Lead Image © Setsiri Silapasuwanchai, 123RF.com

Lead Image © Setsiri Silapasuwanchai, 123RF.com

If You Don't Like Security Guys, Call a Hacker

Welcome

Article from ADMIN 35/2016
By
Many years ago on a school field trip to the local police station, I noticed a bumper sticker on a cop's cruiser that read: "If you don't like Cops, next time you're in trouble call a Hippie."

Many years ago on a school field trip to the local police station, I noticed a bumper sticker on a cop's cruiser that read: "If you don't like Cops, next time you're in trouble call a Hippie." Of course, I understood the purpose and the message behind the sticker, but what I didn't understand was the generic hostility toward an entire group of people who could, at some point, prove useful to law enforcement and its effort to thwart crime. And although the ubiquitous peace and love hippie credo was all encompassing, there were a few bad eggs with whom law enforcement personnel weren't happily acquainted. I assume those "black hat" or perhaps "black headband" hippies comprised a minority of the worldwide hippie community, or commune, if you like. Similarly, all hackers aren't lawbreakers. Most, in fact, are law-abiding citizens who either are curious or who get a thrill of walking that fine line between ethical and illegal. In either case, my assumption is that even the line walkers will help catch their black-hatted counterparts – given the proper motivation, of course.

A day rarely passes without reading about a new hack, a new breach, or a new dump of private information. Hackers, it seems, are always one step ahead of our best security efforts. Shouldn't we embrace those who live in the deep web and harvest their knowledge for good? While I'm only comparing hippies to hackers to illustrate a point, the analogy of partnering with insiders who can help bring the really bad guys to justice is a valid one in either case.

Now, I'm not talking about Edward Snowden here. I'm talking about real hackers – people who have true knowledge of how to compromise systems, to expose data, and to maintain a stealth presence inside your network. I know that a few companies have hired hackers that have infiltrated their perimeters in the past, but that's still the exception more than the rule. My personal opinion is that I'd rather

...
Use Express-Checkout link below to read the full article (PDF).

Buy this article as PDF

Express-Checkout as PDF
Price $2.95
(incl. VAT)

Buy ADMIN Magazine

SINGLE ISSUES
 
SUBSCRIPTIONS
 
TABLET & SMARTPHONE APPS
Get it on Google Play

US / Canada

Get it on Google Play

UK / Australia

Related content

  • BackTrack Linux: The Ultimate Hacker's Arsenal

    Penetration Testing and security auditing are now part of every system administrator's "other duties as assigned." BackTrack Linux is a custom distribution designed for security testing for all skill levels from novice to expert.

  • Security is Everyone's Problem
    I attended a security seminar a few weeks ago, and one of the slides read, "Security is not an IT problem." I laughed when I saw it and gave a smirk to our Security Manager at my new job.
  • Welcome to ADMIN
    If you haven't either used or experienced Chromebooks firsthand by now, you soon will. Chromebooks are the next frontier in IT management and support, and they're coming soon to a network near you. The primary reasons for the soon-to-be widespread adoption of the humble Chromebook are cost, flexibility, security, and portability. But most of those reasons are the "business" reasons driving adoption.
  • John the Ripper

    Easy to remember but difficult to guess isn’t just a catchy phrase for choosing passwords, it’s the law of the Net. Learn how to check your password using a tool network intruders use every day: John the Ripper.

  • The Fine Art of Relationship Maintenance
    We want to be secure. We don't like security. We want system administrators, but yet we are irritated when they need to fix something or to implement security. Complicated isn't it?
comments powered by Disqus
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs



Support Our Work

ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.

Learn More”>
	</a>

<hr>		    
			</div>
		    		</div>

		<div class=