<?xml version="1.0" encoding="UTF-8" ?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Domb Nexen</title>
		<link>http://dombnexen.do.am/</link>
		<description>Blog</description>
		<lastBuildDate>Mon, 18 Jun 2018 23:59:14 GMT</lastBuildDate>
		<generator>uCoz Web-Service</generator>
		<atom:link href="https://dombnexen.do.am/blog/rss" rel="self" type="application/rss+xml" />
		
		<item>
			<title>Ranking All of the Jokers in the DC Universe +videos</title>
			<description>&lt;figure&gt;
&lt;p&gt;&lt;img data-portal-copyright=&quot;DCUO&quot; src=&quot;http://dombnexen.do.am/img/joker.jpg&quot; style=&quot;width: 525px; height: 210px;&quot; /&gt;&lt;/p&gt;

&lt;figcaption&gt;
&lt;p&gt;Warner Bros.&lt;/p&gt;
&lt;/figcaption&gt;
&lt;/figure&gt;

&lt;p style=&quot;text-align: center;&quot;&gt;&amp;nbsp;&lt;/p&gt;

&lt;p style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;
Want to hear our best impression of the Joker?&amp;nbsp;Bhaaa hA HA HAaa.&lt;/p&gt;

&lt;p style=&quot;text-align: center;&quot;&gt;&amp;nbsp;&lt;/p&gt;

&lt;p style=&quot;text-align: center;&quot;&gt;&amp;nbsp;&lt;/p&gt;

&lt;p style=&quot;text-align: center;&quot;&gt;What do you think? Anyway, our take on the Clown Prince of Crime is beside the point. But Jared Leto is bringing his version of the infamous Batman villain to the big screen in&amp;nbsp;Suicide Squad&amp;nbsp;and he recently told ET, &quot;When I got the part, I felt a tremendous amount of pressure -- or terror, you might call it.&quot;&lt;/p&gt;

&lt;p style=&quot;text-align: center;&quot;&gt;&quot;There have been such phenomenal, unforgettable performances, like Jack Nicholson, Heath Ledger, Cesar Romero,&quot; he added. &quot;It really encouraged me to wor...</description>
			<content:encoded>&lt;figure&gt;
&lt;p&gt;&lt;img data-portal-copyright=&quot;DCUO&quot; src=&quot;http://dombnexen.do.am/img/joker.jpg&quot; style=&quot;width: 525px; height: 210px;&quot; /&gt;&lt;/p&gt;

&lt;figcaption&gt;
&lt;p&gt;Warner Bros.&lt;/p&gt;
&lt;/figcaption&gt;
&lt;/figure&gt;

&lt;p style=&quot;text-align: center;&quot;&gt;&amp;nbsp;&lt;/p&gt;

&lt;p style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;
Want to hear our best impression of the Joker?&amp;nbsp;Bhaaa hA HA HAaa.&lt;/p&gt;

&lt;p style=&quot;text-align: center;&quot;&gt;&amp;nbsp;&lt;/p&gt;

&lt;p style=&quot;text-align: center;&quot;&gt;&amp;nbsp;&lt;/p&gt;

&lt;p style=&quot;text-align: center;&quot;&gt;What do you think? Anyway, our take on the Clown Prince of Crime is beside the point. But Jared Leto is bringing his version of the infamous Batman villain to the big screen in&amp;nbsp;Suicide Squad&amp;nbsp;and he recently told ET, &quot;When I got the part, I felt a tremendous amount of pressure -- or terror, you might call it.&quot;&lt;/p&gt;

&lt;p style=&quot;text-align: center;&quot;&gt;&quot;There have been such phenomenal, unforgettable performances, like Jack Nicholson, Heath Ledger, Cesar Romero,&quot; he added. &quot;It really encouraged me to work that much harder.&quot;&lt;/p&gt;

&lt;p style=&quot;text-align: center;&quot;&gt;So, how does Leto&apos;s Joker stack up against those that came before him? We ranked them all to find out.&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&lt;/p&gt;

&lt;p style=&quot;text-align: center;&quot;&gt;6. Various Voice Actors in Various Animated Batman Projects&lt;/p&gt;

&lt;figure&gt;
&lt;p&gt;&lt;img data-portal-copyright=&quot;Warner Bros.&quot; src=&quot;https://www.etonline.com/sites/default/files/styles/640xh/public/images/2016-08/1280_joker_voice_actors.jpg?itok=O4t1D7TR&quot; style=&quot;width: 525px; height: 295px;&quot; /&gt;&lt;/p&gt;

&lt;figcaption&gt;
&lt;p&gt;Warner Bros.&lt;/p&gt;
&lt;/figcaption&gt;
&lt;/figure&gt;

&lt;p style=&quot;text-align: center;&quot;&gt;Including Michael Emerson (The Dark Knight Returns), John DiMaggio (Batman: Under the Red Hood), Kevin Michael Richardson (The Batman), and Brent Spiner (Young Justice), among others. All have merits -- and this isn&apos;t meant as a knock against the craft -- but the look and physicality required of the role are just too important to ignore here. Albeit with one exception.&lt;/p&gt;

&lt;p style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;
5. Cesar Romero in&amp;nbsp;Batman&amp;nbsp;(1966)&lt;/p&gt;

&lt;figure&gt;
&lt;p&gt;&lt;img data-portal-copyright=&quot;ABC&quot; src=&quot;https://www.etonline.com/sites/default/files/styles/640xh/public/images/2016-08/1280_joker_cesar_romero_batman_tv_series.jpg?itok=C8Z8tWGP&quot; style=&quot;width: 525px; height: 295px;&quot; /&gt;&lt;/p&gt;

&lt;figcaption&gt;
&lt;p&gt;ABC&lt;/p&gt;
&lt;/figcaption&gt;
&lt;/figure&gt;

&lt;p style=&quot;text-align: center;&quot;&gt;Romero was first to embody the comic book baddie in the flesh, in the short-lived &apos;60s TV series, and he plays him as pure camp -- with white face paint slathered over his mustache and a deadly slot machine for creating chaos, often while singing! While his take inspired so many of the Jokers that followed, it&apos;s now so far removed from the darker and grittier foe we know today that they might as well be completely different characters.&lt;/p&gt;

&lt;p style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;
4. Jack Nicholson in&amp;nbsp;Batman&amp;nbsp;(1989)&lt;/p&gt;

&lt;figure&gt;
&lt;p&gt;&lt;img data-portal-copyright=&quot;Warner Bros.&quot; src=&quot;https://www.etonline.com/sites/default/files/styles/640xh/public/images/2016-08/1280_jack_nicholson_batman.jpg?itok=PA5Tkuca&quot; style=&quot;width: 525px; height: 295px;&quot; /&gt;&lt;/p&gt;

&lt;figcaption&gt;
&lt;p&gt;Warner Bros.&lt;/p&gt;
&lt;/figcaption&gt;
&lt;/figure&gt;

&lt;p style=&quot;text-align: center;&quot;&gt;If Romero originated the most iconic iteration of the Joker, then Nicholson perfected it when director Tim Burton took over the franchise. His Jester of Genocide chews up scenery with a twisted sense of pleasure and just a touch of&amp;nbsp;The Shining, that -- despite the cartoonish smile, truly a nightmare come to life -- feels practically understated compared to what would come.&lt;/p&gt;

&lt;p style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;
3. Jared Leto in&amp;nbsp;Suicide Squad&amp;nbsp;(2016)&lt;/p&gt;

&lt;figure&gt;
&lt;p&gt;&lt;img data-portal-copyright=&quot;Warner Bros. Pictures&quot; src=&quot;https://www.etonline.com/sites/default/files/styles/640xh/public/images/2016-08/1280_joker_jared_leto_suicide_squad.jpg?itok=9iEO0XJP&quot; style=&quot;width: 525px; height: 295px;&quot; /&gt;&lt;/p&gt;

&lt;figcaption&gt;
&lt;p&gt;Warner Bros. Pictures&lt;/p&gt;
&lt;/figcaption&gt;
&lt;/figure&gt;

&lt;p style=&quot;text-align: center;&quot;&gt;In a film about bad guys -- a hitman, a psychopathic psychiatrist, a crocodile humanoid -- Leto&apos;s Joker remains the most dangerous maniac in the mix, a deadly wild card in a deck of wild cards. This lateest incarnation is unhinged and animalistic, with Leto and director David Ayer taking elements from the comics and amping them up to a billion. That Leto&apos;s role is more or less a glorified cameo likely means he has only scratched the surface, too. (&lt;a href=&quot;http://www.etonline.com/news/167913_margot_robbie_has_a_pet_rat_from_suicide_squads_costar_jared_leto/&quot; target=&quot;_blank&quot;&gt;Good luck&lt;/a&gt;&amp;nbsp;to whoever co-stars with him in&amp;nbsp;that&amp;nbsp;movie.)&lt;/p&gt;

&lt;p style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;
2. Mark Hamill in&amp;nbsp;Batman: The Animated Series&amp;nbsp;(1992)&lt;/p&gt;

&lt;figure&gt;
&lt;p&gt;&lt;img data-portal-copyright=&quot;Warner Bros.&quot; src=&quot;https://www.etonline.com/sites/default/files/styles/640xh/public/images/2016-08/1280_mark_hamill_batman_the_animated_series.jpg?itok=uCLQ4fZY&quot; style=&quot;width: 525px; height: 295px;&quot; /&gt;&lt;/p&gt;

&lt;figcaption&gt;
&lt;p&gt;Warner Bros.&lt;/p&gt;
&lt;/figcaption&gt;
&lt;/figure&gt;

&lt;p style=&quot;text-align: center;&quot;&gt;Hamill rises above the medium, having provided the Ace of Knaves his distinctive cackle for so many years -- starting with&amp;nbsp;The Animated Series&amp;nbsp;in the early &apos;90s before&amp;nbsp;Arkham Asylum&amp;nbsp;and, most recently,&amp;nbsp;Batman: The Killing Joke&amp;nbsp;in 2016 -- that he has become synonymous with the role, without having ever appeared onscreen.&lt;/p&gt;

&lt;p style=&quot;text-align: center;&quot;&gt;Here&apos;s how beloved Hamill&apos;s Joker is: During an appearance at this year&apos;s Star Wars Celebration, it wasn&apos;t anything to do with Luke Skywalker that had fans&amp;nbsp;losing their minds&amp;nbsp;-- it was witnessing Hamill laughing as the Joker, live in person.&lt;/p&gt;

&lt;p style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;
1. Heath Ledger in&amp;nbsp;The Dark Knight&amp;nbsp;(2008)&lt;/p&gt;

&lt;figure&gt;
&lt;p&gt;&lt;img data-portal-copyright=&quot;Warner Bros. Pictures&quot; src=&quot;https://www.etonline.com/sites/default/files/styles/640xh/public/images/2016-08/1280_heath_ledge_the_dark_knight.jpg?itok=0Ghr_N-c&quot; style=&quot;width: 525px; height: 295px;&quot; /&gt;&lt;/p&gt;

&lt;figcaption&gt;
&lt;p&gt;Warner Bros. Pictures&lt;/p&gt;
&lt;/figcaption&gt;
&lt;/figure&gt;

&lt;p style=&quot;text-align: center;&quot;&gt;This may seem like an easy choice to top the list -- Ledger posthumously won the Academy Award for Best Supporting Actor -- but that&apos;s only because it is an easy choice. It&apos;s more than the Oscar, though: Ledger revolutionized how actors could and should approach playing the Joker, granting Leto and whichever actor inherits the role after him (and then after him) carte blanche to take a risk.&lt;/p&gt;

&lt;p style=&quot;text-align: center;&quot;&gt;Ledger and Christopher Nolan gave us a Joker we had never seen before, one as anarchistic as he was brilliant, as utterly captivating as he was absolutely terrifying. And, as much as it chills us to say, he put a smile on our faces.&lt;br /&gt;
&amp;nbsp;&lt;/p&gt;

&lt;center style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;
&lt;iframe allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; src=&quot;https://dombnexen.do.am//players.brightcove.net/1242911076001/41nfxfJ2e_default/index.html?videoId=5070100497001&quot;&gt;&lt;/iframe&gt;&lt;br /&gt;
&lt;iframe allow=&quot;autoplay; encrypted-media&quot; allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; src=&quot;https://www.youtube.com/embed/c-ijgjG-9Gc?rel=0&amp;amp;controls=0&amp;amp;showinfo=0&quot;&gt;&lt;/iframe&gt;&lt;br /&gt;
&lt;iframe allow=&quot;autoplay; encrypted-media&quot; allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; src=&quot;https://www.youtube.com/embed/M6NQ2_8o_vQ?rel=0&amp;amp;controls=0&amp;amp;showinfo=0&quot;&gt;&lt;/iframe&gt;&lt;br /&gt;
&lt;iframe allow=&quot;autoplay; encrypted-media&quot; allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; src=&quot;https://www.youtube.com/embed/TAXkTQLKEZA?rel=0&amp;amp;controls=0&amp;amp;showinfo=0&quot;&gt;&lt;/iframe&gt;&lt;/center&gt;

&lt;p style=&quot;text-align: center;&quot;&gt;&amp;nbsp;&lt;/p&gt;</content:encoded>
			<link>https://dombnexen.do.am/blog/ranking_all_of_the_jokers_in_the_dc_universe_videos/2018-06-19-22</link>
			<category>Joker</category>
			<dc:creator>dombnexen</dc:creator>
			<guid>https://dombnexen.do.am/blog/ranking_all_of_the_jokers_in_the_dc_universe_videos/2018-06-19-22</guid>
			<pubDate>Mon, 18 Jun 2018 23:59:14 GMT</pubDate>
		</item>
		<item>
			<title>Best Audio Streaming Software for Your Radio Station</title>
			<description>&lt;blockquote&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://radio.co/imager/uploads/1661/best-audio-streaming-software-header_af6b9dd550aec5963380aa5ba7dbe70c.png&quot; style=&quot;width: 525px; height: 294px;&quot; /&gt;&lt;br /&gt;
&lt;br /&gt;
Broadcast live to your online radio station using the best audio streaming software built by and for radio professionals.&lt;/p&gt;

&lt;p style=&quot;text-align: center;&quot;&gt;As a radio broadcaster you need the best audio streaming software to effectively manage your station. However it can be tough to find the right all-in-one solution to manage your music, build curated playlists, and broadcast live radio shows without any technical headaches!&lt;/p&gt;

&lt;p style=&quot;text-align: center;&quot;&gt;That&amp;rsquo;s why we have put together the &lt;strong&gt;top&amp;nbsp;best audio streaming software solutions&lt;/strong&gt;&amp;nbsp;worth checking out. Plus at the end have your say! Which one you do you think shines brighter then the rest? Vote for the essential tool radio broadcasters should use.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Wina...</description>
			<content:encoded>&lt;blockquote&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://radio.co/imager/uploads/1661/best-audio-streaming-software-header_af6b9dd550aec5963380aa5ba7dbe70c.png&quot; style=&quot;width: 525px; height: 294px;&quot; /&gt;&lt;br /&gt;
&lt;br /&gt;
Broadcast live to your online radio station using the best audio streaming software built by and for radio professionals.&lt;/p&gt;

&lt;p style=&quot;text-align: center;&quot;&gt;As a radio broadcaster you need the best audio streaming software to effectively manage your station. However it can be tough to find the right all-in-one solution to manage your music, build curated playlists, and broadcast live radio shows without any technical headaches!&lt;/p&gt;

&lt;p style=&quot;text-align: center;&quot;&gt;That&amp;rsquo;s why we have put together the &lt;strong&gt;top&amp;nbsp;best audio streaming software solutions&lt;/strong&gt;&amp;nbsp;worth checking out. Plus at the end have your say! Which one you do you think shines brighter then the rest? Vote for the essential tool radio broadcasters should use.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Winamp -&amp;nbsp;&lt;em&gt;The Old Familiar&lt;/em&gt;&lt;br /&gt;
&lt;img alt=&quot;&quot; src=&quot;https://radio.co/uploads/winamp-broadcaster.png&quot; style=&quot;width: 525px; height: 192px;&quot; /&gt;&lt;/p&gt;

&lt;p style=&quot;text-align: center;&quot;&gt;Kicking off this list is the well-known Winamp. It&apos;s an old familiar having been around for 20 years, but don&amp;rsquo;t let its age fool you! To this day you can still get it for free and it comes with everything you need to manage your music and radio shows - For example, curate your tracks into custom playlists and add plug-ins for additional features,&lt;br /&gt;
plus it runs quite smoothly in comparison to other media players like iTunes.&lt;br /&gt;
Coupled with the SHOUTcast DSP plugin, you can take your shows online. Broadcast your curated playlists to your radio station, even hook up a microphone to talk live to your listeners. Winamp is a good audio streaming software solution if you want something tried and tested.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
SAM Broadcaster Pro -&amp;nbsp;&lt;em&gt;Rock Solid Media Management&lt;br /&gt;
&lt;img alt=&quot;&quot; src=&quot;https://radio.co/uploads/sam-broadcaster.png&quot; style=&quot;width: 525px; height: 192px;&quot; /&gt;&lt;/em&gt;&lt;/p&gt;

&lt;p style=&quot;text-align: center;&quot;&gt;SAM Broadcaster Pro is a well known and advanced piece of broadcasting software. It has a media management system, virtual mixing decks, relays,&lt;br /&gt;
statistics, and much more useful features.&lt;br /&gt;
Controlling your shows are the cornerstone of SAM Broadcaster. Get access to multiple mixing decks and control and synchronise your audio with ease. Mix shows together with faders, EQ sliders, and improve your vocals with an FX voice feature to alter how you sound.&lt;br /&gt;
SAM Broadcaster comes with a commercial license, meaning you have to pay to unlock the full version, however you can get a free trial to see if it&amp;rsquo;s right for you.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Traktor -&amp;nbsp;&lt;em&gt;A DJ&apos;s Delight&lt;br /&gt;
&lt;img alt=&quot;&quot; src=&quot;https://radio.co/uploads/traktor-broadcast-header.png&quot; style=&quot;width: 525px; height: 192px;&quot; /&gt;&lt;/em&gt;&lt;/p&gt;

&lt;p style=&quot;text-align: center;&quot;&gt;Traktor is from leading innovator Native Instruments in the music industry for hardware and software. Designed for both DJs and broadcasters like Pete Tong and Richie Hawtin, it&amp;rsquo;s ideal for managing your station&amp;rsquo;s media and mixing shows together due to its easy hardware integration.&lt;br /&gt;
Hook up an industry-leading Traktor DJ controller to seamlessly manage your shows for professional DJ mixes. Have up to 4 decks at any one time to pre-load tracks, sync to the master track, and manipulate your station&amp;rsquo;s sound the way you want.&lt;br /&gt;
Get Traktor DJ for both Windows and Mac with a 30-minute trial to see if it&amp;rsquo;s right for your radio shows.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
AltaCast -&amp;nbsp;&lt;em&gt;Simple Windows Encoder&lt;br /&gt;
&lt;img alt=&quot;&quot; src=&quot;https://radio.co/uploads/altacast-broadcast-header.png&quot; style=&quot;width: 525px; height: 192px;&quot; /&gt;&lt;/em&gt;&lt;/p&gt;

