Identifying profiles in the internet universe

There a lot of shit texts on internet to talk about this, I can't see if it's really important to talk about that, my personal opinion will be just another one in a sea of confusion on internet, then lets go to another one.

First lets start this about the characters on internet in just two sides, dark side of the force, and the good side of the force, I believe when people compare it with a "real/fiction life character for an example" it becomes better to understand.

Without going into concepts, who came first the chicken or the egg, let's say that before studying programming it's necessary to know certain mathematical concepts, which without covering too much thus don't creating confusion I will just quote here Fuzzy logic, Boolean algebra, which can help us understand the Turing Machine, that's the force, if we can sense it, the force is on these concepts, the force is on the BITS, in reality in the Quantum Universe, which I won't go into in more detail of  "Who came first the Punched Wooden Cards, Steam-driven Calculating Machine or Turing Machine", nevermind.

History of Computers: A Brief Timeline

To start everything, there is no one who dominates the force, without knowing programming, more important than programming is programming logic, for more details:

Logic programming

Computer programming

This is an absolute and indisputable requirement, without it, no one fits into the main roles of the internet universe.

Some would say that a lot of knowledge in Operating Systems would be enough, I disagree, because knowledge in programming is always necessary, even to create a script.

Scripting language


A software or program is a human intellectual asset, it's in the same category, as a music, a book, let's know that a music or a book would be never equals, the software or program starts from the same principle, Intellectual property (IP) is a category of property that includes intangible creations of the human intellect. There are many types of intellectual property, and some countries recognize more than others.The most well-known types are copyrights, patents, trademarks, and trade secrets.

Copyright


Let's start with what we can say is the elite:


Guru:

They are at the top of the tree, an authority on computers and computing, they have great knowledge which he wants to disseminate, transmit, teach, he is a Jedi, let's compare him with Master Yoda:

Hacker ethic




Not everyone accepts and uses this symbol, however it was proposed, in general, each one defends their school and their ideology, there is also no real definition of who should or can use it:

Glider (Conway's Life)

The Glider: A Universal Hacker Emblem




Hacker:

A person who has great ease of analysis, assimilation, understanding and surprising abilities with a computer, he knows perfectly well that no system is completely fault-free, and he knows where to look for them using the most varied techniques.



A Hacker not exactly need to use your knowledge to invade a system, he can use it for build a system, or for any good reason, a Hacker is like a Jedi, he has a code of conduct, he never would do it for bad purpose, as an stupid example "steal the children's milk".

A Hacker could use your knowledge for build a game, or an operational system like a Linux, that's has like others security problems who needs to be fixed.



I personally don’t agree with certain definitions of the internet, a great example of this would be:

Hacker

Security hacker

In my point of view, only partially correct, however they have the same conduct code as a Guru:

Hacker ethic


Cracker:

He has as much knowledge as hackers, however with the difference that, for them, he does it with bad intentions, and doesn't have the same code of conduct.


This definition suits better for them in my opinion, however you need to read till the end:

Hacker



Some confuse the term with:

Software cracking


Sysadmin:

He is the one who must have deep knowledge of the Operating System and its architecture, whatever it may be, he is a system administrator.

Is a person who is responsible for the upkeep, configuration, and reliable operation of computer systems, what will define their level is their knowledge, in essence they need to have some knowledge in programming and programming logic, it's necessary in many cases, to create a script for automatizing a routine and many others cases, like security policies. 

This professional ensures the good performance and security of computers so that they meet the needs of those who use them, he can install components that optimize the company's routine, in addition to solving problems and providing technical support to its employees when necessary.




The way he uses the force will define their side.

Sysadmin


Lamers:

Many would say that this term no longer exists, the lamer is an apprentice, that is, he is a novice, many don’t like it, for him as for everyone else, there are two ways the dark side of the force and the good side, some use the term Wannabe, Larva, which in my opinion can be described as the same thing, that could be compared as a Padawan, he can never necessarily climb the tree, the fact is that there is a learning curve, someone has to start from somewhere:


Lamer


There are many other profiles on the internet, let's say that these profiles cannot be framed above, because they simply don’t build programs:


Designer:

When we speak in terms of WEB, we will say that some need to program, others however don't have this need, but they are no less important, programmers work at BIT level, machine language, let's say that designers work at most with languages for WEB, languages that run in your browser which doesn't configure to be a programming language, in my definition a programming language is everything that interacts directly with the Hardware of your machine, JavaScript and Angular for an example are languages for WEB.


List of programming languages by type

Designer


This in itself isn't a bad thing, in this category many profiles can be fit, such as an Architect who only designs the solution, a person who creates beautiful websites, beautiful symbols and images for products, while the programmer who has the force faces the universe of BITS, they face the universe of PIXELS, that's to say programmers are scientists, these are artists, they draw a solution, more directly, what you see is their art, what you don’t see is the work of the programmers.

Like other profiles, the designer can also practice the dark side of the force.





Maybe some won't agree with my definition, however I tried to add it just to facilitate understanding all in one profile.

Game design

Graphic design

Web design

Websites Architecture

Image editing


Phreaker:

He specializes in telephony. It’s main activities include free calls (both local, long distance and international), reprogramming of telephone exchanges, installation of wiretaps (not those placed on poles, but imagine something in the sense that, every time your phone rings, will also do it, and he will be able to listen to your conversations), etc. In addition to allowing a possible attack on a system to have access providers in other countries as a starting point, their techniques allow not only to remain invisible in the face of probable tracking, but also to forge the culprit of the fraudulent connection, causing the poor guy pay the duck (and the bill).



Phreaking


Defacer:

Are computer users who most often have little technical knowledge, responsible for defacement or, as it is popularly known, deface, is a technique that consists of making changes to the content and aesthetics of a web page.


