lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <414F0955.6040708@well.com>
From: vimages at well.com (Jim Race)
Subject: Scandal: IT Security firm hires the author
 of Sasser worm

Nick Jacobsen wrote:

> Does it not strike anyone that there is a disturbing trend in malicious hackers (yes, yes, I know, they are not hackers if they are malicious, so call em whatever you want) getting hired to security firms, mainly because the "hacker" gets media attention?  It is honestly like we are declaring to the world that the best way to get a good paying job in the computer security field is to perform some major attack - and get caught for it - and then after serving a short sentace, start applying for jobs.  I know lots of young people, myself included, that could make headlines by performing some act or another of a sensational nature, and all that stops us is our own sense of ethics - but those ethics get harder and harder to hold as we earn a pittance doing your standard boring days work, while some other guy is out there essentially (in my mind) having fun doing some detrimental to society, and then getting hired at a substantial salary, as a reward.
> This may sound like a rant, and it probably is, but that makes my point no less accurate.
> Responses anyone?

Hmmm.

I'll tell you what. Try going to jail for a few months. Any jail is 
fine. Pick a "small" offense. Maybe child molestation.

Then come back, sit down in front of your computer (ouch!) and report to 
us how fun it was, and how you think it's a fine idea as a career path.

We'll be waiting...

-jim


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