Skip to main content

5 Things Designers Can Learn from Hackers



I know what most of you might be thinking…what in the world can respectable graphic designers learn from notorious hackers? But hold your horses everyone, don’t jump to conclusions just yet. 

We all are familiar with hackers and their work. A hacker is someone who thinks unconventionally and works with curiosity and ambition. He is someone who perceives rules as barriers to innovation. A hacker is a person who tests the freedom and limitation of systems to satisfy his curiosity. Now we don’t need to emulate the notorious actions of hackers, but we can surely learn from their positive points. 

Here are five things that graphic designers learn from hackers: 

Think outside the box 

The first thing that graphic designers can learn from hackers is to think out-of-the-box. Hackers are people who wish to make a name by achieving the impossible. They want to accomplish feats no one has ever achieved. 

In order to make that happen, they think out of the box and develop new tricks and techniques to tackle any barriers coming in their way. For them,creativity has no limits. Similarly, graphic designers should also come up with out-of-the-box solutions for their graphic design problems. 

Break the rules 

Now don’t get me wrong here, I don’t mean that graphic designers should go around breaking signals and other laws of the society. What I mean is that you should not blindly follow the conventions and trends prevalent in the graphic design industry. 

This doesn’t mean that graphic designers can go around stealing others’ work. On the contrary, it means that you shouldn’t bind yourself withdesign trends and should strive for uniqueness. 

Curiosity to explore 

There is one thing that you will find constant among every hacker…the curiosity to explore. It is this curiosity that drives them to explore the loopholes of the system and exploit them to their requirements. 

The author Arnold Edinborough once said, “Curiosity is the very basis of education and if you tell me that curiosity killed the cat, I say only the cat died nobly.” Graphic designers should also learn to be curious and inquisitive in nature. They should learn to explore every area of graphic design in order to keep themselves up-to-date. 

“Never say die” 

As I mentioned earlier, hackers have a “never say die” attitude. No matter how strict the security controls are, they will always find a way in. Hackers are constantly updating themselves with the latest security features searching for loopholes and walkthroughs. 

This similar approach should also be adopted by graphic designers as well. They should also keep themselves well apprised of the latest events in their field and stay updated with the latest software and techniques. 

Desire for information 

We have learnt from Julian Assange, founder of WikiLeaks and one of the people to have revolutionized the internet, that hackers also desire information. After the advent of WikiLeaks, a large vacuum of information had been filled, courtesy the hackers who wanted to expose the ‘real information’ to the world. 

For graphic designers, the desire for information is essential as well. Some graphic designers avoid obtaining information from their clients regarding the project. In the end, the client shows his dissatisfaction with the work; information collection is critical to the success of any venture. 

Comments

Popular posts from this blog

CIA Triad for- Base of Information security

The essential security principles of confidentiality, integrity, and availability are often  referred to as the  CIA Triad. All security controls must address these principles. These three  security principles serve as common threads throughout the CISSP CBK. Each domain  addresses these principles in unique ways, so it is important to understand them both in  general terms and within each specific domain: Confidentiality is the principle that objects are not disclosed to unauthorized subjects. Integrity is the principle that objects retain their veracity and are intentionally modified by  authorized subjects only. Availability is the principle that authorized subjects are granted timely access to objects  with sufficient bandwidth to perform the desired interaction. Different security mechanisms address these three principles in different ways and offer varying  degrees of support or application of these principles. Objects must be properly classified

List of Company Slogans

·          3M : "Innovation" ·          Agere Systems : "How Communication Happens" ·          Agilent : "Dreams Made Real" ·          Airbus : "Setting the Standards" ·          Amazon.com : "…and You're Done" ·          AMX : "It's Your World. Take Control" ·          Anritsu : "Discover What's Possible ·          AT&T : "Your World. Delivered" ·          ATG Design Services : "Circuit Design for the RF Impaired" ·          ATI Technologies : "Get In the Game" ·          BAE Systems : "Innovating for a Safer World" ·          Ball Corporation : "The Leader in Small Space and Rocket Systems" ·          BellSouth : "Listening, Answering" ·          Blackhawk : "Powering DSP Development" ·          Boeing : "Forever New Frontiers" ·          Bose Corporation : "Better Sound Through Research" ·          Bowers & Wil

My Article :- હેકર બનવું છે? કઈ રીતે?

મારી ૨ વર્ષ ની કારકિર્દી માં મને કેટલાય  લોકોએ, ખાસ કરીને કોલેજ ના વિદ્યાર્થીઓએ ઘણી વાર પૂછ્યું છે કે "મારે હેકર બનવું છે. તો હું શું કરું? " અને મારા બ્લોગ્સ માં પણ પૂછવામાં આવે છે કે એક સારો હેકર કઈ રીતે બની શકાય? એવું હું શું કરું અથવા તો મારા માં કઈ લાયકત હોવી જોઈએ એક હેકર બનવા માટે? આ પ્રશ્ન નો સંતોષકારક જવાબ આપવા માટે મેં internet પર શોધખોળ કર્યા પછી મને જે કઈ માહિતી મળી તેને હું આજે અહી રજુ કરું છું. મિત્રો, સૌપ્રથમ હેકર કઈ રીતે બનવું એ જાણવા પહેલા એ જાણવું જરૂરી છે કે ખરેખર હેકિંગ શું છે ? અને હેકર કોને કહેવાય. હેકિંગ ની સીધી અને સરળ વ્યાખ્યા નીચે મુજબ છે.  "તમારા કમ્પ્યુટર,નેટવર્ક(ઈન્ટરનેટ કે LAN દ્વારા) કે કોઈ ડીવાઈસ માં (ફોન, ટેબ્લેટ) માં કરવામાં આવતા ગેરકાયદેસર પ્રવેશ અને ઉપયોગ એ હેકિંગ કહેવાય છે."અને હેકિંગ કરતા લોકોને હેકર કહેવાય છે. હવે તમને થશે કે આવું શું કામ કરવું જોઈએ? આ તો ક્રાઈમ છે. તો તમને જણાવી દઉં કે હેકર મુખ્યત્વે ૨ પ્રકારના હોય છે.    વાઈટ હેટ હેકર્સ (એથીકલ હેકર્સ) : ધારો કે તમે તમારો ફેસબુક નો પાસવર્ડ ભૂલી ગયા(ખરેખર ના ભૂલતા ક્યારેય..)કે ત