2009-04-23

hackers become security consultant?

You know what the hacker? Hacker is someone who is learning, to analyze a computer device, be it hardware or software programs such as computer, administration and also other things, especially security. In addition, hackers can also create, modify, or even exploit the system's computer device.

Previously, a hacker is among the members of student organizations Tech Model Railroad Club in artificial Intelligence Laboratory Massachusetts Institute of Technology (MIT) in 1960. The student group is one of the pioneering development of computer technology and especially their work with a number of Mainframe computers. However, at this time, hackers have a negative view of the deeds that hackers cause damage such as changing the appearance of a web site, insert the virus code and so forth. The hackers use the midst of security has not been fixed by the software (bug). Although it looks different that done by hackers with the past now, but they still maintain a system of analyzing culture.

However, at this time can not be said hackers virtual villain who must fight in the book. The existence of the hacker can not be said for any loss technology. Thus hackers can be said is one of the key developments in the world. As the story of one of the hackers who penetrate this data on 1.3 million computers worldwide. He is Owen Thor Walker, New Zealand hacker origin. Precisely in the year 2007, the hacker by the name of fictitious AKILL is also evident damage to computer systems and entrance through a number of bank accounts and steal funds more than 1.3 billion dollars. At that time, the new Walker aged 18. He is also a search by FBI.

Finally, he was arrested and pleaded guilty on the crime that he do. However, the punishment that he received only a fine and banned the use of computer. Case was conducted by the court, because they fear will damage the great potential that is owned by Walker if he was in criminal law. Then, a group helping with the Walker pay fines and return the money so that they can claim on Walker revoked and he was released.

Now he be as a cyber security consultant by TelstraClear, the second-largest telecommunications company in the country, New Zealand. TelstraClear is the son of Australia's largest telecommunications company, Telstra. "We believe Walker has the ability to assist senior executives and customers understand the security threats that can attack their network," said TelstraClear spokesman Chris Mirams to the National Radio in Wellington, Wednesday 25 March 2009.

Mirams also said Walker had some counseling and providing advice to managers and security staff TelstraClear. Walker also participated in the program ad TelstraClear. "Walker tells what are the cyber criminals and how to fortify their networks from threats that," added Mirams.

Some of the many hackers send electronic mail to the company's computer system or the government so that the excess capacity of the mailbox and enter the system.
There are also other uses hacker techniques botnet, which is trying the computer and combine hundreds of computers in a kluster that have centralized control.

Then the hacker can use a combination of the computer to steal credit card information, manipulate stock trading, computer systems and destroy an industry.

Thank you have visited.




0 comments: