Start networking and exchanging professional insights

Register now or log in to join your professional community.

Follow

Being a "Hacker" can be a good thing or a bad thing?

What is the role of Hacking in Technology development? Give real examples for any progress (bad or good ) of hackers. You can freely view your opinion and thoughts

user-image
Question added by Lubna Al-Sharif , Medical Laboratory Technician , Nablus Specailized Hospital
Date Posted: 2013/05/21
Mohammed Yaseen MBA  PMP®
by Mohammed Yaseen MBA PMP® , Commercial Officer , Hayat Communications

The word "hacker" does not bring the best of thoughts to most people’s minds. The popular definition of a hacker is someone who intentionally breaks into systems or networks to illegally procure information or infuse chaos into a network for the express purpose of control. Hackers are not usually associated with doing good deeds; in fact, the term "hacker" is often synonymous with "criminal" to the public. These are black-hat hackers or crackers, the folks we hear about on the news creating chaos and pulling down systems. They maliciously enter secure networks and exploit flaws for their own personal (and usually malicious) gratification.

 

The term "hacker" can mean two different things:

  1. Someone who is very good at computer programming, networking, or other related computer functions and loves to share their knowledge with other people
  2. Someone who uses their expert computer skills and knowledge to gain unauthorized access to systems, corporations, governments, or networks.

White-hat hackers are also known as ethical hackers; they are hackers who are working from the inside of a company, with the company’s full knowledge and permission, who hack into the company’s networks to find flaws and present their reports to the company. Most white-hat hackers are employed by actual computer security agencies, such as Computer Sciences Corporation (CSC). As stated on their site, "more than1,000 CSC information security experts, including40 full-time "ethical hackers," support clients in Europe, North America, Australia, Africa and Asia. Services include consulting, architecture and integration, evaluation and assessment, deployment and operations, and training. The deployment of ethical hackers to test the vulnerability of computer networks is one of the many ways CSC can help clients deal with ongoing security threats." These cyber security experts look for flaws in the system, and repair them before the bad guys can exploit them.

سوسن بادع مسير الخزاعى
by سوسن بادع مسير الخزاعى , مديره قسم , زارة التربيه

شى لا يعجبنى مطلقا

Deleted user
by Deleted user

It depends on the nature of what you are doing , in some cases hacking can reinforce the security rather than breaching it.
Remember that the best cyber security companies are founded by former hackers !!

numan subry ahmmad kader
by numan subry ahmmad kader , مؤرشف , Public Iftaa Dept

Good, but to learn and help people

Mohamed Gaber
by Mohamed Gaber , Quality & Development General Manager , International Company For Food Industries

Hacker is a hacker - shameful action

Muhammad Aiyub
by Muhammad Aiyub , Software Engineer , 8Villages

i think being a "hacker" is always a good thing, because Hacker have any idea and creativity to make a new sometime in 'computer world', Hacker make computer's world is beautiful always, give chane everytime in 'computer's world', the hacker like artist in real world.
But, if "hacker" damage the system with his code, like virus, malware r phising, i Think it's not a Hacker, it's Cracker.
Hacker have an ethics but cracker nothing

