`

Hacker Way

 
阅读更多
“黑客咒语”的描述,“代码比毫无意义的争论更有说服力”。因为代码的价值并不会因为你怎么讨论它而改变,也不会因为你画了一个UML图就能对它所能产生的效果有所改变。Meijer说,Facebook的Hacker Way工作方式有五个众所周知的原理:

关注后果:你应该将你的聚焦点放在解决重大问题之后产生了哪些最大影响及结果。
行动要快速:为自己构建能够快速学习的方法,特别是在尝试采取一些有可能是唯一解决方法时,不管有用与否,都要快速决断。
大胆冒险:有尝试,就有失败的可能性,接受失败是最现实的做法。真正的风险是不敢去尝试冒险。
保持开放:其实很多硅谷公司在这一方面做的都很好,例如谷歌和Facebook,一直努力的培养员工在信息上做到公开透明。
建立价值观:你所做的工作应该在整个世界上都要有影响力,而不仅仅是为了创建一个公司而工作。

总的来说,Hacker Way就是拿一个系统的局限性来做实验,采取的方法当然不是公认的、大家都遵守的规则,而是自己的随意所为。用Meijer的话说,黑客就是不喜欢官僚,不喜欢虚伪,更不喜欢无能、无聊之辈。
分享到:
评论

相关推荐

    mongoschema:基于 Mongo 集合中的数据生成 Go 结构类型的工具

    去 github.com/facebookgo/mongoschema 例如,让我们用一些数据创建一个集合: # mongoMongoDB shell version: 2.4.8connecting to: test> db.company.insert({name:"Facebook", address:{street_1:"1 Hacker Way",...

    The Antivirus Hacker's Handbook(Wiley,2015)

    The Antivirus Hacker's Handbook guides you through the process of reverse engineering antivirus software. You explore how to detect and exploit vulnerabilities that can be leveraged to improve future ...

    Hacker's Guide to Scaling Python

    It takes years of practice, research, trial and errors to build experience and knowledge along the way. Simple questions such as "How do I make my code faster?", "How do I make sure there is no ...

    通杀漏洞利用回显方法-linux平台 - 00theway _ blog _ hacker _ exp _ exploit _

    1. 报错回显 2. web中获取当前上下对象(response、context、writer等) 3. 可以出情况下OOB 1. 现状 2. 新的回显思路 3

    hackerrank_myway:我针对hackerrank问题的解决方案

    murchie85针对Hackerrank问题集的解决方案 ![]( “> ) 很多问题的评论部分都会给出答案,但这些问题的解决方案都是我自己的方法,而无需查看答案....因为目标是最终学习和改进。 稍后,我将与最佳解决方案进行...

    The Practical Guide to Become a Hacker pdf(英文版)

    In this chapter, I will try to explain to you how an ethical hacker works, what are his goals and the working method you should follow to become one. CHAPTER 2: THE LABORATORY The first task is to ...

    the web application hacker's handbook

    Because every web application is different, attacking them entails bringing to bear various general principles, techniques and experience in an imaginative way. The most successful hackers go beyond ...

    Black Hat PytHon Python Programming for Hackers and Pentesters

    Python hacker. Those are two words you really could use to describe me. At Immunity, I am lucky enough to work with people who actually, really, know how to code Python. I am not one of those people. ...

    Culture of Programming

    Histories of individual programming languages often take their own contexts for granted, which makes it difficult to connect the dots and understand the history of programming in a holistic way. ...

    Making Things See

    WithMicrosoft's Kinect leading the way, you can now use 3D computervision technology to build digital 3D models of people and objectsthat you can manipulate with gestures and spoken commands....

    The.Antivirus.Hackers.Handbook.1119028752

    You'll begin building your knowledge by diving into the reverse engineering process, which details how to start from a finished antivirus software program and work your way back through its ...

    英文原版-Digital Defense A Cybersecurity Primer 1st Edition

    Locking the “cyber-barn door” after a hacker has struck is way too late. Cyber security, cyber crime and cyber terrorism may seem to be intellectual crimes that don't really touch the average ...

    Understanding the Linux Kernel, Third Edition

    After reading the book, you will find your way through the many thousands of lines of code, distinguishing between crucial data structures and secondary ones—in short, becoming a true Linux hacker.

    Cybersecurity.for.Hospitals.and.Healthcare.Facilities.1484221540

    Cybersecurity for Hospitals and Healthcare Facilities shows what hackers can do, why hackers would target a hospital, the way they research a target, ways they can gain access to a medical grade ...

    Monk, Hacking Electronics 2nd

    one of the most important tools available to the electronics hacker. There are over 20 examples of how to use an Arduino with electronics in this book. You will also learn how to use the Raspberry Pi ...

    Docker-in-Practice.pdf

    In September 2013, while browsing Hacker News, I stumbled across an article in Wired about a new technology called “Docker.” 1 As I read it, I became increasingly excited as I realized Docker’s ...

    Linux Command

    Have you ever noticed in the movies when the “super hacker”—you know, the guy who can break into the ultra-secure military computer in under 30 seconds—sits down at the computer, he never touches ...

    Hack the Stack Using Snort and Ethereal to Master the 8 Layers of an Insecure Netork

    This book is for you then as it details how specific hacker tools and techniques accomplish the things they do. * This book will not only give you knowledge of security tools but will provide you ...

Global site tag (gtag.js) - Google Analytics