Frankly about the secret: who is a user? Who is a user? From a user to a hacker - and it's all the same.


Everyone has the Internet. And today almost every child knows how to use a computer, not to mention adults. Computer literacy is taught to one degree or another in schools, universities and colleges. But who the student becomes next, what skills he masters is a matter of time and the user himself. It is only known that everyone communicating with a PC falls into one of five groups: teapot, user, lamer, solver and hacker. Everything is individual. And now we will talk about the most intimate thing - the ability to manage electronic systems.

The kettle boiled, and at least

When talking about who a teapot, a user, a lamer and other users of personal computers are, they mean a specific person, and not household items or kitchen utensils. Although the namesake sitting at the computer has not advanced much further in his knowledge than his relative in the kitchen. And both perform boiling functions, only one - water, and the second - brains. You've probably heard the expression “brains melt,” so that's where it comes from. A teapot is actually a user of a computer and everything attached to it (Internet, hardware, communications), who understands little in such areas and does not want to delve into it due to laziness or other reasons. The only thing he can do is turn the system unit on and off and move the mouse. As for the rest, nothing matters. Another significant obstacle to skilled surfing for dummies is their fears. Afraid of clicking in the wrong place or pressing the wrong key, such people try not to go anywhere.

Who is a user and how is he different from a teapot?

Don’t feed these Internet users bread, but let them surf the vastness of the World Wide Web. They are everywhere, and there are as many of them as ants. Ninety percent of PC, laptop, tablet and smartphone users are the most avid users. They do nothing significant except play games, register on social networks and other obscure projects, and communicate in instant messengers. In short, they spend their time having fun and searching for interesting information. Users are also permanent residents of online stores, where they can buy some cool stuff for next to nothing. They are not burdened by writing comments on blogs and forums and watching movies on YouTube and Yandex Video all day long. Probably any dog ​​whose owner has a more or less decent computer knows who a user is. Unlike dummies, these brave men are not afraid of anything and boldly clog their hard drives with a bunch of unnecessary junk, coupled with viruses, from which they then spend a long time treating their electronic hardware.

Lamer, or Plyushkin

Well, who the user is is now clear. Let's consider the next category - lamer. These people spend their precious time on the Internet actually out of curiosity. These are mainly clients of visited resources, forums, blogs, investment companies and business sites. They hang out online and do almost the same things every day. Lamers love to subscribe to various mailing lists, write big complaints to admins and gossip in chats. Such users do not want to get acquainted with computer architecture. They tend to know antiviruses and cleaning utilities, as well as software for collection rather than for use. But nothing more. Lamers are ordinary Plyushkins. This is where their functions end, and although they boast of their knowledge of software and drivers, the rest of the work is done for them by so-called solvers or professionals.

Internet Geeks

We have figured out the definitions of who a user is, as well as a lamer and a kettle. The most reliable contingent on the Internet, who have risen to the highest level, can be called specialists in various fields of information systems and management. These are real experts in their field. Programmers and marketers, freelancers and designers, copywriters and content managers in different directions. They work wonders. to express themselves - they develop software in Visual Basic, JavaScript, C++. Internet codes are implemented: html, php, css. They build databases and architecture, create websites, CMS systems and design. Manage advertising campaigns and fill resources with text and graphic information. Experts carry out any technical work, from the basics of computer hardware to complex web site diagrams.

From user to hacker - and in the kings

It turns out that those who can be called users are, in a sense, very close behind hackers in the hierarchy. Although the latter are not just anyone, but seasoned masters in writing malware and hacking resources. At its core, a user is a user who does not understand program codes, but this is where the trick is hidden. Without delving into the meaning of infection, such thoughtless onlookers can spread viruses to thousands of computers without even meaning to. They do not know how to defend themselves and pick up Trojans and rootkits wherever possible. Then they pass them on to acquaintances and friends, and the rest is clear without words... But hackers are a specialized team trained in accordance with all the rules and canons. They “ate their teeth” in fraud and, not disdaining anything, can destroy any Internet target with one wave of the hand, be it the site of an ordinary lammer or a portal of national importance. But, thank God, reliable means of protection against them are now being created and implemented.