&lt;p style=&quot;text-align: center;&quot;&gt;AltaCast, formerly known as Edcast, is a free Windows encoder for live broadcasts to your online station. Radio broadcasters and professional DJs looking for a simple solution will feel right at home with AltaCast. It&amp;rsquo;s a very simple in terms of design and the features that come with it - For example it&amp;rsquo;s main function is to grab your sound card&apos;s audio, like a microphone&amp;rsquo;s input, and broadcast to your station.&lt;br /&gt;
Like every free piece of software AltaCast requires a little bit of work to get setup. You need the C++ 2010 runtime and the latest Lame_enc.dll file for MP3 support. Download them both along with AltaCast to setup your audio streaming software.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Virtual DJ Pro -&amp;nbsp;&lt;em&gt;Professional Mixes Without Expensive Hardware&lt;br /&gt;
&lt;img alt=&quot;&quot; src=&quot;https://radio.co/uploads/virtual-dj-broadcaster.png&quot; style=&quot;width: 525px; height: 192px;&quot; /&gt;&lt;/em&gt;&lt;/p&gt;

&lt;p style=&quot;text-align: center;&quot;&gt;Virtual DJ Pro is an audio mixing software solution for DJs and radio broadcasters alike. Available for Windows and Mac, it comes with old school style vinyl and CD based mixing desks for beat mixing and media management cueing.&lt;/p&gt;

&lt;p style=&quot;text-align: center;&quot;&gt;The idea behind Virtual DJ is that absolutely anyone can start mixing tracks together without the need for loads of expensive equipment, instead giving you everything you need to make awesome sounding mixes just like professional DJs.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Mixxx -&amp;nbsp;&lt;em&gt;Technical Mixer for Radio Experts&lt;br /&gt;
&lt;img alt=&quot;&quot; src=&quot;https://radio.co/uploads/mixxx-broadcasting-software-header.png&quot; style=&quot;width: 525px; height: 192px;&quot; /&gt;&lt;/em&gt;&lt;/p&gt;

&lt;p style=&quot;text-align: center;&quot;&gt;Mixxx is advanced open-source DJ software. It&amp;rsquo;s completely free and works with Windows, Mac, and Linux systems like Ubuntu.&lt;/p&gt;

&lt;p style=&quot;text-align: center;&quot;&gt;It&amp;rsquo;s ideal if you handle quite a lot of tracks and recorded shows as it comes with an advanced library management system. Use it to update your track&amp;rsquo;s info like titles, artists, and albums using a built-in ID3 tag editor. When broadcasting from Mixxx your track&amp;rsquo;s details get shown to listeners via the player, so it comes in handy as everyone can see what you&amp;rsquo;re playing.&lt;/p&gt;

&lt;p style=&quot;text-align: center;&quot;&gt;Mixxx is great for beat syncing tracks with up to 4 decks. Invite guests on board by adding several microphones at once and easily map external mixing decks with MIDI controllers. If you broadcast live shows often then you can repeat them by recording in Mixxx and adding them to your library.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
BUTT -&amp;nbsp;&lt;em&gt;Free &amp;amp; Easy to Use Encoder Available on All Platforms&lt;br /&gt;
&lt;img alt=&quot;&quot; src=&quot;https://radio.co/uploads/butt-broadcaster.png&quot; style=&quot;width: 525px; height: 192px;&quot; /&gt;&lt;/em&gt;&lt;br /&gt;
&amp;nbsp;&lt;/p&gt;

&lt;p style=&quot;text-align: center;&quot;&gt;BUTT is by far the easiest tool to broadcast live to your online radio station. Free and easy to use, it offers a simple way to get online no matter if you&amp;rsquo;re on Windows, Mac, or Linux systems.&lt;/p&gt;

&lt;p style=&quot;text-align: center;&quot;&gt;BUTT comes with a built in encoder, which means you don&amp;rsquo;t need additional software or a plugin to connect to your station. Broadcast using external equipment like microphones, mixers, and even pre-built mics. However it only handles live feeds like talking into a mic or through your computer&amp;rsquo;s sound card, so you can&amp;rsquo;t play audio from a media player unless you using&amp;nbsp;Soundflower (Mac)&amp;nbsp;or&amp;nbsp;Stereo Mix (Windows)to broadcast all your computer&amp;rsquo;s audio&amp;nbsp;and with Voicemeeter Banana / VB Audio Cable for you can manage your pc sounds as you like.&lt;br /&gt;
&amp;nbsp;&lt;/p&gt;
&lt;/blockquote&gt;</content:encoded>
			<link>https://dombnexen.do.am/blog/best_audio_streaming_software_for_your_radio_station/2018-06-16-21</link>
			<category>Other</category>
			<dc:creator>dombnexen</dc:creator>
			<guid>https://dombnexen.do.am/blog/best_audio_streaming_software_for_your_radio_station/2018-06-16-21</guid>
			<pubDate>Fri, 15 Jun 2018 21:53:00 GMT</pubDate>
		</item>
		<item>
			<title>A hacking lexicon</title>
			<description>&lt;blockquote&gt;
&lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;https://media.wired.com/photos/594db1736b76bb7625b89e48/1:1/w_5000,c_limit/hidden_data-01.png&quot; style=&quot;width: 500px; height: 500px;&quot; /&gt;&lt;/p&gt;

&lt;p&gt;Crackers, hackers, phrackers, phreakers, sneakers: Is there a difference? Here&apos;s a primer on hacking nomenclatures to help you keep the bad guys and the good guys straight.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Recently, a debate broke out on TechRepublic over the use of the word &amp;ldquo;hacker&amp;rdquo; in an article describing DDoS attacks (see &lt;a href=&quot;https://www.techrepublic.com/article.jhtml?id=r00520000414law01.htm&quot;&gt;&quot;TechRepublic members say the law needs to punish cyber criminals, not the victims&quot;&lt;/a&gt;). Member Lee McGrevin, a systems administrator, took exception to that article&amp;rsquo;s usage of the term &amp;ldquo;hacker,&amp;rdquo; stating that the correct term for someone who launches a DDoS attack would be &amp;ldquo;cracker.&amp;rdquo;&lt;br /&gt;
&lt;br /&gt;
&amp;ldquo;I am surprised that such a technical-based Web forum...</description>
			<content:encoded>&lt;blockquote&gt;
&lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;https://media.wired.com/photos/594db1736b76bb7625b89e48/1:1/w_5000,c_limit/hidden_data-01.png&quot; style=&quot;width: 500px; height: 500px;&quot; /&gt;&lt;/p&gt;

