Friday, April 12, 2019

Computer forensics and hacker expert witness: Hello, I am a hacker!

The most common visual effect was the pale nerd in his mother's basement, who was entering his university server and changed his competitor's score to failure. Then there are various descriptions of Hollywood that show the "master offender" manipulating traffic signals and financial markets. This is the recent use of the term "hacker" and years before it has a very different meaning.

In the early 1990s, when Linux [a popular free computer operating system] was introduced, the term hacker did not even exist. Users of these operating systems call themselves "hackers" simply because they can manipulate and reuse programming code for their own purposes beyond their original intended purpose. If you think they are chefs, everyone has a basic recipe for lobster soup, but each chef puts his recipe on the recipe to make it his own recipe. They are very competent programmers who are passionate about writing their own programs.

Most of these "hackers" use their skills. For example, help a friend who needs new software to help track the inventory of a grocery store. Then there are some of the more famous hackers, including Steve Jobs and Bill Gates, who made a lot of money by creating a consumer computer for the family. A small number of people use their skills rather than glorious purposes, such as Kevin Poulsen and Adrian Lamo. These disgraceful hackers make the noble hobby of computer operation a bad name.

Due to the media's heavy attention to the subject, in recent years, the term "hacker" has become a criminal conspiracy, and people use their skills to steal and create fear. Although this may be true in some cases, it is not a majority. Now we use the [figurative] hat to distinguish between good and evil:

"White hat hackers" or "moral hackers" are people who are good at discovering vulnerabilities in themselves or other organizations and reporting improvements.

When the word "black" is used with "hackers," they are considered to be malicious malicious or personal interests.

The "grey hat hacker" is in a state of between and may provide the cost of fixing the vulnerability.

"Blue Hat Hackers" are often outside the computer security consulting firm, who test software or systems for vulnerabilities in vulnerabilities to shut down software or systems before they are released.

Remember: not all hackers are bad guys.




Orignal From: Computer forensics and hacker expert witness: Hello, I am a hacker!

No comments:

Post a Comment