Hacking
is the term that fascinates 90% of the people. By hearing the term ‘Hacking’,
people start to dream that the hackers can do anything. But that’s not the
truth, There is certain restriction through which the hacker is bounded that
are “cyber laws”. These days, hackers are in huge demand. Major organizations
& co-operations requires hackers for data security. Today, we will see 10
interesting facts about ethical hacking.
Note: We would like to thanks Mr. Comet for
giving us these amazing facts, tips & suggestions.
According to Mr. Comet) : “For me, a hacker is one who enjoys observing details and understanding how
things work, and uses this knowledge to improve things.”
There are many types of hackers like Black Hat hacker, White Hat hacker, Gray Hat hacker or the Suicide
hacker. An Ethical Hacker is the White hat hacker whose
main intention is to safeguard the data owned by the organization. In simple
words, we can say that hacking for a good cause.
Here are top 10 interesting facts about the ethical hacking.
1. Hacker culture can be traced to 1959
Hacker
culture can be traced to 1959 with the founding of the MIT Artificial
Intelligence Lab. MIT students who were exploring phone switching network and
the control systems of the Tech Model Railroad Club were drawn to the computers
of the MIT Artificial Intelligence Lab (MIT AI Lab). Marvin Minsky (MIT AI Lab
Director), was sympathetic to the hacker’s desire to explore and was very much
impressed with their achievements. He allowed them have direct access to the
machines, even if the true hackers among the group were dropped out of school
to spend more time on hacking. Legendary hackers from this first wave include Peter Deutsch, Bill Gosper, Jerry Sussman, Tom
Knight, and Richard Greenblatt.
This was
said to be “Golden Age” of computer hackers. As the machines were large and
slow, extraordinary effort was required for their coding and operations. Soon,
the hacker culture spread widely across the country. The Stanford AI Lab
(SAIL), under the direction of John McCarthy, became the center for west-coast
hacker activity. In 1991 the SAIL machine was shut down, hackers sent an
goodbye email to internet as if the machine was itself sending messages. Legendary
hackers from this second wave include Ed Fredkin, Brian Reid, Jim Gosling, Brian Kernighan, Dennis
Ritchie, and Richard Stallman.
Now comes the
time. The third wave of hacker activity tool place in northern California. Now,
the hackers wanted their own computer machines such that they could program
them at home as well can build or modify (hardware) it. This includes legendary
figures,Lee
Felsenstein, Steve Dompier, Steve Wozniak, Steve Jobs, and Bill Gates.Moreover, these legends
formed the foundation for the entire personal computer industry.
Source : University of Utah School of
Computing
2.
Hacker’s Memorandum was published on leap day 1972.
HAKMEM, is an report of MIT Artificial Lab. It was published in
1972, It includes wide variety of hacks algorithms and theories. It was
published in an html document format so that it is supported by all types of
browsers. The HAKMEM 140 includes:
§
Geometry, Algebra, Calculus
§
Recurrence Relations
§
Boolean Algebra
§
Random Numbers
§
Number Theorem Primes, Probability,
§
Autometa Theory, Games, hardware, etc (Total 191 items)
Source : HAKMEM (inwap)
3.
Richard Matthew Stallman wrote GNU General Public License
Richard Matthew
Stallman (RMS), who launched the GNU Project, founded the Free Software Foundation, developed the GNU Compiler Collection and GNU Emacs, and wrote the GNU General Public License, is a self-identified
hacker.
GNU General
public License is free license for software & other works. It’s designed to
guarantee your freedom to share & modify work. It means anyone can free
contribute, use and share the product. The GNU Compiler Collection includes
front ends and libraries for different languages like C & C++. GCC was
originally written as the compiler for the GNU operating system.
Yet when I say I am a hacker, people often think I am making a
naughty admission, presenting myself specifically as a security breaker. How
did this confusion develop?
Around 1980, when the news
media took notice of hackers, they fixated on one narrow aspect of real
hacking: the security breaking which some hackers occasionally did. They
ignored all the rest of hacking, and took the term to mean breaking security,
no more and no less. The media have since spread that definition, disregarding
our attempts to correct them. As a result, most people have a mistaken idea of
what we hackers actually do and what we think.
Source : Richard Stallman’s Personal
Site
4.
Creative Computing, hackers got information before the Internet was created in
1984.
“Creative
Computing”, edited by David
H. Ahl and
published from October 1974 until October 1985, was one of the ways hackers got
information before the Internet was created in 1984. It was one of the earliest
magazines of that time covered the microcomputer revolution. Moreover the
magazine, covered major spectrum of different types of computing in more human
understandable easy format.