&lt;p&gt;Crackers, hackers, phrackers, phreakers, sneakers: Is there a difference? Here&apos;s a primer on hacking nomenclatures to help you keep the bad guys and the good guys straight.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Recently, a debate broke out on TechRepublic over the use of the word &amp;ldquo;hacker&amp;rdquo; in an article describing DDoS attacks (see &lt;a href=&quot;https://www.techrepublic.com/article.jhtml?id=r00520000414law01.htm&quot;&gt;&quot;TechRepublic members say the law needs to punish cyber criminals, not the victims&quot;&lt;/a&gt;). Member Lee McGrevin, a systems administrator, took exception to that article&amp;rsquo;s usage of the term &amp;ldquo;hacker,&amp;rdquo; stating that the correct term for someone who launches a DDoS attack would be &amp;ldquo;cracker.&amp;rdquo;&lt;br /&gt;
&lt;br /&gt;
&amp;ldquo;I am surprised that such a technical-based Web forum would stoop low enough to jump on the bandwagon of the hacker witch hunt,&amp;rdquo; McGrevin wrote. &amp;ldquo;Let&amp;rsquo;s get the record straight for those of us who wear the white hat. A hacker is someone with deep knowledge of how systems work, how to optimize them through noncommercial ways, and [how to] improve the overall quality of programs and [deal with] security-related issues.&amp;rdquo;&lt;br /&gt;
&lt;br /&gt;
McGrevin basically felt that calling those who engage in DDoS attacks &amp;ldquo;hackers&amp;rdquo; was demeaning to the hacking community and a hallmark of bad reporting.&lt;br /&gt;
&lt;br /&gt;
We certainly regret mislabeling anyone, although in our defense, we&amp;rsquo;d like it noted that hacking is used generically both in the media and in the IT security field to refer to illegal tampering with systems.&lt;br /&gt;
&lt;br /&gt;
So to make sure no other members out there fall into the same trap we did, let&amp;rsquo;s all take a closer look at this issue.&lt;br /&gt;
&lt;br /&gt;
Depends on whom you ask&lt;br /&gt;
In some ways, the definition of these terms depends upon whom you ask. Take, for example, the following various interpretations of hacking.&lt;br /&gt;
&lt;br /&gt;
The &lt;a href=&quot;http://www.nsa.gov/&quot;&gt;National Security Agency&lt;/a&gt; (NSA) defines hacking simply as the &amp;ldquo;unauthorized use, or attempts to circumvent or bypass the security mechanisms of an information system or network.&amp;rdquo;&lt;br /&gt;
&lt;br /&gt;
By comparison, &lt;a href=&quot;http://www.hackers.com/&quot;&gt;Hackers.com&lt;/a&gt;, an underground domain whose stated purpose is to &amp;ldquo;provide a place for hackers, phone phreaks, and other underground-related people to interact and expand their minds,&amp;rdquo; offers a somewhat more poetic and gracious definition of hacking:&lt;br /&gt;
&lt;br /&gt;
&amp;ldquo;Hacking is the act of penetrating a closed computer system for the knowledge and information that is contained within. Through the study of technology and computers, a hacker can open his mind and expand his knowledge. Hacking is intended to free information and expand minds, not to be destructive nor for material gain. There is always some debate because of how the term &amp;lsquo;hacker&amp;rsquo; has been both glorified and undermined by common media, but most will say that those who destroy data, hack for money, or hack with illegal intent should be referred to as &amp;lsquo;crackers,&amp;rsquo; not hackers.&amp;rdquo;&lt;br /&gt;
&lt;br /&gt;
On the other hand, TechRepublic member Edward Clint, a systems administrator for &lt;a href=&quot;http://www.healthcenter.com/&quot;&gt;HealthCenter Internet Services&lt;/a&gt;, made this important distinction:&lt;br /&gt;
&lt;br /&gt;
&amp;ldquo;No one with a real IT job calls themselves either a hacker or a cracker. &amp;hellip;In the real world, we are Security Experts, System Engineers, Network Admins and Architects, and so forth.&amp;rdquo;&lt;br /&gt;
&lt;br /&gt;
A list of terms&lt;br /&gt;
To help set the record straight, we&amp;rsquo;ve provided a breakdown of terms and their definitions from the &lt;a href=&quot;http://www.sans.org/newlook/resources/glossary.htm&quot;&gt;&quot;NSA Glossary of Terms Used in Security and Intrusion Detection.&quot;&lt;/a&gt; You might also want to visit Information Security Magazine&amp;rsquo;s online descriptions of &lt;a href=&quot;http://www.infosecuritymag.com/articles/july00/features2a.shtml&quot;&gt;&quot;Perpetrator Subtypes.&quot;&lt;/a&gt;&lt;/p&gt;

