In the mind of a Hacker

20 41
Avatar for Infinity
2 years ago

January 13, 2022. No. 126

Hacker: "is any individual who dedicates himself to programming enthusiastically, that is, an enthusiastic expert of any kind" or "person who is an expert in handling computers, who deals with the security of systems and developing improvement techniques".

If you are surprised to read this end and it does not match the one you had in mind until the moment when you heard this word, it is simple, the word you are looking for is "Cracker". The main difference is that crackers do it illegally. For many, many years, the word "Hacker" has been misrepresented and attributed to anyone who tries to bypass a system and exploit its vulnerabilities for personal gain or perhaps simply harm.

Image from PixaBay - geralt

A little history

Since 1961 the Massachusetts Institute of Technology (MIT), the PDP-1 microcomputer captured the curiosity of a group of students who were part of the Tech Model Railroad Club (TMRC), and with it, they began to experiment. They even created the video game Spacewar. Sometime later some of these same students began to play pranks on each other and they called these "hacks". These were the first to be called β€œhackers”.

Hacker ethics

Steven Levy published the book entitled "Hackers: heroes of the computer revolution" where the hacker ethic is raised for the first time, proclaiming and promoting an ethic of free access to the source code of the software and free access to all information.

According to Levy, these are the 6 fundamentals of the hacker:

  • Access to computers must be unlimited and total.

  • All information should be free.

  • It is necessary to promote decentralization and distrust the authorities.

  • Hackers should be judged on their work and not on things like their race, age, or their social position.

  • You can create art and beauty on a computer.

  • Computers can change your life for the better.

  • Best hacking software.

Image from criptonoticias

There are a good variety of operating system distributions that come with a set of tools that perform dissimilar types of attacks. Currently, anyone on the internet can download and install them on their computers and through various tutorials on YouTube to be able to access your computer or cell phone in an extremely easy way (as long as you are an easy target). There are people who don't take security seriously enough. Passwords are birthdays, pet names, or even "admin" or even some make it more complex even with "123".

Kali Linux

Image from Kali Linux

We could easily say that Kali Linux is the best operating system for Hacking. Kali is a real hacker hammer for any computer scientist. It includes more than 600 pentesting (penetration testing) tools, uses the default root account, and is open source. It is compatible with x86 computers and ARM architectures and it is also compatible with smartphones including devices from Nexus, One Plus One, and others.

There are others like Black Arch Linux, Parrot Sec, Backbox, CAINE, just to name a few. All of them are free and available on the internet so that you can make use of them.

These operating systems with their tools allow you to check your own security in your company or at home. Whenever you watch a tutorial, it will alert you that hacking another person without their consent has legal repercussions and that these methods they teach you are for personal use and in order to improve your own security, finding vulnerabilities in your system to be able to correct them.

Advice

The main thing is to have an antivirus and always updated. In addition, always avoid entering pages of dubious origin that generate little confidence, especially when you are going to download some software, always do it from official websites and not from third parties.

Whenever you download software and install it, you can introduce a virus to your computer or cell phone, which can establish a back door from your computer to the attacker's computer. At this time, all your documents are exposed. Imagine that that person now has access to your entire computer or cell phone. You can even copy all the information and then erase everything or format your pc or cell phone if you wish. Activate the camera or microphone and monitor you constantly. The best thing to do for this is to always keep the camera covered when you are not using it. In addition, as a general rule, I have never liked leaving the cell phone idle and that the camera is looking at me at that moment.

There are variants to enter your computer or cell phone without even requiring your interaction! This is because operating systems have bugs and if you don't have them updated, they are easy to break.

Avoid replying to emails that are questionable. Even those that take you to an external link. There are several pages on the Internet that allow you to configure an email and send it as if the sender were as real as possible. You can even receive an email from Facebook or another company, and the characteristics are 99.9% identical. So you always have to be aware of what you are doing. In the URL of the browser, check previously that it is the address of the page you are entering and not another. They may have created a new domain and simply changed one letter and you wouldn't realize it until the damage is done.

The saddest thing that could happen to you is that they install a keylogger on your computer and be checking it daily remotely. If at some point you put the 12 words of your wallet in MetaMask to restore it, you can forget that capital.