You can find
complete collection of magazine: Creative Computing Magazine
5.
Bulletin Board Systems
Hackers also communicated via dial-up bulletin board systems, such
as Spies in the Wire BBS, which ran from 1984 to 1991.
I'd like to take the time to say that I REALLY, REALLY enjoyed running this
system for you guys, and the messages I have received in mail and on the
forums has been terrific! It's good to see that the system wasn't just
THERE, it really seems to have made a difference. I'd like to thank Carmen,
RObert, Ult, Cindy, Hagbard, monaq, Rich, Panther, and the others who were
there from the beginning, and really helped to make SPIES a memeorable
place. The good times and the bad times changed the way I think about many
things, but most importantly, they remind me of how much can really be
accomplished with a stupid computer and modem.
Take care, and stay in the spirit...
--
SYSTEM 0PERATOR/Ducati pilot/Geek
Subject: Yup, I still have it!
From: moebius (moebius)
Comment: Sell the kids for food.
Date: Wed, 30 Oct 91 09:58:44 PST
Citadel on in Chappaqua, NY. As a matter of fact, I thought I was
the one who turned Andy on to Citadel (wasn't I?!)...
SOURCE: arubin.txt
6. In 2014, Yahoo!
suffered the largest Cyber Attack.
On 22 SEP 16, NYTimes reported Yahoo had
suffered a cyber attack in 2014 that affected 500 million user accounts. It had
constituted the largest massive hacking of individual data directed against a
single company. Names, dates of birth, telephone numbers and passwords were
stolen.
However on 3
OCT 17, Yahoo said that all 3 billion of its accounts were hacked.
Source : Reuters
7. SOME ETHICAL HACKERS ARE FAMOUS!
Ethical Hackers are now very valuable for an organization for
security concern and are in Big Demand. Let’s see few of the famous ethical
hackers:
1. Kelvin
Mitnick (American Computer Security consultant, Author &
Hacker. Best known for 1995 high-profile arrest. His black hat adventures
included breaching down due to 2.5 years spree of criminal cyber activity.)
2. Joanna
Rutkowska (Cyber Security Researcher,Poland. She is the founder of
Qubes Desktop OS focused on security.)
3. Charlie
Miller (Computer Security Researcher, best known for exposing
vulnerabilities in Apple products.)
4. Greg
Hoglund (Specialist in computer forensics, best known for working
in include physical memory forensics, attribution of hackers and malware
detection.)
5. Tsutomu
Shimomura (Cyber Security Expert and Physicist)
Source: Top 5 ethical hackers you
should doff your white hat to (CBRonline)
8. NOW MAY BE THE BEST TIME TO
PURSUE ETHICAL HACKING AS A CAREER
The United States Bureau of Labor Statistics’ job outlook for
information security analysis is expected to increase 18 percent between
2014-2024. 18% is very much faster than the national average. Many top
technology companies like Microsoft and Facebook helped hackers gain mainstream
recognition as an vital element of cyber security. Facebook uses many hackers
to discover new vulnerabilities within its system. Ethical Hacking requires
vast amount of knowledge and skills. But, hackers play an vital part in IT
sector. Today, big corporations and organizations are investing huge in cyber
security to prevent major attacks.
Source: Ethical Hacking Emerges as
Unique Career Path in Cyber Security
9. INDIA LEADS THE WORLDS IN
ETHICAL HACKERS (HACKERONE)
According to
the survey conducted by Hacker One, it was found
that 23% of world’s hackers belong to India. The US is the second country to
have the highest number of hackers that are 20%. Followed by Russia (6%),
Pakistan (4%) and United Kingdom (4%).
Note: However, viewers
must know these numbers do not claim to show who leads the world in the number
of ethical hackers. The numbers simply show the participation, by country, of
the 166,000 people participating in Hacker One programs.
10. 35 % OF THE CYBER-ATTACK ON
INDIAN SITES ARE FROM CHINA
The Official
report of National Security Council Secretariat (NSCS) says
that “The cyber attacks from China made up 35% of the total number of cyber
attacks on official Indian websites, followed by the US (17%), Russia (15%),
Pakistan (9%), Canada(7%) and Germany (5%) ”. However, cyber attacks on Indian
sites also affect computers that do not host a web server. The cited report is
only analysis of attacks reported on web sites where the attacker has been
identified.
Source: Indian Express
No comments:
Post a Comment