White Hat Hacker Breaks Silence 425
Flackboy Kevin writes "The nation's hackers are about to come out of their shells on Friday as one of the most notorious 'good guys' in Manhattan makes a rare-yet-cyber public appearance on USA Today's online chat. Gary Morse, Manhattan's white hat hacker and good friend of every Chief Security Officer in the financial world agreed to an online chat regarding security.
Morse's uncanny knowledge of how Manhattan is wired helps keep him one step ahead of hackers and has kept him in high disregard in most hacker communities. Morse's company, Razorpoint Security Technologies does not employ hackers who've decided to come in from the cold."
Which shell is he coming out of? (Score:4, Funny)
Inquiring minds want to know.
Re:Which shell is he coming out of? (Score:4, Funny)
I was thinking the same thing: He broke silence? Maybe we should remove his cvs commit access to it until he learns better.
Re:Which shell is he coming out of? (Score:2)
Re:Which shell is he coming out of? (Score:2)
How sad. (Score:4, Interesting)
He's not well regarded because he's good at what he does, or because he's good at what he does without cattering to the overused claim that ex-hackers are best suited at protecting systems?
Frankly I find him a breath of fresh air.
Re:How sad. (Score:2)
Sensible position, whether or not claim is true (Score:5, Insightful)
A person who has been a black hat has been so, specifically because they did not have the moral fortitude to remain on the white side. Now, that can change when there is a profound revelation [Dr. Laura Schlessinger], or when there is a ton of incentive [G.W. Bush], or because they were caught and decided the price was too high [many haxors who have been caught flip in this way] or it can appear to change when convenient [psychotics.]
But the fact is, you don't really know why it changed, and therefore you don't really know if it changed. So you don't let ex-black-hats work for your company, period.
Now, if a black hat did have some profound change, that doesn't mean that there isn't work for him. Assuming that it is not prohibited by court order, he can start donating information to the security watchdog groups, and they can verify the information on their own. If it is illegal for them to be using the internet or interfacing with computers, they can wait until it is again allowed. Or they often can instead put their skills to use building new systems, or writing code for a supposedly secure system -- on paper.
Anyhow, I have no idea whether the claim is true or untrue, that ex-black-hats make good white hats. But Morse's position makes a lot of sense.
Re:Sensible position, whether or not claim is true (Score:5, Insightful)
If, as you say, black hats arise from white hats who specifically ... did not have the moral fortitude to remain on the white side how can anyone be sure that any given white hat will never turn to the black side if the incentive/threat is great enough.
if a black hat did have some profound change,
You make it sound like they are evil incarnate. If the BH you are looking at did time for money crimes or e-vandalism maybe you'de think twice about trusting them but if it was pure challenge based hacking maybe a blanket no-hire wastes talent.
Seems to make more sence to hire good people who haven't shown any serious criminal activity and then watch them very closely white and black.
to summarize your assertion... (Score:4, Funny)
You underestimate the power of the dark side.
Give them the color test... (Score:4, Funny)
Re:Sensible position, whether or not claim is true (Score:5, Funny)
I try to find teachers they had to find out if they were ever given detentions or didn't do their homework -- who knows why someone who used to refused to do their homework started doing their work, they could stop again at any time!
Especially, I try to discover if they were ever caught masturbating. The last thing I want to do is hire a masturbator.
Re:Sensible position, whether or not claim is true (Score:5, Funny)
"Self motivator" with "a lot of manual hability". Funny, a lot of companies value that.
Re:Sensible position, whether or not claim is true (Score:5, Funny)
Re:Sensible position, whether or not claim is true (Score:2)
Now, that can change when there is a profound revelation [Dr. Laura Schlessinger], or when there is a ton of incentive [G.W. Bush]
I can picture it now, GWB the "black hat" cowboy coming to town with a sinister motive. Then some nasty terrorist mexicans run a dilligence into the towns two water towers. This somehow gives GWB incentive to go "white hat". Yes, it does make a lot of sense.
Re:Sensible position, whether or not claim is true (Score:5, Insightful)
Would you hire me?
Or would you merely stop at the apparent conviction as if that's the only ruling authority?
