What enterprise developers can learn from hackers
Even if you’re not sure you’d hire a former hacker, your staff can learn a great deal from talking with one. Developers in an enterprise shop wouldn’t be wasting their time listening to former hackers Rob Newhouse and Dan Verton. Verton authored The Hacker Diaries: Confessions of Teenage Hackers and is a former U.S. Marine Corps intelligence officer. Newhouse is Chief Technology Officer of Orbit 11 Partners, a New York-based option market-making company. Together, they offer six lessons enterprise developers can learn from hackers.
Hiring an ex-hacker
You can read more about hiring ex-hackers in the article ”Should you hire an ex-hacker?”
Lessons from the hacker culture
Some valuable lessons for enterprise developers have their origins in the unique hacker culture.
Nothing is impossible
One of the major tenets of hacking and cracking has always been that nothing is impossible. Many problems are difficult to solve, but that means changing your approach in order to attack them from a different direction. The same thinking can be applied to enterprise development. It’s easy to claim that your deadlines are unrealistic, but are they really impossible? Newhouse notes that, like hacking a system, you must consider unusual solutions when coding business requirements.
Criticize your own work
Learn to be brutally honest when it comes to evaluating your work. Find the strong and weak points. Hackers are always analyzing and criticizing their work; enterprise developers must do the same. Ideally, it should be a daily task that becomes a dynamic process.
Look for unique solutions
Impressing other hackers is one of the major driving forces behind hacking. That was Newhouse’s goal when he wrote a new piece of software. Earning fellow hackers’ praise for creativity was just as important as the personal pride he took in the accomplishment. In the corporate world, the goal is to work out a unique solution, taking into account cost and other parameters important to the enterprise. Striving for unique results benefits your company and your reputation.
Hunt for security vulnerabilities like a hacker
Verton suggests taking security strategies out of the hacker’s playbook. In other words, think like they do.
Software doesn’t ship secure out of the box
Software is not shipped with standard security settings. When you buy a new operating system, systems administrators must go through it carefully. All default settings must be changed. Hackers know this, and it makes it easier for them to break into a system. Enterprise developers would do well to follow suit and consider potential security lapses in their designs.
Find your system’s vulnerabilities
Take a defensive position and look at your enterprise from the hacker’s perspective. It’s a good idea to actually hack your system for its vulnerabilities. This should be done regularly, especially when you have a change in your enterprise—new users, for example. The formal term for this process, “Red Teaming,” originated in the military. Red Teaming is a vulnerability assessment that targets information-based systems and associated support infrastructure to uncover security problems and devise fixes.
Monitor what’s being posted out about your company
It’s important to search the Internet to find out what’s being said about your company or its software. Hackers use this reconnaissance technique to gather information on their targets—for example; when administrators unwittingly release information a hacker can use to gain entry into a system. Regularly gathering such defensive intelligence will help you stay a step ahead of the hackers.
Lessons from a hacker
Are there important lessons that can be learned from hackers? Tell us what you think or post a comment below.
No messages found
No messages found
Well now Brad
If you want to troll, make it fun. I like to laugh at the frolics of one that manages to croak out something original . And I have seen some good ones. You are neither original nor funny.
I will not be back to look for comments, this is a hit and run answer. And to those anwering this individuals : he is "too rude too be true". Bye now. veni vidi vici.
Brad or Brat
You may claim not to be a baggy-panter, but you sure rant like one.
Rest assured, little one, few of us would piss in your mouth if your teeth were on fire.
I'm only writing to whip little Brat into an even greater frenzy. I find his ranting very amusing.
Hoping to read more from you, Brat.
In fact, I've had comp sci professors only use the word "crackers" to describe or address any malicious doings as to not insult the 'hackers' of the class.
"Cracker" is a very old term. The code-breakers for WWII's Enigma machine were "crackers" because they simply "cracked" the codes. If a cracker leaves a footprint, like a damaged web page or corrupt database, he's failed - because the goal was to get in and out quietly.
"Hacker's" a little newer. A hacker takes cracking one step further to actually damage something. Often, he'll use off-line methods - like breaking into a building or calling users to ask for passwords.
However, being slang terms, you can use them however you like - as can your comp-sci prof.
There are no posts from your contacts.
Adding contacts is simple. Just mouse over any member's photo or click any member's name then click the "Follow" button. You can easily manage your contacts within your account contacts page.