ExtraTorrent.cc - The Largest Bittorent SystemLogin   |   Register
Latest Articles
Most searched
Hot torrents
First Cams
View Torrent Info: Underworld Blood Wars 2016 HDCAM NAKRO
View Torrent Info: Moana 2016 HD-TS XviD AC3-CPG
View Torrent Info: Shut.In.2016.HDCAM.x264 - Lesnar
View Torrent Info: Fantastic Beast and Where To Find Them 2016 HD-TS x264-CPG
Hot torrents
XVID DIVX
View Torrent Info: The.Bourne.Identity.2002.BRRip.XviD.AC3-ETRG
View Torrent Info: The.Hollars.2016.HDRip.XViD-ETRG
View Torrent Info: Krampus.The.Christmas.Devil.Returns.2016.BRRip.XviD.AC3-EVO
View Torrent Info: It Had to Be You.2016.HDRip.XviD.AC3-EVO
Hot torrents
H264 X264
View Torrent Info: Suicide.Squad.2016.EXTENDED.1080p.BluRay.AC3.x264-ETRG
View Torrent Info: Kids.in.Love.2016.720p.BRRip.x264.AAC-ETRG
View Torrent Info: Fender.Bender.2016.720p.BRRip.x264.AAC-ETRG
View Torrent Info: End.of.a.Gun.2016.720p.BRRip.x264.AAC-ETRG
Hot torrents
Television
View Torrent Info: Timeless.S01E09.HDTV.x264-KILLERS[ettv]
View Torrent Info: NCIS.New.Orleans.S03E08.HDTV.x264-LOL[ettv]
View Torrent Info: Conviction.2016.S01E09.HDTV.x264-LOL[ettv]
View Torrent Info: American.Dad.S13E05.HDTV.x264-FUM[ettv]
View Torrent Info: YZ.2016.Marathi.720p.WEB-DL.H264.ESub.AAC2.0-DDR
View Torrent Info: Nenu Sailaja (2016)   EXTRAS 720p UNCUT HDRip x264 [Dual Audio] [Hindi DD 2.0 - Telugu 2.0] Exclusive By -=!Dr.STAR!=-
View Torrent Info: Morgan (2016) 1080p BDRip DUAL DD 5.1 x264 ~ PyZ
View Torrent Info: Kahaani 2 (2016) Hindi 1CD Desi Cam x264 AAC - Downloadhub
30s
Chat
To add new messages please Login or Register for FREE
Warning! Use a VPN When Downloading Torrents!
Your IP Address is 23.23.50.247.   Location is United States
Your Internet Provider and Government can track your torrent activity!  Hide your IP ADDRESS with a VPN!
ExtraTorrent strongly recommends using Trust.Zone VPN to anonymize your torrenting. It's FREE!

ExtraTorrent.cc > Articles > Hackers Are in High Demand

Hackers Are in High Demand

Hackers Are in High Demand

Added: Monday, November 18th, 2013
Category: Recent Headlines Involving File Sharing > Current Events
Tags:ET, p2p, Torrent, Piracy, Peer To Peer, Network, Hackers, Internet, BitTorrent, Google, utorrent, bitcomet, extratorrent, 2013, www.extratorrent.cc
A few weeks ago, the UK Defense Secretary mentioned that hackers with a criminal past might be hired to serve in a new military cyber force. This stance may have surprised many, but it actually points to an important recent shift where governments and companies were increasingly trying to use hackers and their associated skills to improve security, fight crime and even develop competitive advantage.

hacker_blog_main_horizontal.jpg

Today, if you look into the heart of any successful information security organization, you will find hackers, because they have become highly cherished commodities throughout the mainstream. In fact, it took businesses and governments too long to realize this untapped resource, all due to a combination of negative PR and a fundamental lack of understanding about hacker’s incentives.

Originally, a hacker was a technical wizard interested in exploring electronic systems and living by a strict ethical code which forbade them from harming those systems. But those hackers were later replaced by a younger, more reckless generation of crackers, whose aim was to break security and show they were better than the others. They were called “blackhats” and looked to financially motivated crime, being prolific at pirating software, stealing phone access, and even credit card fraud. As a result, being labeled a “hacker” automatically made bright young people unemployable. As such, a candidate with unparalleled expertise in IT but no qualifications or higher education to justify their skills ended up perceived as unsuitable for any position.