Everyone has their own path

Having learned to use an electronic machine at least a little, the teapot, willy-nilly, understands who the user is and moves into this caste. After wandering around the World Wide Web, he chooses one of two roads:

  1. Stay at the same level and strengthen your Internet surfing skills.
  2. Continue your training and become a confident pro.

Everyone has their own path. Well, if you feel confident and excited about acquiring computer skills, then go for it and don’t stop there!

So, if you are reading these lines, then I can draw two conclusions: first, you know how to read, and second, most likely you have a computer. And now the question: how many times have you been offended when your mouse brothers called you “user”, “lamer”? You probably won’t remember anymore. What if you figure it out? Of course, it is difficult to give an exact definition, but 5 main groups can be distinguished:

Kettle is a person who has just begun to take his first steps into the world of information technology. His main problem is fear. It is fear that prevents him from becoming a confident computer user. Trying something new, clicking on the button that confirms deletion is a whole lot of stress for him. At work, the kettle becomes a ridicule for colleagues and the system administrator, and it is these ridicules that force him to overcome his fears and become a user, and the sooner this happens, the better! We were all (or still are) teapots, no need to be offended by this.

User(from English user - user) is probably the largest part of the computer population of our planet. The user can be compared to a bird that spent part of its life in a cage and suddenly gained freedom. Word and Excel no longer cause him any difficulties; the Internet is moving from the category of scary legends about viruses to the category of an integral part of his life. The hard drive is slowly becoming clogged with junk, which it seems impossible for him to live without. This definition is suitable for an “ordinary user”, and in addition, there is a “confident user” - in addition to the qualities described above, he has an average knowledge of hardware and software, his friends respect him, and sometimes they turn to him for advice.

Lamer- this is a half-hacker re-user who usually explains with a smart look what he himself doesn’t understand a damn thing about, he doesn’t even have the word “I don’t know” in his vocabulary. So rest assured, if you turn to him with any question, you will definitely receive an answer, but whether you should listen to him is up to you to decide! The average lamer usually takes on anything. Let's say an article on overclocking a processor caught his eye, without thinking twice he rolls up his sleeves and gets down to business... Usually this ends with an emergency trip to the computer store for a new part, well, a negative result is also a result! Most lamers are very fond of teapots. Why? Yes, I just like to hang computer noodles on their ears.

Hacker. How do you imagine it? Probably like this: a puny little bespectacled guy with bulging eyes, driving the ominous code of a new virus into the body of the program? There are probably some, but in general this is a fairly small group of people, consisting mainly of dropouts from computer departments. Their main occupation is searching for vulnerabilities and doing nasty things to others. In general, these are pretty smart guys, and only God knows why they chose this particular self-realization.

IT specialists– this group includes a variety of subclasses, including Web masters, programmers, system administrators, and technical engineers; the only thing they have in common is that they are experts in their field. According to statistics, these are the most fashionable specialties, of course - as one wisdom says: “Only an IT specialist can ask the boss for 100 dollars as a souvenir, and get it.”

And finally, I want to say: if someday a book “Windows for Dummies” falls out of a programmer’s drawer, don’t laugh at him, because perhaps he, too, was once looking for the “any key” key.

Lamer, lamer, lamer...
Sits at the computer, thinks - a hero,
Super hacker, by nature.
I downloaded tren from the Internet, and
And he was going to nuke everyone.

And he still hasn’t figured out how to connect Windows.
Not long ago I learned to click the mouse,
My computer opens - he has achieved a lot.
But what is Windows?
No idea, just press the Enter button
He presses all the time.

And starts DOS, accomplishes the feat,
He doesn't know a single command in it yet.
And who is it? Do not tell me.
Who who is this? Do not speak.

And damn!!! This is lamer!

Lamers on the network, lamers on the network,
Lamers on the network, lamers on the network.
Who?
Lamers on the network, lamers on the network.
Where?
Lamers, lamers..
Who? Who?
Lamers...

