LT   EN   RU  
Thursday 28 March 2024 Straipsniai.lt - Independent and informative portal
Home
Phorum
Contacts
Login
Register   Login
News subscribe
Subscribe   Unsubscribe
Partners
www.slaptai.lt www.gamezone.lt
www.penki.lt www.hakeriai.lt
   
   
Advertising
Statistic
Visits since 2002 09 12 - 70580410
Pages in Straipsniai.lt: 40735
  
  Computers > Computer technologies > Hackers
Lankomumo reitingas Print version Print version
Hacker Psych

Who are hackers, and what makes them tick?

Two experts in the field of cyber forensics and psychology have some answers to that question. One is Marc Rogers, a behavioral sciences researcher at the University of Manitoba in Winnipeg, Canada, and a former cyber detective. The other is Jerrold M. Post, a psychiatrist at George Washington University in Washington, D.C.

Rogers and Post have identified some basic behavioral trends for hackers who commit crimes. Rogers says one characteristic is that they tend to minimize or misconstrue the consequences of their activities, rationalizing that their behavior is really performing a service to society. (Some researchers call this the Robin Hood Syndrome). They may also tend to dehumanize and blame the victim sites they attack. Post says the same hackers share a sense of "ethical flexibility," which means that since human contact is minimized over the computer, hacking becomes like a game where the serious consequences can be easily ignored.

But Rogers is careful to point out that not all hackers are criminals. He's identified four categories as follows:

1. Old School Hackers: These are your 1960s style computer programmers from Stanford or MIT for whom the term hacking is a badge of honor. They're interested in lines of code and analyzing systems, but what they do is not related to criminal activity. They don't have a malicious intent, though they may have a lack of concern for privacy and proprietary information because they believe the Internet was designed to be an open system.

2. Script Kiddies, or Cyber-Punks: Most commonly what the media calls "hackers." These are the kids, like Mafia Boy, who most frequently get caught by authorities because they brag online about their exploits. As an age group, they can be between 12 and 30 years old, they're predominantly white and male, and on average have a grade 12 education. Bored in school, very adept with computers and technology, they download scripts or hack into systems with the intent to vandalize or disrupt systems.

3. Professional Criminals, or Crackers: These guys make a living breaking into systems and selling the information. They might get hired for corporate or government espionage. They may also have ties to organized criminal groups.

4. Coders and Virus Writers: Not a lot of research has been done on these guys. They like to see themselves as an elite. They have a lot of programming background and write code but won't use it themselves. They have their own networks to experiment with, which they call "Zoos." They leave it to others to introduce their codes into "The Wild," or the Internet.

Underlying the psyche of the criminal hacker may be a deep sense of inferiority. Consequently, the mastery of computer technology, or the shut down of a major site, might give them a sense of power. "It's a population that takes refuge in computers because of their problems sustaining real world relationships," says Post. "Causing millions of dollars of damage is a real power trip."

         
Lankomumo reitingas

Diskusijos - Discusions

Print version - Print version

Atgal


Random tags:    Hackers (59)    Agrobusiness (2)    Philately (8)    Politics (13)    Soldiership (12)    Krishnaism (10)    Fishing (14)    Countries (43)    Agriculture (17)    Modems (2)    Biology (66)    The Rights of Man (14)    Geology (4)    Religion (34)    Yoga (4)    Nursing (4)    Music (10)    Astronomy (11)    Wedding (10)    Feng Shui (14)    Geography (10)    Monitors (10)    Viruses (10)    Dogs (17)    Procesors (2)    Sport2 (8)    Computer piracy (10)    Physics (5)    Mysticism 2 (3)    Medicine (5)    Art (10)    Animals (65)    Helping and prevention (14)    Blow-ups (2)    Cats (14)    Education (174)    Architecture (2)    Floriculture (10)    Eurointegration (4)    Sound systems (10)    Science (163)    Energetics (2)    Business (25)    Tales (13)    SSL certificates (10)    Egypt (43)    Sport (81)    Kisses (13)    Linux/Unix (2)    Hobby (25)
1. Bill Gates and other communists
2. Wi-Fi overtakes Ethernet for home networks
3. Worm plays games with victims
4. McAfee Launches SiteDigger 2.0 - program, which checks sites for their vulnerabilities
5. Troy-horses infects Windows Media files?
6. iWork productivity software targets Microsoft's Office
7. Taiwan police seize 60,000 suspect AMD CPUs
8. IDC: 3 future technologies
9. phpBB Attachment Mod: new vulnerabilities discovered
10. Windows XP SP2 Firewall shows your files and printers to every Internet user
1. Multiple vulnerabilities within PHP <= 4.3.9, PHP5 <= 5.0.2
2. Taiwan police seize 60,000 suspect AMD CPUs
3. Who says safe computing must remain a pipe dream?
4. Bill Gates and other communists
5. phpBB Attachment Mod: new vulnerabilities discovered
6. iWork productivity software targets Microsoft's Office
7. Feds try to take logs from Nmap creator
8. New hacking tool: chocolate
9. McAfee Launches SiteDigger 2.0 - program, which checks sites for their vulnerabilities
10. New Internet domains in the works
Map