Skip to main content

What kind of picture of the hacking is given in the public media?

Does normal hackers this kind of equipment?

Kimmo Huosionmaa

In the beginning of the text is a picture, what I used before. I must ask is it the picture of the real world of hackers? Of course, it is published in some newspapers, but does real hacker this kind of systems? The picture is really taken from the Internet, and it was mentioned originally for the art of the story. In my opinion, if some hackers have this kind of resources, they must have very much financial support.


Most of that kind of persons are not dangerous, but if the hackers are working with international criminals, could those people want that this computer genius will be silent forever, and that's why they might kill this kind of people, what those gangsters think that they are weak rings in their organization. If the criminals are the part of the mafia, they might be very dangerous, and if they think that somebody is useless, they might kick that person off the system, and they can't leave evidence of their actions. The gangsters can play the people like Greenpeace and claim that they are looking for the evidence of corruption etc. , and they might hire hackers to make computer brakings inside the police computers to find the covered agents from their organization, and if the hacker will know too much about their work, those criminals might want to silent this person, because they don't want any witnesses to this kind of crimes like drug trafficking and murders.


When we are looking for the photos, what will jump to our screen, when we are searching the Internet using the word “hacker”,  must we ask ourselves one special question. “Is the hacker this kind of person in real life”? The equipment in those pictures are fantastic, and the working spaces are awesome, but in those photographs are given the picture, that those hackers have very much financial support for their operations. In the real life, most of those people only dream about this kind of equipment and working areas. The problem of the hacking tools is that all the equipment, what is fully downloaded from the net must be registered. In this text, I will analyze the hacking to set myself to hackers position.


If I want to be phantom of the Internet, I would not use the software, what can link straight to my telephone or bank account, and that’s why I can’t use the software like Kali-Linux in my illegal operations. Of course if I were the spectacular programmer and I have lots of time, I could make the hacking software myself, but the programming skills must be very good, and of course, I should have enough time to make that software. In the real world making the hacking tool is not so easy, that the code is properly done in the one hour, and in the real world making the programs is not the synonym for the word “coding”. Making the code is, of course, the big function ft r the programmers, but also testing is the important part of the process. When we are talking about the making the program, we must make one thing clear.


When somebody wants to make the program, that person must not even know how to make codes.  That person must only get the list of the codes, and then connect that code to freeware code editor like “DEV-C++” and then just compile that program, what might be delivered with the World documents. When the mission of the hacking is purely illegal,  that hacker must hide identity very careful. If we are talking about official so-called “white hat” hackers, they can use the official software, what is properly tested. But how the criminal hacker does the test of the programs, and the programming editors sometimes codes the operating systems user information in those programs, what is made by that editor.


This is the thing, what is made to guarantee the programmer’s rights of that product, and that thing can be used for tracking the hackers. Normally the hackers don’t have millions in their bank accounts, and they don’t have very cool places, where the can make their operations. Of course, there is somewhere international gangs, what are lead by military intelligence, but normally hackers can only dream about this kind of offices, what are seen in the picture above this text.  Normal hackers operate in their homes, or they will use some other open networks. Those networks are found from the library or some kind of public places, but the problems are the limits of the batteries. And that's why that kind of connection is unstable, and when the hacker stands on the streets this person might be in danger to be targeted by robberies or some person might stand behind this hacker and see what's going on in this person's computer screen. That's why the hacker needs the secure place where to work without risks. And this is why those persons will normally do their missions at home.

Comments

Popular posts from this blog

Chinese innovations and space lasers are interesting combinations.

Above: "Tiangong is China's operational space station located in low Earth orbit. (Image credit: Alejomiranda via Getty Images)" (Scpace.com, China's space station, Tiangong: A complete guide) Chinese are close to making nuclear-powered spacecraft.  Almost every day, we can read about Chinese technical advances. So are, the Chinese more innovative than Western people? Or is there some kind of difference in culture and morale between Western and Chinese societies? The Chinese superiority in hypersonic technology is one of the things that tells something about the Chinese way of making things.  In China, the mission means. And the only thing that means is mission. That means that things like budgets and safety orders are far different from Western standards. If some project serves the Chinese communist party and PLA (People's Liberation Army) that guarantees unlimited resources for those projects. Chinese authorities must not care about the public opinion.  If we th

Iron Dome is one of the most effective air defense systems.

The Iron Dome is a missile defense system whose missiles operate with highly sophisticated and effective artificial intelligence. The power of this missile defense base is in selective fire. The system calculates the incoming missile's trajectory. And it shoots only missiles that will hit the inhabited area. The system saves missiles and focuses defense on areas that mean something. The system shares the incoming missiles in, maybe two groups. Another is harmless and another is harmful.  Things like killer drones are also problematic because their trajectories are harder to calculate than ballistic missiles. The thing that makes drones dangerous is that they can make masks for ballistic missiles. And even if those drones are slow, all of them must be shot down.  The thing is that the cooperation between drone swarms and ballistic missiles is the next danger in conflict areas. In the film, you can see how drones make light images of the skies. The killer drones can also carry LED li

The innovative shield that protects OSIRIS-APEX can also protect the new hypersonic aircraft.

"NASA’s OSIRIS-APEX spacecraft successfully completed its closest solar pass, protected by innovative engineering solutions and showing improvements in onboard instruments. Credit: NASA’s Goddard Space Flight Center/CI Lab" (ScitechDaily, Innovative Engineering Shields NASA’s OSIRIS-APEX During Close Encounter With the Sun) The OSIRIS-APEX probe travels close to the sun. The mission plan is to research the sun. And especially find things that can warn about solar storms. Solar storms are things that can danger satellites at the Earth orbiter. And the purpose of OSIRIS-APEX is to find the method of how to predict those solar storms. Another thing is that the OSIRIS-APEX tests the systems and materials that protect this probe against heat and plasma impacts.  The same technology. The researchers created for OSIRIS-APEX can used in the materials and structures. That protects satellites against nuclear explosions. That means this kind of system delivers information on how to prot