Security hacker
A security hacker is someone who explores methods for breaching defenses and exploiting weaknesses in a computer system or network.[1] Hackers may be motivated by a multitude of reasons, such as profit, protest, information gathering,[2] challenge, recreation,[3] or evaluation of a system weaknesses to assist in formulating defenses against potential hackers.
Not to be confused with Hacker or Hacker culture.Longstanding controversy surrounds the meaning of the term "hacker." In this controversy, computer programmers reclaim the term hacker, arguing that it refers simply to someone with an advanced understanding of computers and computer networks,[4] and that cracker is the more appropriate term for those who break into computers, whether computer criminals (black hats) or computer security experts (white hats).[5][6] A 2014 article noted that "the black-hat meaning still prevails among the general public".[7] The subculture that has evolved around hackers is often referred to as the "computer underground".
– Making information that is not public, or is public in non-machine-readable formats, accessible to the public.
Freedom of information
sentenced to three years in prison, is a grey hat hacker whose security group Goatse Security exposed a flaw in AT&T's iPad security.
Andrew Auernheimer
was a DNS expert who exposed multiple flaws in the protocol and investigated Sony's rootkit security issues in 2005. He spoke in front of the United States Senate on technology issues.
Dan Kaminsky
(also known as Bernie S) is a longstanding writer for 2600: The Hacker Quarterly. In 1995, he was arrested and charged with possession of technology that could be used for fraudulent purposes, and set legal precedents after being denied both a bail hearing and a speedy trial.
Ed Cummings
(also known as Emmanuel Goldstein) is the longstanding publisher of 2600: The Hacker Quarterly. He is also the founder of the Hackers on Planet Earth (HOPE) conferences. He has been part of the hacker community since the late 1970s.
Eric Corley
(also known as Susan Thunder), was an American hacker active during the late 1970s and early 1980s widely respected for her expertise in social engineering, pretexting, and psychological subversion.[40] She became heavily involved in phreaking with Kevin Mitnick and Lewis de Payne in Los Angeles, but later framed them for erasing the system files at US Leasing after a falling out, leading to Mitnick's first conviction.[41]
Susan Headley
is a Scottish hacker who was facing extradition to the United States to face criminal charges. Many people in the UK called on the authorities to be lenient with McKinnon, who has Asperger syndrome. The extradition has now been dropped.[42]
Gary McKinnon
known by the handle Fyodor, authored the Nmap Security Scanner as well as many network security books and web sites. He is a founding member of the Honeynet Project and Vice President of Computer Professionals for Social Responsibility.
Gordon Lyon
who claimed that he hacked into the Democratic National Committee (DNC) computer network
Guccifer 2.0
is an advocate, security researcher, and developer for the Tor project. He speaks internationally for usage of Tor by human rights groups and others concerned about Internet anonymity and censorship.
Jacob Appelbaum
(known as St. Jude) was an American hacker and activist, founding member of the cypherpunk movement, and one of the creators of Community Memory, the first public computerized bulletin board system.[43]
Jude Milhon
was a computer security consultant and author, formerly the most wanted computer criminal in United States history.[44]
Kevin Mitnick
was a Belgian computer programmer and technologist who was also a privacy advocate.
Len Sassaman
is a well-known technologist and biohacker who has presented research with Dan Kaminsky and Len Sassaman at many international security and hacker conferences.
Meredith L. Patterson
(lcamtuf) is a prominent security researcher.
Michał Zalewski
sentenced to 2 years in youth detention, who is autistic, gained access to highly sensitive information and "cyber-terrorised" high-profile U.S. intelligence officials such as then CIA chief John Brennan or Director of National Intelligence James Clapper.[46][47][48]
Kane Gamble
security measures
The novels of William Gibson – especially the Sprawl trilogy – are very popular with hackers.[55]
cyberpunk
the protagonist of the second series in The Chronicles of Amber by Roger Zelazny, is a young immortal hacker-mage prince who has the ability to traverse shadow dimensions.
Merlin of Amber
Alice from
Heaven's Memo Pad
Samuel Chng, Han Yu Lu, Ayush Kumar, David Yau (March 2022). . Computers in Human Behavior Reports. 5. ISSN 2451-9588. Retrieved January 27, 2022.
{{cite journal}}
: CS1 maint: multiple names: authors list (link)
"Hacker types, motivations and strategies: A comprehensive framework"
Apro, Bill; Hammond, Graeme (2005). Hackers: The Hunt for Australia's Most Infamous Computer Cracker. Rowville, Vic: Five Mile Press. 1-74124-722-5.
ISBN
Conway, Richard; Cordingley, Julian (2004). Code Hacking: A Developer's Guide to Network Security. Hingham, Mass: Charles River Media. 978-1-58450-314-9.
ISBN
Freeman, David H.; Mann, Charles C. (1997). . New York: Simon & Schuster. ISBN 0-684-82464-7.
At Large: The Strange Case of the World's Biggest Internet Invasion
Granville, Johanna (Winter 2003). . Australian Journal of Politics and History. 49 (1): 102–109. doi:10.1111/1467-8497.00284. Retrieved February 20, 2014.
"Dot.Con: The Dangers of Cyber Crime and a Call for Proactive Solutions"
Gregg, Michael (2006). Certified Ethical Hacker. Indianapolis, Ind: Que Certification. 978-0-7897-3531-7.
ISBN
Hafner, Katie; Markoff, John (1991). . New York: Simon & Schuster. ISBN 0-671-68322-5.
Cyberpunk: Outlaws and Hackers on the Computer Frontier
Harper, Allen; Harris, Shon; Ness, Jonathan (2011). (3rd ed.). New York: McGraw-Hill. ISBN 978-0-07-174255-9.
Gray Hat Hacking: The Ethical Hacker's Handbook
McClure, Stuart; Scambray, Joel; Kurtz, George (1999). . Berkeley, Calif: Mcgraw-Hill. ISBN 0-07-212127-0.
Hacking Exposed: Network Security Secrets and Solutions
Russell, Ryan (2004). Stealing the Network: How to Own a Continent. Rockland, Mass: Syngress Media. 978-1-931836-05-0.
ISBN
Taylor, Paul A. (1999). Hackers: Crime in the Digital Sublime. London: Routledge. 978-0-415-18072-6.