Prev Next
Published at 20th of July 2019 12:12:02 PM
Chapter 6

Hacker

 

The Internet was originally maintained by of “trusting” the participants . Correct e-mail delivery also assumes that each network would do the right thing .

It is technically possible and also extremely easy to open or falsify transferred mail en route .

However, e-mail systems have been created based on a trust that “no one would do such a thing . ”

If this relationship of trust breaks down, the Internet will soon cease to function .

The Internet is a technology that was originally created for the United States to compete against its enemy the Soviet Union .

Therefore, at first, it was considered to only connect member states .

It is assumed that the enemy would not get in .


Sponsored Content

 

A hacker (or a cracker . The terms are synonymous here) is a person who misuses his knowledge to break into other people’s computers and “tamper” with the system .

Hackers are currently classified into approximately six types according to their motives .

The “Thrill Seeker” who, regardless of whether it’s good or bad, finds joy in taking on difficult hacking challenges .


Sponsored Content

The “Market Manipulator” who seeks out new business opportunities in the untapped areas of the Internet .

The “Freelancer” who is hired by the country and hacks for a living .

The “Hacktivist” who appeals to society based on his principles and convictions .

The “Sneak Thief” who steals information for money .


Sponsored Content

The “Stalker” who monitors and follows targets of interest .

In practice, there are many cases where these elements are mixed .

 

Also, one of the means that hackers use to achieve their purposes is the computer virus .

Please download our sponsor's game to support us!
Report error

If you found broken links, wrong episode or any other problems in a anime/cartoon, please tell us. We will try to solve them the first time.

Email:

SubmitCancel

Share