[{"@context":"https:\/\/schema.org\/","@type":"Article","@id":"https:\/\/www.fipobex.cz\/hackeri-co-byste-meli-vedet\/#Article","mainEntityOfPage":"https:\/\/www.fipobex.cz\/hackeri-co-byste-meli-vedet\/","headline":"Hacke\u0159i. Co byste m\u011bli v\u011bd\u011bt!","name":"Hacke\u0159i. Co byste m\u011bli v\u011bd\u011bt!","description":"Kdo je p\u0159esn\u011b hacker? Po v\u011bt\u0161inou, kdy\u017e mluv\u00edme o hackerovi, tak se jedn\u00e1 o \u010dlov\u011bka zb\u011bhl\u00e9ho v po\u010d\u00edta\u010d\u00edch a jejich softwarech. Napad\u00e1 na\u0161e po\u010d\u00edta\u010de a mobily r\u016fzn\u00fdmi metodami, kter\u00e9 n\u00e1m jsou ji\u017e dob\u0159e zn\u00e1my a dok\u00e1\u017eeme se proti nim br\u00e1nit. Av\u0161ak \u00fato\u010dn\u00edk m\u016f\u017ee b\u00fdt i n\u011bkdo, kdo um\u00ed jen trochu pracovat s programy a vyu\u017e\u00edv\u00e1...","datePublished":"2019-02-05","dateModified":"2023-05-03","author":{"@type":"Person","@id":"https:\/\/www.fipobex.cz\/author\/#Person","name":"","url":"https:\/\/www.fipobex.cz\/author\/","identifier":1,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/505fff4dce96a6fd9b2c3bab9d6ad2c90e3ce4a797f024fc5ad345c11f66ba90?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/505fff4dce96a6fd9b2c3bab9d6ad2c90e3ce4a797f024fc5ad345c11f66ba90?s=96&d=mm&r=g","height":96,"width":96}},"publisher":{"@type":"Organization","name":"fipobex.cz","logo":{"@type":"ImageObject","@id":"\/logo.png","url":"\/logo.png","width":600,"height":60}},"image":{"@type":"ImageObject","@id":"https:\/\/www.fipobex.cz\/wp-content\/uploads\/img_a335955_w1690_t1549364230.jpg","url":"https:\/\/www.fipobex.cz\/wp-content\/uploads\/img_a335955_w1690_t1549364230.jpg","height":0,"width":0},"url":"https:\/\/www.fipobex.cz\/hackeri-co-byste-meli-vedet\/","wordCount":591,"articleBody":" Kdo je p\u0159esn\u011b hacker? Po v\u011bt\u0161inou, kdy\u017e mluv\u00edme o hackerovi, tak se jedn\u00e1 o \u010dlov\u011bka zb\u011bhl\u00e9ho v po\u010d\u00edta\u010d\u00edch a jejich softwarech. Napad\u00e1 na\u0161e po\u010d\u00edta\u010de a mobily r\u016fzn\u00fdmi metodami, kter\u00e9 n\u00e1m jsou ji\u017e dob\u0159e zn\u00e1my a dok\u00e1\u017eeme se proti nim br\u00e1nit. Av\u0161ak \u00fato\u010dn\u00edk m\u016f\u017ee b\u00fdt i n\u011bkdo, kdo um\u00ed jen trochu pracovat s programy a vyu\u017e\u00edv\u00e1 k \u00fatok\u016fm skripta jin\u00fdch hacker\u016f. Pokud jste tedy trp\u011bliv\u00ed a r\u00e1di se u\u010d\u00edte nov\u00fdm v\u011bcem, hacker m\u016f\u017ee b\u00fdt i z V\u00e1s. \u00dato\u010dn\u00edci m\u011bn\u00ed z\u00e1pisy program\u016f v syst\u00e9mech p\u0159\u00edstroj\u016f a t\u00edm p\u00e1dem se prolamuj\u00ed hloub\u011bji do na\u0161eho po\u010d\u00edta\u010de nebo mobilu a zji\u0161\u0165uj\u00ed na\u0161e hesla a dal\u0161\u00ed citliv\u00e9 informace, a proto se pou\u017e\u00edv\u00e1 i ozna\u010den\u00ed cracker, co\u017e znamen\u00e1 \u201eprolamova\u010d\u201c. Typy hacker\u016f Jeden typ zn\u00e1 ur\u010dit\u011b ka\u017ed\u00fd \u010dlov\u011bk, co n\u011bkdy pou\u017eil internet, a to je Black Hat hacker. To jsou klasi\u010dt\u00ed cracke\u0159i, kte\u0159\u00ed pronikaj\u00ed do syst\u00e9mu za \u00fa\u010delem po\u0161kodit \u010di ukr\u00e1st data. Ov\u0161em mohou takto napadat