The hacking hobbyist

Published: 17 March 2001 y., Saturday
Baker, a 24-year-old systems programmer, is part of a group of computer experts who spend their free time trying to figure out potential Internet security threats to large networks. Over the last year, Baker's hobby has led him to technology security lapses at E*Trade, the Charles Schwab brokerage concern, Wells Fargo bank and the Critical Path e-mail service. Baker is a member of a clan known as "gray-hat" hackers, who occupy the ethical territory between the malicious "black hats" and the "white hats," hired by companies to check their own systems' security. Gray Hat protocol is to first notify hacked companies of possible network flaws, and then possibly posting the flaw on Web sites where gray hats exchange trade gossip, as Baker did when he discovered the E*Trade network security hole. The company quickly vowed to clean up the matter after reporters called. In a world where hackers are either jailed or earn thousands in consulting fees, Baker's hobby is puzzling. The online gatherings for this community are places like Bugtraq, run by Virginia-based SecurityFocus.com. Five to 10 network vulnerabilities can be posted on Bugtraq in just one day, said chief technology officer Elias Levy, who estimates the gray hat community numbers 10,000 people, ranging from researchers at well-known labs and universities to amateurs. "People make targets of themselves," said Baker, who says he gave E*Trade months to address the issues before posting vulnerabilities. "If there isn't any press, there isn't any action. It is the key to making the whole plan work."
Šaltinis: nandotimes.com
Copying, publishing, announcing any information from the News.lt portal without written permission of News.lt editorial office is prohibited.

Facebook Comments

New comment


Captcha

Associated articles

Hotmail Targets Web Beacons

Microsoft on Thursday announced Hotmail users could block HTML images from appearing in e-mail messages, in a move meant to foil spammers trolling for valid e-mail addresses more »

U.S. agencies defend gov't data-mining plans

Leaders of two much-criticized projects that privacy advocates fear will collect massive amounts of data on U.S. residents defended those projects before the U.S. Congress Tuesday more »

Microsoft unveils hardware partner portal

Site holds resources for hardware and driver software makers more »

search.lt news

search.lt presents newest links more »

Europe's Borderless Market: The Net

Business-to-business e-commerce is thriving more »

Poland - Lucent to expand Netia's ATM broadband network

Lucent Technologies has been executing the second phase of the ATM multiservice network for Netia, one of Poland's largest independent telecommunications service providers more »

Business Users Clearly Define Spam

The difference between spam and desired e-mail is whether the user has previously transacted business with the sender. more »

The Great IT Complexity Challenge

Technology is supposed to help simplify transactions and increase the speed of doing business, but often that is not the way it works more »

Immigration applications online

The Bureau of Citizenship and Immigration Services will start accepting immigration applications filed through the Internet on May 29 more »

search.lt news

search.lt presents newest links more »