Advertise


Monday, November 3, 2008

[Shadeshi_Bondhu] Exploring the minds of hackers

In most cases hackers try to demonstrate their skills and talent instead diabolic acts. Cyber criminal experts often find many talented hackers are not directly attached with the nefarious intentions. Their knowledge on programming sometimes inject megalomania in their minds and they mistakenly think 'we are extraordinary than general computer users.' Thus a stupidity can be seen in their cracking down on security systems of computer users which is the clue for cyber forensic experts to trace out wicked surfers in the virtual world.

 

A large part of hackers are obsessed by sacred pleasure to enter cyber zones of netizens. Considering consequences after the hack is totally absence in their minds. A strange pleasure to break cyber security system and to see information of famous companies, security bodies, celebrities, political leaders etc is the inspiration of many hackers.

 

General finding is teenaged hackers just try to break info-security system to test their capacity to break. Hacking satisfy their pleasure to see the secret information of people. However, incidents of hacking cause huge financial loss to companies and departmental wings of a government.   

 

Some researches revelled most teenagers hack out of curiosity and show a kind of foolishness in the hacking. Thus such hackers can be easily traceable to bring them to the justice. Often parents are not aware of hacking skills of their children. In fact, a big part of parents is preoccupied that hackers grow up in the gang of criminals. Last year results were posted on the website of a local university which was hacked by the children of a few teachers or examiners of the university. Somehow the teachers or examiners provided password of the online result to their beloved kids. Teachers of the technology university could not realise their innocent kids can be hackers and change the results in favour of their friends.

 

The hackers of RAB website claimed as hackers they are ten times better than experts of RAB. It was reported in the newspapers the alleged hackers mentioned on the RAB's website, "The government does not take any step for ICT development but passed a law about anti-cyber crime."
They further said, "You do not know what the cyber security is or how to protect yourself. Listen, hackers are not criminal. They are 10 times better than your (RAB) experts."

 

Stupidity of the self-proclaimed genius hackers was using their real identity, own computer, and real IP address (Internet Protocol). RAB officials should not be boastful for arresting the alleged hackers within 24 hours. Stupidity of the hackers was the cause for early arrest. The alleged hackers Abu Musa Mirza Kamruzzaman Shahee reportedly confessed that his team hacked the website of the elite force RAB. Besides the RAB website they hacked 22 websites including Bangladesh Army.

 

The alleged cyber crime is under the process of investigation and it is the premature period to say finally something against the crime. Court will deliver a judgement about the hack of RAB website and the alleged hackers.    

 

An anonymous survey of about 4,800 San Diego area high school students at the American Psychological Association conference revelled.

 

•38 per cent students said they copied software without permission.

 

•18 per cent students went into someone's computer or website without permission, and 16 per cent took material.

 

Every website is hackable, even if a website is developed by talented programmers who have special expertise in security system. We witnessed the hacking of the websites of Microsoft and a portion of Computer Networks of Pentagon. Terrorists can break any well-protected security system of homes and palaces, they earn skills to know the security loopholes of houses and palaces as well as they gain savvy on technological know-how of breaking the security. Similarly hackers are able to find out weak parts of software, website and data stored in server or computer. Mastery over programming is the reason behind their hacking intention.    

 

In developed countries some organisations look for hackers to protect their information and they are needed for data security. Such hackers are called "white hat hackers" and employers appoint them to protect their data. Cyber shields are developed by them to crack down on rival hackers. They find out and protect loopholes in security system as if hackers cannot explore the loopholes. Many young hackers try to draw attention of media with hacking website of famous organisations. After being freed from jail they get big job offers from security firms.

 

"Black hat hackers" are those cyber security crackers who break the security system for personal gains. Also any computer user can be hacker at any time if he is inspired by his primitive instinct. Your colleague can try to click on your folder to see your personal letters to someone. If your e-mail account is not signed out during going washroom your colleague can see your personal mails only for fun. Here hacking is a malicious trend of human beings like peeping into windows of people, checking bags of women, listening to secret talks of lovers etc.

 

Hackers can be victims by their rival hackers in breaking guarded security system. Cyber space is the field for war between "white hat" and "black hat hackers." Endlessly the war can go because software cannot be hundred per cent secure from hackers. So hacker detecting knowledge and mechanism must be created for the protection of valued data.

 

Some hackers without diabolic intention claim themselves proudly hackers because they find there is not significant wrong with hacking. According to their view instead hacker security system breakers with malicious intentions should called cracker. For the purpose of developing cyber security system they conduct experiments of hacking on the website and networks. Cyber security shield can be developed by such experiments even after the losses for the experiment.

 

Value of information can be more than billion dollars, a country's data must be regarded as assets like the reserve of the central bank. So ignoring info-security issue can be a havoc to the country. We spent hundreds of core TK for preparing voter or national ID card and the preparation took nine months with including military and experts of several sectors.

 

If hackers destroy, copy or steal the data of national ID card the country will lose the investment and valuable time spent by militaries and other experts. In addition, national security will come at risk for the collapse of data. So more focus should be laid on the information security and cyber security experts must be trained at the IT institutes.

 

Hacking of RAB's website drew the attention of IT concern people on the site. The hacking did not only prove that the security options of the site were neglected, but it was poorly developed and every day a few surfs visit the website. Landscape of the RAB website is lagging behind for lack of attractiveness; user friendly options can increase enthusiasm about the website among the commoners; it is needed to be more interactive, rich with information and easy for common people to lodge complain via the website.

 


Source:

The Independent



__._,_.___

++++++++++++++++++++++++++++++++++++++++++++++++++++++++
SB: Home of the Bangladeshi Teens & Youths
++++++++++++++++++++++++++++++++++++++++++++++++++++++++

-> Official Website: http://www.ShadeshiBondhu.com
-> Group's short url: http://Group.ShadeshiBondhu.com

++++++++++++++++++++++++++++++++++++++++++++++++++++++++
SB: Friends' Family
++++++++++++++++++++++++++++++++++++++++++++++++++++++++




Your email settings: Individual Email|Traditional
Change settings via the Web (Yahoo! ID required)
Change settings via email: Switch delivery to Daily Digest | Switch to Fully Featured
Visit Your Group | Yahoo! Groups Terms of Use | Unsubscribe

__,_._,___