Re:Sensible position, whether or not claim is true (Score:5, Informative)
Look at it from the company's point of view. YOU are a liability if you have a criminal record. If you ever do anything wrong while working there their cleints who may be victimized by you will ask your boss "Why did you hire someone with a KNOWN criminal record for hacking?"
Then once your boss gets sued he'd be liable for damages since he'd lose insurance coverage for hiring a known convicted hacker.
Do you understand it now?
Re:Sensible position, whether or not claim is true (Score:4, Insightful)
Funny, I thought it was a criminal nature was a requirement for advancement into management these days.
Not to mention politics. You do know that almost 50% of Congress has a criminal record? And that our own President was a criminal (drug user) at one point? The fact that he wasn't convicted and sent to jail does nothing to diminish the crime itself.
Max
Re:Sensible position, whether or not claim is true (Score:3, Interesting)
Uh, adultery and/or fornication (sex outside of marraige - which generally includes adultery as a subclassification) was illegal in England and most of the US until fairly recently. The most recent US state to repeal it's fornication law is Georgia [bbc.co.uk], and there are still 10 states with it on the book (as of that article). Georgia has a separate adultery law, however, and I believe that still stands.
As best I can tell most states have laws against
Re:Sensible position, whether or not claim is true (Score:4, Insightful)
Do you realize the implications of what you're saying, whether or not it is the reality of things? How is anyone supposed to put their life back together after being released from incarceration or probation if everyone shuns them? This creates a permanent underclass of people who very likely have something positive to contribute to society. The costs of a prior mistake, or worse, of being convicted under laws that make no sense [anti-dmca.org] would be, and are too high for anyone to bear in a purportedly civil society.
Under a capitalist system, your scenario makes sense, but I think it shows us one of the flaws of such a system that puts scarlet letters on people out of selfish interest.
Is this a joke? (Score:5, Insightful)
Do Slashdot editors realize how many security consultancies there are in New York City, even leaving out the credible names like @Stake and IBM?
Do Slashdot editors honestly believe that major financial firms in NYC don't already have a track record of hiring and retaining exceptional security engineers? Do they honestly believe that a major financial needs Gary Morse to tell them what a firewall does for them?
Haven't the Slashdot editors ever seen that silly flash video with "Kimball" and "Dataprotekt"? Heard about the subsequent investor fraud story? Recognized that maybe real security firms don't market themselves on "white hats staying ahead of the evil hackers" hype?
Did the Slashdot editors think of visiting Razorpoint's website, where we find white papers with scintillating security insights like "security is a process" and "here's how to read a CIDR address"? Or notice the lack of advisories, research papers, or bios of credible security researchers on the site?
Maybe these are smart people. Maybe they secretly have Citicorp and Bank of America on their client list.
Or maybe they're just a bunch of wannabes.
Why are we supposed to be interested in this crap?
Please mod this up... (Score:4, Insightful)
I guess it seems kind of hokey. The guys who KNOW security tend to not be so outward about it.
Re:(replying to self) (Score:2, Funny)
"WhiteHat just got slapped by a dead fish"
"Fdawg is now op"
"Fdawg - Hi mom!!"
"WhiteHat was just kicked by fdawg's mom"
Some security.
Re:Please mod this up... (Score:5, Interesting)
I do not doubt that there are people out there who have never broken any laws and are decent, if not excellent, security types.
However, since it's been illegal to do ANYTHING with a computer since the DMCA and Patriot Act came out, that type of expert is obviously a breed rapidly approaching death.
If a person is acquiring security skills in this day and age, that person is in the law's eyes a black hat.
Re:Is this a joke? (Score:4, Informative)
Kinda boring, actually...
Re:Is this a joke? (Score:5, Insightful)
Kinda boring, actually...
My favorite was the ports list. It started out as a nice copy of
Re:Is this a joke? (Score:3, Funny)
I hang out on the cisco's firewall support board. Some guy wanted to know how to stop people via his PIX from being able to telnet into port 25 and type commands like "mail to", "helo", etc. to his mailserver. Yikes.
ostiguy
Re:Is this a joke? (Score:2)
"sendmail is port 25. Port 80 is http."
Glad you cleared up his misconception that its not the webserver on port 80 but in fact http.
Go back and read the post. The webserver comment and the send mail comment were different.