&lt;center&gt;
&lt;table style=&quot;border:1px solid #cccccc&quot; width=&quot;384&quot;&gt;
 &lt;tbody&gt;
 &lt;tr&gt;
 &lt;td style=&quot;border:1px solid #cccccc; padding:0.05in 0.1in&quot; width=&quot;87&quot;&gt;&amp;nbsp;&lt;/td&gt;
 &lt;td style=&quot;border:none; padding:0in&quot; width=&quot;288&quot;&gt;&amp;nbsp;&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style=&quot;border:1px solid #cccccc&quot; width=&quot;87&quot;&gt;
 &lt;p style=&quot;padding:0.05in 0.1in&quot;&gt;Hacking&lt;/p&gt;
 &lt;/td&gt;
 &lt;td style=&quot;border:1px solid #cccccc&quot; width=&quot;288&quot;&gt;
 &lt;p style=&quot;padding:0.05in 0.1in&quot;&gt;Unauthorized use, or attempts to circumvent or bypass the security mechanisms of an information system or network.&lt;/p&gt;
 &lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style=&quot;border:1px solid #cccccc&quot; width=&quot;87&quot;&gt;
 &lt;p style=&quot;padding:0.05in 0.1in&quot;&gt;Hacker&lt;/p&gt;
 &lt;/td&gt;
 &lt;td style=&quot;border:1px solid #cccccc&quot; width=&quot;288&quot;&gt;
 &lt;p style=&quot;padding:0.05in 0.1in&quot;&gt;A person who enjoys exploring the details of computers and how to stretch their capabilities. A malicious or inquisitive meddler who tries to discover information by poking around. A person who enjoys learning the details of programming systems and how to stretch their capabilities, as opposed to most users who prefer to learn only the minimum necessary.&lt;/p&gt;
 &lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style=&quot;border:1px solid #cccccc&quot; width=&quot;87&quot;&gt;
 &lt;p style=&quot;padding:0.05in 0.1in&quot;&gt;Crack&lt;/p&gt;
 &lt;/td&gt;
 &lt;td style=&quot;border:1px solid #cccccc&quot; width=&quot;288&quot;&gt;
 &lt;p style=&quot;padding:0.05in 0.1in&quot;&gt;A popular hacking tool used to decode encrypted passwords. System administrators also use crack to assess weak passwords by novice users in order to enhance the security of the Automated Information System (AIS).&lt;/p&gt;
 &lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style=&quot;border:1px solid #cccccc&quot; width=&quot;87&quot;&gt;
 &lt;p style=&quot;padding:0.05in 0.1in&quot;&gt;Cracker&lt;/p&gt;
 &lt;/td&gt;
 &lt;td style=&quot;border:1px solid #cccccc&quot; width=&quot;288&quot;&gt;
 &lt;p style=&quot;padding:0.05in 0.1in&quot;&gt;One who breaks security on an AIS. Automated Information System - any equipment of an interconnected system or subsystems of equipment that is used in the automatic acquisition, storage, manipulation, control, display, transmission, or reception of data and includes software, firmware, and hardware.&lt;/p&gt;
 &lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style=&quot;border:1px solid #cccccc&quot; width=&quot;87&quot;&gt;
 &lt;p style=&quot;padding:0.05in 0.1in&quot;&gt;Samurai&lt;/p&gt;
 &lt;/td&gt;
 &lt;td style=&quot;border:1px solid #cccccc&quot; width=&quot;288&quot;&gt;
 &lt;p style=&quot;padding:0.05in 0.1in&quot;&gt;A hacker who hires out for legal cracking jobs, snooping for factions in corporate political fights, lawyers pursuing privacy-rights and First Amendment cases, and other parties with legitimate reasons to need an electronic locksmith.&lt;/p&gt;
 &lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style=&quot;border:1px solid #cccccc&quot; width=&quot;87&quot;&gt;
 &lt;p style=&quot;padding:0.05in 0.1in&quot;&gt;Sneaker&lt;/p&gt;
 &lt;/td&gt;
 &lt;td style=&quot;border:1px solid #cccccc&quot; width=&quot;288&quot;&gt;
 &lt;p style=&quot;padding:0.05in 0.1in&quot;&gt;An individual hired to break in to places in order to test their security; analogous to tiger team.&lt;/p&gt;
 &lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style=&quot;border:1px solid #cccccc&quot; width=&quot;87&quot;&gt;
 &lt;p style=&quot;padding:0.05in 0.1in&quot;&gt;Tiger Team&lt;/p&gt;
 &lt;/td&gt;
 &lt;td style=&quot;border:1px solid #cccccc&quot; width=&quot;288&quot;&gt;
 &lt;p style=&quot;padding:0.05in 0.1in&quot;&gt;Government and industry-sponsored teams of computer experts who attempt to break down the defenses of computer systems in an effort to uncover, and eventually patch, security holes.&lt;/p&gt;
 &lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style=&quot;border:1px solid #cccccc&quot; width=&quot;87&quot;&gt;
 &lt;p style=&quot;padding:0.05in 0.1in&quot;&gt;Ankle-Biter or Script Kiddies&lt;/p&gt;
 &lt;/td&gt;
 &lt;td style=&quot;border:1px solid #cccccc&quot; width=&quot;288&quot;&gt;
 &lt;p style=&quot;padding:0.05in 0.1in&quot;&gt;A person who aspires to be a hacker/cracker but has very limited knowledge or skills related to AIS&apos;s. Usually associated with young teens who collect and use simple malicious programs obtained from the Internet.&lt;/p&gt;
 &lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style=&quot;border:1px solid #cccccc&quot; width=&quot;87&quot;&gt;
 &lt;p style=&quot;padding:0.05in 0.1in&quot;&gt;Phreaking&lt;/p&gt;
 &lt;/td&gt;
 &lt;td style=&quot;border:1px solid #cccccc&quot; width=&quot;288&quot;&gt;
 &lt;p style=&quot;padding:0.05in 0.1in&quot;&gt;The art and science of cracking the phone network.&lt;/p&gt;
 &lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style=&quot;border:1px solid #cccccc&quot; width=&quot;87&quot;&gt;
 &lt;p style=&quot;padding:0.05in 0.1in&quot;&gt;Phreak(er)&lt;/p&gt;
 &lt;/td&gt;
 &lt;td style=&quot;border:1px solid #cccccc&quot; width=&quot;288&quot;&gt;
 &lt;p style=&quot;padding:0.05in 0.1in&quot;&gt;An individual fascinated by the telephone system. Commonly, an individual who uses his knowledge of the telephone system to make calls at the expense of another.&lt;/p&gt;
 &lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style=&quot;border:1px solid #cccccc&quot; width=&quot;87&quot;&gt;
 &lt;p style=&quot;padding:0.05in 0.1in&quot;&gt;Phracker&lt;/p&gt;
 &lt;/td&gt;
 &lt;td style=&quot;border:1px solid #cccccc&quot; width=&quot;288&quot;&gt;
 &lt;p style=&quot;padding:0.05in 0.1in&quot;&gt;An individual who combines phone phreaking with computer hacking.&lt;/p&gt;
 &lt;/td&gt;
 &lt;/tr&gt;
 &lt;/tbody&gt;
&lt;/table&gt;
&lt;/center&gt;

&lt;p style=&quot;margin-bottom:0in&quot;&gt;&amp;nbsp;&lt;/p&gt;

