You are viewing our Forum Archives. To view or take place in current topics click here.
#11. Posted:
Bashful
  • TTG Senior
Status: Offline
Joined: Aug 02, 201212Year Member
Posts: 1,915
Reputation Power: 77
Status: Offline
Joined: Aug 02, 201212Year Member
Posts: 1,915
Reputation Power: 77
Nasyr- wrote
GunSwoozy wrote There are different types of hackers. You state that hackers get paid and they cause damage to companies/government.
You're talking about black hat hackers.
Have you ever heard of grey hat and white hat hackers?
White hat hackers help companies find vulnerabilities in a system.
Grey hat is a combination of both black and white.


I know that the different hats are but when I described it I meant in general, understanding of Anonymous, LuLzsec etc.
I have friends who are whitehat hackers, you might have heard of Aura? Very well known Whitehat helper.
I also have Greyhat and Blackhat friends, trust me I know the difference and what each does, but keep in mind all the hats know how to attack and defend, most use it in an attack way though.

SRT wrote I agree with this almost 100%, there's just one flaw.

It seems like you're trying to dissociate Xbox 360 and hackers completely, but what about people like GliGli who exploited the Xbox 360 software?
Straight from the wiki definition:
[ Register or Signin to view external links. ]

Just though I should add that in, other than that I completely agree with the modder vs. hacker argument, getting tired of the 12 year olds on XBL calling themselves "l33t h4x0rz"


That is a very valid point, there is actual hackers who have targeted Xbox and other gaming companies, but what I was meaning was people with a JTAG who call themself a hacker, when they don't know what a VPN is.


Greyhat at your service
:3 I like the whitehatted avatar though. So much better.
But either way, as someone who knows about all of this, I can't stand skids even more.

They think they have 1337 h4x because they can use Cain and Abel and Jays Booter or Command prompt (lol, I've had it happen) to flood an ip address.

I'm sorry, but that's not even close to true DDoSing. Botnet's, that's DDoSing.
Jump to:
You are viewing our Forum Archives. To view or take place in current topics click here.