I bought a bag of literature about computers,
And I didn’t forget the “Hacker Soft” disk.
I sat, read, studied programs,
He threw a bag at his fellow lamer,
He shouted "I am a great hacker! I have learned how to carry out the attack element."
And he still doesn’t know what to do with the Trojan,
He edits the server himself and launches it,
Scanning ports, pinging everyone,
Well, he still doesn’t smell what all this smells like.

And who is it? Do not tell me.
Who who is this? Do not speak.
And who is it? It's not difficult to understand
And damn!!! This is lamer!

Lamers on the network, lamers on the network,
Lamers on the network, lamers on the network.
Who?
Lamers on the network, lamers on the network.
Where?
Lamers, lamers..
Who? Who?
Lamers...

Dedicated to all pseudo-hackers,
To all those lamers who
They imagine themselves to be super hackers.
Who really can't do anything else.

Simplynet, demon, nazar,
I also want to add that a new abbreviation has appeared
By the way, a lamer is a houser,
Bad user.

Lamers on the network, lamers on the network,
Lamers on the network, lamers on the network...
Lamers, lamers...

Lamer, lamer, lamer...
Sitting at the computer, I think - a hero
Super hacker in the nature of such.
I downloaded friction with the Internet, and
And all the nuke going.

And how to connect Windows, it is not yet understood.
Not long ago I learned how to click the mouse,
My Computer Opens - he has achieved a lot.
But what he has is Windows
It is not only the Enter button
All the time presses.

And run DOS, makes the feat,
Not one team in it, he does not know yet.



And fuck!!! It lamer!



Who?
Lamer in the network, the network lamer.
Where?
Lamer, lamer...
Who? Who?
Lamer...

Bag literature about computers bought
And the drive & Hacker Soft & is not forgotten.
He sat, reading, studying programs,
His fellow-lamer package overwhelmed,
He yelled & I am a great hacker! I learned how to carry out the attack element & quot ;.
And what to do with the Trojan, he does not know yet
He himself Edith server starts,
Ports scans all consecutive pings,
Well, how it smelled not yet feels.

And who is it? Don't tell me.
Someone who is it? Don't speak.
And who is it? It is not difficult to understand,
And fuck!!! It lamer!

Lamer in the network, the network lamer,
Lamer in the network, the network lamer.
Who?
Lamer in the network, the network lamer.
Where?
Lamer, lamer...
Who? Who?
Lamer...

Dedicated to all the pseudo-hackers,
All the lamer that
Imagines himself a super-hacker.
That really can't do anything more.

Prostonet demon, Nazar,
I also want to add a new abbreviation
By the way lamer - huyuzer,
Bad user.

Lamer in the network, the network lamer,
Lamer in the network, the network lamer...
Lamer, lamer...

Biblical version

In the beginning there was Lamer. Lamer gave birth to User. The user gave birth to Hacker and his brother Kracker. The hacker gave birth to Sysop.

Sysop was ordered from Above and he became a Sysadmin. The system administrator gave birth to the Provider. And the Internet Provider saw it and said it was good.

Then the Provider saw Lamer and said that this was bad. Lamer, the primary source and root cause of all the troubles of Sysop, the SysAdmin, the Provider and the Internet as a whole, began to follow the commandment: “be fruitful and multiply.”

And the number of lamers on the Internet has multiplied immensely.

Darwinian version

Modern scientists have come to the conclusion that different people descended from monkeys of different breeds. For example, the Lamer tribe descended from fold-eared macaques.

Like their ancestors, the lamers kept in a large flock and observed tribal relations. They were engaged in gathering, hunting and fishing.

But they didn’t do it well, so the lamers had to raid their neighboring users. They believed in a Higher Power called Sysadmin, and many lower rank deities - Sysops.

