15 published resources on Hacking

One of the most important, but often overlooked, aspects of being a programmer is security and protecting against hackers. Developers of all calibers should understand the basics of security as it relates to the technologies they work with.

Become a Subscriber

Famous Hacker Secs

all
  • Clayton Unicorn
  • Hacking

For years hacker secs have been relatively small and tight knit. Most have initiation rituals, similar to what you would see in a street gang or fraternity. For a black hat or grey hat group, the reasons behind this are fairly obvious. Since the activities of a black hat group are seldom legal, they need to be more selective about who they allow in. Often times this involves a hazing or initiation ritual to weed out the government spies and to quantify the initiate’s talents and abilities.

Famous Hackers

all
  • Clayton Unicorn
  • Hacking

While most hackers escape with only minor traces of their organization left behind, there have been times when individuals have come forward or been captured. Most of these names never make the headlines, however, and thus tend to only be known within circles involved with security. Names like Snowden and Assange are recognized by most of the general public for their whistle-blower actions while other significant individuals like Mitnick, Iceman, Poulsen or McKinnon may go unnoticed.

Hacking as a Trade

all
  • Clayton Unicorn
  • Hacking

Most hackers are hobbyists, tinkerers or they are employed in technology fields. Fictional tales have created the modern day image for what a hacker looks like. In such movies as The Girl With the Dragon Tattoo and Ex Machina hackers are portrayed as possessing a rare combination of genius and skill. If you replace these characters with a humble family technician working for Google, you lose the mysterious edge to the tale. The truth is hackers can be average doers and dreamers with an above average interest in technology.

Common Hacking Methods

all
  • Clayton Unicorn
  • Hacking

The resources for a hacker are so numerous, that it is entirely possible that no two hackers have the same tools or approaches for how they operate. With a choice of over a thousand programming languages, dozens of operating systems, and hundreds of different communication protocols, hackers have so many options to explore and test for vulnerabilities. While it would be impossible to describe every tool and technique, it is easy enough to talk address the most common form of attacks and how to protect against them.

Governments and Banks are Ripe for Hacking

all
  • Clayton Unicorn
  • Hacking

It’s a common misconception that big banks, government, and healthcare companies are secure from hackers. Conventional wisdom would say that people who have the most sensitive information should be the ones that have the best security, but the issue is that good security comes from good technology practices. In other words, really secure organizations pay regular attention to software and hardware maintenance, monitoring, testing and upgrades.

More money does not mean more secure

all
  • Clayton Unicorn
  • Hacking

While investing in better security from a monetary standpoint is certainly not a bad thing, some of the most effective security is free. Educating employees on best practices, potential threats and maintenance is a great place to start. Most businesses leave security to the IT team and think that the responsibility ends there. In reality, everyone from the shareholders to CEO and custodial staff should care about security.