White Hat Hacker Breaks Silence (Score:5, Funny)
Maybe the title should instead be "White Hat Hacker Breaks Wind"
Use your brain, please. (Score:5, Insightful)
AC, there may be many bright people in New York, but you are not one of them if you overlook this. Some of us might be interesed in asking pointed questions that millions of people will see when the sit in on the USA Today chat this particular consultant is about to have. My questions are, "Would you recomend free software, such as Debian or Red Hat, on the desktop?" and "What makes Microsoft software so insecure?" Other people here could have better questions.
I highly recomend everyone to go and post questions about free software solutions to security problems. The answers he provides will be seen by the chat crowd and may be turned into an article for printed USA Today. There are 750,000 Slashdotters all interested in free software and security? This interest should be reflected in the questions. Follow the link [usatoday.com] and submit as many good questions as you can think up.
Speaking of (not) bright people... (Score:2, Flamebait)
Re:Speaking of (not) bright people... (Score:2, Insightful)
It's probably an inappropriate question only because it is too specific, imho. One of the first things I'd probably ask a guy or girl who is known for his experience and expertise in security would definitely be something along the lines of:
"Given the increasing interest of the business world ab
Re:Use your brain, please. (Score:3, Insightful)
Would you recomend free software if it were known to be coded by someone with a record of putting malicious back doors in their programs?? Even if they swear up and down that they're reformed and don't do such naughty things anymore??
I know I'd look upon it with deep suspicion, at the very least. And not let it touch any computer other than a goat box.
Re:Is this a joke? (Score:2, Interesting)
This isnt by any means groundbreaking but it is something that is a psdo-event in the security industry...this is not a random firm, it is a leading New York City firm...that being said, no they are not an national/international authority on the subject. This wouldnt be on the scale as something like phil zimmerman having an online chat about asyncronus encryption.
However, it is an oppertunity for smaller people in the security community, and people who arnt
Morse Code? (Score:5, Funny)
Don't wait around for the USA Today chat (Score:5, Informative)
Here is the text of a recent interview with the
reclusive security wonk from Crain's New York Business.
On the job with...
Gary Morse
Founder and CEO
Razorpoint Security
Keeping a company's computer systems and networks secure from intruders used to be the responsibility of mid-level IT managers. But after the Sept. 11 attacks, the job landed on the desk of company CEOs. Executives in all sorts of industries woke up to the fact that security--of everything from the front door to the mailroom PC--has to be a top management concern.
The new consciousness has proved a boon for companies like Razorpoint Security, which was founded in Manhattan in 2000 and saw its business take off after the attacks. Razorpoint tests just how secure a company's network is by trying to hack into it. The company then does the follow-up work of fixing problems and performing regular network audits. Crainsny.com's Judy Messina talks with Razorpoint founder and CEO Gary Morse.
Crainsny.com: Describe what Razorpoint does.
Gary Morse: In the simplest terms, you can think of us as professional hackers. We're tech professionals who in the past have built large-scale networks, including major sites on the Internet. That helps us know where the pitfalls in systems are and how to break things. Once we find vulnerabilities, we demonstrate them in a very comprehensive report. If we're able to crack passwords, for example, we'll show the list of passwords or a screen shot of them. We want to drive the point home.
Then, one of the three things happens. The company has trained staff who are capable of fixing the problems and they use our report as a roadmap. Others ask us to do the remediation for them. In the third category, and this is coming up more and more, is the client who is overwhelmed and understaffed, and we go in and act as their temporary IT security arm for a while.
Crainsny.com: How do you convince executives that their networks are vulnerable?
Gary Morse: At one firm half the executive board wanted to bring us in and the other half was on the fence. They had all the buzzwords, the firewalls, all the security products you're supposed to have. But when they finally hired us, in less than one week we had control of every device on their network - every server, every desktop computer, every laptop. We even logged on to the system as the president and we wrote an email in his name. The screen shot of that email was one of the prominent pieces in our presentation to the executive board. We had to break the report in two pieces it was so big.
Crainsny.com: What are the most common holes you find in computer systems?
