Category Archives: Hacking

Turning The World….

image

I read a quote on Ello the other day that one of the writers I follow posted. I’m not sure if it was one of her own or from another source, but I found myself wondering about it a great deal.

“Many people, especially in technology say their productivity is changing the world, and this is irrefutable. But no one seems to know what they’re changing it into.”

Many commenters posted their thoughts, and much of it was about technology it’s self. I couldn’t understand that. Technology it’s self doesn’t have fully functioning rational consciousness…yet. So why is so much being said about technology when there are minds behind it? I decided to put my two cents in and commented:

This is precisely the point I had been trying to make in my computer ethics blog in college, and why I personally believe in the “design for good” movement. I think the use of technology and how to cause change in the world stems from the individual user and their choice, not necessarily the creator of said technology. Though I think the creator is the one who gets the ball rolling, it is the users who manipulate the technology’s usefulness and influence one another. Though, that is more or less dependent on the situation. Without context I get the implication that the quote speaks more on the unpredictability of the technology user to change the world and not necessarily the technology it’s self.

I think when it comes to technology we are too willing to blame situations on the device. Too often I hear parents ridicule their children about phone and computer use, but in the context of the technology. “I should get rid of that damn computer…” Kind of commentary is often times too common, but what it does is dissociates the user from the responsibility. It is not the computers fault that the individual spends so much time on it. It is the choice of the user to spend time on it, and in this particular case, it was someone’s failure to set appropriate boundaries for such use. Weather it be the parent or the child is another story entirely.

To take away the computer is far too extreme. It is useful. It is necessary as well. Technology use causes the world to turn. Most of our educational and work environments require the use of a computer for nearly everything now. Perhaps another case of people’s failure to set boundaries? Feel free to put your thoughts on that in comments below.

I must put a disclaimer as well. There are some technologies that are changing the world for very specific reasons. The above commentary I made speaks more on programs, games, social networks, internet use, apps etc. More socially oriented technology. There are technologies that are made for specific uses, like medical technology, where the goal is to change the medical field for whatever reason, and usually with a passionate cause and predicted out come. In those situations, the use of technology is entirely dependent on the proper functionality if the technology as well as the user, and the outcome is usually predictable because it is being made for a specific goal. That may seem obvious to mention, but I would rather mention it since occasionally, the technology has other outcomes as well that develop into another kind of technology altogether. Much of our popularly used tech was developed from military tech made public once it was found to have a variety of uses.

What are your thoughts on technology development and the quote above? I would love to hear perspectives.

Advertisements

Three Types of Hacking

Indeed.

Indeed.

We are all familiar with the concept of hacking. Unless you have been stuck under a rock for an overwhelming amount of time or are a Luddite, hacking has become just as much of a reality to you as pop culture itself. We are all well aware of the kind of hacking we see portrayed in pop culture. The nerd in shady clothing, breaking into banks, stealing money and information. Trying to manipulate the system and work for some kind of self gain. They are obvious and terrifying. Haunting our very dreams and stealing our private e-mails.

Yes, they are very real. These kinds of Hackers that work for self gain are called Black Hat Hackers. But they are not the only kind of Hackers in the world. There are also White Hat Hacker as well, people who hack into systems to find security flaws. They try to keep you safe. Protect you from the Black Hat Hackers in a game of Spy VS Spy.

Then, there are Grey Hat Hackers. They don’t quite know who they work for. They’re in the middle using their talents for both sides. They back into systems of organizations without authorization, and then inform those organizations what’s up.

To summarize in nerd terms:

Black Hat Hackers = Chaotic Evil

White Hat Hackers = Lawful Good

Grey Hat Hackers = Chaotic Good

There is actually a great deal of use for White Hat Hackers by many Fortune 500 companies. Needed increases in security provide a great deal of job security, and offers a flexible opportunity for those interested in the field. Training can be taken for such companies to become certified, and you can even take the course at home online. To learn more follow this link to become CEH v8 Certified as a White Hat Hacker.