10 Interesting Facts about Ethical Hacking

Hacking is the term that fascinates 90% of the people. By hearing the term ‘Hacking’, people start to dream that the hackers can do anything. But that’s not the truth, There is certain restriction through which the hacker is bounded that are “cyber laws”. These days, hackers are in huge demand. Major organizations & co-operations requires hackers for data security. Today, we will see 10 interesting facts about ethical hacking.
Note: We would like to thanks Mr. Comet for giving us these amazing facts, tips & suggestions.
According to Mr. Comet) : “For me, a hacker is one who enjoys observing details and understanding how things work, and uses this knowledge to improve things.
There are many types of hackers like Black Hat hacker, White Hat hacker, Gray Hat hacker or the Suicide hacker. An Ethical Hacker is the White hat hacker whose main intention is to safeguard the data owned by the organization. In simple words, we can say that hacking for a good cause.
Here are top 10 interesting facts about the ethical hacking.

1. Hacker culture can be traced to 1959

Hacker culture can be traced to 1959 with the founding of the MIT Artificial Intelligence Lab. MIT students who were exploring phone switching network and the control systems of the Tech Model Railroad Club were drawn to the computers of the MIT Artificial Intelligence Lab (MIT AI Lab). Marvin Minsky (MIT AI Lab Director), was sympathetic to the hacker’s desire to explore and was very much impressed with their achievements. He allowed them have direct access to the machines, even if the true hackers among the group were dropped out of school to spend more time on hacking. Legendary hackers from this first wave include Peter Deutsch, Bill Gosper, Jerry Sussman, Tom Knight, and Richard Greenblatt.
This was said to be “Golden Age” of computer hackers. As the machines were large and slow, extraordinary effort was required for their coding and operations. Soon, the hacker culture spread widely across the country. The Stanford AI Lab (SAIL), under the direction of John McCarthy, became the center for west-coast hacker activity. In 1991 the SAIL machine was shut down, hackers sent an goodbye email to internet as if the machine was itself sending messages. Legendary hackers from this second wave include Ed Fredkin, Brian Reid, Jim Gosling, Brian Kernighan, Dennis Ritchie, and Richard Stallman.
Now comes the time. The third wave of hacker activity tool place in northern California. Now, the hackers wanted their own computer machines such that they could program them at home as well can build or modify (hardware) it. This includes legendary figures,Lee Felsenstein, Steve Dompier, Steve Wozniak, Steve Jobs, and Bill Gates.Moreover, these legends formed the foundation for the entire personal computer industry.
Source : University of Utah School of Computing
2. Hacker’s Memorandum was published on leap day 1972.
HAKMEM, is an report of MIT Artificial Lab. It was published in 1972, It includes wide variety of hacks algorithms and theories. It was published in an html document format so that it is supported by all types of browsers. The HAKMEM 140 includes:
§  Geometry, Algebra, Calculus
§  Recurrence Relations
§  Boolean Algebra
§  Random Numbers
§  Number Theorem Primes, Probability,
§  Autometa Theory, Games, hardware, etc (Total 191 items)
Source : HAKMEM (inwap)
3. Richard Matthew Stallman wrote GNU General Public License
Richard Matthew Stallman (RMS), who launched the GNU Project, founded the Free Software Foundation, developed the GNU Compiler Collection and GNU Emacs, and wrote the GNU General Public License, is a self-identified hacker.
GNU General public License is free license for software & other works. It’s designed to guarantee your freedom to share & modify work. It means anyone can free contribute, use and share the product. The GNU Compiler Collection includes front ends and libraries for different languages like C & C++. GCC was originally written as the compiler for the GNU operating system.
Yet when I say I am a hacker, people often think I am making a naughty admission, presenting myself specifically as a security breaker. How did this confusion develop?
Around 1980, when the news media took notice of hackers, they fixated on one narrow aspect of real hacking: the security breaking which some hackers occasionally did. They ignored all the rest of hacking, and took the term to mean breaking security, no more and no less. The media have since spread that definition, disregarding our attempts to correct them. As a result, most people have a mistaken idea of what we hackers actually do and what we think.
Source : Richard Stallman’s Personal Site
4. Creative Computing, hackers got information before the Internet was created in 1984.
“Creative Computing”, edited by David H. Ahl and published from October 1974 until October 1985, was one of the ways hackers got information before the Internet was created in 1984. It was one of the earliest magazines of that time covered the microcomputer revolution. Moreover the magazine, covered major spectrum of different types of computing in more human understandable easy format.
You can find complete collection of magazine: Creative Computing Magazine
5. Bulletin Board Systems
Hackers also communicated via dial-up bulletin board systems, such as Spies in the Wire BBS, which ran from 1984 to 1991.
 I'd like to take the time to say that I REALLY, REALLY enjoyed running this
 system for you guys, and the messages I have received in mail and on the
 forums has been terrific!  It's good to see that the system wasn't just
 THERE, it really seems to have made a difference.  I'd like to thank Carmen,
 RObert, Ult, Cindy, Hagbard, monaq, Rich, Panther, and the others who were
 there from the beginning, and really helped to make SPIES a memeorable
 place.  The good times and the bad times changed the way I think about many
 things, but most importantly, they remind me of how much can really be
 accomplished with a stupid computer and modem.
Take care, and stay in the spirit...
SYSTEM 0PERATOR/Ducati pilot/Geek
 Post: 21 of 25
 Subject: Yup, I still have it!
 From: moebius (moebius)
 Comment: Sell the kids for food.
 Date: Wed, 30 Oct 91 09:58:44 PST
...yes, I still have the Altos that arubin ran E-MX and eventually
 Citadel on in Chappaqua, NY.  As a matter of fact, I thought I was
 the one who turned Andy on to Citadel (wasn't I?!)...
SOURCE: arubin.txt
6. In 2014, Yahoo! suffered the largest Cyber Attack.

On 22 SEP 16, NYTimes reported Yahoo had suffered a cyber attack in 2014 that affected 500 million user accounts. It had constituted the largest massive hacking of individual data directed against a single company. Names, dates of birth, telephone numbers and passwords were stolen.
However on 3 OCT 17, Yahoo said that all 3 billion of its accounts were hacked.
Source : Reuters
Ethical Hackers are now very valuable for an organization for security concern and are in Big Demand. Let’s see few of the famous ethical hackers:
1.    Kelvin Mitnick (American Computer Security consultant, Author & Hacker. Best known for 1995 high-profile arrest. His black hat adventures included breaching down due to 2.5 years spree of criminal cyber activity.)
2.    Joanna Rutkowska (Cyber Security Researcher,Poland. She is the founder of Qubes Desktop OS focused on security.)
3.    Charlie Miller (Computer Security Researcher, best known for exposing vulnerabilities in Apple products.)
4.    Greg Hoglund (Specialist in computer forensics, best known for working in include physical memory forensics, attribution of hackers and malware detection.)
5.    Tsutomu Shimomura (Cyber Security Expert and Physicist)
Source: Top 5 ethical hackers you should doff your white hat to (CBRonline)
The United States Bureau of Labor Statistics’ job outlook for information security analysis is expected to increase 18 percent between 2014-2024. 18% is very much faster than the national average. Many top technology companies like Microsoft and Facebook helped hackers gain mainstream recognition as an vital element of cyber security. Facebook uses many hackers to discover new vulnerabilities within its system. Ethical Hacking requires vast amount of knowledge and skills. But, hackers play an vital part in IT sector. Today, big corporations and organizations are investing huge in cyber security to prevent major attacks.
Source: Ethical Hacking Emerges as Unique Career Path in Cyber Security
According to the survey conducted by Hacker One, it was found that 23% of world’s hackers belong to India. The US is the second country to have the highest number of hackers that are 20%. Followed by Russia (6%), Pakistan (4%) and United Kingdom (4%).
Note: However, viewers must know these numbers do not claim to show who leads the world in the number of ethical hackers. The numbers simply show the participation, by country, of the 166,000 people participating in Hacker One programs.
The Official report of National Security Council Secretariat (NSCS) says that “The cyber attacks from China made up 35% of the total number of cyber attacks on official Indian websites, followed by the US (17%), Russia (15%), Pakistan (9%), Canada(7%) and Germany (5%) ”. However, cyber attacks on Indian sites also affect computers that do not host a web server. The cited report is only analysis of attacks reported on web sites where the attacker has been identified.
Source: Indian Express