Professional Documents
Culture Documents
Unit14 - Hacking With Exercises Quantifiers Demonstratives
Unit14 - Hacking With Exercises Quantifiers Demonstratives
Unit14 - Hacking With Exercises Quantifiers Demonstratives
One of the misunderstandings among people who are not in I.T. is the word
“hacker”. The word itself comes from the verb “to hack” or “cut with rough or heavy
blows”. So, a hacker is someone who works on software like a logger works on a
tree – hacking until they reach their goal. A person who is a hacker is not inherently
bad – the term does not mean “criminal” or “bad guy. It all depends on what “hat”
they wear – white, black, gray, red, blue, and who knows what new color they come
up with. A hacker may be someone who compromises computer security (black
hat) or a skilled developer in the free software or open-source communities (white
hat).
Many of the values and tenets of the free and open source software movement come
from the hacker ethics that originated at MIT and at the Homebrew Computer Club.
These can be described as:
• Access to computers-and anything that might teach you something about the
way the world works-should be unlimited and total
• All information should be free
• Hackers should be judged by their hacking, not false criteria such as
degrees, age, race, or position.
• You can create art and beauty on a computer
• Computers can change your life for the better
• Hacker ethics are concerned primarily with sharing, openness, collaboration,
and engaging in the hands-on development
Linus Torvalds, one of the leaders of the open-source movement, who also
developed the Linux kernel, notes that these principles have evolved from the
known Protestant ethics and incorporates the spirits of capitalism, as introduced in
the early 20th century by Max Weber.
White Hat
122
UNIT 14 – Hats, Hats, Hats: What’s the Color of Yours?
organization and tells them how they gained access. This allows the organization to
improve their defenses. This is known as “penetration testing”.
A white-hat hacker who finds a security vulnerability would tell the developers, thus
allowing them to patch their product and improve its security before it’s
compromised. Many organizations pay “bounties” or award prizes discovering
vulnerabilities.
Black Hat
A black-hat hacker who finds a new “zero-day” security vulnerability would likely
sell it to criminal organizations on the black market or use it to compromise computer
systems.
Gray Hat
A gray-hat hacker may disclose the flaw publicly instead of privately to the
organization and giving them time to fix it. They wouldn’t take advantage of the flaw
for their own personal gain — that would be black-hat behavior — but telling the
public could cause damage as black-hat hackers tried to take advantage of the flaw
before it is fixed.
123
UNIT 14 – Hats, Hats, Hats: What’s the Color of Yours?
These hacker terms have appeared in general culture. “Black hat,” “white hat,” and
“gray hat” can also refer to behavior – if someone says, “That seems a bit black hat”,
they are saying that the action in question seems unethical.
In addition, there has been a proliferation of terms in the hacker world, some have
gained general use, others only in a small subset. Let’s look at a few of these.
Blue Hat
Red Hat
These term is not to be confused with
RedHat, the company that puts out
RedHat Linux. When referring to hackers,
these are the vigilantes of the hacker world.
They are like White Hats in that they halt Black
Hats, but instead of reporting the malicious
hacker, they shut them down by uploading
viruses, DoS, or breaking into someone’s computer to destroy it from the inside out.
They use multiple aggressive methods that might force the Black Hat to need a new
computer.
Script kiddie
124
UNIT 14 – Hats, Hats, Hats: What’s the Color of Yours?
Hacktivist
Many hackers are disappointed by the mass media and general public's usage of the
word hacker to refer to security breakers. They call them "crackers" instead. This
includes both "good" crackers ("white hat hackers") as well as those more "evil”
crackers ("black hat hackers"), and all the other “hats” listed above. The
programming subculture of hackers, in contrast to the cracker community, generally
sees computer security-related activities as against the ideals of the original and true
meaning of the hacker term. This term, however, has been used by “black hat”
hackers who see themselves as doing good by “exposing” what they feel is “evil”.
