Skip to main content

What kind of picture of the hacking is given in the public media?

Does normal hackers this kind of equipment?

Kimmo Huosionmaa

In the beginning of the text is a picture, what I used before. I must ask is it the picture of the real world of hackers? Of course, it is published in some newspapers, but does real hacker this kind of systems? The picture is really taken from the Internet, and it was mentioned originally for the art of the story. In my opinion, if some hackers have this kind of resources, they must have very much financial support.


Most of that kind of persons are not dangerous, but if the hackers are working with international criminals, could those people want that this computer genius will be silent forever, and that's why they might kill this kind of people, what those gangsters think that they are weak rings in their organization. If the criminals are the part of the mafia, they might be very dangerous, and if they think that somebody is useless, they might kick that person off the system, and they can't leave evidence of their actions. The gangsters can play the people like Greenpeace and claim that they are looking for the evidence of corruption etc. , and they might hire hackers to make computer brakings inside the police computers to find the covered agents from their organization, and if the hacker will know too much about their work, those criminals might want to silent this person, because they don't want any witnesses to this kind of crimes like drug trafficking and murders.


When we are looking for the photos, what will jump to our screen, when we are searching the Internet using the word “hacker”,  must we ask ourselves one special question. “Is the hacker this kind of person in real life”? The equipment in those pictures are fantastic, and the working spaces are awesome, but in those photographs are given the picture, that those hackers have very much financial support for their operations. In the real life, most of those people only dream about this kind of equipment and working areas. The problem of the hacking tools is that all the equipment, what is fully downloaded from the net must be registered. In this text, I will analyze the hacking to set myself to hackers position.


If I want to be phantom of the Internet, I would not use the software, what can link straight to my telephone or bank account, and that’s why I can’t use the software like Kali-Linux in my illegal operations. Of course if I were the spectacular programmer and I have lots of time, I could make the hacking software myself, but the programming skills must be very good, and of course, I should have enough time to make that software. In the real world making the hacking tool is not so easy, that the code is properly done in the one hour, and in the real world making the programs is not the synonym for the word “coding”. Making the code is, of course, the big function ft r the programmers, but also testing is the important part of the process. When we are talking about the making the program, we must make one thing clear.


When somebody wants to make the program, that person must not even know how to make codes.  That person must only get the list of the codes, and then connect that code to freeware code editor like “DEV-C++” and then just compile that program, what might be delivered with the World documents. When the mission of the hacking is purely illegal,  that hacker must hide identity very careful. If we are talking about official so-called “white hat” hackers, they can use the official software, what is properly tested. But how the criminal hacker does the test of the programs, and the programming editors sometimes codes the operating systems user information in those programs, what is made by that editor.


This is the thing, what is made to guarantee the programmer’s rights of that product, and that thing can be used for tracking the hackers. Normally the hackers don’t have millions in their bank accounts, and they don’t have very cool places, where the can make their operations. Of course, there is somewhere international gangs, what are lead by military intelligence, but normally hackers can only dream about this kind of offices, what are seen in the picture above this text.  Normal hackers operate in their homes, or they will use some other open networks. Those networks are found from the library or some kind of public places, but the problems are the limits of the batteries. And that's why that kind of connection is unstable, and when the hacker stands on the streets this person might be in danger to be targeted by robberies or some person might stand behind this hacker and see what's going on in this person's computer screen. That's why the hacker needs the secure place where to work without risks. And this is why those persons will normally do their missions at home.

Comments

Popular posts from this blog

MIT's tractor beam can make the new types of SASER systems possible

   "This chip-based "tractor-beam," which uses an intensely focused beam of light to capture and manipulate biological particles without damaging the cells, could help biologists study the mechanisms of diseases."(Interesting Engineering, MIT’s Star Wars-inspired ‘tractor beam’ uses light to capture, manipulate cells) MIT's tractor beam can make the new types of SASER systems possible. The tractor beam just hovers the nanoparticle in air or medium, and then the laser or some other electromagnetic system transports oscillation into those particles. The ability to make cells and other particles hover in the system makes it possible to create particles whose energy level or resonance frequencies are accurately calculated things.  That thing makes it possible to create things that transmit wave movement accurately and cleanly. This is one version of the use of a tractor beam. Modern tractor beams are like acoustic tweezers where sound waves lock the object in its cr

The new observations tell that the thunderstorms form gamma-rays. That could make gamma-ray lasers possible.

  "An illustration of NASA’s research plane ER-2 flying over thunderstorms. Credit: University of Bergen / Mount Visual (CC BY 4.0), edited" (ScitechDaily, Surprising Discovery: NASA’s Retrofitted U2 Spy Plane Reveals Tropical Lightning Storms Are Radioactive) The new observations tell that the thunderstorms form gamma-rays. That could make gamma-ray lasers possible. The process has been observed by the NASA (Lockheed) ER-2 research plane, which is a modified U-2 spy plane. The gamma-ray formation in thunderstorms. Where lightning and electric fields release electrons that impact the air molecules and water droplets is an interesting thing. That thing opens the route to solving many mysteries.  "The general physics behind how thunderstorms create high-energy flashes of gamma radiation is not a mystery. As thunderstorms develop, swirling drafts drive water droplets, hail, and ice into a mixture that creates an electric charge much like rubbing a balloon on your shirt. Pos

Chinese innovations and space lasers are interesting combinations.

Above: "Tiangong is China's operational space station located in low Earth orbit. (Image credit: Alejomiranda via Getty Images)" (Scpace.com, China's space station, Tiangong: A complete guide) Chinese are close to making nuclear-powered spacecraft.  Almost every day, we can read about Chinese technical advances. So are, the Chinese more innovative than Western people? Or is there some kind of difference in culture and morale between Western and Chinese societies? The Chinese superiority in hypersonic technology is one of the things that tells something about the Chinese way of making things.  In China, the mission means. And the only thing that means is mission. That means that things like budgets and safety orders are far different from Western standards. If some project serves the Chinese communist party and PLA (People's Liberation Army) that guarantees unlimited resources for those projects. Chinese authorities must not care about the public opinion.  If we th