Gary Morse: There's everything from the seemingly insignificant to the colossally devastating. You can have a poorly configured web server or mail server sitting next to a server with financial information. One time, we found a fax machine talking to a phone system so that a document on somebody's work station was being sent over the network as if it were being faxed. Somebody had set up the connection and forgot about it.
Crainsny.com: What do companies need to do to make their systems secure?
Gary Morse: They need to think about what services they truly need in order to be online. Security is a process not a product. There is no shrink wrapped thing you take off a shelf and install. New vulnerabilities are coming out every hour.
Crainsny.com: What changes did you see after 9/11?
Gary Morse: We saw more security awareness. The bar was raised quite a bit. People who had been on the fence about doing regular security audits were certainly calling us a lot more than we were calling them. The year 2002 was a big year for us. We grew roughly 300%.
Crainsny.com: You said new vulnerabilities are surfacing every day. What should companies be preparing themselves for?
Gary Morse: Web and web application vulnerabilities and wireless security issues are going to be concerns. In the past year, a lot of w
WTF did 9/11 have to do with unsecure networks??? (Score:5, Insightful)
It had a lot to do with it... (Score:5, Interesting)
IANASC (...security consultant), but ISTR that many firms in the WTC were foolish enough to have the "backup" systems...in the other tower. IOW they assumed that if one tower went blooey, the other one would still be there. So much for redundancy.
The point is physical security, not network security. It's kind of like having all your backup CDs in the same room (or building!) as your computer. Fire, fire, oops, it's all gone.
Also, ISTR that in some cases, with the loss of systems in the WTC, financial networks were left in a state of chaos -- perfect time to be hacked, really.
Cheers,
Ethelred
Re:It had a lot to do with it... (Score:2)
Scold them all you want with the benefit 20/20 hindsight, but I'm guessing that if someone told you on Sep. 10 that this scheme was unsecure because both towers were going to be levelled, you would have laughed him out of the room. Just like everyone else in the world.
Re:It had a lot to do with it... (Score:2)
Except that the WTC had been the target of terrorist attacks before, with the goal of toppling (or at least damaging) both towers. If someone had suggested the idea before the first attack, then yes, I'd have been skeptical.
Cheers,
Ethelr
Re:It had a lot to do with it... (Score:2)
Re:WTF did 9/11 have to do with unsecure networks? (Score:5, Insightful)
Normally, I would agree with your assessment of Morse a fearmongering assclown. Except, I know that computer security is thought of as a joke, never taken seriously, and worst of all, procedures and tools are put in place by people who really do not understand the nature of system security. It is the digital equivalent of a 9/11, except its unlikely to have quite the same repercussions. There is nothing moral about a hacker that chooses not to work in computer security because they think that the act of preventing illegal hacking into systems is somehow wrong. In the real world, people work for employers they don't like. To not support their families is irresponsible and childish.
Re:WTF did 9/11 have to do with unsecure networks? (Score:5, Insightful)
It didn't have anything *directly* to do with insecure networks, that I've ever heard about. However, the date 9/11 had a great deal of indirect effect on security consultants. Security/anti-terrorism/stopping people from kicking your ass has become *the* most discussed concept in the western world since that date. The Office of Homeland Security. Iraq represented a threat to US Security. Hackers present a Security threat. Apologies for sounding like Illiad but that's what has actually happened in the public eye over the last two years. The profile of security as a profession has gone through the roof.
I imagine that is why they asked the question.
~cHrisRe:Don't wait around for the USA Today chat (Score:4, Informative)
They could have forged the entire presentation. The whole thing could be nothing but a mock up of the company internet site.
Get real. These people are professionals and you have to trust them to some degree.
Hell, you have given them permission to break into your company system.
Besides, is it so farfetched that the President has his password set as 'IBGOD' and the head of networking doesn't have the guts to point out this is a bad choice for a password?
Re:Don't wait around for the USA Today chat (Score:2)
On one end of the spectrum you have the company doing the audit.
They are there to point out any and every flaw. No flaw too small.
And on the other end you have the clueless pointy haired CEO who is pissed at the IT guys because he just had to reinstall his Gator Password tool for the 3rd time in the last month.
(ever see the Dilbert where they gave the pointy haired boss an etch-a-sketch and told him it was a laptop? To reboot you hold it over your head and shake)
S
yeah i think so (Score:5, Funny)
Um...was he ever in jail?
