I get onto the bus, pick a seat in the corner, and start to listen to Security Now podcast. Online technology communities are notably hostile to newcomers. On community forums, I am always labeled as unqualified to comment on topics. Listening to technology podcasts is my way to gain knowledge so that I will no longer be recognized as a beginner. Suddenly, a voice comes along. “Nice shirt.”
I turn to the right. It is a guy with a big smile on his face. I am confused and I try to smile back, forcefully stretching edges of my squeezed lip onto my ears. “I like your shirt.” He repeats. I peak at my Ubuntu logo printed shirt. A swarm of blood pumps through my heart. It is always exciting to meet Linux operating system enthusiasts.
“Thank you! Do you use Ubuntu too?”
“Yes, kind of. You know, there are so many Linux distros. Ubuntu is one of them.”
He begins to list numbers of distros that I have never heard of. I struggle to follow all the distros’ names but my curiosity is fostering. I tilt my head and look at the window behind him. What kind of geek would use all those different distros?
“You must be experienced with Ubuntu.” He says. He turns toward me. His eyes emit particular light that can break into my dark mind-chamber where I hide the insecurity as a beginner.
“Eh, I only use Ubuntu as my primary operating system. I am not one of those experts who does everything in the terminal.”
Usually, I would explain how Ubuntu is user-friendly to beginners and how awesome Ubuntu online community is, but I decide not to make myself more foolish than I already appear to be. Only newbies use Ubuntu.
“What about you? How do you like Linux? What do you use Linux for?”
“I am taking an information security class.”
My blood starts boiling. I have always had a dream to become a security expert. However, after I learn more about the industry via podcasts, I decided not pursue my dream. White hat hackers do not always get paid. People do not appreciate their effort to create a safer Internet. Some even regard security experts as troublemakers. I have so many questions need answers.
“You must be one of those Kali Linux guys in the show Mr. Robert. What are you working on?” I interrupt him.
“I do use Kali Linux. Kali Linux is designed for penetration testing. I am trying to remote control a PC run on Ubuntu. Why do you choose Ubuntu?”
I have watched enough Def Con presentations to comprehend how difficult it is to remote control a modern operating system. I try to conceal my excitement and decide to tell a funny joke before asking series questions.
“Computers are like air conditioners, they can’t work while Windows are open.”
Linux online communities love poking fun of Windows. I am expecting a laugh, but nothing happens. He is sitting there, smiling. Then, I start to list every unpleasant experience with Windows. Still, I get no reaction from him.
“Have you tried Windows 10?” he asks.
This question makes me suspicious about whether he is the security expert I have always wanted to meet. Windows 10 is notorious for collecting users’ private information. Of course, I avoid using Windows 10. There is one simple way to test whether he is a hacker.
“No. What operating system do you run on your laptop? Where do you install your Linux distros?”
“I am running Windows 10 as my host operating system. I run Linux distros in VirtualBox. It is so convenient, you can run any OS in VirtualBox. Look, here is my note from hacking class. Do you know any of those terms?”
There is a long list of words in his note. I quickly spot the word VPN. He is definitely not a security expert. A white hat would have been using a VPN every day. I get even more excited. Although I will not get my questions answered, I get to destroy a beginner’s “unrealistic” dream just as how my dream was crushed by experts in the tech industry.
“It is so dangerous to become a hacker. It is so easy for your internet service provider to acknowledge that you are doing naughty things on the Internet. Even if you are using a VPN, FBI still can find you via the real-time attack. If you use Tor all the time, you should expect that the ISP has already put you on a naughty list. This year, FBI arrested one teenager during Def Con for being able to find the flow in WannaCry ransomware code. Another one was arrested….”
Before I finish my sentence, he suddenly stands up.
“Excuse me, it is my stop.”
After he leaves his seat. I spread out my arms feeling relaxed. The triumph of victory is ringing in my ears. My eyebrows are dancing. My smile becomes natural. I can speak English more fluently. My confidence has reached another new peak value.
