Tuesday 23 May 2006

What the Hack?

Computer hackers come in all shapes and sizes. Some are just curious to see what they can do and don’t cause any harm, others look for flaws in software design and work out ways to exploit them. Some seek power, others seek thrills, some steal money and others steal secrets. We see them in movies all the time. But the term hacker can mean many things, and they’re not all negative.

At their best, hackers may be people who know various programming languages and interfaces so well that they can write software expertly and quickly. These hackers can be brilliant at their tasks, writing detailed programs with little guidance in very quick time.

At their most interesting however, hackers can exploit computer security systems and gain unauthorized access through their own skills, tactics and knowledge. I’m sure that many listeners have been victims of this type of hacker, having perhaps had a Trojan horse, which is a program designed to look like legitimate software, but actually does something malicious, downloaded onto their computer.

A notorious, or famous depending on your point of view, computer hacker is Jonathon James, who obtained access to the source code on the International Space Station that controlled critical life sustaining functions such as oxygen filtering. He also intercepted communications between U.S. Department of Defense officials at the Defense Threat Reduction Agency who were discussing nuclear strategy, and obtained usernames and passwords of Defense Department officials. And he did this all at the age of 15!

Gary McKinnon is another infamous hacker, who is accused of the "biggest military computer hack of all time". The unemployed computer systems administrator is accused of hacking into 97 US government computers, including networks owned by NASA, the US Army, US Navy, Department of Defense, the US Air Force, and The Pentagon. The costs of tracking and correcting the problems he allegedly caused are estimated to be around $US 700 000.

Another, rather ingenious, hacker is Noah Burn of South Carolina in the US. Burn exploited a software flaw in the game EverQuest II so that his character within the game, a barbarian called Methical, could sell lots of desirable goods, and therefore make lots of virtual money. Now this might sound like it’s not worth the effort – after all, all this extra money is just virtual money, and you can’t spend it in the real world. However, with online gaming becoming more and more prevalent, a real life market has been set up on auction sites such as e-bay, whereby you can buy virtual goods for real life money – that is, you can buy the goods and have your character possess them, without having to earn them within the game. In this way, Burn made roughly $US 100 000 in the real world due to a minor glitch in his virtual world.

Indeed, this real life market for online commodities has taken off to such an extent that some players have been collecting real life money for destroying the property of other characters, or even the characters themselves. One such online character is Istvaan Shoaatsu, who is a mercenary destroying other characters for a profit within the game Eve Online. And whilst Shoaatsu may profit in the real world from these activities, those whom he destroys lose their own virtual money, which has taken time to earn and has a real life worth. Indeed, violence from the online world has spilled over into reality. Qui Chengwei from Shanghai, having loaned his valuable sword to a friend Zhu Caoyuan within the game Legends of Mir, actually murdered Zhu in real life when he discovered that Zhu had sold his sword on to another buyer.

This highlights an area where our laws are just not ready, as we have never had to develop laws for such situations. Another area where this is the case is in the situation of bio-hackers, who are similar to computer hackers, but instead of tinkering with computers and software, they experiment with DNA and other aspects of genetics. It is thought that in the future, computers themselves will contain biological devices. But until then, the risk of bioterrorism and biohackers with evil intent is high. Imagine if you could isolate the DNA of dangerous viruses and create even more deadly bugs? Tom Knight of the Massachusettes Institute of Technology thinks we have absolutely no choice but to try and do this better and faster than the bad guys, and work out ways of lessening the possible damage caused.

See Tim Guest’s book Second Lives, which will be published in 2007, for more information about online/offline adventures.

Listen to this show here

47 comments:

  1. Great job for publishing such a nice article. Your article isn’t only useful but it is additionally really informative. Thank you because you have been willing to share information with us. Computer hackers for hire

    ReplyDelete
  2. It's a magnificent blog and it was very informative while reading. I look forward to reading more of your blogs. Checkout here more info about hire a hacker for social media

    ReplyDelete
  3. This information is meaningful and magnificent which you have shared here about the hacking. I am impressed by the details that you have shared in this post and It reveals how nicely you understand this subject. I would like to thanks for sharing this article here. Hire Online a Certified hacker in USA

    ReplyDelete
  4. Such a wonderful and marvelous blog to always visit. hackers for hire

    ReplyDelete
  5. Thanks for sharing this article here. Your article is very informative. Keep sharing your excellent work. hacker service online in USA

