White-hat hackers use their powers for good. They help out organizations that might have security breaches before the organizations get hacked. Hacking doesn't always mean hacking into someone else's system.

"The use of 'hacker' to mean 'security breaker' is a confusion on the part of the mass media," said Richard Matthew Stallman, a well-known white-hat hacker and software developer. "We hackers refuse to recognize that meaning, and continue using the word to mean someone who loves to program, someone who enjoys playful cleverness or the combination of the two."

TUTORIAL: Investing 101

Tim Berners-Lee
Famous not for hacking but inventing the World Wide Web, Berners-Lee nevertheless is undeniably a member of the white-hat hacking camp. As a student at Oxford University, Berners-Lee was banned from using the university computers after he and a friend were caught hacking to gain access to restricted areas. He moved on and built his own computer from spare parts. After college, he hacked a few other things including HTML. Did we mention creating the World Wide Web? (For related reading, see Most Costly Computer Hacks Of All Time.)

Steve Wozniak
The "other Steve" of Apple, Steve Wozniak got started as a white-hat hacker by making something called blue boxes. Wozniak and Jobs built blue boxes, which essentially hack the phone system so users can make free long-distance calls. They then sold the blue boxes to their classmates in college. Of course, you know the rest of the story. From blue boxes they moved on to bigger and better things. Those early days of white-hat hacking are what started them off.

Kevin Mitnick
Mitnick started as a black-hat hacker, and ended up serving time after hacking into some of the biggest companies in the world. Now he has left the dark side and works as a consultant and a writer. His own hacking experience gives him hands-on expertise. An article by TakeDown.com reports that Mitnick's early hacking days were ambitious and largely successful.

"As a teenage prank in 1982, he allegedly broke into a North American Air Defense Command computer in Colorado Springs, Colo. He once altered a phone program to misdirect federal agents trying to trace his call, sending them barging into the home of a Middle Eastern immigrant watching television," states the article. We're all glad he's on the good side now.

Tsutomu Shimomura
Back in the days when Mitnick was a black-hat hacker, he hacked computer-security expert, Shimomura. This didn't go over well. Shimomura decided to take his own revenge by using his hacking skills to assist the FBI in tracking and locating Mitnick. With Shimomura's help, they were successful, and Mitnick was arrested. Now they're on the same team. (For related reading, see Identity Theft: Who To Call For Help.)

Jeff Moss
Moss is better known in the computer world as Dark Tangent, though he's now well known apart from his hacking handle. Moss founded the Black Hat security conferences, which still draw thousands of computer security experts. Moss also founded Defcon, which is a hugely popular annual hacker conference. He serves as the chief security officer for ICANN and as an adviser to the U.S. Department of Homeland Security. He continues to run the Black Hat security conferences and Defcon.

Jon Lech Johansen
Even though they often help big companies protect themselves from malicious hackers, white-hat hackers are far from being passive cogs in the system. White-hat hackers often embrace the independent and the free sharing of resources such as open source, open access, and free sharing of software and protocols.

Like Wozniak building boxes to allow college peers to get free long distance phone calls, Johansen is a younger, newer hacker who has used his skills to aid others in beating a closed system. His hacking skills enabled him to hack an encryption system used on DVD movies. As a result, users of Linux or other open source operating systems are able to play DVDs encoded with Microsoft's proprietary codec, which is supposed to prevent non-Microsoft systems from running the DVDs.

TUTORIAL: Stock Basics

Richard Matthew Stallman
Stallman founded the GNU Project. The GNU project is both an open source operating system and a mass collaborative project. According to Stallman, GNU includes programs that are not GNU software but rather programs that were developed by other people for their own purposes. Stallman continues to work on the GNU Project and is an advocate for free and open software.

The Bottom Line
White-hat hacking has become more and more important as businesses and individuals depend on computers and the internet. Since computer security isn't something all of us understand, it's vital to have those who do share their expertise. (For related reading, see Cybercrime The Newest National Threat.)

Related Articles
  1. Investing News

    Yo Shkreli: Kanye Doesn't Want Your $10M, Bromance

    Martin Shkreli, I'm really happy for you, Imma let you finish, but you might be one of the weirdest ex-CEOs of all time. Of all time!
  2. Investing Basics

    This is What Donald Trump's Portfolio Looks Like

    Find out what Donald Trump's portfolio looks like and gain some interesting insights into the way the billionaire's investment mind works.
  3. Personal Finance

    4 Famous People Whose Finances Were Under Conservatorship

    Understand what conservatorship is and how it comes about during the legal process. Learn about four celebrities who were placed under conservatorship.
  4. Stock Analysis

    7 Trump Businesses You Didn't Know Existed

    Understand what Donald Trump is best known for and the types of income streams he's created. Learn about seven obscure businesses he owns.
  5. Estate Planning

    A Look At Robin Williams' Net Worth and What Happened to His Estate

    Understand what happened to Robin Williams' estate and what his estate included. Learn about the court battle over his remaining possessions.
  6. Professionals

    4 Degrees Most Oil Companies Are Looking For

    Find out which four degrees oil companies want to see on the resumes of new hires, and find out why the industry still pursues these graduates.
  7. Professionals

    8 College Degrees with the Best Returns on Investment

    Find out which college degrees offer the best opportunities to earn a salary that can generate a solid return on your investment in education.
  8. Your Clients

    What Working with Celebrity Clients is Really Like

    Expect excitement as well as the mundane when dealing with celebrity clients. Some will be charming; others...not so much. Here's what else to anticipate.
  9. Your Practice

    How to Add Celebrities to Your Client Roster

    The trick to landing celebrity clients is a subset of the skill of acquiring clients in general. Here are some strategies to help break into this world.
  10. Wealth Management

    A Look At Britney Spears' Net Worth and Her Conservatorship

    Discover how Britney Spears' net worth plunged in 2007 and has since been growing under the management and direction of her conservatorship.
RELATED FAQS
  1. What is the relationship between research and development and innovation?

    Although it's possible to achieve innovation without research and development and it's possible to conduct research and development ... Read Full Answer >>
  2. What are some common functions of business intelligence technologies?

    Although business intelligence technologies have some common functions, their main function is to support a company's decision-making ... Read Full Answer >>
  3. What is the difference between an MIS (Management Information System) and Information ...

    Management information system (MIS) refers to a larger infrastructure, whereas information technology (IT) is one component ... Read Full Answer >>
Hot Definitions
  1. Harry Potter Stock Index

    A collection of stocks from companies related to the "Harry Potter" series franchise. Created by StockPickr, this index seeks ...
  2. Liquidation Margin

    Liquidation margin refers to the value of all of the equity positions in a margin account. If an investor or trader holds ...
  3. Black Swan

    An event or occurrence that deviates beyond what is normally expected of a situation and that would be extremely difficult ...
  4. Inverted Yield Curve

    An interest rate environment in which long-term debt instruments have a lower yield than short-term debt instruments of the ...
  5. Socially Responsible Investment - SRI

    An investment that is considered socially responsible because of the nature of the business the company conducts. Common ...
Trading Center