My Dream
I step onto the bus, pick a seat in the corner, and start to listen to Security Now podcast. Online technology communities are notably hostile to newcomers. On community forums, I am always labeled as unqualified to comment on topics. Listening to technology podcasts is my way to gain knowledge so that I will no longer be recognized as a beginner. Suddenly, a voice comes along. “Nice shirt.”
I turn to the right. It is a young man smiling at me. I try to smile back, forcefully stretching edges of my squeezed lip onto my ears, but the prefrontal cortex is too weak to separate my frowning brows. “I like your shirt.” He repeats. I peak at my Ubuntu logo printed shirt. A swarm of blood pumps through my heart. It is always exhilarating to meet Linux operating system enthusiasts.
“Thank you! Do you use Ubuntu too?”
“Yes, kind of. You know, there are so many Linux distributions. Ubuntu is one of them.”
A list of cyphered distro names transmit through his larynx. My biological processor, the receiving side, struggles to decrypt the message but my curiosity is fostering. I tilt my head and look at the window behind him. What kind of geek would use all those different distros?
“You must be experienced with Ubuntu.” He says. He turns toward me. His visual detectors emit particular electromagnetic waves that can traverse my dark mind-chamber where I hide the insecurity as a beginner.
“Eh, I only use Ubuntu as my primary operating system. I am not one of those experts who does everything in the terminal.”
Usually, I would explain why Ubuntu is user-friendly to beginners and how splendid Ubuntu online community is, but I decide not to make myself more foolish than I already appear to be. Only newbies use Ubuntu.
“What about you? How do you like Linux? What do you use Linux for?” I ask.
“I am taking an information security class.”
My blood starts boiling. I have always had a dream to become a security expert. However, the more I learn about the industry, more impenetrable hurdles emerge between me and my dream. White hat hackers do not always get paid. People do not appreciate their effort to create a safer Internet. Some even regard security experts as troublemakers. I have so many questions that need answers. My deep buried dream shines again.
“You must be one of those Kali Linux guys in the show Mr. Robert. What are you working on?” I interrupt him.
“I do use Kali Linux. Kali Linux is designed for penetration testing. I am trying to remote control a PC running on Ubuntu. Why do you choose Ubuntu?”
The only lesson which Def Con presentations have taught me is that the level of difficulty to remote control a modern operating system is beyond my comprehension. The prefrontal lope is working overtime against its fierce enemy, adrenal gland. I decide to tell a funny joke before asking a series of questions.
“Computers are like air conditioners, they can’t work while Windows are open.”
Linux online communities love poking fun of Windows. I am expecting a laugh, but nothing happens. He is sitting there, smiling. Then, I enumerate every unpleasant experience with Windows. Still, I get no reaction from him.
“Have you tried Windows 10?” he asks.
“No!”
Of course not. Windows 10 is notorious for collecting users’ private information. His question makes me suspicious about whether he is the security expert I have always wanted to meet. There is one simple way to test whether he is a hacker.
“What operating system do you run on your laptop? Where do you install your Linux distros?”
“I am running Windows 10 as my host operating system.” He answers. “I run Linux distros in VirtualBox. It is so convenient, you can run any OS in VirtualBox. Look, here is my note from the hacking class. Do you know any of those terms?”
There is a long list of words in his note. I quickly spot the word VPN. He is definitely not a security expert. A white hat hacker would have always been using a VPN. I get even more thrilled. Although I will not get my questions answered, I get to destroy a beginner’s “unrealistic” dream just as how experts crushed my dream years ago.
“It is so dangerous to become a hacker. It is so easy for your internet service provider to acknowledge that you are doing naughty things on the Internet. Even if you are using a VPN, FBI still can find you via the real-time attack. If you use Tor all the time, you should expect that the ISP has already put you on a naughty list. This year, FBI arrested one teenager during Def Con for being able to find the flaw in WannaCry ransomware code. Another one was arrested….”
Before I can finish my sentence, he suddenly stands up.
“Excuse me. It is my stop.”
After he leaves his seat, I spread out my arms enjoying the excessive dopamine production. The triumph of victory is ringing in my ears. My eyebrows are dancing. My smile becomes natural. I can speak English more fluently. My confidence has reached to another new peak value.