Although I have started the personal artist blog recently. It was not an easy task for me to regain, strength after losing a fully functional 2 years old running blog to a hacking attack.

Hackers attacked my hosting server. The blog was gone, and sadly I couldn’t cope up with the loss, you will find some of the mistakes I made as you read. Hope you don’t repeat them if you are new to blogging. But this event made me curious about hackers. And I fell in love with the breed.

How about you visit your blog, and all you see is a message left for you saying you are hacked. It happened to me once. I visited my website one day and found that my WordPress site hosted on Hostgator was hacked. Everything was gone, and the hackers left a message with creepy background sound? They are called wolf hackers.

I was shocked and as one more of my blog hosted with Hostgator was hacked too. Waghya survived although.

I quickly posted the screenshot shown above to my FB friends. Many of my friends were surprised by hearing the new. My father was terrified too and commented to enquire in to matter if it is dangerous.

This is the same question I was asking myself. Is it serious? Why did they do that? Are they cruel? Are the terrorists? Are they Criminals?

And I dived into google and youtube to find more and more about hackers. And what I saw was astonishing. And I fell in love with the breed. They have added a lot to my knowledge about internet business and personal development. Talks by Keren Elazari and Misha Glenny on TED came out to be an essential resource to understand the allegory of the hacking premise.

It’s not the information that wants to be free. It’s us!

-Keren Elazari

Hackers are intelligent :

Mine was not the only blog that got hacked that day. There were many from Hostgator. There is nothing on the internet that is not hacked, even the internet companies that provide anti-hacking securities to government and big corporation database. There are only two possibilities, You have been hacked, or you don’t know it. These bunch of people win against hundreds of programmers. They are omnipresent.

Forge Disclosure:

Hacking attacks are mostly made for content distribution. Yes, you might think I am advocating to hack Facebook or Youtube to distribute your content. But that is not the fact. The point is their way of distribution is unique in its own way. It socks!!! And grab your immediate attention. And that is what they need attention. I would have never paid attention to what they have to if they would have mailed me. But Scriptkiddies, a hacking group hacked into twitter account of Fox news and tweeted about President Obama been assassinated in the white house. Or Samy Kamkar hacked into MySpace servers to auto add a follower to his account. MySpace had to shut down the website to fix the problem. Samy created a fastest speeding virus of all time. What purpose does this solve? Karen Elazani stated in her Ted talk that hackers operate as an immune system to the society. They find an error in the system and urge huge corporations to fix them. Making their product better. This the very basis of development, identify and rectify. If there are no problems in the system, there will be solutions. Everything will be so static and what we call a tech revolution will lose its speed. They gave me a sense that what I had online is too fragile, and I need to do something about it. I learned a lot about security and backing up a website back then. They are shaping the society we live in. The message given on my blog was necessary to reach to people. Syrian issues Refugees are trying to find shelter still has its ripples all over the world. It’s impossible to get Aylan Kurdi’s images out of mind.

Propose is freedom:

These people have a very complicated relationship with government, media and public. They are much time thanked by companies and government to find a problem in their products. But they are never paid as their way of seeing the problem is not considered legal. They don’t do it for money. Hackers hack because they stand for something that is important and needs attention. Their way of doing things might not be conventional, but their purpose is. We leave a world where we are continuously monitored. The government has there eye to market the votes, and Corporate have their eyes on them so that the can market us their products effectively. It is although fair at a certain point, and they are doing their jobs. But Time comes when they try to control things, and Ideologically driven hackers come into the rescue. For instance in the Egyptian government once blocked all over Egypt to restrict information going out of the country. Telecomix groups helped to bypass the censorship, and further they also installed 300 dial-up modems so that people could use the internet. They believe in freedom of Information.

Good Hackers and Bad Hackers:

There is nothing good or bad! It’s just how we look at it. , in this case, not every hacker get a chance to build a million dollar company like Samy. Research has shown that most of the hackers started hacking because they wanted to hack some game server. It explains itself that most of this hackers were genius Kids, who hacked out of curiosity to access what they are obsessed with. These successful hacking attempt landed them in jails, custodians. Thanks to people who forget to thank them. And exposure to the system that acts against there innocent crimes put them in the company of people that are into dark things. It’s like fire meeting kerosene situation. A kid at a young age who is “angry for nothing” get a purpose to be angry at something, THE SYSTEM. And evil people take advantages of them to employee online, credit card frauds. Misha Glenny conveys that most of the hacker he has met said that they would like on good purpose if given a chance. I wondered they might be a proper help content distribution.

Organized and still unanimous:

Be the hacker a robin hood who keep good intentions that are bad in the eyes of the social system or a villain hacker who hacks for personal gain. There is one thing that strikes as it occurs. These guys have a vast network. It is well organized and managed. They influence media in masses, and still, we don’t know who they are. It is like Rihanna releasing a song, and we don’t know who Rihanna is. Management and big guys have a lot to learn from this.
Hence next time if insecurity about hacker crosses your mind, be assured that if someone wants to hack you. They have already. You don’t know the purpose. And if you have already been hacked like me and you know it, I would appreciate if you could share your experience an thought beneath. In the comment box.

I have worked in film industry for more than 10 years. I had put in lots of efforts to create the website that got hack. It didn’t only featured my portfolio but also had some unique animation. But I learned a lot. And continue to build my new website in foot forward to gain momentum as the artist.

Write A Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.