why money, power, and ego drive hackers to cybercrime
Only one more hour behind the hot flame broil flipping burgers, and Derek* could consider it daily. Under his smelly cap, his hair was tangled down with perspiration, and his work uniform was scattered with oil. He realized he'd smell the prepared meat and smoke for the following three days, even after he'd showered. Be that as it may, it was cash, he assumed.
"Derek!" His director slapped him on the shoulder. "A little feathered creature revealed to me you were great with PCs. I have an occupation for you, in the event that you'll take it."
The following day, with switches and links purchased and paid for by his supervisor, Derek arranged his manager's whole home. Following one hour of work, he was given a fresh $100 note. Derek made a snappy count: He'd need to put in three full moves at the burger joint to bring home the equal.
Sadly, not the majority of Derek's customers had his chief's cash. Like him, his schoolmates originated from an unassuming working class foundation, and they frequently couldn't manage the cost of the most recent computer games, DVDs, and collections. However, Derek had something not in any case his supervisor had: the capacity to hack.
For the most part, his cohorts searched for computer game hacks, as boundless life, or access to boatloads of free music. Once in a while they required costly links to set up LAN gatherings, and Derek could McGyver a feline 5 with the goal that his companions just needed to pay him $10, rather than the $50 they cost, best case scenario Buy.
Now and again, Derek took on work that was somewhat more hazardous or testing—like defrauding different tricksters to get onto their systems and drop malware or diverting program traffic to individual eBay customer facing facades—and he substantiated himself skilled at this sort of critical thinking. Everybody knew Derek was the man to go to for these things—and he enjoyed that. Could you ask for anything better? Cash, fame, and a peaceful "screw you" to the man. He was pleased with his capacity to hack into and alter programs worked by experts.
"There was inner self required, obviously. It resembled, 'Ha! Look what I did that I should almost certainly do,'" said Derek, who today fills in as an architect at a security organization, yet some of the time still takes an interest in under legitimate exercises on the web. "Some 13-year-old child simply beat a 30-year-old software engineer."