Black Hats Versus White Hats #Part 1
File Under:
Assalamualaikum and evening to all viewers.. Haiyak!! Well, my session for 'Introduction to Cyberworld' would not be updated by everyday because I don't have much time to always make a new post. Hehe. It doesn't matter as long as you may take note for what I've post. Nahh.. Let's start!
Nowadays, we were up to hacker and cracker issues. So, let's classified who're being called as 'hacker' and who're being deserve to get name to called as 'cracker'. Hooyahh.. Black Hats are hackers who are up to no good. And White Hats are hackers who want to make the virtual world a safer place.
BLACK HAT.
Black Hat File #1:
Super Hackers
Who are they??
Super hackers, or crackers, are highly skilled troublemakers. They like to show off their programming skills by breaking into computer networks. Many design nasty worms and viruses that can seriously damage any computer they infect.
Who are they on the web?
Most super hackers spend much of their time online. Computers are their whole world. But they dont like the Internet's rules. They break them by hacking into computer networks. They want to show that they can outsmart the software designers at companies like MICROSOFT.
Black Hat File #2:
Identity Thieves.
Who are they?
Identity thieves run scams to steal people's Social Security numbers, bank account numbers, and other personal information. Most identity thieves work for organized crime groups. Many experts say that they are a bigger threat than cyberterrorists.
Why are they on the web?
Identity thieves send out fake email offers designed to trick people into giving them personal information such as passwords and driver's license numbers. That's called phishing. Or they get that information by hacking into people's computers. They use those stolen identities to get credit cards. Or sometimes they can steal directly from someone's bank account. They can also use people's email accounts to reach other potential victims.
Black Hat File #3:
Cyberterrorists
Who are they?
They could belong to an international terrorist group like Israel. U.S. officials also believe that Iran, North Korea, Russia, and China have trained hackers to engage in Internet warfare.
Why are they on the web?
Many terrorists use the Internet to raise money, recruit others, and share information about their plans. But the term cyberterrorist really applies to those who plot to attack computer networks. A large-scale cyberattack could affect power plants, transportation systems, and even the water supply. No such attack has ever taken place, and most experts think a major cyberattack is unlikely.
How many are out there?
There's been a dramatic explosion in the number of WEB sites operated by terrorist organizations. According to estimates, there were just 12 in 1998. By 2006, there were more than 4800 sites operated by terrorists.
Who's tracking them?
Rita Katz formed a company called SITE- Search for International Terrorist Entities- to track terrorists on the Net. She slips into terrorists chat rooms and listens to their plots.
Perghh.. Too long for you viewers to read hehe.. But.. Do I look like I care? Haha Just read okay. It's for our knowledge for newbies... By the way.. this is only for part 1. We still have a few parts to be done, if I'm not mistaken Ngeh Ngeh Ngeh. Okay I need a good rest for Ramadhan fasting tomorrow. Adioss!!
-NoLoner-
Tahukah Anda Setiap Lawatan Ke GilerHackers.Com Mendapat Mata? Sila Baca Disini
Log Masuk Menggunakan Salah Satu Akaun Social Network Anda Untuk Komen! (+ 100 Points)
Log Masuk Menggunakan Salah Satu Akaun Social Network Anda Untuk Komen! (+ 100 Points)
comments powered by Disqus