Lamers also believed in “heaven” “rulez”) - when in the afterlife a lamer meets a dual-processor Pentium Pro with 2 GB memory, a free dedicated channel of 2 Mb/sec or at least a 33600 connection, a 21-inch monitor and a dad-provider, and " hell" (or "Mazday"), where a terrible punishment awaits the lamer in the form of a 286 without a coprocessor, a 2400 modem without parity control and 20 megabytes in email from an angry system administrator, who "hasn't been paid for six months."

The lamer's closest neighbors, users, evolved faster. And while the users had already learned to get their food with the help of tamed animals such as “mouse,” the lamers used the latter to knock nuts from palm trees. Therefore, the lamers were terribly jealous of the users. Advanced fellow tribesmen were kicked out of the herd in disgrace, shouting after him “user-moderator!”, or even simply eaten.

However, it was thanks to random coincidences that the lamers invented the digging stick and the joystick thresher, the log drag and the wheel, but unfortunately, history has not preserved the names of these lamers.

And since the majority of lamers preferred physical strength to thought, spending energy not on thinking, but on breaking through walls and typing text in a binary system, as a result the limbs of the lamers became tenacious and fast, while their brains mutated and atrophied.

Historical version

Postulate one: the lamer knows very little.

Postulate two: the lamer is confident that he knows a lot.

Postulate three: it is impossible to explain to the lamer the validity of the first postulate.

Postulate four: if a lamer has come to terms with the first postulate, he is no longer a lamer.

The last postulate: all lamer discoveries occur due to a misunderstanding.

Example: in the era of great historical discoveries, one lamer decided that he could open a new route to India. He did not bother to thoroughly study nautical and navigational charts.

Smart people tried to persuade him not to do stupid things. A lamer would not be a lamer if he listened to smart people. He equipped four ships and set off across the ocean. Along the way, people died and ships sank.

As a result, the lamer, half dead from fever, saw the land and confidently called it India. Lamer, naturally, was mistaken. This is how America was discovered by Columbus.

Biological version

The common lamer (lamerus vulgaris - lat.) is a warm-blooded animal of the user family.

Body type: dochlomorphic. Brain volume: no brain detected. Presence of a tail: absent. Presence of horns: probable. Limbs - 4 pieces, the right front one ends with a strange two- or three-button manipulator appendage.

Hair: unstable. Below the back is a callous formation. Paradigm: sluggish. Falls into suspended animation at the word "Unix".

It is active during the daytime. Ability to reproduce: reproduces virally.

Lactation: absent. Configuration: non-expandable. Speech: rudimentary. Hearing: developed, acute, sensitive to the entire frequency range. Reaction: inadequate. Coordination: impaired.

Features: once a year, in the spring, increased activity of these creatures is observed.

Lamers gather in flocks, and huge herds rush to the area of ​​the Moscow River embankment, to the Expo Center on Krasnaya Presnya.

Animals are trying to get into the Comtek exhibition, rushing at the fence, at the guards, gnawing holes in the concrete, showing the rudiments of intelligence, getting entrance tickets.

Once inside, they sweep away everything in their path, filling their pockets and bags with badges, booklets, price lists and press releases.

Attacking the mouse-pad, they seize it with loud and sharp screams. They strive to drag all the prey to their nest.

The violent insanity lasts for several days. After which the lamers disappear, where is unknown. Most likely, they rush into the oncoming waves of the Moscow River.

This achieves a natural balance in population size. It is recommended to keep them in closed enclosures, in complete isolation from personal electronic computers and especially from servers, the contemplation of which leads to heart failure.

The version is paradoxical - lamers are needed!

The conclusion from the above suggests itself as follows: the lamer is a useless creature and in some places even harmful. And yet, wherever you spit, there are lamers everywhere. No dusts, rides, traps or passwords can defeat them.

But in fact, lamers are useful creatures. Thanks to communication with them, sysops and system administrators develop speech, reaction, intuition and memory.

Thanks to them, hungry for the Internet, providers are getting rich. In addition, there is healthy competition, because every lamer has a small chance to someday become a user, and then, you see, he will grow into a sysop...







2024 gtavrl.ru.