“黑客咒语”的描述,“代码比毫无意义的争论更有说服力”。因为代码的价值并不会因为你怎么讨论它而改变,也不会因为你画了一个UML图就能对它所能产生的效果有所改变。Meijer说,Facebook的Hacker Way工作方式有五个众所周知的原理:
关注后果:你应该将你的聚焦点放在解决重大问题之后产生了哪些最大影响及结果。
行动要快速:为自己构建能够快速学习的方法,特别是在尝试采取一些有可能是唯一解决方法时,不管有用与否,都要快速决断。
大胆冒险:有尝试,就有失败的可能性,接受失败是最现实的做法。真正的风险是不敢去尝试冒险。
保持开放:其实很多硅谷公司在这一方面做的都很好,例如谷歌和Facebook,一直努力的培养员工在信息上做到公开透明。
建立价值观:你所做的工作应该在整个世界上都要有影响力,而不仅仅是为了创建一个公司而工作。
总的来说,Hacker Way就是拿一个系统的局限性来做实验,采取的方法当然不是公认的、大家都遵守的规则,而是自己的随意所为。用Meijer的话说,黑客就是不喜欢官僚,不喜欢虚伪,更不喜欢无能、无聊之辈。
分享到:
相关推荐
去 github.com/facebookgo/mongoschema 例如,让我们用一些数据创建一个集合: # mongoMongoDB shell version: 2.4.8connecting to: test> db.company.insert({name:"Facebook", address:{street_1:"1 Hacker Way",...
The Antivirus Hacker's Handbook guides you through the process of reverse engineering antivirus software. You explore how to detect and exploit vulnerabilities that can be leveraged to improve future ...
It takes years of practice, research, trial and errors to build experience and knowledge along the way. Simple questions such as "How do I make my code faster?", "How do I make sure there is no ...
1. 报错回显 2. web中获取当前上下对象(response、context、writer等) 3. 可以出情况下OOB 1. 现状 2. 新的回显思路 3
murchie85针对Hackerrank问题集的解决方案 ![]( “> ) 很多问题的评论部分都会给出答案,但这些问题的解决方案都是我自己的方法,而无需查看答案....因为目标是最终学习和改进。 稍后,我将与最佳解决方案进行...
In this chapter, I will try to explain to you how an ethical hacker works, what are his goals and the working method you should follow to become one. CHAPTER 2: THE LABORATORY The first task is to ...
Because every web application is different, attacking them entails bringing to bear various general principles, techniques and experience in an imaginative way. The most successful hackers go beyond ...
Python hacker. Those are two words you really could use to describe me. At Immunity, I am lucky enough to work with people who actually, really, know how to code Python. I am not one of those people. ...
Histories of individual programming languages often take their own contexts for granted, which makes it difficult to connect the dots and understand the history of programming in a holistic way. ...
WithMicrosoft's Kinect leading the way, you can now use 3D computervision technology to build digital 3D models of people and objectsthat you can manipulate with gestures and spoken commands....
You'll begin building your knowledge by diving into the reverse engineering process, which details how to start from a finished antivirus software program and work your way back through its ...
Locking the “cyber-barn door” after a hacker has struck is way too late. Cyber security, cyber crime and cyber terrorism may seem to be intellectual crimes that don't really touch the average ...
After reading the book, you will find your way through the many thousands of lines of code, distinguishing between crucial data structures and secondary ones—in short, becoming a true Linux hacker.
Cybersecurity for Hospitals and Healthcare Facilities shows what hackers can do, why hackers would target a hospital, the way they research a target, ways they can gain access to a medical grade ...
one of the most important tools available to the electronics hacker. There are over 20 examples of how to use an Arduino with electronics in this book. You will also learn how to use the Raspberry Pi ...
In September 2013, while browsing Hacker News, I stumbled across an article in Wired about a new technology called “Docker.” 1 As I read it, I became increasingly excited as I realized Docker’s ...
Have you ever noticed in the movies when the “super hacker”—you know, the guy who can break into the ultra-secure military computer in under 30 seconds—sits down at the computer, he never touches ...
This book is for you then as it details how specific hacker tools and techniques accomplish the things they do. * This book will not only give you knowledge of security tools but will provide you ...