Gadgetory


All Cool Mind-blowing Gadgets You Love in One Place

Types of Hackers (Hats) Explained

2017-02-21
you've heard it all over the news major company hacked user data exposed hospital held ransom celebrity tweet something offensive claims hackers did it Internet superstar linus hacked will it never end well no after all for as long as there have been locked there have been locked pics to break into them and unfortunately to the chagrin of major corporations and individual users alike computers are no different so who are these digital lock pickers and what makes them tick you might think of 90s retro teens with glasses staring at screens flooded with code but the reality is actually far less dramatic at the beginning of the digital age hackers were enthusiasts probing to see what was possible with emerging technologies phone freaker's are an early example from the late 1950s through the early 70s among whom was the legendary Steve Wozniak who would go on to co-found Apple Computer anyway the idea behind freaking was to generate tones that early automated phone systems used in order to gain control for themselves woz and Steve Jobs even impersonated Henry Kissinger to prank call the Vatican sadly that era of playful innocence ended soon after computers and networks became more commonplace and today we classify individual hackers by the hats that they wear which we assign based on their intentions the colors are white gray or black no relation to red hat which is an Enterprise Linux distribution white hats are mainly security researchers and penetration testers people whose job it is to counter the other guys their actions are often sanctioned by the companies who pay them for their services some white hats have discover a massive security holes that could have affected a lot of people if they weren't found such as Dan Kaminsky who discovered a flaw in the DNS that could have crippled huge parts of the Internet as well as rootkits that Sony was intentionally putting on to its music CDs which you can learn more about here gray hats as the name suggests muddy the waters since they generally don't have malicious intentions but they act without permission from their targets and the way in which they use any data they access comes down to their personal moral code gray hat incidents can take many forms from the hacker who sold an iphone cracked to the FBI to help them access the San Bernardino shooters data to the Russian software company that developed ebook software that bypass DRM restrictions although that was legal in Russia it wasn't in the u.s. leading to a run with the law when one of their employees visited the state's black cats meanwhile are usually the ones making splashy headlines as they have no problem floating the law to profit at someone else's expense or even to just cause damage to a website service business or even an individual when passwords or credit cards are stolen and put up for sale online that's a blackhat handiwork and although it's easy to label hackers that steal money from target customers as black hats there's debate as to whether other kinds of hackers fall into this category think so-called activists whose actions inspire impassioned arguments or government spy agencies like the NSA and some black hats have even had their talents recognized by major IT and cybersecurity firms who have ended up offering them jobs as long as the hacker trades in his or her black hat for a white one but these days it should be noted there are much better ways to break into the world of security consulting than by committing crimes and on the subject of the internet tunnel there is the VPN that lets you tunnel through 20 different countries allowing you to browse the Internet and use online services as though you are from that other country it's crazy easy to use they've got apps for iOS Android PC and Mac and they also have a Chrome extension all you got to do is visit the tunnel ver link in the video description it'll start downloading automatically then once it's installed you just click one button choose the country that you want and boom a couple of things happen your connection gets encrypted with AES 256-bit encryption and your public IP address gets switched so you show up as though you're in a different country tunnel where also lets you bypass all of the annoying details that typically come with using a VPN for personal users so port forwarding dns settings none of that nonsense and they don't log user activity so Charla tunnel bear for free at the link in the video description tunnel bear comm / - and when you sign up you can save 10% again by using our link so thanks for watching guys like this like subscribe or check out our other videos also you can leave a comment suggesting future topics for fast as possible
We are a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for us to earn fees by linking to Amazon.com and affiliated sites.