The Hows and Whys of Computer Hacking



hack
Gone are the days when hackers were obsessive little computer geeks, sitting alone in his bedroom, coding a virus that would unleash havoc in the computer world. In fact, modern hackers are a sociable bunch who make use of instant messaging and video chatting to ensure connectivity. Hacking conferences are lively affairs, where hackers share their latest achievements. The only entry-level requirements are an inquisitive mind and heaps of dedication to your craft. The initial lure of hacking is simply the sense of achievement felt from getting past the security hurdles on computers that are intended to thwart a vast majority of people. In addition, there's also the lure of the fact that machines will do what you tell them, without fail, again and again. Once mastered, it's a delicious power.
As systems advance, it essentially becomes easier to hack- modern computer systems are so complex that there is always a flaw to be exploited somewhere. Targets range from the easy- websites running outdated software- to the tough, complicated security systems. About half of the world is running on Microsoft's Windows XP, which is 10 years old and riddled with security lapses in its original form. Many of the copies used in the far east are pirated, and Microsoft refuses to let them be updated, which leaves the holes "unpatched", creating an easy backdoor for hackers. There exists widely distributed "hacking kits" that let would-be "l33t haX0rs" (elite hackers) target sites by clicking a few buttons.
hack
Many start their hacking career by breaking into websites and defacing them, but this is regarded by their elders as the lowest form of hacking. Of course, getting caught is the ultimate humiliation. However, the more time they spend on it, the sooner they realize that a certain level of skills will make it possible to make money, either by stealing credit card details or by getting paid to create "malware" that could go for a high price.That might be programs that will silently take over a computer, or subvert a web browser so it goes to a particular site for which they get paid, or lace a website with commercial spam.
However, the distinction lies here: the commercial hackers do not go to conferences, and keep out of the public eye as far as possible, which can be hard when you are making serious money from it. They are the ones who the security and police services try very hard to keep their eyes on by any means possible, including infiltration and coercion. Some of the better hackers may be persuaded to work for governments. The suspicion is that in China the most successful are given no option.

No comments:

Post a Comment