    ReplyDelete
  6. Found your post interesting to read. I cant wait to see your post soon. Good Luck for the upcoming update.This article is really very interesting and effective.Best Certified Ethical Hackers For Hire

    ReplyDelete
  7. Thanks for sharing this article here about the Your article is very informative and I will share it with my other friends as the information is really very useful. Keep sharing your excellent work.Hire A Hacker For Cell Phone

    ReplyDelete
  8. It's a nice article, Which you have shared here about the . Your article is very informative and I really liked the way you expressed your views in this post. Thank you.Hire a hacker online

    ReplyDelete
  9. Great work! I am totally impressed with your work. I got some amazing ideas from your article. Thanks and keep sharing. hire a professional hacker

    ReplyDelete
  10. I read this article, it is really informative one. Your way of writing and making things clear is very impressive. Thanking you for such an informative article.password hacking service online

    ReplyDelete
  11. Very well written article. It was an awesome article to read. Complete rich content and fully informative. I totally Loved it.professional phone hackers online

    ReplyDelete
  12. You are doing such a great job by publishing such informative post in this blog about Business. I got some useful knowledge from this post. Thanks for sharing it.Password hacker

    ReplyDelete
  13. After reading the post about Business case, I got some descriptive information which is very helpful for me. Thanks for posting it. Keep it up. Hire a hacker

    ReplyDelete
  14. This comment has been removed by the author.

    ReplyDelete
  15. Wow! Thank you! I constantly wanted to write on my site something like that. Can I take a portion of your post to my website? best hire a hacker to fix credit score service provider.

    ReplyDelete
  16. It’s great to come across a blog every once in a while that isn’t the same out of date rehashed material. Fantastic read. Best Hire a hacker service provider.

    ReplyDelete
  17. Hey what a brilliant post I have come across and believe me I have been searching out for

    this similar kind of post for past a week and hardly came across this. Thank you very much

    and will look for more postings from you.Best professional hackers for hire service

    provider

    ReplyDelete
  18. I am heartily thankful to you for sharing this best knowledge. This information is helpful for everyone. So please always share this kind of knowledge. Thanks once again for sharing it. Hire a hacker

    ReplyDelete
  19. This is really a good source of information, I will often follow it to know more information and expand my knowledge, I think everyone should know it, thanks Best professional hackers for hire service provider

    ReplyDelete
  20. It's very nice of you to share your knowledge through posts. I love to read stories about your experiences. They're very useful and interesting. I am excited to read the next posts. I'm so grateful for all that you've done. Keep plugging. Many viewers like me fancy your writing. Thank you for sharing precious information with us. Best hire a professional hacker service provider.

    ReplyDelete
  21. I am very much obliged to you for sharing this necessary knowledge. This information is very helpful for everyone. So please always share this kind of information. Thanks once again for sharing it. Defense Linear Motor

    ReplyDelete
  22. I read the above article and I got some knowledge from your article. pay to hack gmail account It's actually great and useful data for us. Thanks for share it.

    ReplyDelete
  23. This comment has been removed by the author.

    ReplyDelete
  24. I'm very impressed with your innovative ideas that are really amazing about Hire A Hacker. You have good knowledge on this topic. Keep sharing your amazing article with us. Thanks for sharing your article.

    ReplyDelete
  25. This comment has been removed by the author.

    ReplyDelete
  26. very delightful article that you have shared here.Hire A Verified Hacker Your blog is a valuable and engaging article for us, and also I will share it with my companions who need this info. Thankful to you for sharing an article like this.

    ReplyDelete
  27. Your blog contains lots of valuable data. It is a factual and beneficial article for us.fully external memory aimbot hack Thankful to you for sharing an article like this.

    ReplyDelete
  28. This is important information which is shared by you. This info is meaningful and important for everyone to increase our knowledge about it. Always keep sharing this kind of information. Thank you. Read more info about Trusted Hackers for Hire

    ReplyDelete

  29. This is really a good source of information, I will often follow it to know more information and expand my knowledge, I think everyone should know it, thanks.Best professional hacker for hire service provider

    ReplyDelete
  30. A very delightful article that you have shared here. Hire Hacker For Email Password Your blog is a valuable and engaging article for us, and also I will share it with my companions who need this info. Thankful to you for sharing an article like this.

