Testimony from computer forensics and hacking experts: Hi, I am a hacker!

The most common visual effect is the pale nerd in his mother ’s basement. He is entering the university server to change his competitor ’s grade to fail. Then there are various depictions of Hollywood, showing “main criminals” manipulating traffic signals and financial markets. This is the latest usage of the term “hacker” and its meaning has been completely different over the years.

In the early 1990s, when Linux (a popular free computer operating system) was introduced, the word hacker did not even exist. Users of these operating systems call themselves “hackers” simply because they have the ability to manipulate and reuse programming code for their own purposes, rather than their original intended purpose. If you think of them as chefs, then everyone will have a basic recipe for lobster chowder, but each chef will put their own characteristics on the recipe to make it their own dish. They used to be very capable programmers and were keen to write their own programs.

Most of these “hackers” are good at using their skills. For example, help friends who need new software to track grocery store inventory. Then there are some more famous hackers, including Steve Jobs and Bill Gates, who made a lot of money by creating home computers for the family. A small number of people use their skills for despicable purposes, such as Kevin Polson and Adrian Lamo. These shameful hackers made the lofty hobby of computer manipulation notorious.

Due to a lot of media attention on this topic, in recent years, the term “hacker” has become synonymous with crime, and people use their skills to steal and create fear. Although this may be correct in some cases, it is not the majority. Now we use a (symbolic) hat to distinguish good from evil:

“White hat hacker” or “ethical hacker” refers to a permanent hacker who reports and improves to discover vulnerabilities in himself or other organizations.

When the word “Black” is used with “Hacker”, they are considered to be hackers for evil intentions or personal interests.

“Grey hat hackers” are in a deadlock between the two, and they may be willing to pay to fix the loopholes.

“Blue hat hackers” are usually not within the scope of computer security consulting companies, which test software or systems for vulnerabilities so that they can be closed before the software or system is released.

Remember: not all hackers are bad guys.

The


Source by Scott P Greene