The ethic of the hacker was born at the Massachusetts Institute of Technology (MIT): it’s moral and philosophical values that hackers must have to adhere.
This is what differentiates hackers who seek to defend themselves from pirates who seek to harm others. The nuance is important.
THE ETHIC OF HACKING (ethical hacking)
Journalist Steven Levy is the first to use the term ethical hacker in his book called Hackers. He also defined the following rules:
• The access to anything that could teach you something about how the world works should be unlimited and total.
• The information should be free.
• Do not trust authority, prefer decentralization.
• Hackers should be judged on their exploits and not on criteria such as age, origin, sex, diploma etc ...
• You can create art and beauty with a computer.
• Computers can improve your life.
He also asks the society to open up its worldview on hackers and expand it to the planet and not just reduce it to the little computer genius. He is followed later by the hacker Loyd Blankenship who defines the hacker's manifesto
Initially, the term "ethical hacker" was used to refer to a real hacker who secures computer systems and not to an “IT pirate”.
WHY PUT YOURSELF IN THE SHOES OF AN ATTACKER?
Hacking helps solve problems in many areas. In programming for example, we don’t reinvent the wheel, we access the details of a system to build something useful and effective.
IT security hacking makes possible to secure one's own systems and online privacy by first understanding how attacks work.
From there, the ethical hacker also known as the hacker in the white hat is thus put himself in the skin of a pirate to understand how he acts, and protect himself.
That’s "offensive security".
The approach, inspired by fire safety training, is a standard in the hacking industry:
We present a technique inspired by a real case, we explain it and put it into practice in order to understand the operating principles, and finally we protect ourselves against it.
The approach is the same for the police: we learn the techniques of thieves to catch them more easily.
=> Present, understand, protect.
Note: Putting the attacks into practice to understand them presents a potential danger related to the malicious people who would use the information to their advantage. As a result, my Steemit-Blog will not provide public details that could lead to illegal actions.
Besides, I have a revelation for you right now:
It is often thought that a IT pirate is a geek person, gifted and nomadic.
But actually, once you know their little secrets, you realize that all this doesn’t require a depth knowledge, and that you can defend yourself by applying simple and methodical concepts
That’s all for the ehic of hacker and for the diverse types oh hacker you could get to meet.
An easy way to reduce your chance to be hacked is to use the double authentification
If you think that you have already been hacked, you should read this post (the Trojan is the worst virus for me so be sure to have read this post too!)