Hackers' World - Why Teens Make the Best Hackers
Teens Make The Proud Majority Of Hackers' World
Hacking is normally considered a criminal offense. But do the hackers think the same too? Probably not.
Study reveals that the majority of hacking population consists of the teenagers. Wouldn’t it be interesting to find out the facts hidden behind it? Let’s take a quick look at what the surveys reveal.
A survey conducted on 1000 New York city teenagers revealed that 50% of kids admitted to having hacked Facebook/email accounts, and a stunning 39% thought it was ‘cool’ thing to do! A disturbing 7% of the young hackers did so for generating income and a 6% thought it was a potential career path.
What just gets them to commit this act?
Why do the teenagers find hacking intriguing enough? The answer probably lies in the ‘power of thrill’. The internet has plethora of loopholes and backdoors that the teens are, or develop themselves to be, adept at breaking in to them.
Since internet is a daily routine to almost any business and even the household mums, teenagers are probably motivated and driven by the fact that people take easy control of what internet has in store.
USAToday.com once reported that most teenagers commit computer hacking and software piracy crimes out of excitement and a hunger for inquisitiveness. In a nutshell, the major contributing factor to this offense is in seek of fun.
Ethical Hacking Guides
Most Popular Tricks By Tech-savvy kids
Most teens are content on using their personal or family computers for hacking. No matter what controls the parents try to impose on restricting their access to potential crimes, the tech-savvy kids find an alternative to accomplish their tasks. The most popular trickeries employed by the teenagers are discussed below:
Spotting access vulnerabilities
A savvy hacker would write a scanning tool that is run 24 x7 to detect and filter all IP addresses that are vulnerable to hacking. The hacker depending on the vulnerability of the machine, creates a privileged or non-privileged account, exploits the network system the subject computer shares information with or is networked with.
Spotting OS vulnerabilities
In succession to the above, hackers then look for OS (Operating System) vulnerability, and the scanning tools in support of the same. This part is quite known to the public itself, with security sites like SecurityFocus and CERT disclosing full information about the same, and the hackers that take easy and full advantage of.
Related Articles :Meaning of Hacking and the Different Kinds of Hacker.
More by this Author
There could be many reasons for practicing Hair coloring, or you can say, changing the color of hair. The most common motivation to change the hair color is the recent trend or fashion. Hair coloring process involves...
Let us assume 2G (Second generation)as a pipe through which 10 persons can go at a time. 3G is a pipe through which 100 persons can go at a time. Most of us are using 2G.In this only sound is transmitted. In third...
Sania Mirza: the name itself is more than enough to provoke the religious fanatics of India. Sania is a sports personality who didn’t get the acclaim she deserved. It’s true that India honored her with one...