Won't employ hackers? (Score:5, Interesting)
Does anyone have any links regarding that? I read the link in the story, and all it gives is some very brief information. I'd just like to see the guys reasoning for not hiring "hackers who have come in from the cold."
Re:Won't employ hackers? (Score:5, Insightful)
Want to be a security guard? Nope, sorry, not if you have a B&E record. Want to be a police officer? Couple of murder convictions? I don't think so. And so on.
The rest of society has already figured this out. Ex-criminals can be useful for information, but it's not very often that they get put into positions of *trust*. I sure wouldn't want someone who's already proven their disregard for security controls designing them.
Re:Won't employ hackers? (Score:5, Insightful)
Furthermore, the hacker who grew up retains his knowledge. The hacker who has never broken into a Real System cause mommy said she'd take away his computer privileges simply cannot know all the details.
How do you get good at knowing you're being tracked, if you've never been tracked? You don't. So how do you devise a tracking system which a hacker wouldn't detect? You can't.
All but the stupidest of employers care vastly more about experience than education.
Re:Won't employ hackers? (Score:2)
See, in humans, we've got this thing called language, which can be used to symbolically represent situations. We've also got this new concept called "imagination".
I don't know, but I think you'd have
Re:Won't employ hackers? (Score:3, Interesting)
There are in fact, lots of people who commit crimes that go on in thier lives to council others. Often people who have done something wrong and have turned thier life around, are the best people to council others who are trying to turn thier lives around.
I don't believe that anybody is saying that it's a requirement to do something wrong, to be good at correcting it
Re:Won't employ hackers? (Score:5, Insightful)
Yup, some people CAN change. Fact is, most crimes are commited by repeat offenders. Most people DON'T change, and have fun applying for the CIA job with your supposedly-erased-due-to-it-being-7-years-old criminal record.
The hacker who has never broken into a Real System cause mommy said she'd take away his computer privileges simply cannot know all the details.
How do you get good at knowing you're being tracked, if you've never been tracked? You don't. So how do you devise a tracking system which a hacker wouldn't detect? You can't.
Now come on, grow up. You want to break into a system? Set one up. Crack it. Next, get a friend to set one up, not tell you what he did, then crack it. And so on. You want to elude detection? Install Snort, and try to elude it. Etc.
You don't think Locksmiths are trained for their job by breaking into unsuspecting homeowners, do you? Or alarm companies enhance their products by comitting B&Es?
Re:Won't employ hackers? (Score:2)
There are also heuristics: the desire to break into systems, to trespass and have the rules not apply, are going to go hand in hand with somebody who puts huge amounts of effort into learning
Re:Won't employ hackers? (Score:2)
Usually people cracking computers aren't doing it because they were victimized, or because of some trauma, which is mostly true for violent criminals. They do it for the thrill, or for the knowledge, or just because they want to know whats on the ot
Re:Won't employ hackers? (Score:2)
Not at all, if you really think so, then you have a view very contrary to popular morality, and legal morality. I can shoot and kill someone with a gun, but in one situation walk away a hero, and in another go to jail as a murderer. Suppose:
I am walking along, armed. I decide to turn down a back alley, there is a man and a woman there, the man has one arm around the woman. The man is also
Re:Won't employ hackers? (Score:2)
Re:Won't employ hackers? (Score:2)
You don't think Locksmiths are trained for their job by breaking into unsuspecting homeowners,
They don't, because their job is not to ensure physical security on a site. Its to install locks. And shockingly, they spend a good chunk of their time breaking into safes, cars, and buildings. Sometimes people lock themselves out, or don't possess combinations or keys.
Or alarm companies enhance their products by comitting B&Es?
They do, but usually in their own labs. But I'm sure at a large, e
Crackers do _not_ make good security experts (Score:5, Interesting)
Utter garbage.
That is completely analogous to saying only a burglar could design a security system, which is the point an earlier poster was making.
There is phrase 'send a thief to catch a thief', which makes for a good Hollywood script, but this is not good everyday practice, which the rest of the world has already worked out. The idea behind the phrase is that the a thief has information that can be useful in catching another thief, but thieves make VERY bad policemen.
Being a hax0r does imbibe you with any knowledge of how to develop secure systems. In the same way that being a successful scam artist does not put you in a good position to design a more secure credit card. Most crackers have no knowledge of using secure systems, break ins that occur usually down to trivial holes, which all non-security orientated developers know how to fix (and code against), these holes occur simply because best practices are not always followed.
Commercial systems designed with security in mind (e.g. trusted operating systems, encrypted networks, systems that use seperate signed keys for all inter-process and inter-host transactions, networks that have hard-wired one way Ethernet links) tend to cost many hundreds of thousands of dollars to build, and require a team with a strong mix of OS, Software Development and Networking knowledge.
Knowing how to defeat a burglar alarm system is a far cry from knowing how to build one, just as knowing how to write microcode to exploit a buffer overflow is a far cry from knowing how to write and develop for a secure environment.
All but the stupidest of employers care vastly more about experience than education.
Crackers break into secure software, they don't have experience in designing secure software. They would make awful systems that would be just a vulnerable but in different ways - developing secure solutions requires a design approach that bears this in mind.
Serious crackers are *not* suitable canidates for security experts.
Re:Really bad examples. (Score:2)
Absolutely. If you were coding for twelve years, you'd immediately have demonstrated tremendous commitment, which is a Big Plus in employers's eyes. One can assume you would have sought out information on the www, usenet, irc, etc, if you were that interested.
Where I work, every student we've ever had on co-op was the pits, in one case years of
Re:Won't employ hackers? (Score:2)
Re:Won't employ hackers? (Score:2)
It's not quite that simple. The reason you don't hire a hacker to be a security consultant or a bank robber to be a security guard is that the connection between the two, in terms of the skills required, is tenuous at best. Yes, a cracker will
Re:Won't employ hackers? (Score:2, Redundant)
Re:Won't employ hackers? (Score:2, Interesting)
"Razorpoint is always interested in the best and brightest in the technology security field. If you have five to ten years of hands-on, real world experience, we may have a place for you.
Smart, skilled and self-motivated professionals are desired in the following areas: Security Auditing, Sales/CRM, Firewalls & Intrusion Detection Systems, Application Development, Systems & Net
Re:Won't employ hackers? (Score:2)
Same reason the rape crisis center isn't returning calls from Mike Tyson.
Not a simple choice... (Score:5, Insightful)
It totally depends on the situation. Some people did very illegal things that hurt no one, others did not get caught doing much of anything, have a far cleaner record, and shouldn't be let within 50 miles of a Security operation.
Moral issues are always complex. All people being looked at for a sensitive position, regardless of history, need to be looked at on a case by case basis. Of course someone's past should be taken into consideration, but an in-depth interview and background check is far more productive than simply writing people off based on a title that they may have had at one point in their lives.
Re:Not a simple choice... (Score:2)
I think you're adopting a point of view like this: trait consistency is better explored through interview and business conversations than it is through similar situations in the past.
I think that point of view is wrong.
Personally, I'd be looking for honest and repuutable in a Software Engineer to protect my business, and an interview might not tell me that. Background checks are little more than a formality these days - there's very little one can do about making sure someon
Re:Not a simple choice... (Score:2)
I think what you're stumbling upon is called "The Interview Illusion" - a Social Psychology term - that goes something like this: People have a mistaken belief in their ability to predict, based on a brief conversation with someone, how they will evaluate this person in the future. (Reference: Kunda and Nisbett, 1986).
Interviews are generally a poor measure for gaining personal knowledge about someone. While they often serve well in proving someone a bad ca
Can't ... withstand ... the urge (Score:5, Funny)
Look forward.. (Score:5, Funny)
I think this will be interesting to watch too.
White hat? (Score:2, Funny)
White Hat Hackers
Blue Hat Hackers
Labor Union Hat Hackers
Slave Labor Hat Hackers?
(Refering to the entire "white collar" idea...)
Cracker (Score:2, Informative)
2 most overrated IT fields ever (Score:4, Insightful)
1) Security
2) Video Games
Both are fucking boring as fuck. I know every kid these days goes into college dreaming of becoming a leet d00d with his Information Systems degree and become a uberleet securitah master. Either that or they want to get a CS degree and then instantly get the job they are guaranteed as a code monkey for some video game firm (shea).
