LATEST UPDATES

.Hack//New Testament - Chapter 6

Published at 20th of July 2019 12:12:02 PM


Chapter 6

If audio player doesn't work, press Stop then Play button again




Hacker

 

The Internet was originally maintained by of “trusting” the participants. Correct e-mail delivery also assumes that each network would do the right thing.

It is technically possible and also extremely easy to open or falsify transferred mail en route.

However, e-mail systems have been created based on a trust that “no one would do such a thing.”

If this relationship of trust breaks down, the Internet will soon cease to function.

The Internet is a technology that was originally created for the United States to compete against its enemy the Soviet Union.

Therefore, at first, it was considered to only connect member states.

It is assumed that the enemy would not get in.

 

A hacker (or a cracker. The terms are synonymous here) is a person who misuses his knowledge to break into other people’s computers and “tamper” with the system.

Hackers are currently classified into approximately six types according to their motives.

The “Thrill Seeker” who, regardless of whether it’s good or bad, finds joy in taking on difficult hacking challenges.

The “Market Manipulator” who seeks out new business opportunities in the untapped areas of the Internet.

The “Freelancer” who is hired by the country and hacks for a living.

The “Hacktivist” who appeals to society based on his principles and convictions.

The “Sneak Thief” who steals information for money.

The “Stalker” who monitors and follows targets of interest.

In practice, there are many cases where these elements are mixed.

 

Also, one of the means that hackers use to achieve their purposes is the computer virus.





Please report us if you find any errors so we can fix it asap!


COMMENTS