Website defacement

Investigating Web Defacement Campaigns


Carder:

Carding is a form of credit card fraud in which a stolen credit card is used to charge prepaid cards. Carding typically involves the holder of the stolen card purchasing store-branded gift cards, which can then be sold to others or used to purchase other goods that can be sold for cash. Credit card thieves who are involved in this type of fraud are called “carders.”





Carders use this information for their own benefit, whether using it to buy products and make financial transactions or selling the information they have obtained at very high prices.

Carding

Credit card fraud


Script Kiddie:

It is a pejorative term, used in relation to "hackers" who, because they don’t have great technical knowledge, use ready-made scripts, "cake recipes", to invade systems, make DoS attacks or make trouble just as an example, usually, these scripts don't require much technical knowledge to be used.

As many of these attacks are reported in the media, it’s largely thanks to the Script kiddie's that the term "hacker" came to be used in a negative way, since the mainstream media doesn’t normally differentiate between the two.


Imagine the following situation: 


The Cellphone of the famous singer Mary was stolen and their pictures was exposed on internet. 


1 - To say if it's an Hacker activities we need to do an analysis, thus in this case there are many steps before to say it was really a hacker, in essence can be considered a group with just skills in cell phone, like Script Kiddie, Phreaker or others

2 - Question one, was your Cell pattern or password break ?

3 - Question two,  Who in the world can expose a picture to become viral in not so much time ?

4 -  A thief for the pictures become viral have to do as fast as they can, because a cell phone of a famous singer is really danger in anyone hands

5 - Thus the most possible logic is to sell Cell it for a specialized group to expose the pictures as fast as they can


For instance:


- I stole the cell phone of a famous singer, my group, who in the world would pay more for that valuable data ?

- Just a moment, I will try to find someone !

- OK !

- I found three Guys in the world !

- Who would pay more for that data ?

- There are one who really wants to fuck a lot this stupid bitch, then for this one $ 1.000,00 ​!

- OK !

- Send  me your account and will transfer the money now, leave it in my hands !

- OK !


Has your cell phone been cloned? Your Telegram or whats app? Your Instagram ? Your Facebook ? Your e-mail ? Were your photos stolen? Anything you can imagine, these one are largely responsible:

Script kiddie


Conclusion:

I hope someone will read this and like it, a simple way of defining it, since many don't have this understanding, there are many other profiles, if I were to go into the definition of the job market then it would be very comprehensive, I tried to define it just that way, thus don't creating too much confusion, because this is really very comprehensive, focusing only on the most common information security language and internet in general.


I don't know if someone will have interest on this, however since I were a child I like to read, I will leave here some readings and films which I consider my favorites:

2001: A Space Odyssey (film)

Dark City (1998 film) - Some say that Matrix is a plagiarism of this movie

The Sum of All Fears (film) - I recommend to read the two books

The Matrix (franchise) - This one is obvious

Pirates of Silicon Valley - Not really one of my preferred however good to see 

Star Wars Trilogy - Ignoring of course the last trilogy

Star Wars prequel trilogy - Ignoring of course the last trilogy

Star Wars - The real last trilogy - MAY THE FORCE BE WITH YOU !!!

Back to the Future - Obviously

Blade Runner - Like Star Wars I have on cassette tape :-)

Blade Runner 2049 - I pretty loved the sequel, I waited years reading theories on the internet and in magazines :-)

Alien (franchise) - Can't miss

Hitler: The Rise of Evil - I read so many books and watched so many movies that it's hard to list, I have books with chronological details of the second world war and others, since I was a child, my Father was terrible, it's a hobby for me, just an example :-)

The NeverEnding Story - Someone reminded me of this movie in some way, I don't know why they saw that he wasn't in that list , and that person knew it was one of the most important of my childhood :-)


My preferred list of books, many of them I read when I was a child:

Data Structures Using C

Sprawl trilogy - This one is special, read this one then watch Matrix again :-)

Alice's Adventures in Wonderland - Lewis Carroll was an excellent logical if you realize you'll see a lot about programming here

The Little Prince - This book has a logic, nobody really understand :-)

O Cachorrinho Samba - my biggest hero :-)

João Peralta e Pé-de-moleque - Amazing !

Dan Brown is the author of numerous #1 bestselling novels

Gulliver's Travels

O Grande Mentecapto (romance)

Don Quixote

Sherlock Holmes - All the books as possible

Série Vaga-Lume - All the books as possible

Agatha Christie (1890–1976) was an English crime novelist

Monica's Gang or Monica and Friends - All readings and movies :-)

Erich von Däniken - This one is really special, the greatest conspirator theorist in my opinion :-)

Paulo Coelho - I haven't read them all, however Brida is really special, purely logical :-)

The Art of War - Would it be necessary to remember?

The Book of Five Rings - Would it be necessary to remember?

Pyramidology - I read so many books on this topic that I don't even remember the names of the authors anymore


I'm going to stop my list of movies and books here, because otherwise I can make a mistake, forgetting one and sometimes I can't even know really my favorites, I've never seen the HACKERS and 21 movies, I too don't have any interesting in somethings like RUBIK'S CUBE, they never piqued my interest, a simple calculator can do so, of course, if you are a mathematician, you should exercise this type of reasoning, I always preferred chess and other games, although I never delved too deeply into tactics, we learned in childhood from each other and those who studied this had more tactics than we that never went deeper, I also always preferred video games and RPG games, which today I don't practice as much, each one has their taste, sometimes I watch movies just for entertainment.

Comentários

Postagens mais visitadas deste blog

Akka vs. Spring Reactor personal comparison

Adaline - Adaptive Linear Neuron

Simple Application Microservices and MongoDB using Clean Architecture