WikiLeaks is a good example. The people who exposed the “secrets” did so without
thinking about the damage and the deaths that it would cause.
As you can see, there is a wide variety of hacking and hacking terms in I.T. The
meanings given in this Unit are those as of 2018. They may change with time. The
main choice you have is – What hat will you wear?
SOURCES:
https://www.howtogeek.com/157460/hacker-hat-colors-explained-black-hats-white-
hats-and-gray-hats/
https://en.wikipedia.org/wiki/Security_hacker
https://en.wikipedia.org/wiki/Hacker_culture
125
UNIT 14 – Hats, Hats, Hats: What’s the Color of Yours?
VOCABULARY
TECHNICAL NON-TECHNICAL
cracker – зломщик; компьютерный bogus (adj) – фіктивний; підроблений;
взломщик; специалист по раскрытию фальшивий; фальшивый
шифров и кодов
hacker – хакер; компьютерный пират bounty (n) – щедрість, дар; щедрость,
дар
hacktivist - хакер-активiст; хактивiст; compromise (v) - піти на компроміс,
хактивист (лицо, использующее компроміс; пойти на компромисс
компьютерные сети для
распространения той или иной
идеологии
open-source - відкрите джерело; consulting firm - консалтингова фірма;
общедоступный, бесплатный консалтинговая компания
penetration testing - випробування на criminal (n) – злочинець; преступник
проникнення; тест на защиту от
несанкционированного доступа
script kiddie - скрипт kiddie; хакер- criterion/-a (n) – критерій, критерії;
дилетант; взломщик-дилетант; критерий; критерии
(начинающие или совершенно
неквалифицированные хакеры, часто
с большим самомнением,
использующие для атак на сети
готовые хакерские инструменты
(hacking tools), не понимая как они
написаны и как работают.)
zero-day vulnerability - уразливість deface (v) – затемнювати; псувати;
“нульового дня”; уязвимость стирати; повредить; портить; портить
"нулевого дня" (уязвимость, атаки на поверхность
которую проводят в тот же день,
когда она обнаружена, т.е. пока
отсутствует "заплатка" от
разработчика ПО)
depend on (v) - залежить від; зависеть
от
derogatory (adj) – зневажливий, що
применшує, принизливий;
уничижительный, пренебрежительный,
умаляющий
disclose (v) – розкривати; виявляти;
обнаруживать; раскрыть (особенно
конфиденциальную информацию)
ethical/unethical (adj) – етичний/
неетично // моральный/ неэтичный
hack (v) – рубати; рубить
impress (v) – вразити; производить
впечатление
improve (v) – поліпшити; улучшать
126
UNIT 14 – Hats, Hats, Hats: What’s the Color of Yours?
ACTIVITIES:
2) Find at least five (5) more terms used by the hacker community and explain
what they mean.
3) Why do you think “script kiddies” are looked down upon by the hacker
community, no matter what color “hat” they wear?
4) What do you know about the DARK WEB (don’t go there – do research)?
127
UNIT 14 – Hats, Hats, Hats: What’s the Color of Yours?
Vocabulary exercises
128
UNIT 14 – Hats, Hats, Hats: What’s the Color of Yours?
Exercise 2. Fill in the blanks with the words/phrases from the Unit.
Grammar
129
UNIT 14 – Hats, Hats, Hats: What’s the Color of Yours?
This/ - for people or things near us; This gadget here is the Your
these newest one. own
- for present or future We’re having a test this example
situations; term.
- when the speaker is in or This museum was
near the place referring to; opened 10 years ago.
- to introduce people; “Hi. This is Ben
speaking.”
- to refer to something we are Try this. It’s really
about to mention. marvelous.
That/ - for people or things not near That woman over there
those us; is our IT lecturer.
- for past situations; That year was the
toughest of my life.
- to refer back to something “I have passed all my
mentioned before; exams!” “That’s cool.”
130