Welcome, Guest: Join Nairaland / LOGIN! / Trending / Recent / New
Stats: 2,775,717 members, 6,612,442 topics. Date: Thursday, 02 December 2021 at 12:28 AM

The Ethics Of Hacking (what To Do & What Is Forbidden) - Programming - Nairaland

Nairaland Forum / Science/Technology / Programming / The Ethics Of Hacking (what To Do & What Is Forbidden) (147 Views)

Ethical Hacking And Penetration Testing For Educational Purposes / Guys KINDLY Help!! Forbidden You Don't Have Permission To Access This Resource. / What Is The Meaning Of This:403 Forbidden And How Do I Resolve It (2) (3) (4)

(1) (Reply)

The Ethics Of Hacking (what To Do & What Is Forbidden) by julybaba(m): 9:20am On Feb 18
The Initial or Pre-existing Ethic

Back when computers just started to reach universities and colleges and students had access to use computer systems, curious users began to show a certain disregard for the pre-existing rules.

These users would enter sections of the system without authorization, gaining access to privileged or elevated resources. With no Internet and no copies of Hacking Exposed or Security Warrior to assist them, they had to figure out how to enter the systems on their own.

Although these young students represented the first hackers, they had no malicious intent; they simply wanted knowledge, information, a deeper understanding of the systems which they had access to.

To justify and eventually distinguish their efforts, the hacking community developed The Hacker Ethic as a core part of their subculture. The Hacker Ethic states two basic principles:

-Do no damage.
-Make no one pay for your actions.

These two principles fall hand in hand. The original hackers had an intention to learn about the systems they invaded, not to destroy them or steal valuable confidential information. 
They wanted to know how they worked, their flaws, their strengths, interesting functions of their design. They had no authorization; at the time, they made up for this by making a point of neither interfering with anyone's work nor costing anyone any money in the process of exploring the system. Unfortunately this mantra does not provide a fully effective cover for your actions.

Even disregarding the legal ramifications, such as the Computer Fraud and Abuse Act of 1986, your actions will have devastating unintentional consequences if not carefully controlled. Robert Morris created the Morris Worm to gauge the size of the Internet harmlessly; unfortunately, it loaded down the systems it infected due to exponential re-infection, causing tens of millions of dollars of financial damage.
You must always remember to carefully consider the short and long term impact of your actions on any system.

Modern or Today’s Ethic…
Today we need to add one more rule to The Hacker Ethic, a rule that we should have added long ago.

The Morris Worm illustrates why this rule exists, even beyond legality.
-Always get permission ahead of time.
-Please remember to always get permission before acting. Your actions cause a major disruption to the targets you attack. Networks become slow, servers crash or hang, and you create spurious log entries.

Any institution with a useful IA sector will notice your attack and panic, believing you to have malicious intent; they will invariably expend resources searching for back doors and trying to determine what confidential information you stole. All of this, even if you don’t get caught, demands that you acquire permission ahead of time.

You always have authorization to hack into servers you own. In all other cases, you need to ask the owners of the machines for authorization; you can even ask them to pay for it, selling your services as penetration tests and giving them a comprehensive outline of their network’s vulnerabilities and proper mitigation steps to improve their security. As long as you have permission ahead of time, and you remember the first two rules of The Hacker Ethic, you can do as you please with the network and the affected machines.

The Prerequisite Knowledge.
Some background knowledge that is required to begin learning are as follows:
1. Knowledge of a computer's inner hardwares and what they do, like the CPU and RAM chips
2. Programming experience. A good knowledge of C, C+, Phython, Java etc
3. A desire to learn new things and lots of motivation and resilence to keep going.

https://digitalskeleton.com.ng/blog/view/153/the-initial-or-pre-existing-ethic-of-hacking

1 Like

(1) (Reply)

Needs An Answer To An Constant Hanging Of Udemy Video Tutorial / Network Error When Posting Or Quoting Someone... / 6 Best CMS Solutions For Website Development In 2021

(Go Up)

Sections: politics (1) business autos (1) jobs (1) career education (1) romance computers phones travel sports fashion health
religion celebs tv-movies music-radio literature webmasters programming techmarket

Links: (1) (2) (3) (4) (5) (6) (7) (8) (9) (10)

Nairaland - Copyright © 2005 - 2021 Oluwaseun Osewa. All rights reserved. See How To Advertise. 51
Disclaimer: Every Nairaland member is solely responsible for anything that he/she posts or uploads on Nairaland.