<?xml version="1.0" encoding="UTF-8"?><rss
version="2.0"
xmlns:content="http://purl.org/rss/1.0/modules/content/"
xmlns:dc="http://purl.org/dc/elements/1.1/"
xmlns:atom="http://www.w3.org/2005/Atom"
xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
> <channel><title>Comments on: In Layman&#8217;s Terms Issue 18- Hats</title> <atom:link href="http://www.pcmech.com/article/in-laymans-terms-issue-18-hats/feed/" rel="self" type="application/rss+xml" /><link>http://www.pcmech.com/article/in-laymans-terms-issue-18-hats/</link> <description>Tech Powered Life... Simplified</description> <lastBuildDate>Sat, 09 Feb 2013 03:19:03 +0000</lastBuildDate> <sy:updatePeriod>hourly</sy:updatePeriod> <sy:updateFrequency>1</sy:updateFrequency> <generator>http://wordpress.org/?v=3.4.2</generator> <item><title>By: mmseng1</title><link>http://www.pcmech.com/article/in-laymans-terms-issue-18-hats/comment-page-1/#comment-78473</link> <dc:creator>mmseng1</dc:creator> <pubDate>Mon, 08 Oct 2012 21:37:00 +0000</pubDate> <guid
isPermaLink="false">http://www.pcmech.com/?p=16427#comment-78473</guid> <description>I perhaps don&#039;t follow the hacking community as much as I should, but I always kind of pictured at least a subset of White Hats to be those that may perform technically unauthorized break-ins, but will still release the information in a secure manner. This could also include hacking a company&#039;s products, where there is no risk directly to the company infrastructure.Also, I generally picture a different breed of Gray Hats, who hack and release information in a secure way (i.e. not directly to Black Hats), but with potential profit in mind. Some might call that blackmail, but it depends on the circumstances. Sometimes companies offer bounties on breaking their systems, sometimes it&#039;s legitimately done with the the intention of forcing a company to be aware of the fact that their systems are vulnerable, or sometimes forcing them to ACT on the vulnerable systems that they ARE aware of, but don&#039;t WANT to act on, or deny that action is necessary.</description> <content:encoded><![CDATA[<p>I perhaps don&#8217;t follow the hacking community as much as I should, but I always kind of pictured at least a subset of White Hats to be those that may perform technically unauthorized break-ins, but will still release the information in a secure manner. This could also include hacking a company&#8217;s products, where there is no risk directly to the company infrastructure.</p><p>Also, I generally picture a different breed of Gray Hats, who hack and release information in a secure way (i.e. not directly to Black Hats), but with potential profit in mind. Some might call that blackmail, but it depends on the circumstances. Sometimes companies offer bounties on breaking their systems, sometimes it&#8217;s legitimately done with the the intention of forcing a company to be aware of the fact that their systems are vulnerable, or sometimes forcing them to ACT on the vulnerable systems that they ARE aware of, but don&#8217;t WANT to act on, or deny that action is necessary.</p> ]]></content:encoded> </item> </channel> </rss>
<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

Minified using apc
Page Caching using apc
Database Caching 40/49 queries in 0.022 seconds using apc
Content Delivery Network via pcmech.pcmediainc.netdna-cdn.com

Served from: www.pcmech.com @ 2013-02-12 12:10:01 --