Which hat are you?

8

Author: JT Smith

LogError writes: “It was inevitable that the hacking scene be split into new sub categories with new terminology to represent the mentality of the world’s brightest hackers. A decade ago it was a lot easier to understand what a hacker was and could do. Now we have millions of people using computers each day for email, e-commerce, banking, business, socialising, etc. It’s clear cyberspace has become a mirror of reality with more and more people getting online every day. The internet follows the same patterns as the universal guiding pattern of birth, a system rises, transforms itself and the world. Birth, change, death, rebirth, but on the net it’s beta, version 1, obsolete, prototype. Read more at Help Net Security.”

Category:

  • Linux