Hacking is the term that fascinates 90% of the people. By hearing the term ‘Hacking’, people start to dream that the hackers can do anything. But that’s not the truth, There is certain restriction through which the hacker is bounded that are “cyber laws”. These days, hackers are in huge demand. Major organizations & co-operations requires hackers for data security. Today, we will see 10 interesting facts about ethical hacking.
Note: We would like to thanks Mr. Comet for giving us these amazing facts, tips & suggestions.
According to Mr. Comet) : “hacker ”
There are many types of hackers like . An Ethical Hacker is the White hat hacker whose main intention is to safeguard the data owned by the organization. In simple words, we can say that hacking for a good cause.
Here are top 10 interesting facts about the ethical hacking.
1. Hacker culture can be traced to 1959
Hacker culture can be traced to 1959 with the founding of the MIT Artificial Intelligence Lab. MIT students who were exploring phone switching network and the control systems of the Tech Model Railroad Club were drawn to the computers of the MIT Artificial Intelligence Lab (MIT AI Lab). Marvin Minsky (MIT AI Lab Director), was sympathetic to the hacker’s desire to explore and was very much impressed with their achievements. He allowed them have direct access to the machines, even if the true hackers among the group were dropped out of school to spend more time on hacking. Legendary hackers from this first wave include
This was said to be “Golden Age” of computer hackers. As the machines were large and slow, extraordinary effort was required for their coding and operations. Soon, the hacker culture spread widely across the country. The Stanford AI Lab (SAIL), under the direction of John McCarthy, became the center for west-coast hacker activity. In 1991 the SAIL machine was shut down, hackers sent an goodbye email to internet as if the machine was itself sending messages. Legendary hackers from this second wave include
Now comes the time. The third wave of hacker activity tool place in northern California. Now, the hackers wanted their own computer machines such that they could program them at home as well can build or modify (hardware) it. This includes legendary figures,Moreover, these legends formed the foundation for the entire personal computer industry.
2. Hacker’s Memorandum was published on leap day 1972.
HAKMEM, is an report of MIT Artificial Lab. It was published in 1972, It includes wide variety of hacks algorithms and theories. It was published in an html document format so that it is supported by all types of browsers. The HAKMEM 140 includes:
§ Geometry, Algebra, Calculus
§ Recurrence Relations
§ Boolean Algebra
§ Random Numbers
§ Number Theorem Primes, Probability,
§ Autometa Theory, Games, hardware, etc ()
3. Richard Matthew Stallman wrote GNU General Public License
Richard Matthew Stallman (RMS), who launched the GNU Project, founded the , developed the and , and wrote the , is a self-identified hacker.
GNU General public License is free license for software & other works. It’s designed to guarantee your freedom to share & modify work. It means anyone can free contribute, use and share the product. The GNU Compiler Collection includes front ends and libraries for different languages like C & C++. GCC was originally written as the compiler for the .
Yet when I say I am a hacker, people often think I am making a naughty admission, presenting myself specifically as a security breaker. How did this confusion develop?
4. Creative Computing, hackers got information before the Internet was created in 1984.
“Creative Computing”, edited by and published from until , was one of the ways hackers got information before the Internet was created in 1984. It was one of the earliest magazines of that time covered the microcomputer revolution. Moreover the magazine, covered major spectrum of different types of computing in more human understandable easy format.
You can find complete collection of magazine:
5. Bulletin Board Systems
Hackers also communicated via dial-up bulletin board systems, such as Spies in the Wire BBS, which ran from 1984 to 1991.
6. In 2014, Yahoo! suffered the largest Cyber Attack.
On 22 SEP 16, reported Yahoo had suffered a cyber attack in 2014 that affected 500 million user accounts. It had constituted the largest massive hacking of individual data directed against a single company. Names, dates of birth, telephone numbers and passwords were stolen.
However on 3 OCT 17,
7. SOME ETHICAL HACKERS ARE FAMOUS!
Ethical Hackers are now very valuable for an organization for security concern and are in Big Demand. Let’s see few of the famous ethical hackers:
1. (American Computer Security consultant, Author & Hacker. Best known for 1995 high-profile arrest. His black hat adventures included breaching down due to 2.5 years spree of criminal cyber activity.)
2. (Cyber Security Researcher,Poland. She is the founder of Qubes Desktop OS focused on security.)
3. (Computer Security Researcher, best known for exposing vulnerabilities in Apple products.)
4. (Specialist in computer forensics, best known for working in include physical memory forensics, attribution of hackers and malware detection.)
5. (Cyber Security Expert and Physicist)
8. NOW MAY BE THE BEST TIME TO PURSUE ETHICAL HACKING AS A CAREER
The United States Bureau of Labor Statistics’ job outlook for information security analysis is expected to increase 18 percent between 2014-2024. 18% is very much faster than the national average. Many top technology companies like Microsoft and Facebook helped hackers gain mainstream recognition as an vital element of cyber security. Facebook uses many hackers to discover new vulnerabilities within its system. Ethical Hacking requires vast amount of knowledge and skills. But, hackers play an vital part in IT sector. Today, big corporations and organizations are investing huge in cyber security to prevent major attacks.
9. INDIA LEADS THE WORLDS IN ETHICAL HACKERS (HACKERONE)
According to the survey conducted by , it was found that 23% of world’s hackers belong to India. The US is the second country to have the highest number of hackers that are 20%. Followed by Russia (6%), Pakistan (4%) and United Kingdom (4%).
However, viewers must know these numbers do not claim to show who leads the world in the number of ethical hackers. The numbers simply show the participation, by country, of the 166,000 people participating in Hacker One programs.
10. 35 % OF THE CYBER-ATTACK ON INDIAN SITES ARE FROM CHINA
The Official report of says that “The cyber attacks from China made up 35% of the total number of cyber attacks on official Indian websites, followed by the US (17%), Russia (15%), Pakistan (9%), Canada(7%) and Germany (5%) ”. However, cyber attacks on Indian sites also affect computers that do not host a web server. The cited report is only analysis of attacks reported on web sites where the attacker has been identified.