Hackers. The new cyber terrorists | |
Anonymous Coward User ID: 33435073 United States 12/14/2014 07:51 PM Report Abusive Post Report Copyright Violation | |
Anonymous Coward (OP) User ID: 36510525 United States 12/14/2014 08:48 PM Report Abusive Post Report Copyright Violation | |
Anonymous Coward User ID: 33435073 United States 12/14/2014 08:49 PM Report Abusive Post Report Copyright Violation | |
Anonymous Coward User ID: 66061444 Spain 12/14/2014 09:06 PM Report Abusive Post Report Copyright Violation | |
Anonymous Coward User ID: 60629212 Brazil 12/14/2014 09:07 PM Report Abusive Post Report Copyright Violation | |
Anonymous Coward (OP) User ID: 36510525 United States 12/14/2014 09:43 PM Report Abusive Post Report Copyright Violation | |
Anonymous Coward User ID: 33435073 United States 12/14/2014 09:44 PM Report Abusive Post Report Copyright Violation | |
Anonymous Coward User ID: 23343194 United States 12/16/2014 06:47 PM Report Abusive Post Report Copyright Violation | |
Anonymous Coward User ID: 61646741 Canada 12/16/2014 06:49 PM Report Abusive Post Report Copyright Violation | |
Anonymous Coward User ID: 36256843 United States 12/16/2014 07:11 PM Report Abusive Post Report Copyright Violation | |
Anonymous Coward User ID: 23343194 United States 12/19/2014 09:20 PM Report Abusive Post Report Copyright Violation | |
TwitcH User ID: 44336187 United States 12/19/2014 09:41 PM Report Abusive Post Report Copyright Violation | Hackers: The White Hats Just like in the old Hollywood westerns, the good guys wear the white hats, at least metaphorically. White hat is a term often used to describe ethical hackers that stay entirely within the law. They never access a system or network illegally, and they work tirelessly to expose holes in systems with the ultimate goal of fixing flaws and improving security. Upon finding a flaw, a white hat will usually notify the software vendor and give the company a chance to patch the flaw before making the bug public knowledge. White hats may be security professionals, hired by companies to audit network security or test software. Using the same software tools that crackers use, a white hat seeks to improve the security of his own network by proactively attacking it as a cracker would. White hats may even create software aimed at thwarting tools available to crackers. White hats can use tools such as the Fake AP to thwart wireless sniffers that crackers might use to discover wireless networks. Knowing how a cracker operates enables a white hat to take steps to secure a network against likely avenues of attack. Although some ex-crackers work as security consultants, simply knowing how to crack a system doesn’t translate into being able to secure it. White hats don’t acquire their skills illegally. By demonstrating sound judgment and admirable ethics, they make a much better choice for companies looking to hire a security consultant. Crackers: The Black Hats Hackers refer to the computer world’s outlaws as black hats. The opposite of the white hat, a black hat or cracker breaks into systems illegality for personal gain, vandalism, or bragging rights. A cracker doesn’t need to be particularly knowledgeable or skillful; in fact, most of them aren’t. Few crackers are skilled enough to create their own software tools, so most rely on automated programs that they download from disreputable Web sites. Because crackers know they are breaking the law, they do everything they can to cover their tracks. Fortunately, security professionals catch quite a few of them because the majority of crackers lack real skill. When the authorities do catch them, their skill with a computer is often greatly exaggerated to promote the agency making the arrest (and to sell newspapers and commercials). Still, it’s important to acknowledge that crackers present a serious threat: Many are technically proficient and can cause a lot of damage, and many systems are so woefully insecure that even technically inept crackers can wreak havoc on them. [link to www.security-faqs.com] |