![]() ![]() Where do all these come from? More importantly, where does it all go? If you keep up with today’s tech news, you probably hear quite a lot about major hacking attacks, stolen emails, credit card information, vulnerable software, (un)patched bugs etc., stuff like the Heartbleed bug (early 2014). So, what is it? Before getting to that, let’s look for patterns… A surprisingly small number of people actually know about it. Earlier we explored the need and workings of this wonderful software, and now we’re going to discuss the hidden world it opens up. Here, we’re going to extend the discussion started in. We have the pieces of the puzzle in front of us, it only depends on how we put them together. Being an expert in something is not about knowing everything, it’s about using and applying whatever you do know, correctly. You may find that you can do something that you don’t fully understand, but you can be sure that in the long run, no good will come out of it. It is this ‘stuff’ that creates script kiddies, which is why it’s important to stay on track, progress slowly. You get to see things that have an obvious potential for exploitation, stuff that can do a lot of damage just sitting there, a “Download” button away. Apart from interesting software and applications you get to see the inner workings of the virtual world. Becoming a hacker exposes you to a lot of things.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |