Unlike testing solutions that simulate attacks, CyberFlood Data Breach Assessment uses actual attack components,
true hacker activity and malware executables to assess an organization's vulnerability to cybercrime.
Kevin Mitnick, the infamous hacker just released from four years in federal prison, says you are a "vandal," not a
true hacker. And Newsweek says your feats "required the skill of a spitballer." At the risk of sounding like a "hacktivism" groupie, let me just say that some of us were able to decipher your encrypted cri de coeur.
In 2000, Richard Stallman--who was once dubbed by journalist Steven Levy 'the last of the
true hackers'--visited a restaurant in Korea with some friends.
"They are not
true hackers. We call them defacers," said Xpander.
They don't possess the level of knowledge of
true hackers; rather, they customarily download hacking tools and program snippets (or scripts), and then use them to cause mischief.
True hackers subscribe to a code of ethics and do not conduct illegal activity.
Also, there are times when the attack is simply to prove to the administrator of the system that there is a hole and
true hackers will simply gain access, then try to assess what kind of rights they managed to acquire, then disconnect from the remote machine and write the admin on what they did to get entry and what measures could be taken to prevent other people from doing the same thing later.