&lt;center&gt;
&lt;table style=&quot;border:1px solid #cccccc&quot; width=&quot;384&quot;&gt;
 &lt;tbody&gt;
 &lt;tr&gt;
 &lt;td style=&quot;border:1px solid #cccccc&quot; width=&quot;81&quot;&gt;
 &lt;p style=&quot;padding:0.05in 0.1in&quot;&gt;Hacking&lt;/p&gt;
 &lt;/td&gt;
 &lt;td style=&quot;border:1px solid #cccccc&quot; width=&quot;281&quot;&gt;
 &lt;p style=&quot;padding:0.05in 0.1in&quot;&gt;Unauthorized use, or attempts to circumvent or bypass the security mechanisms of an information system or network.&lt;/p&gt;
 &lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style=&quot;border:1px solid #cccccc&quot; width=&quot;81&quot;&gt;
 &lt;p style=&quot;padding:0.05in 0.1in&quot;&gt;Hacker&lt;/p&gt;
 &lt;/td&gt;
 &lt;td style=&quot;border:1px solid #cccccc&quot; width=&quot;281&quot;&gt;
 &lt;p style=&quot;padding:0.05in 0.1in&quot;&gt;A person who enjoys exploring the details of computers and how to stretch their capabilities. A malicious or inquisitive meddler who tries to discover information by poking around. A person who enjoys learning the details of programming systems and how to stretch their capabilities, as opposed to most users who prefer to learn only the minimum necessary.&lt;/p&gt;
 &lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style=&quot;border:1px solid #cccccc&quot; width=&quot;81&quot;&gt;
 &lt;p style=&quot;padding:0.05in 0.1in&quot;&gt;Crack&lt;/p&gt;
 &lt;/td&gt;
 &lt;td style=&quot;border:1px solid #cccccc&quot; width=&quot;281&quot;&gt;
 &lt;p style=&quot;padding:0.05in 0.1in&quot;&gt;A popular hacking tool used to decode encrypted passwords. System administrators also use crack to assess weak passwords by novice users in order to enhance the security of the Automated Information System (AIS).&lt;/p&gt;
 &lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style=&quot;border:1px solid #cccccc&quot; width=&quot;81&quot;&gt;
 &lt;p style=&quot;padding:0.05in 0.1in&quot;&gt;Cracker&lt;/p&gt;
 &lt;/td&gt;
 &lt;td style=&quot;border:1px solid #cccccc&quot; width=&quot;281&quot;&gt;
 &lt;p style=&quot;padding:0.05in 0.1in&quot;&gt;One who breaks security on an AIS. Automated Information System - any equipment of an interconnected system or subsystems of equipment that is used in the automatic acquisition, storage, manipulation, control, display, transmission, or reception of data and includes software, firmware, and hardware.&lt;/p&gt;
 &lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style=&quot;border:1px solid #cccccc&quot; width=&quot;81&quot;&gt;
 &lt;p style=&quot;padding:0.05in 0.1in&quot;&gt;Samurai&lt;/p&gt;
 &lt;/td&gt;
 &lt;td style=&quot;border:1px solid #cccccc&quot; width=&quot;281&quot;&gt;
 &lt;p style=&quot;padding:0.05in 0.1in&quot;&gt;A hacker who hires out for legal cracking jobs, snooping for factions in corporate political fights, lawyers pursuing privacy-rights and First Amendment cases, and other parties with legitimate reasons to need an electronic locksmith.&lt;/p&gt;
 &lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style=&quot;border:1px solid #cccccc&quot; width=&quot;81&quot;&gt;
 &lt;p style=&quot;padding:0.05in 0.1in&quot;&gt;Sneaker&lt;/p&gt;
 &lt;/td&gt;
 &lt;td style=&quot;border:1px solid #cccccc&quot; width=&quot;281&quot;&gt;
 &lt;p style=&quot;padding:0.05in 0.1in&quot;&gt;An individual hired to break in to places in order to test their security; analogous to tiger team.&lt;/p&gt;
 &lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style=&quot;border:1px solid #cccccc&quot; width=&quot;81&quot;&gt;
 &lt;p style=&quot;padding:0.05in 0.1in&quot;&gt;Tiger Team&lt;/p&gt;
 &lt;/td&gt;
 &lt;td style=&quot;border:1px solid #cccccc&quot; width=&quot;281&quot;&gt;
 &lt;p style=&quot;padding:0.05in 0.1in&quot;&gt;Government and industry-sponsored teams of computer experts who attempt to break down the defenses of computer systems in an effort to uncover, and eventually patch, security holes.&lt;/p&gt;
 &lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style=&quot;border:1px solid #cccccc&quot; width=&quot;81&quot;&gt;
 &lt;p style=&quot;padding:0.05in 0.1in&quot;&gt;Ankle-Biter or Script Kiddies&lt;/p&gt;
 &lt;/td&gt;
 &lt;td style=&quot;border:1px solid #cccccc&quot; width=&quot;281&quot;&gt;
 &lt;p style=&quot;padding:0.05in 0.1in&quot;&gt;A person who aspires to be a hacker/cracker but has very limited knowledge or skills related to AIS&apos;s. Usually associated with young teens who collect and use simple malicious programs obtained from the Internet.&lt;/p&gt;
 &lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style=&quot;border:1px solid #cccccc&quot; width=&quot;81&quot;&gt;
 &lt;p style=&quot;padding:0.05in 0.1in&quot;&gt;Phreaking&lt;/p&gt;
 &lt;/td&gt;
 &lt;td style=&quot;border:1px solid #cccccc&quot; width=&quot;281&quot;&gt;
 &lt;p style=&quot;padding:0.05in 0.1in&quot;&gt;The art and science of cracking the phone network.&lt;/p&gt;
 &lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style=&quot;border:1px solid #cccccc&quot; width=&quot;81&quot;&gt;
 &lt;p style=&quot;padding:0.05in 0.1in&quot;&gt;Phreak(er)&lt;/p&gt;
 &lt;/td&gt;
 &lt;td style=&quot;border:1px solid #cccccc&quot; width=&quot;281&quot;&gt;
 &lt;p style=&quot;padding:0.05in 0.1in&quot;&gt;An individual fascinated by the telephone system. Commonly, an individual who uses his knowledge of the telephone system to make calls at the expense of another.&lt;/p&gt;
 &lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style=&quot;border:1px solid #cccccc&quot; width=&quot;81&quot;&gt;
 &lt;p style=&quot;padding:0.05in 0.1in&quot;&gt;Phracker&lt;/p&gt;
 &lt;/td&gt;
 &lt;td style=&quot;border:1px solid #cccccc&quot; width=&quot;281&quot;&gt;
 &lt;p style=&quot;padding:0.05in 0.1in&quot;&gt;An individual who combines phone phreaking with computer hacking.&lt;/p&gt;
 &lt;/td&gt;
 &lt;/tr&gt;
 &lt;/tbody&gt;
&lt;/table&gt;
&lt;/center&gt;

