Katana VentraIP

Security hacker

A security hacker is someone who explores methods for breaching defenses and exploiting weaknesses in a computer system or network.[1] Hackers may be motivated by a multitude of reasons, such as profit, protest, information gathering,[2] challenge, recreation,[3] or evaluation of a system weaknesses to assist in formulating defenses against potential hackers.

Not to be confused with Hacker or Hacker culture.

Longstanding controversy surrounds the meaning of the term "hacker." In this controversy, computer programmers reclaim the term hacker, arguing that it refers simply to someone with an advanced understanding of computers and computer networks,[4] and that cracker is the more appropriate term for those who break into computers, whether computer criminals (black hats) or computer security experts (white hats).[5][6] A 2014 article noted that "the black-hat meaning still prevails among the general public".[7] The subculture that has evolved around hackers is often referred to as the "computer underground".

 – Activities involving website defacement or denial-of-service attacks; and,

Cyberterrorism

 – Making information that is not public, or is public in non-machine-readable formats, accessible to the public.

Freedom of information

sentenced to three years in prison, is a grey hat hacker whose security group Goatse Security exposed a flaw in AT&T's iPad security.

Andrew Auernheimer

was a DNS expert who exposed multiple flaws in the protocol and investigated Sony's rootkit security issues in 2005. He spoke in front of the United States Senate on technology issues.

Dan Kaminsky

(also known as Bernie S) is a longstanding writer for 2600: The Hacker Quarterly. In 1995, he was arrested and charged with possession of technology that could be used for fraudulent purposes, and set legal precedents after being denied both a bail hearing and a speedy trial.

Ed Cummings

(also known as Emmanuel Goldstein) is the longstanding publisher of 2600: The Hacker Quarterly. He is also the founder of the Hackers on Planet Earth (HOPE) conferences. He has been part of the hacker community since the late 1970s.

Eric Corley

(also known as Susan Thunder), was an American hacker active during the late 1970s and early 1980s widely respected for her expertise in social engineering, pretexting, and psychological subversion.[40] She became heavily involved in phreaking with Kevin Mitnick and Lewis de Payne in Los Angeles, but later framed them for erasing the system files at US Leasing after a falling out, leading to Mitnick's first conviction.[41]

Susan Headley

is a Scottish hacker who was facing extradition to the United States to face criminal charges. Many people in the UK called on the authorities to be lenient with McKinnon, who has Asperger syndrome. The extradition has now been dropped.[42]

Gary McKinnon

known by the handle Fyodor, authored the Nmap Security Scanner as well as many network security books and web sites. He is a founding member of the Honeynet Project and Vice President of Computer Professionals for Social Responsibility.

Gordon Lyon

who claimed that he hacked into the Democratic National Committee (DNC) computer network

Guccifer 2.0

is an advocate, security researcher, and developer for the Tor project. He speaks internationally for usage of Tor by human rights groups and others concerned about Internet anonymity and censorship.

Jacob Appelbaum

is a Polish computer security researcher who developed the Blue Pill rootkit and Qubes OS.

Joanna Rutkowska

(known as St. Jude) was an American hacker and activist, founding member of the cypherpunk movement, and one of the creators of Community Memory, the first public computerized bulletin board system.[43]

Jude Milhon

was a computer security consultant and author, formerly the most wanted computer criminal in United States history.[44]

Kevin Mitnick

was a Belgian computer programmer and technologist who was also a privacy advocate.

Len Sassaman

is a well-known technologist and biohacker who has presented research with Dan Kaminsky and Len Sassaman at many international security and hacker conferences.

Meredith L. Patterson

(known as Gigabyte) is a Belgian hacker recognized for writing the first virus in C#.[45]

Kimberley Vanvaeck

(lcamtuf) is a prominent security researcher.

Michał Zalewski

is the pseudonym of the founder of the Openwall Project.

Solar Designer

sentenced to 2 years in youth detention, who is autistic, gained access to highly sensitive information and "cyber-terrorised" high-profile U.S. intelligence officials such as then CIA chief John Brennan or Director of National Intelligence James Clapper.[46][47][48]

Kane Gamble

security measures

The novels of William Gibson – especially the Sprawl trilogy – are very popular with hackers.[55]

cyberpunk

from the .hack manga and anime series

Helba

the protagonist of the second series in The Chronicles of Amber by Roger Zelazny, is a young immortal hacker-mage prince who has the ability to traverse shadow dimensions.

Merlin of Amber

Alice from

Heaven's Memo Pad

by Orson Scott Card

Ender's Game

by Catherine Jinks

Evil Genius

by Jack Dann and Gardner Dozois

Hackers (anthology)

by Cory Doctorow

Little Brother

by William Gibson

Neuromancer

by Neal Stephenson

Snow Crash

Samuel Chng, Han Yu Lu, Ayush Kumar, David Yau (March 2022). . Computers in Human Behavior Reports. 5. ISSN 2451-9588. Retrieved January 27, 2022.{{cite journal}}: CS1 maint: multiple names: authors list (link)

"Hacker types, motivations and strategies: A comprehensive framework"

Apro, Bill; Hammond, Graeme (2005). Hackers: The Hunt for Australia's Most Infamous Computer Cracker. Rowville, Vic: Five Mile Press.  1-74124-722-5.

ISBN

Beaver, Kevin (2010). . Hoboken, NJ: Wiley Pub. ISBN 978-0-7645-5784-2.

Hacking for Dummies

Conway, Richard; Cordingley, Julian (2004). Code Hacking: A Developer's Guide to Network Security. Hingham, Mass: Charles River Media.  978-1-58450-314-9.

ISBN

Freeman, David H.; Mann, Charles C. (1997). . New York: Simon & Schuster. ISBN 0-684-82464-7.

At Large: The Strange Case of the World's Biggest Internet Invasion

Granville, Johanna (Winter 2003). . Australian Journal of Politics and History. 49 (1): 102–109. doi:10.1111/1467-8497.00284. Retrieved February 20, 2014.

"Dot.Con: The Dangers of Cyber Crime and a Call for Proactive Solutions"

Gregg, Michael (2006). Certified Ethical Hacker. Indianapolis, Ind: Que Certification.  978-0-7897-3531-7.

ISBN

Hafner, Katie; Markoff, John (1991). . New York: Simon & Schuster. ISBN 0-671-68322-5.

Cyberpunk: Outlaws and Hackers on the Computer Frontier

Harper, Allen; Harris, Shon; Ness, Jonathan (2011). (3rd ed.). New York: McGraw-Hill. ISBN 978-0-07-174255-9.

Gray Hat Hacking: The Ethical Hacker's Handbook

McClure, Stuart; Scambray, Joel; Kurtz, George (1999). . Berkeley, Calif: Mcgraw-Hill. ISBN 0-07-212127-0.

Hacking Exposed: Network Security Secrets and Solutions

Russell, Ryan (2004). Stealing the Network: How to Own a Continent. Rockland, Mass: Syngress Media.  978-1-931836-05-0.

ISBN

Taylor, Paul A. (1999). Hackers: Crime in the Digital Sublime. London: Routledge.  978-0-415-18072-6.

ISBN

Media related to Hacking (computer security) at Wikimedia Commons

CNN Tech PCWorld Staff (November 2001). Timeline: A 40-year history of hacking from 1960 to 2001

Video produced by Off Book (web series)

Can Hackers Be Heroes?