how to hire a pro

DEFINITIONS OF HACKERS AND TIPS ON HIRING ONE 




IT departments and individuals are advised to hire a hacker, regardless of the stigma associated with it.


The word “Hacker” entails a lot more than the criminal activities associated with the word.  So you need to make sure you know well enough about why you need a hacker and the kind of hacker you need, and how to hire the right kind. Hackers usually have their specializations. Therefore, you need to ensure you will hire one that can peculiarly solve your problems, just like chiropractors and dentists and heart surgeons aren’t interchangeable, even though they’re all doctors.

That easily means you have some discerning to do. I have worked with a  Certified Ethical Hacker, Whom we made look at security audits, and also do some intelligence gathering for us.  But when it comes to building a WordPress plugin that checks the Copyscape API, one of the things the article touts as something a hacker can do….? He’d be lost. But that doesn't make him any less good at what he does.

I’m probably closer to what the article means when they say a hacker. I’ve been the guy who roams from project to project, fixing annoying things without saying much, writing scripts to automate repetitive tasks, working without close supervision and not liking close supervision when I had it. I have a fake “Help Wanted” ad from an evil genius in my cubicle, and I want all of my coworkers to think I listen to GWAR. And I’m outspoken.






Hackers aren’t inherently bad like we are made to believe — the word “hacker” doesn’t mean “criminal” or “bad guy.”  Geeks and tech writers often refer to “black hat,” “white hat,” and “grey hat” hackers. These terms have successfully generalized the Hacking profession and its classification.
The definition of the word “hacker” is controversial and could mean more than just someone who compromises computer security or a skilled developer in the free software or open-source movements.


 BLACK-HAT HACKERS

Black-hat hackers, or simply “black hats,” are regarded as the bad egg that the media focus on.  Black-hat hackers violate computer security for personal gain (stealing credit card numbers or harvesting personal data for sale to identity thieves). Amazingly they pull certain stunts that are just for pure maliciousness (such as creating a botnet and using that botnet to perform DDOS attacks against websites they don’t like.)

Black hats fit the widely premeditated idea of hackers being computer criminals that perform illegal activities for personal gain and attacking others.

A black-hat hacker who finds a new, “zero-day” security vulnerability would either sell it to criminals on the black market or use it to compromise computer systems.

You can hardly blame people for their stereotype tag for hackers. Media portrayals of black-hat hackers may be accompanied by silly stock photos like the below one, which is intended as a parody.


GRAY HATS

Very few things in life are clear black-and-white categories. In reality, there’s often a gray area. A gray-hat hacker falls somewhere between a black hat and a white hat. A gray hat doesn’t work for their gain or to cause carnage, but they may technically commit crimes and do arguably unethical things.
For example, a black hat hacker would compromise a computer system without permission, stealing the data inside for their gain or vandalizing the system. A white-hat hacker would ask for permission before testing the system’s security and alert the organization after compromising it. A gray-hat hacker might attempt to compromise a computer system without permission, informing the organization after the fact and allowing them to fix the problem. While the gray-hat hacker didn’t use their access for bad purposes, they compromised a security system without permission, which is illegal.
If a gray-hat hacker discovers a security flaw in a piece of software or on a website, they may disclose the flaw publically instead of privately communicating the fault to the organization and giving them time to fix it. They wouldn’t take advantage of the flaw for their gain — that would be black-hat behavior — but the public disclosure could cause carnage as black-hat hackers tried to take advantage of the flaw before it was fixed.


WHITE HATS

White-hat hackers are quite different from their counterparts. They’re the so-called “ethical hackers,” experts in compromising computer security systems which use their abilities for ethical, and legal purposes rather than unethical, and criminal purposes.

White-hat hackers are in fact promoted by societies like U.S.A  especially to test an organizations’ computer security systems for vulnerabilities. The organization authorizes the white-hat hacker to attempt to compromise their systems. The white-hat hacker uses their knowledge of computer security systems to compromise the organization's systems, just as a black hat hacker would. However, if the white-hat hacker is able to gain access to their systems he educates them on how to better guard against situations like that in the future using their access to steal from the organization or vandalize its systems, This process is known as “penetration testing,” and it’s one example of an activity performed by white-hat hackers which further limits the negative effects of black-hat hackers

A white-hat hacker who finds a security vulnerability would disclose it to the developer, allowing them to patch their product and improve its security before it’s compromised. Various organizations pay “bounties” or award prizes for revealing such discovered vulnerabilities, compensating white-hats for their work.





The purpose of this blog is to hire the right hacker and avoid scams and deceit on all levels; my next post will be about real hackers out there for hire.

Cheers!!







Popular Posts