Does normal hackers this kind of equipment? |
Kimmo Huosionmaa
In the beginning of the text is a picture, what I used before. I must ask is it the picture of the real world of hackers? Of course, it is published in some newspapers, but does real hacker this kind of systems? The picture is really taken from the Internet, and it was mentioned originally for the art of the story. In my opinion, if some hackers have this kind of resources, they must have very much financial support.
Most of that kind of persons are not dangerous, but if the hackers are working with international criminals, could those people want that this computer genius will be silent forever, and that's why they might kill this kind of people, what those gangsters think that they are weak rings in their organization. If the criminals are the part of the mafia, they might be very dangerous, and if they think that somebody is useless, they might kick that person off the system, and they can't leave evidence of their actions. The gangsters can play the people like Greenpeace and claim that they are looking for the evidence of corruption etc. , and they might hire hackers to make computer brakings inside the police computers to find the covered agents from their organization, and if the hacker will know too much about their work, those criminals might want to silent this person, because they don't want any witnesses to this kind of crimes like drug trafficking and murders.
When we are looking for the photos, what will jump to our screen, when we are searching the Internet using the word “hacker”, must we ask ourselves one special question. “Is the hacker this kind of person in real life”? The equipment in those pictures are fantastic, and the working spaces are awesome, but in those photographs are given the picture, that those hackers have very much financial support for their operations. In the real life, most of those people only dream about this kind of equipment and working areas. The problem of the hacking tools is that all the equipment, what is fully downloaded from the net must be registered. In this text, I will analyze the hacking to set myself to hackers position.
If I want to be phantom of the Internet, I would not use the software, what can link straight to my telephone or bank account, and that’s why I can’t use the software like Kali-Linux in my illegal operations. Of course if I were the spectacular programmer and I have lots of time, I could make the hacking software myself, but the programming skills must be very good, and of course, I should have enough time to make that software. In the real world making the hacking tool is not so easy, that the code is properly done in the one hour, and in the real world making the programs is not the synonym for the word “coding”. Making the code is, of course, the big function ft r the programmers, but also testing is the important part of the process. When we are talking about the making the program, we must make one thing clear.
When somebody wants to make the program, that person must not even know how to make codes. That person must only get the list of the codes, and then connect that code to freeware code editor like “DEV-C++” and then just compile that program, what might be delivered with the World documents. When the mission of the hacking is purely illegal, that hacker must hide identity very careful. If we are talking about official so-called “white hat” hackers, they can use the official software, what is properly tested. But how the criminal hacker does the test of the programs, and the programming editors sometimes codes the operating systems user information in those programs, what is made by that editor.
This is the thing, what is made to guarantee the programmer’s rights of that product, and that thing can be used for tracking the hackers. Normally the hackers don’t have millions in their bank accounts, and they don’t have very cool places, where the can make their operations. Of course, there is somewhere international gangs, what are lead by military intelligence, but normally hackers can only dream about this kind of offices, what are seen in the picture above this text. Normal hackers operate in their homes, or they will use some other open networks. Those networks are found from the library or some kind of public places, but the problems are the limits of the batteries. And that's why that kind of connection is unstable, and when the hacker stands on the streets this person might be in danger to be targeted by robberies or some person might stand behind this hacker and see what's going on in this person's computer screen. That's why the hacker needs the secure place where to work without risks. And this is why those persons will normally do their missions at home.
Comments
Post a Comment