
Chapter 1: Frequently Asked Questions
Unlike my previous Burmese books, I decided to write this one in a way that feels comfortable for me. That’s why I titled the first chapter as such. Based on my experience, many beginners interested in hacking often have similar questions:
- Is studying hacking legal?
- Does hacking invade other people's privacy?
- Is hacking about stealing Facebook or Gmail accounts?
- If I learn hacking, will I be able to unlock Facebook accounts?
- Will learning hacking help me get a job? Will it pay well?
- Is Kali Linux mandatory for learning hacking, or can other tools work too?
- Can hacking be learned on a phone, or is a computer required?
What is hacking?
The term “hack” originates from around the 1200s, and by 2025, it has existed for over 825 years. Interestingly, the world’s first computer was developed around the 1600s, making the word “hack” much older than computers. Initially, "hack" referred to cutting something irregularly or randomly, as defined in the Oxford Dictionary.
Over time, the term evolved to mean expertise in a particular domain. In the tech world, "hack" and "hacker" became widely used in the late 19th century. The 1975 “Jargon File” defined a hacker as:
A hacker is someone who deeply explores and understands technological systems, uncovering their strengths and weaknesses. They are often curious, persistent, and innovative.
Is studying hacking legal?
Yes, learning hacking is legal. It’s comparable to how both criminals and law enforcement officers learn how to use firearms. The purpose and intent determine whether hacking is used legally or illegally.
Does hacking invade privacy or involve stealing accounts?
Hacking involves understanding and exploring technological systems. While it can be used to breach accounts (like Facebook or Gmail), ethical hacking focuses on preventing such breaches by identifying vulnerabilities.
Can hacking skills get you a job?
Yes, but the opportunities depend on your skills and location. In Myanmar, hacking-related jobs are still rare. However, as security becomes more critical worldwide, opportunities in fields like freelance bug bounty hunting, workshops, and corporate roles are expanding.
Is Kali Linux mandatory?
No, you can use any operating system you prefer, such as Windows, MacOS, or Linux. Kali Linux is commonly used because it comes preloaded with tools designed for hacking, has a strong community, and offers extensive resources.
Can hacking be learned on a phone?
While it’s possible, it’s not ideal. Phones have limitations, such as smaller screens and less compatibility for setting up labs. It’s better to learn hacking on a computer for a comprehensive experience.
Final Thoughts
Hacking itself is neutral—it depends on how people use it. Ethical hackers (White Hat Hackers) use their skills to protect systems, while malicious hackers (Black Hat Hackers) exploit vulnerabilities for personal gain. There are also Gray Hat Hackers, who fall somewhere in between.
Hacking requires patience, determination, and a genuine interest in technology. It’s not just about finding shortcuts or solving problems—it’s about understanding systems deeply.
Let’s continue to the next chapter.
0 Comments