The Hacker's Ethic

in #writing7 years ago

The ethic of the hacker was born at the Massachusetts Institute of Technology (MIT): it’s moral and philosophical values that hackers must have to adhere.

This is what differentiates hackers who seek to defend themselves from pirates who seek to harm others. The nuance is important.

THE ETHIC OF HACKING (ethical hacking)

Journalist Steven Levy is the first to use the term ethical hacker in his book called Hackers. He also defined the following rules:

• The access to anything that could teach you something about how the world works should be unlimited and total.
• The information should be free.
Do not trust authority, prefer decentralization.
• Hackers should be judged on their exploits and not on criteria such as age, origin, sex, diploma etc ...
• You can create art and beauty with a computer.
• Computers can improve your life.

He also asks the society to open up its worldview on hackers and expand it to the planet and not just reduce it to the little computer genius. He is followed later by the hacker Loyd Blankenship who defines the hacker's manifesto

Initially, the term "ethical hacker" was used to refer to a real hacker who secures computer systems and not to an “IT pirate”.

hacker-2077138_1920.jpg

WHY PUT YOURSELF IN THE SHOES OF AN ATTACKER?

Hacking helps solve problems in many areas. In programming for example, we don’t reinvent the wheel, we access the details of a system to build something useful and effective.

IT security hacking makes possible to secure one's own systems and online privacy by first understanding how attacks work.

From there, the ethical hacker also known as the hacker in the white hat is thus put himself in the skin of a pirate to understand how he acts, and protect himself.

That’s "offensive security".

The approach, inspired by fire safety training, is a standard in the hacking industry:

We present a technique inspired by a real case, we explain it and put it into practice in order to understand the operating principles, and finally we protect ourselves against it.

The approach is the same for the police: we learn the techniques of thieves to catch them more easily.

=> Present, understand, protect.

Note: Putting the attacks into practice to understand them presents a potential danger related to the malicious people who would use the information to their advantage. As a result, my Steemit-Blog will not provide public details that could lead to illegal actions.

work-933061_1920.jpg

Besides, I have a revelation for you right now:

It is often thought that a IT pirate is a geek person, gifted and nomadic.

But actually, once you know their little secrets, you realize that all this doesn’t require a depth knowledge, and that you can defend yourself by applying simple and methodical concepts

That’s all for the ehic of hacker and for the diverse types oh hacker you could get to meet.

An easy way to reduce your chance to be hacked is to use the double authentification

If you think that you have already been hacked, you should read this post (the Trojan is the worst virus for me so be sure to have read this post too!)

DQmNuF3L71zzxAyJB7Lk37yBqjBRo2uafTAudFDLzsoRV5L.gif

Sort:  

WARNING! The comment below by @yeico leads to a known phishing site that could steal your account.
Do not open links from users you do not trust. Do not provide your private keys to any third party websites.

I'm pretty sure that you will be the main Security Guy on steemit :D Great post :D

I won't have that claim but thank you so much man! :D

Interesting read, thanks for posting.

Thank you for reading my posts!

WARNING - The message you received from @yeico is a CONFIRMED SCAM!
DO NOT FOLLOW any instruction and DO NOT CLICK on any link in the comment!

For more information about this scam, read this post:
https://steemit.com/steemit/@arcange/virus-infection-threat-reported-searchingmagnified-dot-com

If you find my work to protect you and the community valuable, please consider to upvote this warning or to vote for my witness.

Thx a lot man!

I guess that's an example of white hat 🧙🏻‍♂️ vs black hat 🧙🏿‍♂️ ;)

You've been an assiduous reader @vinyll ;-)

Well, that's the least one can do when someone takes time to write an article, write.
To my regard that has more value than the Steem 🤑 or upvotes ;)

I totally agree! But it's hard to get followers in the beginning... But readers like you motivate me!

At the beginning of what I call hacking, the purpose of a hacker was not to "show how much damage" he can do.. It's all depend of the moral and the will of the hacker. And the firsts hacker do not learn how to make damages to an organization but to build the numeric universe by resolving problems

I won't said that I'm a good hacker but I know the basis and I have 2 good friends who are in master of programming at the university and that I always consult to have their opinion. They don't have either your point of view.
So, for you, a hacker is in all cases someone who act illegally for his own purpose?

Yes I totally agree with you, it's not linked but it can be per moment! And that's always hard for hacker to experience his skills in a legal way and to prove his value in this field... But for me, I prefer to be outside of the mainstream. I have taken the red pill and you?

Loading...