That is not to say that it defeated security in any way, but rather it was probably something less glorious than the same sort of program that might have been designed and then built by a team of professional programmers who were hell bent on selling the world the next great database merge tool with bells and whistles hidden beyond the ken of any human user. What I ended up with may or may not have been elegant - but it did work. It was a successful perl hack.
The term hack and hacker can have both positive and negative connotations, depending upon the context in which they are used. For example, consider this comment made by one IT professional when talking about a particular network engineer's "fix" to protect a large hospital's exposure to the conficker malware: "If he would have spent half the time coming up with that fire-wall hack as he did surfing the web this morning, we might have actually avoided having the entire hospital infected." Clearly, in this instance, the hack was not a success.
Had that network engineer been a member of our cyber-jutsu blog, he might have been better educated. He might have still been accused of implementing a hack, but it would have then been a good thing. Luckily for him, that hospital's CIO doesn't know the difference, and he still has a job.
I recommend a google search for "The New Hacker's Dictionary" to help get you up to speed on all the jargon you'll need to survive here at Hacking Code.
In case you want to check out a good online reference for the same: see Jargon File
There are many copies of the Jargon file being hosted by different sites. Google it and see for yourself.
So, the difference between hacking code and code hacking - to me - would be this:
If I am hacking code, I am programming.
If I am code hacking, I am trying to find a way around or through some sort of code or cypher.
If I'm hacking a web server, I'm probably trying to bypass the security of the web server. If I'm hacking together a web server, I'm writing a bare-bones computer program to do the work of a web server rather than using someone else's fully developed web server program (such as Apache 2).
Some might say that I'm not really a freelance writer or professional blogger, that I'm just a hack. Therein we see the negative connotation of hack as applied to a writer.
To this I say: :>p
That's it in a nutshell. I hope this was edifying.
Hmm, hacking code and code hacking, what are the differences between them?
ReplyDeleteIphone App builder | outsourcing software development company | software outsourcing companies |
Hello Guys! I am Juliet Hilton. I live in Uk I’m 42 Years old, am so happy I got my blank ATM card from Calvin Grayson. My blank ATM card can withdraw £5,500 daily. I got it from Him last week and now I have withdrawn about £350,000 for free. The blank ATM withdraws money from any ATM machine and there is no name on it because it is blank just your PIN Only. It is not traceable and now I have money for business, shopping and enough money for me and my family to live on. I am really glad and happy I met Calvin Grayson because I met Five people before him and they could not help me. But am happy now Calvin Grayson sent the card through UPS and I got it in two days. Get your own card from him right now, he is giving it out for an affordable fee to help the poor even if it is illegal but it helps a lot and no one ever gets caught or traced. I’m happy and grateful to Calvin Grayson because he changed my story all of a sudden. The card works in all countries that is the good news if you are interested in getting yours : email: officialblankatmservice@gmail.com
DeleteHi, This is a great article. Loved your efforts on it buddy. Thanks for sharing this with us.
ReplyDeleteGet cissp
it training courses.
CISSP training ,cissp exam cost, CISSP certification. Get CEH, ec council., ceh v10. , ethical hacking training. , it training.Get VMware, vmware training.,vmware course., vmware online training., vmware interview questions and answers.,vmware Certification. Get Azure, azure training,azure certification,microsoft azure training,azure course,azure online training .AWS, aws training,aws course,aws certification training,aws online training
Get PMP pmp certification, pmp training,pmp certification in gurgaon,pmp certification cost,pmp training certification
Hack somebody's m pesa using code
ReplyDeleteThis professional hacker is absolutely reliable and I strongly recommend him for any type of hack you require. I know this because I have hired him severally for various hacks and he has never disappointed me nor any of my friends who have hired him too, he can help you with any of the following hacks:
ReplyDelete-Phone hacks (remotely)
-Credit repair
-Bitcoin recovery (any cryptocurrency)
-Make money from home (USA only)
-Social media hacks
-Website hacks
-Erase criminal records (USA & Canada only)
-Grade change
-funds recovery
Email: onlineghosthacker247@ gmail .com