Both of those fields fucking suck. Security, once you leave the leet hacker intrigue CIA espionage fantasy shit back in the dorm after you graduate you'll realize what you do is fucking boring ass shit thwarting scumbag employees and stupid script kiddies. Ooohhh FUN! And guess what in the video game industry you don't actually play the god damn games you just code monkey it up for the designers, JUST ANOTHER CODING JOB. BORING.
Re:So what are the underrated ones? (Score:4, Interesting)
Remember, McDonalds doesn't count as we are talking about IT.
CodeMonkey job at video game firm might be boring. Don't know. Don't know anyone personally working in that field. Database app codemonkeying was interesting for as long as I had problems. It got extremely tiresome when I got stuck in the "support" phase.
If you like to trace raw HD dumps and cracking crypto to reveal originator of an instrusion, then the security sector might be just for you. Done that twice. Once with my own box that gor rooted, once with companys server. Both just of sheer curiosity on my own time because I find the above mentioned things interesting and intellectually challenging. Ofcourse, once I would get good at it, I'd prolly get bored of that too.
You don't state what you do for a living. Or even what you'd like to do and what you might find interesting. I have found out that I get bored to one labour pretty quickly.
If you are like me, go work for a contracting firm. I like this. Once I get bored with one job, I just tell that to my superior and we will negotiate another place to work for me.
This far I have had just short contracts varying from 3 months (Porting Symbian code from device to another) to 2 years (my current job as a software integrator.).
You also get an impressive resume quickly
Suspect this guy & his company are a fraud. (Score:5, Interesting)
From those articles, his qualifications seem to consists of 'Runs netstumbler (or something similar) on a zaurus, knows the basics of making strong passwords, and reads press releases from real security companies.' Which, admittedly, makes him better than half the corporate IT world, but still isn't exactly impressive,
So then, out of curiosity, I checked the domain of 'Flackboy Kevin', the submitter of this story. His email is at yeahwhatever.com [slashdot.org], which points to something called 'RLM'. RLM is a PR agency. And guess who's on their clients list. That's right, Razorpoint Security. (They're listed under 'Professional Services' instead of 'Technology', if you're looking.)
So, with that in mind I've come up with this basic plan for making yourself an internet security 'expert':
Now, I could be totally off base and he could be the be-all-end-all of security for all I know, but he sure as hell doesn't come across that way.
Very nice. Mod up. (Score:3, Interesting)
Okay, then let's ask WHY he's setting this up? (Score:5, Interesting)
Since he's trying to gain publicity as a "security expert", it would seem that his purpose is publicity in the security field. That, in turn, is a political goal.
So then we need to ask, what political goals, involving security, would he be after? Would this be new laws? How about a cushy government contract, a la Schindler in Schindler's List? To find this information out, one again needs to look at the source of the money with which he hired the PR firm.
Anyone familiar enough with the web and obtaining informaton, willing to search out a bit more info, and speculate?
Re:Okay, then let's ask WHY he's setting this up? (Score:2, Interesting)
Re:Okay, then let's ask WHY he's setting this up? (Score:2)
I'm sorry, man.
The Slashdot webserver obviously consider you a lamer.
That is one wicked rude box!
Re:Suspect this guy & his company are a fraud. (Score:5, Funny)
Re:Suspect this guy & his company are a fraud. (Score:2, Informative)
If you want his phone number, you're going to have to google it yourself. Nice PR coup, though. But I'd be pissed off if I was tricked like that.
Re:Suspect this guy & his company are a fraud. (Score:5, Interesting)
Article Poster is a fraud also! Is this an ad? (Score:5, Interesting)
Which leads to me to believe that Slashdot is getting paid to run this article, which is, in effect then -- spam. Now I'm not going to outright accuse them, but you gotta admit this is rather suspicious, guys.
Any of the
I'm not an editor, but.. (Score:4, Informative)
One of my earlier issues with this is that it's simple to impersonate someone else (ie: post a pro-Microsoft story as a user who's known for being anti-Microsoft).
Anyway, this could be one giant astroturf sessions but it's not certain that the Slashdot editors are in on it.