Image from adcy.io

You always have to be active and think that through Social Engineering they can do you a lot of harm. They disguise themselves as lambs and are wolves eager to enter your virtual life. Don't let them in. Keep them away. Keep alert!

Thanks to @CoquiCoin for renewing their sponsorship. Excuse some if you have renewed your sponsorship and I have not mentioned you, but these days I have not been myself. Sorry. But I always keep them all of you in mind. Thanks for the support!

Follow me on Twitter, noise, and P0x

9
$ 7.45
$ 6.97 from @TheRandomRewarder
$ 0.06 from @Amazing-grace
$ 0.05 from @Alther
+ 10
Sponsors of Infinity
empty
empty
empty
Avatar for Infinity
2 years ago

Comments

oh, thanks for giving us valuable information, especially with me who is not that techy.

$ 0.00
2 years ago

I remember taking a course on ethical hacking some years back, I was amazed by the various things a hacker can do and also the illegal means a cracker can gain access into a victim's computer using Trojans

$ 0.01
2 years ago

Hackers can do anything ☹️

$ 0.00
2 years ago

So you are a hacker but not a cracker πŸ˜‚ Now, seriously speaking, thanks for this information.

I hope things go well with your son's treatment. And I think I have seen in TG, among the thousands of messages, hehe, that it was your birthday these days, so Happy belated birthday! And you are very welcome :)

$ 0.01
2 years ago

Thank you my friend πŸ™ 😊 Everything is going to be fine. Thanks for everything! πŸ™

$ 0.00
2 years ago

There are actually legal hackers hired by big companies and they are called "White Hackers". Their job is to test the company's and their software's security if it is secured enough or still crackable, then guard the whole security against another hacker. I'm interested in codes and software. I would like to have a job like that someday, too. 😊

$ 0.01
2 years ago

Indeed my friend. But it is really complex, because that person in the end knows all the secrets of the company's vulnerabilities. But you have to trust them, someone has to.

$ 0.00
2 years ago

Yeah, but since they are legal, they have a contract agreement about the data they can acquire from the company. The company can sue them if they sell the data, so both of them have risks to be cautious of.

$ 0.00
2 years ago

Hacking is such an issue rights now specially we on digital age which we computers is everywhere. I can't believe that there's already softwares for hacking, it may alarm those people to keep their devices secured with firewalls. I think hackers usually target those high class people to steal their identity and do some bad thing out of it. However we ordinary people shouldn't let our guard down since there are hackers hackers pick random people to hack their virtual informations.

$ 0.01
2 years ago

Hackers sometimes just bait to see who bites.

$ 0.00
2 years ago

Hackers are cool especially if what they do is for the sake of many.. they can be dangerous also... I always want to study this kind of things but sadly I don't have any computer or atleast laptop... Updating the anti virus in our gadgets is a good move .. but the best is always be careful in clicking..

$ 0.01
2 years ago

Indeed, one of the best things is don't click in any strange link.

$ 0.00
2 years ago

This is a good reminder for me. I keep on clicking links that would just pop up in my browser πŸ˜…

$ 0.01
2 years ago

What? Don't do that anymore!

$ 0.00
2 years ago

So do you know how to hack? πŸ˜…

$ 0.01
2 years ago

πŸ˜‚ I do not practice these types of activities. I only know about them πŸ˜‚. I repeat: I am not a hacker. πŸ˜‚

$ 0.00
2 years ago

In this digital world.. hacking is such a difficult issue for the online crypto earners for me.Because everybody use the crypto wallet to hold their tokens for long time for getting a huge profits.But the fact is that many hackers hack those wallet's for stealing the money.

$ 0.01
2 years ago

That is why we have to take steps to avoid it

$ 0.00
2 years ago

I am not very verse in the digital world. I have always associated hackers as sabotuers. As I grew older, I found at that a good number of them are were actually what I had earlier thought them to be. Just like in every works of life, there are bad eggs.

$ 0.01
2 years ago

Take all more measures to avoid being hacked or at least not so easy.

$ 0.00
2 years ago