About Me

My photo
Hello my fellow Politiores Troglodytes. This Blog is a collection of Posts, Poems, & Short Stories that I write on a daily basis. If you find it entertaining, informative, and controversial, then I have done my job properly. Thank goodness too, because Karma has been on my case of late. I'm supposed to bring fifty people into the fold or I'll have to give back the part of Einstein's brain I inherited. No, I'm not one of the Scientists who got a piece of his brain when he died. Karma said, "Eat this knowledge. It'll make you smarter!" The bargain I made with Karma was, if I could change fifty people into Politiores Populos, I would be rewarded with my very own Lamborghini. So, that's my story and I'm sticking to it! Like what you're reading, then read on. P.S. Populo is Latin for people. Politiores is Latin for educated. Troglodytes is English for troglodytes. And Einstein's brain was stolen by Thomas Stoltz Harvey after his death in 1955 and eventually divvied up into 240 pieces. If you just read that last sentence, then you have just learned something and I'm just that much closer to fulfilling my commitment to Karma!

Friday, April 12, 2019

Hackerone

Now I have heard everything.
"The U.S. Department of Defense (DoD) has put together a prize fund of $150,000 for any computer hacker who can find vulnerabilities in the organization's security systems."
By Luke Graham for CNBC
"This is the first "bug bounty" program run by the U.S. federal government. Several companies, including Facebook and Google, have offered cash rewards to hackers who can find bugs in their programs or vulnerabilities in their cyber security."
If you believe that the
Government 
is just going to let every participant go on their merry way after this is all over,
please let me sell you the
Empire State Building!
OK,
sure.
If you do not know by now,
paying
Hackers
to find vulnerabilities in a security system is nothing knew.
I am going to use the old labels here.
The very best
Black Hat Hackers
after being caught,
have been offered jobs by
Governments,
Corporations,
Law Enforcement,
and
Security Companies.
They become
White Hat Hackers
because they are now supposedly working for the good guys.
But every
Black Hatter
knows,
every component of every computer has a signature.
A lot of times the
Black Hatter
will even leave his
Calling Card.
A code in the
Hacked System,
so the
IT Department
of that
System,
Law Enforcement,
Security Companies,
and
Governments
know who they have been
Hacked
by.
"Hackers will have to register to participate and there are strict eligibility criteria: hackers must have a U.S. social security number, be eligible to work in the U.S., and will have to agree to a criminal background check to receive a bounty payment from the prize fund." 
Registration,
that is the key.
Put your name on a list
and if your signature hacking code
or hacking technique ever shows up somewhere else in the World doing something funny,
say hello to your new little friend named
Bubba.
He will be sharing a prison cell with you.
Yet,
I believe everybody should have at least one chance in life to make as much money as they can,
as long as it does not hurt anyone in the process.
Except for
Big Business,
corrupt
Law Enforcement,
and evil
Empires!
Yes,
there is a company out there that will pay you to hack
Companies Legally.
You will also have to register there if you want a piece of that Pentagon Money.
It is called
Their motto is;
Modern Security Is Hacker-Powered!

This is,
Once Again I Retired From Hacking When It Was A Lot Easier In The 1990s - I Did It For Free Software - Free Web Browsers (You Use To Have To Pay For Them) - Free Anything Computer Wise - Free Is The Key Word Here,
Jim Hauenstein,

And,

“She’s in the middle of something really important. What do I tell her?”
“Tell her she gets to hack into the CIA’s system. She won’t be able to pass that up.”

That is my story and I am sticking to it!

 Like what you are reading?

Sign up as a Follower,
or Set up my Blog
as your Homepage
on your Web-browser,
or Leave a Comment,
or a Suggestion,
and I will answer you in a Post.

Thanks for reading.

If you are reading this on a
Cell-Phone,
you will see a
Link
on the bottom of the page,
after all the headlines of stories
where it says;
View Web Version.
To truly get the full benefit of my
Blog,
I suggest you view the web version.
You will just have to expand the page to be able to read it.


Thanks Again.

2 comments:

  1. He is no scam,i tested him and he delivered a good job,he helped me settle bank loans,he also helped my son upgrade his scores at high school final year which made him graduate successfully and he gave my son free scholarship into the college,all i had to do was to settle the bills for the tools on the job,i used $500 to get a job of over $50000 done all thanks to brillianthackers800@gmail.com,he saved me from all my troubles,sharing this is how i can show gratitude in return for all he has done for me and my family.

    ReplyDelete
    Replies
    1. I believe you Commented on the wrong Post. This has nothing to do with an individual but with firms out there willing to pay for hackers who can find vulnerabilities. I have nothing against it, but being an ex-hacker, I'm always worried about getting my name on a list.

      Delete