Re:Suspect this guy & his company are a fraud. (Score:4, Funny)
Understanding (Score:2)
I'm a strong believer in that to know how to defend you know how to attack. This is a nice example of that
R.
This reminds me of someone...... (Score:3, Insightful)
On the subject of hats... (Score:3, Interesting)
is apalling. I used to be a black hat. I have penetrated corporate america and then some. I have
exploited entire countries. I never went out of my
way for publicity, but some of my exploits were
publicized. I was quoted in a few places. This was
all when I was younger, and not so wise.
I changed.
There is no money in staying a black hat. Eventually, everyone has to eat. The love of the
game never dies, but you have to face reality. I work for a very successful company doing security.
I have taken their policy and general operation
and turned it around in the realm of security. I enjoy my job, it stimulates me, and while they have a good idea of my past, they are cool with it, because they pay me to help protect them from what I used to be. I grew up.
This man who does not hire previous black hats isn't trying to make a statement; he just doesnt want to be upstaged. The only way to be very good at security, is to once have been on the black side of the fence. There are no college credits for exploitation and penetration; these are skills that must be learned under the gun. I have no respect for this man, as his message is wrong. He knows that his livelyhood depends on black hats exploiting systems, so he will not ever give one a chance to change his colors. They will be forced to get a different kind of job, and will stay as a black hat because its the only stimulation they will get.
At least wait until the trial is over and then decide if one is worthy of employment.
For the record, I was never raided or tried in anything, this does not make my once black hat status right, its just the way the chips landed.
Chat with Gary about... (Score:5, Funny)
Yeah, I'm sure Manhattan's uber-elite white hat hacker wants to spend his time answering questions like "I can't find my email. Did a hacker take it, or does my computer just hate me?"
Re:the problem with subscriber notices (Score:3, Funny)
Thereby driving up page hits and ad views.
I think I'm on to something here.
Re:the problem with subscriber notices (Score:3, Funny)
ooh..trolling = profit
aww..cmon, someone chime in with the profit model, and something about soviet russia, this wont be a good post w/o it...
*shrug*
Re:the problem with subscriber notices (Score:2, Funny)
donkey = six letter word
six letter word = hacker
therefore confused philosopher is a hacker.
Re:the problem with subscriber notices (Score:2)
So, consider the timeout a good thing. At least you haven't been banned by the gods.
Re:well (Score:3, Interesting)
Re:This guy has no proper java experience (Score:2, Interesting)
Re:This guy has no proper java experience (Score:4, Insightful)
Then you have low expectations of your systems. I expect my web server to run on most available platforms, same for my database server, and I will try my best to make my middle layer be flexible as well. I do not expect my own solutions to restrict me to a single path dictated by a single corporation. If you choose to predominantly use MS-specific solutions, you are doing just that.
Now, I am not saying that's what you do, I am just commenting on the point that it's OK to be locked in. It's not "OK", unless it's by choice or a very good set of reasons.
Car comparison is not really valid. If you drive a Ford and start liking a new Toyota model, you can trade it in the next day; don't try that with any corporate systems, especially if you are locked in to a single vendor.
Re:This guy has no proper java experience (Score:3, Interesting)
And while I'm being soooo off topic here, it might not be a bad business decision to start manufacturing cross-compatible car parts.
Think of it. I've done the maths once (for fun) and the cost of rebuilding my car from scratch with parts, would be 5 times higher then to purchase it from the dealer. This means that they take a higher markup on parts, and since they always break down, one company could make massive money just manufacturing pa
Re:This guy has no proper java experience (Score:5, Informative)
THERE IS NO ARTICLE LINKED TO IN THIS NEWS ITEM.
In fact the link goes to a place you can post questions which may be asked in a chat which has not yet taken place.
C'mon mods... at least read the news story and links before modding troll posts like this.
Re:High Disregard (Score:5, Funny)
Actually, I can understand this, being held in rather "high disregard" myself in some circles.
Ah, the joys of being the "Prince of Insufficient Light"
Re:High Disregard (Score:2)
Re:McHacker. (Score:2, Funny)
Those computer geeks will not be cold and clammy, they'll just be clammy.
Re:Buzzzzzzz....what a sweet sound (Score:3, Informative)