Abdul Ghani
by Abdul Ghani , Senior Design Engineer , Fatin Home Furniture LLC

Good hackers go to heaven, bad hackers go everywhere.
But who are these hackers and what is so bad or so good about them? What do they do? Where do they go? Trying to answer these questions raises even more.
Consider the following recent incidences.
The Code Red Worm started its attack around July 13th, burrowing into a known “hole” or “vulnerability” in the web-server software from Microsoft (called IIS).
The worm compromised the servers and defaced web sites by replacing the contents with a page that proclaimed “Hacked by Chinese”.
Code Red not only defaced web sites, but also injected programs into the compromised servers that started attacking the US President’s web site, using a “Distributed Denial of Service” (or DDoS) attack.
The DDoS attack is a particularly heinous gimmick that uses hundreds of thousands of compromised computers to simultaneously send a flood of spurious messages to a particular web site.
This flood causes the computers at the attacked site to get bogged down, and unable to function normally.
Again on August 1st, the worm reappeared and caused plenty of woes.
Dmitry Sklyarov is a 26-year-old Russian citizen and a Ph.D.
student who studies cryptography.
He also works for a Russian company called Elmcomsoft, and is the main developer of a software system called the “Advanced eBook Processor”.
The AeBP software breaks the so-called secure encryption built into electronic books (an invention of Adobe Systems).
Dmitry arrived in the United States as an invited speaker, to talk to a rather large group of computer security experts at a conference called DEFCON, in Las Vegas.
After his speech, federal agents acting on a tip-off by Adobe Systems stormed his hotel room (on July 17th) and arrested him for violating US laws on hacking.
He is in jail.
Carnegie Mellon University had a team of very dedicated people who worked on deflecting attacks on computer systems.
This team was known as the “Computer Emergency Response Team”, but now is called the CERT Coordination Center.
The CERT delves into the inner mechanisms of worms and viruses, figuring out how each one works and how to stop the spread.
CERT sends out immediate bulletins to millions of subscribers as soon as a naughty bug is detected.
Similar groups of people exist at universities and organizations who purposely hack into systems, dissect software and uncover vulnerabilities.
They publish their findings urging software manufacturers to plug the holes.
Software that messes up computer systems are called viruses and worms.
The people who play with these things are often called “hackers”.
Code Red is one of thousands of worms unleashed on the Internet.
The designers of Code Red are bad hackers and are criminals.
The CERT people and their ilk are the good hackers who provide a valuable service to the community.
Dmirty is also a hacker, who probably did no harm.
He invented a way of defeating the encryption on the eBook system.
The encryption was broken to start with (bad design).
Dmitry’s crime was that he told people how to break the encryption at his conference speech.
While free speech is protected in the US, a sinister law called the DMCA (Digital Millennium Copyright Act), makes it illegal to distributed methods for breaking security on copyrighted material.
Hence, Dmitry is technically a criminal, but hopefully, the law will be found to be grossly overbearing.
The word “hacker” has a checkered past.
Originally the word was coined to mean an “extreme programmer”.
Normal programmers write programs that do normal things.
Hackers are very sharp people with a deeper understanding of how computers work and can write programs that do things programs are not supposed to do.
Programmers can make computers compute, hackers can make a computer sing, dance and fly—or crash.
After the antics of some destructive hackers were publicly known, the news media started calling those destructive people “hackers”.
The hacker community was quite upset.
“Hackers are good people”, they cried.
“These criminals should be called crackers”.
However, the damage was done, today, hacker means a bad person, who writes programs designed to cause harm.
Worms and viruses are the infections of the computer world.
The worm is a self-contained, replicating program that burrows its way from computer to computer, causing harm.
A virus is a program fragment that needs to attach itself to a host program in order to live.
Once a virus attaches itself, then it can replicate and travel and cause harm.
As for the effects they can cause, worms and viruses are identical.
In theory, worms and viruses cannot exist.
Computer operating systems are designed such that external programs cannot be injected into them.
But obviously this is not true.
The first Internet Worm was written almost by accident.
A graduate student at MIT, called Robert Morris, thought he had found a flaw in the way Email software works.
He then wrote a program to exploit the flaw and to test his hypothesis.
His program sent messages over the Internet to every machine it could find and made these machines send more messages over the Internet.
Of course, general consensus was that writing such programs are not possible, because one machine cannot make another machine do something it is not supposed to do.
But Morris was right.
His program worked better than he had imagined.
It clogged up the entire Internet on November 2, 1988 (at this point the Internet had less than a thousand machines connected to it).
Of course no one knew how to stop the worm from spreading, as no one had ever seen anything like that.
So the fix was drastic, all the machines on the Internet were shut off and rebooted.
That killed the Morris worm.
For trying this experiment, Morris went to jail.
Morris had invented the “Buffer Overflow Attack”, the same technique used by the Code Red worm.
This technique works as follows.
Suppose a computer connected to the Internet is waiting to receive a message—it expects a message of maybe 10 words.
We send it a humongous message—several million words long.
The computer stores the message and then looks at it.
However, while storing the message, the faulty software did not check to see if there was enough free memory.
So the message ended up being stored on top of programs that were already in the computer memory (overwriting these programs).
Subsequently when the computer tried to execute some of the now overwritten programs, it ends up executing the contents of the long message.
This causes the sender of the message to obtain complete control of what the computer executes.
Over the years the hackers have found, invented, perfected and finessed a whole slew of innovative tricks to fool the protections built into the computer operating systems.
Before the days of the Internet, the viruses were “boot-sector” viruses.
These program fragments lived on diskettes, and when the diskette was put into a machine, attached themselves into some part of the operating system.
Subsequently, any diskette written on the infected machine carried the virus.
Then came macro viruses, using the programming language built into MS Word.
An innocuous document is mailed to a user who opens it, and the macro in the document comes to life and damages the computer.
Even maybe sends itself out via email from the victim’s computer.
Quite easy to write, but also quite insidious.
Then came many more Email viruses and worms that used a plethora of tricks called “Trojan Horses”.
A complete documentation of the types and techniques would fill volumes.
Finally, today, the virus writing state of the art has become really sophisticated.
Any kid with a computer can find a “phreaking” site, that is, a web site run by senior hackers who want to tell everyone how to cause trouble.
These sites have complete explanations of how to write viruses along with pre-written programs.
All the kid has to do it to pick the features he or she wants and the site will generate a custom virus (also called a script) that can be used for nefarious purposes.
The youngsters who use these virus generators are called “script-kiddies”.
To help the script-kiddy out, the phreaker sites also provide “root-kits”.
Root kits are sophisticated software that when aimed at to a site, will penetrate the site and then replace all the software on the site with software that makes the presence of the virus on the system invisible.
For example, all the files containing the virus will become invisible, as the program that displays files, is replaced by a new program that displays all files other than virus files.
Very well thought out, very neat and pretty dangerous in the hands of stupid script kiddies.
The attacks on the Internet are made possible by an ancient design error.
The Internet was not designed to be a large public network.
It was designed to be a closed network used by trustworthy people inside the US military and universities.
Today the vulnerabilities are causing heartburn for all those who depend on the network.
The hackers are running amok, and the fear of legal action is not enough of a deterrence (the challenge is to cause harm and not get caught).
The solution? Who knows?