Only a small group of hackers found jobs in roles that demonstrated their true value – they were the ones who managed to change the mainstream view of what a hacker could be. For instance, the US government had early exposure to hackers when a hacker group L0pht testified in front of the Senate in 1998. Perhaps, this is why the American government is now so advanced in the integration of hackers into cyber defense and other critical parts of the country's military program.

Today the world offers many possibilities, and businesses start realizing that hackers could play a pivotal role in shaping their cyber future. They are perceived as technical geniuses who like to explore the technical world and change it as they like in a non-destructive way. So, modern hackers are in high demand – governments see hackers as valuable assets in fighting sophisticated cyber-criminals, while businesses see them as the front-line against complex cyber threats.


By:
SaM
November 18th,2013

Posted by: 
SaM

Date:  Monday, November 18th, 2013



Comments (11) (please add your comment »)

1
posted by Blocked (2013-11-18 19:07:34)
No avatarok

2
posted by (2013-11-18 20:08:59)
eazylnova avatarvery nice
its about time

3
posted by (2013-11-18 20:09:00)
eazylnova avatarvery nice
its about time

4
posted by (2013-11-18 23:09:47)
Kharo avatarMuch to learn about politics in this.

5
posted by Site FriendET loverSuperman (2013-11-19 01:19:52)
Embolism avatarSo when its politically expedient its ok to be a hacker when the government want to recruit you to do unethical things on their behalf in intruding on others privacy and penetrating their security,but if you do it without their sanction you are a criminal.I am sure Laurie Love and his accomplices and dozens of others currently on charges for misuse of the communications act and awaiting jail are pleased that the title of Hacker is now acceptable and that they are all in demand by the powers that be for employment after the Man has finished prosecuting and incarcerating them.It`s alright to be a hacker as long as you work for us is the message from the NSA and GCHQ.

6
posted by Site FriendET loverSuperman (2013-11-19 01:38:11)
Embolism avatarSomeone really needs to define the types of hackers from Black to white for the people that report these things since every security analyst,every engineer,every programmer and developer use workarounds or hack at one point or another and so all should be in demand the only ones we are told are in demand are black hats, the nefarious ones who do nasty stuff to millions of computers as with the introduction of worms or corrupted payloads or who intrude on others systems the latter are those currently in demand obviously,now wait for the penny to drop and see the next generation of engineers and programmers start to hack the NSA and GCHQ etc just to prove they can to better the so-called hackers employed by the NSA,I am still awaiting a true hero of the people to logic bomb the NSA`s mainframe now that would be a worthy feat on behalf of all.

7
posted by (2013-11-19 22:38:01)
Kickstand avatarAs always, When we do it its wrong, When they do it its OK.@6 great last statement

8
posted by (2013-11-20 02:57:04)
hubsabubs avatarAgain why are people treating this and reacting to this as if it is something new... This has been practiced as far back as I can remember... Hell in Atlanta you only see billboards pop up everywhere advertising schools to learn how to hack and get paid and be recruited by big companies to aid them in security and other things.. There was a 16 year old that hacked into the White House and was recruited by the D.o.D and paid millions of dollars to hack different installations in Washington DC including the White House. I know someone who gets paid to test different attacks on an Online Colleges system.

9
posted by (2013-11-20 03:00:54)
hubsabubs avatarLong live Kevin Mitnick...

10
posted by (2013-11-20 19:58:30)
cggc avatarFBI REWARDS!!!???

11
posted by Site FriendET loverSuperman (2013-11-22 01:24:49)
Embolism avatarMany,many people have hacked the Pentagon,NSA and CIA etc over the years and some have had contracts and financial remuneration to shore up their defenses rather than going to jail for such,security analysts and penetration testing is perfectly acceptable as is securing programs to be used online etc,what is unacceptable is to use such intrusions to spy on Joe public and to data mine those that you are supposed to be serving against the laws of the land and constitution for the benefit of individuals in the corporate sector against the electorate who you are supposed to serve and protect,something Bill Binney quite rightly refused to do when he left the NSA in 2001.



Articles Search
Most Popular Stories
Articles Categories
Articles Tags


Home - Browse Torrents - Upload Torrent - Stat - Forum - FAQ - Login
ExtraTorrent.cc is in compliance with copyrights
BitCoin: 12DiyqsWhENahDzdhdYsRrCw8FPQVcCkcm
Can't load ExtraTorrent? Try our official mirrors: etmirror.com - etproxy.com - extratorrentonline.com - extratorrentlive.com
2006-2016 ExtraTorrent.cc1