softwary z nudy, ale to je v dne\u0161n\u00ed dob\u011b opravdu vz\u00e1cn\u00e9, proto\u017ee nikdo nechce riskovat pokutu \u010di uv\u011bzn\u011bn\u00ed pro nic. Nej\u010dast\u011bji k hackersk\u00fdm \u00fatok\u016fm doch\u00e1z\u00ed tedy za \u00fa\u010delem z\u00edsk\u00e1n\u00ed pen\u011bz. Abyste si nemysleli, \u017ee ka\u017ed\u00fd hacker je \u0161patn\u00fd, tak V\u00e1s sezn\u00e1m\u00edm i s typem hackera, kter\u00fd je spole\u010dnosti velice prosp\u011b\u0161n\u00fd, tzv. White Hat. V \u010de\u0161tin\u011b se setk\u00e1te s pojmem \u201eetick\u00fd hacker\u201c.Tento typ crackera napad\u00e1 syst\u00e9my, ne proto aby zni\u010dil nebo ukradl data, ale d\u011bl\u00e1 to kv\u016fli tomu, aby odhalil mo\u017en\u00e9 skuliny v obran\u00fdch k\u00f3dech. V\u011bt\u0161inou si ho najmou tv\u016frci syst\u00e9mu, aby jim pomohl skripta zdokonalit a znemo\u017enit tak ostatn\u00edm hacker\u016fm pr\u016fnik k chr\u00e1n\u011bn\u00fdm dat\u016fm. \u010casto se tento typ zam\u011b\u0148uje s Blue Hat, proto\u017ee jsou mezi nimi opravdu nepatrn\u00e9 rozd\u00edly. Existuje je\u0161t\u011b Grey Hat, co\u017e je kombinace Black a White Hat. Zn\u00e1m\u00e1 je tak\u00e9 skupina Anonymous, kter\u00e1 hackov\u00e1n\u00ed vyu\u017e\u00edv\u00e1 v\u00fdhradn\u011b k z\u00e1krok\u016fm proti ISIS. Zn\u00e1m\u00ed cracke\u0159i Jeden z nejzn\u00e1m\u011bj\u0161\u00edch hackr\u016f je Loyd Blankenship, kter\u00fd vystupoval pod p\u0159ezd\u00edvkou The Mentor. Byl \u010dlenem dvou velk\u00fdch hackersk\u00fdch hnut\u00edch a napsal tak\u00e9 manifest Sv\u011bdom\u00ed hackera, kde vysv\u011btluje my\u0161lenku hacker\u016f. Manifest byl zve\u0159ejn\u011bn na hackersk\u00e9m webu Phrack, ale pokud ani trochu nerozum\u00edte hackersk\u00fdm pojm\u016fm, tak na tuto str\u00e1nku rad\u011bji necho\u010fte a najd\u011bte si n\u011bkde dostupnou kopii. Dal\u0161\u00ed cracker, co stoj\u00ed za zm\u00ednku je Kim Schmitz alias Dotcom s p\u0159ezd\u00edvkou Kimble. Ukradl 20 mili\u00f3n\u016f dolar\u016f od p\u00e1r z\u00e1kazn\u00edk\u016f banky Citibank a tuto sumu pak poslal na \u00fa\u010det, kter\u00fd pat\u0159il Greenpeace. Oba tito hacke\u0159i ji\u017e funguj\u00ed v leg\u00e1ln\u00ed z\u00f3n\u011b internetov\u00e9ho podnik\u00e1n\u00ed. Existuje v\u0161ak spousta dal\u0161\u00edch, kte\u0159\u00ed je\u0161t\u011b nebyli odhaleni. Technologie se zlep\u0161uje, ale hacke\u0159i tak\u00e9. Na\u0161e informace, kter\u00e9 jednou zad\u00e1me do na\u0161ich p\u0159\u00edstroj\u016f budou nav\u017edy ohro\u017eeny. Obeznamte se s prvky ochrany a m\u011bjte sv\u00e1 data v bezpe\u010d\u00ed.                                                                                                                                                                                                                                                                                                                                                                                         4.7\/5 - (8 votes)        "},{"@context":"https:\/\/schema.org\/","@type":"BreadcrumbList","itemListElement":[{"@type":"ListItem","position":1,"name":"Hacke\u0159i. Co byste m\u011bli v\u011bd\u011bt!","item":"https:\/\/www.fipobex.cz\/hackeri-co-byste-meli-vedet\/#breadcrumbitem"}]}]