The term "hacker" (Internet pirate) to describe a person with deep computers and networks of knowledge, which has a high skill in programming languages and operating systems so that it can skillfully exploit vulnerabilities in any computer network to penetrate, and the word is originally carrying a positive meaning it into a negative meaning the focus of the media now.
The hackers usually divides into two parts: the pirates moralists (white hats) and the pirates criminals (black hats) and add them sometimes third section are the owners of the gray hats.
Hats eggs
They are pirates who are working in government institutions and companies information or even security alone to discover the software and hardware, networks gaps, and reporting in order to fill them and prevent exploitation by hackers, criminals.
Figure in the world of this kind and months is a hacker Kevin Mitnick, who considered the US Department of Justice on what "more criminal computer is required in the history of the United States" and was arrested and jailed more than once before it turns into an ethical hacker and become a consultant and speaker-year-old in Computer Security and Director of the Company "Mitnick security Consulting."
There are pirate Adrian Lamo (known as the hacker homeless) which was used cafes, libraries and Internet cafes places to implement Achteraqath to websites of famous companies such as The New York Times, Microsoft and Yahoo, but he finally turned to the moral Hacker and works as a consultant computer security and helped in the delivery of the US military authorities Bradley Manning, accused of being Video source of the leak air raid on Baghdad to the site of the famous Wikileaks publication of secret documents in July 2007.
It pirate eggs also "Steve Wozniak," co-founder of the famous Apple Inc., and Linus Torvalds developed an open-source operating system "Linux", and Tim Berners-Lee the creative mind behind the World Wide Web development, and Julian Assange, founder of WikiLeaks.
Black hats
They are a common type that focus on typical media, and penetrate computer security for personal gain, such as the theft of credit or personal data card data in order to sell them, or even for their own pleasure, such as making robots software (botnet) can be used to launch denial attacks Distributed Service against certain websites.
Among the most famous of these British hacker Gary McKinnon, accused greater penetration operations against the United States government computer networks of computers, including the Army, Air Force and Navy and the Department of Aviation and Space Systems implementation (NASA) and cause damage to systems army estimated Besbamaip thousand dollars.
In addition to McKinnon, there's Jonathan James (known as Komred), which broke in a 15-year-old network of NASA and the Pentagon.
And George Hotz, who knows being infiltrated platform Sony Playstation 3 Games in 2011. Kevin Paulson (known as Dark Dante), one of the pirates eighties with hats blacks, and gained a reputation that to penetrate the phone lines to a radio station in Los Angeles to win the prize was a Porsche 911 new from within other awards.
There Albert Gonzalez, who was accused of being the mastermind in the largest theft of ATM cards and credit history, where it is believed that he and his group of pirates sold during the period from 2005 to 2007, more than 170 million ATM cards and credit card numbers.
And Russian President Vladimir Levin, who managed in 1994, using the laptop in his apartment in St. Petersburg from the conversion of ten million dollars from customer accounts at the bank, "Citibank" to personal accounts around the world, after the arrest of the stolen money has been restored with the exception of four hundred thousand dollars.
There is Robert Tappan Morris, who was on the second of November 1988 computer worm (malicious software) disrupted the Internet and about a dozen more than six thousand computer system, and estimated the value of financial losses to the process by about $ 15 million.
Gray hats
They are the pirates who do legal work sometimes, or security with the help of as dictating to them their conscience sometimes, or mischievous breach at other times, they are so combination of pirates with hats and white with hats blacks, and they usually do not penetrate malicious purposes or for personal interest, but also to increase their expertise in penetration and the discovery of security vulnerabilities.
Categories
Popular Posts
-
the space agency and Aviation Administration (NASA) said that the asteroid with a diameter of half a kilometer, will pass on the relatively...
-
The United States is the primary source of electronic attacks on China in the year 2012, according to data from the Annual Conference of the...
-
Statistics revealed by the mobile carriers in China for the month of May / May last big expansion of the mobile market in China, which set a...
Subscribe to:
Post Comments (Atom)
Popular Posts
-
the space agency and Aviation Administration (NASA) said that the asteroid with a diameter of half a kilometer, will pass on the relatively...
-
The United States is the primary source of electronic attacks on China in the year 2012, according to data from the Annual Conference of the...
-
Statistics revealed by the mobile carriers in China for the month of May / May last big expansion of the mobile market in China, which set a...
0 comments:
Post a Comment