    ReplyDelete
  31. It's very nice of you to share your knowledge through posts. I love to read stories about your experiences. They're very useful and interesting. I am excited to read the next posts. I'm so grateful for all that you've done. Keep plugging. Many viewers like me fancy your writing. Thank you for sharing precious information with us. Best genuine hackers for hire service provider.

    ReplyDelete
  32. It's a nice article, Which you have shared here about the What the Hack. Your article is very informative and I really liked the way you expressed your views in this post. Thank you.Professional Phone Hacker in Usa

    ReplyDelete
  33. I found decent information in your article.Hire A Professional Hacker I am impressed with how nicely you described this subject, It is a gainful article for us. Thanks for share it.

    ReplyDelete
  34. After a long time, I read a very beautiful and very important article that I enjoyed reading. I have found that this article has many important points, I sincerely thank the admin of this website for sharing it. Best i need a hacker urgently service provider.

    ReplyDelete
  35. I read this article, it is really informative one. Your way of writing and making things clear is very impressive. Thanking you for such an informative article.mobilespy

    ReplyDelete
  36. After a long time, I read a very beautiful and very important article that I enjoyed reading. I have found that this article has many important points, I sincerely thank the admin of this website for sharing it. Best Best Hacker for social media service provider.

    ReplyDelete
  37. Nice blog post so thanks a lot for sharing this great blog post.. keep more post for sharing.. have a nice day.
    Real Estate Lawyer in Cambridge

    ReplyDelete
  38. Very nice post, impressive. its quite different from other posts. Thanks for sharing.
    Express Entry Lawyer in Canada

    ReplyDelete
  39. Hire a whatsapp hacker is one of the maximum famous instant messaging apps used by one-0.33 of the planet’s populace, and there are over 1.5 billion lively users on the app. Developers of this messaging application work hard to offer the exceptional protection and protection to the users. Therefore, if you want to log into a person else’s WhatsApp account, you want access to their smartphone.

    ReplyDelete
  40. In need of a hacker services ?
    Contact; ( bluehackangels407 (at) gmail (dot) com )
    Hack college/university grades
    Hack email, WhatsApp, Instagram acc,
    Erase criminal records
    Database hack
    hack cheating spouse phone
    Contact; ( bluehackangels407 (at) gmail (dot) com )
    For other specific hack

    ReplyDelete
  41. You've composed an exceptionally valuable article. This article furnished me with some valuable information. Much thanks to you for giving this data . Keep up the great work.Professional Phone Hacker in Usa

    ReplyDelete
  42. Magnificent post. I truly appreciate perusing and furthermore value your work. This idea is an effective method for improving information. Continue to share this sort of articles, Thank you.Professional Phone Hacker in Usa

    ReplyDelete
  43. You wrote this post very carefully.hire a hacker for cell phone The amount of information is stunning and also a gainful article for us. Keep sharing this kind of articles, Thank you.

    ReplyDelete
  44. You have given great content here.Hire A Verified Hacker I am glad to discover this post as I found lots of valuable data in your article. Thanks for sharing an article like this.

    ReplyDelete
  45. Thanks for sharing valuable informative article. I really appreciated to learn new things. hire a hacker

    ReplyDelete
  46. I wanted to take a moment to share my experience with Spyware Cyber, a group of hackers who specialize in hacking any database or admin. As a former student, I struggled with poor grades throughout my college career. Graduating from college with lower grades was not something that pleased me, and I ended up spending an extra two years in college due to it. That was until one of my college mates introduced me to Spyware Cyber. They were very helpful during my final year in college, and they successfully changed my grades for the better. If you are facing challenges in university and want to achieve your goals, Spyware Cyber is capable of helping you. Their contact information is Spyware(@)cybergal(.)com and through WhatsApp: +1 (989) 264-0381

    Thank you, Spyware Cyber, for everything you have done for me. I would recommend your services to anyone with confidence.

    ReplyDelete
  47. Students who have attained a low grade can be very devastated just like I was. Getting a professional hacking team like Coder Cyber Services is one of the best decisions I’ve made in my life. I had bad school grades for more than 2 years, but then I was encouraged by an article to reach out to Coder Cyber Services who made something that once seemed so incomprehensible to me, seem so easy. I appreciate how they upgraded my files regarding my poor academic performance and left no traces behind. Currently, I'm a very contented student. Coder Cyber Services can assist you as a student in improving your academic standing so that you can receive the greatest possible school accreditation. Contact  (Codercyberservices@execs.com) right away.

    ReplyDelete