Deleted user
by Deleted user

Hacker does not mean some one doing something king is a profession,however any profession misused is a crime as well as Hacking.

Urban Prototyping Festival: hackers develop technology to save fire fighters..A helmet sensor that could potentially save the lives of fire fighters was one of five inventions that has reached the final of a Hackathon event.
The Hackathon challenged computer programmers to use data and develop computer programs to improve lives.
It was held last weekend at Imperial College London.
In one challenge, programmers were given access to data from the Hampshire and Dorset Fire Brigades to help them develop digital technologies that could keep fire fighters safe on duty.
Currently there is no system in place for fire-fighters to detect temperature surges.
Temperature surges are a serious cause of death for fire fighters.
Two were killed in a blaze in south England in 2010.
Temperatures can rise hundreds of degrees in seconds if a fire is hit with a blast of air — for example when a window bursts.
The risk has become worse as protection has become more effective leaving fire fighters less able to sense sudden changes in temperature.
A 15 second delay can be lethal.
In the audio interview, Group Manager, Mick Johns from the Hampshire Fire and Rescue Service discusses the potential of the Hackathon for improving the way that fire fighters operate.
A group of hackers called ‘Team Fire’ developed the computer program behind a sensor device that could fit neatly inside a fire fighter’s helmet, monitoring the temperature surges during a fire.
The sensor would vibrate when there is a rapid fluctuation in temperature, alerting the fire fighter, so that they could make quick exit from the building.
Other finalist projects included a mobile app that coordinates information between emergency services and citizens in real time.
The app was designed to address the challenge of slow information gathering during crisis situations such as riots or floods.
In the audio interview, Hackathon contestants discuss their work and what it is like to take part in the event.
Commenting on the Hackathon, Dr Catherine Mulligan, Research Fellow at Imperial College Business School, said: “The ideas that came out from the Hackathon were really inspiring and exciting.
These ideas could have the potential to save the lives of fire fighters, who often put themselves at risk in order to keep the public safe.
This is just an example of how the UP Festival can harness some of the public’s most innovative ideas and connect them with the funding opportunities available to see them come to life and make a difference to society.” In the audio interview, Dr Mulligan talks in more detail about the Hackathon and the UP Festival.
More than 100 computer programmers, developers and technologists took part in the Hackathon, which was held at Imperial College London on 19-21 April.
This competition was open to computer programmers, designers, architects and anyone interested in using digital technologies to deliver citizen-led improvements in the urban space.
The Hackathon is part of the Urban Prototyping (UP) Festival, which is happening at Imperial until 26 June.The Festival, held annually in cities around the world, explores how technology, art and design can help to create smart sustainable cities.
Team Fire, along with the four other finalists ideas will go on to be judged with the overall winner being announced on 25 April during the Festival.
The winning idea will then be developed with funding from businesses, potentially sharing in £100,000.
The winning team will also receive a complementary trip idea to Shanghai, China on 26-28 June 2013.
Here they will present their ideas to a Smart City Forum of Chief Information Officers and to leading mobile operators.
The trip is organised by the GSM Association, which represents the interest of mobile operators worldwide.
The Technology Strategy Board will also award £1,000 each to six selected individuals to help them build their prototypes for an exhibition taking place at Digital Shoreditch, which is an organisation that celebrates the outstanding creative, technical and entrepreneurial talent of East London and Tech City.
Additionally, Intel will also offer a further £3,000 to the winning teams.
The UP Festival is led by DE Sustainable Society Network+.
Imperial College London, DE NEMODE Network+ and the UK Research Council (RCUK) Digital Economy Programme are event partners.

Abdullah Al Jallad
by Abdullah Al Jallad , Chief Accountant , Sankyu Saudi Arabia

Good if I'm good

More Questions Like This