13.03.2013 Views

Hacking the Xbox

Hacking the Xbox

Hacking the Xbox

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

CHAPTER 13<br />

Onward!<br />

The state of <strong>the</strong> art in <strong>Xbox</strong> hacking is constantly advancing. Thousands of<br />

hackers are constantly researching, innovating, discovering, and sharing<br />

new methods and techniques for making <strong>the</strong> <strong>Xbox</strong> a more useful and<br />

valuable piece of hardware to its end users. Keeping abreast of <strong>the</strong> latest<br />

developments in hacking can be overwhelming. Hopefully, reading this<br />

book has given you <strong>the</strong> faculties to understand <strong>the</strong> latest posts and news<br />

on various websites and web fora dedicated to <strong>Xbox</strong> hacking. This<br />

chapter discusses where you can go to find out more about <strong>the</strong> latest<br />

hacks, where to ask for help, and how you can contribute your unique<br />

abilities and perspective to <strong>the</strong> community. This chapter also discusses<br />

some of <strong>the</strong> larger challenges that will face hackers in <strong>the</strong> future, namely<br />

<strong>the</strong> trusted PC initiatives.<br />

The <strong>Hacking</strong> Community<br />

<strong>Xbox</strong> hackers are an anarchistic community that works mostly underground,<br />

keeping in touch and sharing information through various Internet “fora”<br />

(fora is <strong>the</strong> plural of forum, as data is <strong>the</strong> plural of datum). Most of <strong>the</strong><br />

<strong>Xbox</strong> hacking community keeps a low profile, and hackers often use<br />

pseudonyms to protect <strong>the</strong>ir identities. The reasons for using pseudonyms<br />

varies, but in general anonymity carries <strong>the</strong> benefit of greater operating<br />

freedom. Hackers are more inclined to share <strong>the</strong>ir results and findings if <strong>the</strong>y<br />

know <strong>the</strong>y can back away unsca<strong>the</strong>d in case things get ugly. The use of<br />

pseudonyms also levels <strong>the</strong> playing field. Hackers judge each o<strong>the</strong>r primarily<br />

on <strong>the</strong> basis of <strong>the</strong> quality and frequency of <strong>the</strong>ir contributions, and little<br />

else. The fact that you may be young does not detract from your first<br />

impression or street credibility, as it might in o<strong>the</strong>r situations. Likewise,<br />

many hackers have no qualms about being blunt when you’ve made an<br />

error, and <strong>the</strong>y have even less patience for stupidity presented as erudition or<br />

rude assertions. On <strong>the</strong> o<strong>the</strong>r hand, many hackers are more than happy to<br />

extend a hand to those who have made an honest effort to read <strong>the</strong> FAQs,<br />

search <strong>the</strong> web and generally try <strong>the</strong>ir best to check and make sure that <strong>the</strong><br />

question hasn’t already been answered.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!