Hacking For Beginners – Manthan Desai
2010
Now we have. .
White Hat Hackers –
White hat hackers, also known as ethical hackers, or white knights, are computer security experts, who specialize inpenetration testing, and other testing methodologies, to ensure that a compa ny’s information systems are secure. Suchpeople are employed by companies where these professionals are sometimes called "sneakers.” Groups of these peopleare often called tiger teams or red teams. These security experts may utilize a variety of methods to carry out their tests,including social engineering tactics, use of hacking tools, and attempts to evade security to gain entry into secured areas.
1) Stephen Wazniak
Stephen Wazniak, one of the founders when a younghacker could twiddle the phone system prank wouldturn into an international incident. Steve Wozniak got the first inspirations by its father Jerry, which worked as anengineer at Lockheed, and by the fiktionalen miracle boy Tom Swift. Its father stuck on it with the fascination forelectronics and examined frequently the inventions of its son. Tom Swift was on the other hand for it the product ofcreative liberty, scientific knowledge and the ability to find problem solutions. Tom Swift showed it also the large prices,which expected him as inventors. Until Wozniak returns to the world from Tom Swift and reads out the books to itsown children, in order to inspire it.
2) Tim Berners-Lee
Berners-Lee is famed as the inventor of the World Wide Web, the system that we use to access sites, documents and fileson the Internet. He has received numerous recognitions, most notably the Millennium Technology Prize. While workingwith CERN, a European nuclear research organization, Berners-Lee created a hypertext prototype system that helpedresearchers share and update information easily. He later realized that hypertext could be joined with the Internet.Berners-Lee recounts how he put them together: "I just had to take the hypertext idea and connect it to the TCP and DNS
ideas and "ta-da! ” the World Wide Web . ”
www.hackingtech.co.tv
Page 234