&lt;p&gt;We&amp;rsquo;d like to know: What&amp;rsquo;s your take on this whole hacker/cracker debate? Is there an important distinction between all of these terms, or is it mere semantics? Post your comments below.&lt;/p&gt;</content:encoded>
			<link>https://dombnexen.do.am/blog/a_hacking_lexicon/2018-05-03-17</link>
			<category>Other</category>
			<dc:creator>dombnexen</dc:creator>
			<guid>https://dombnexen.do.am/blog/a_hacking_lexicon/2018-05-03-17</guid>
			<pubDate>Thu, 03 May 2018 18:12:31 GMT</pubDate>
		</item>
		<item>
			<title>7 Types Of Hackers You Should Know About</title>
			<description>&lt;blockquote&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://darkinfotech.files.wordpress.com/2018/03/hats.png&quot; style=&quot;width: 525px; height: 296px;&quot; /&gt;&lt;/p&gt;

&lt;p style=&quot;text-align: center;&quot;&gt;In our last blog post, we talked about some of our security services and how thoroughly we can test your business for Cyber weaknesses. One of the terms we used in that was &amp;lsquo;White Hat Hacker&amp;rsquo;, to describe ourselves. Now it might seem odd to refer to a high level Cyber security company as &amp;lsquo;hackers&amp;rsquo; but in reality, that&amp;rsquo;s exactly what we do in order to provide you with the best service possible. You see, &amp;lsquo;White Hat hackers&amp;rsquo; are just one type of hacker out there and they are the only ones who aren&amp;rsquo;t dangerous to your business. To illustrate, here&amp;rsquo;s what each type of hacker &amp;lsquo;Hat&amp;rsquo; does:&lt;/p&gt;

&lt;h3 style=&quot;text-align: center;&quot;&gt;Script Kiddie&lt;/h3&gt;

&lt;p style=&quot;text-align: center;&quot;&gt;Script Kiddies don&amp;rsquo;t really care about hacking into sys...</description>
			<content:encoded>&lt;blockquote&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://darkinfotech.files.wordpress.com/2018/03/hats.png&quot; style=&quot;width: 525px; height: 296px;&quot; /&gt;&lt;/p&gt;

&lt;p style=&quot;text-align: center;&quot;&gt;In our last blog post, we talked about some of our security services and how thoroughly we can test your business for Cyber weaknesses. One of the terms we used in that was &amp;lsquo;White Hat Hacker&amp;rsquo;, to describe ourselves. Now it might seem odd to refer to a high level Cyber security company as &amp;lsquo;hackers&amp;rsquo; but in reality, that&amp;rsquo;s exactly what we do in order to provide you with the best service possible. You see, &amp;lsquo;White Hat hackers&amp;rsquo; are just one type of hacker out there and they are the only ones who aren&amp;rsquo;t dangerous to your business. To illustrate, here&amp;rsquo;s what each type of hacker &amp;lsquo;Hat&amp;rsquo; does:&lt;/p&gt;

&lt;h3 style=&quot;text-align: center;&quot;&gt;Script Kiddie&lt;/h3&gt;

&lt;p style=&quot;text-align: center;&quot;&gt;Script Kiddies don&amp;rsquo;t really care about hacking into systems and stealing things. They simply copy code and use it for a virus, SQLi or something else. Script Kiddies will never hack for themselves, they will just download some overused software (such as LOIC or Metasploit) and watch a YouTube video on how to use it. A very common Script Kiddie attack would be a DOS (Denial of Service) or DDOS (Distributed Denial of Service), where they flood an IP with so much useless information that it collapses, preventing other people from using it.&lt;/p&gt;

&lt;h3 style=&quot;text-align: center;&quot;&gt;White Hat&lt;/h3&gt;

&lt;p style=&quot;text-align: center;&quot;&gt;White Hat hackers are also known as ethical hackers, and they&amp;rsquo;re the good guys of the hacker world. They help you remove viruses, perform pen tests and generally help people understand where their vulnerabilities are and fix them. Most White Hat hackers will hold some form of computer or security related qualification, and often pursue careers in hacking and Cyber security. They love the challenge of finding the holes but have no interest in doing anything with them. There are even a number of qualifications specifically for them &amp;ndash; Offensive Security Certified Professional (&lt;a href=&quot;https://www.offensive-security.com/information-security-certifications/oscp-offensive-security-certified-professional/&quot;&gt;OSCP&lt;/a&gt;), CREST Certified Infrastructure Tester and CREST Certified Application Security Tester.&lt;/p&gt;

&lt;h3 style=&quot;text-align: center;&quot;&gt;Black Hat&lt;/h3&gt;

&lt;p style=&quot;text-align: center;&quot;&gt;Black Hat hackers, or &amp;lsquo;crackers&amp;rsquo; are the types of people you often hear about on the news and from businesses trying to sell cyber services. They find banks and big companies with weak security systems and steal credit card information, confidential data or money. Their methods are varied but actually fairly basic most of the time.&lt;/p&gt;

&lt;h3 style=&quot;text-align: center;&quot;&gt;Grey Hat&lt;/h3&gt;

&lt;p style=&quot;text-align: center;&quot;&gt;As with everything in this world, nothing is just black and white. Grey Hat hackers don&amp;rsquo;t steal information or money like Black Hat hackers (though they may sometimes deface a website for fun), nor do they help people out like white hack hackers. Instead, they spend most of their time just playing around with systems, without doing anything harmful. This type of hacker actually makes up most of the hacking community, even though Black hat hackers garner most of the media&amp;rsquo;s attention.&lt;/p&gt;

&lt;h3 style=&quot;text-align: center;&quot;&gt;Green Hat&lt;/h3&gt;

&lt;p style=&quot;text-align: center;&quot;&gt;Green Hat hackers are the babies of the hacker world. They are new to the game and mainly use script, like Script Kiddies, but they have aspirations of becoming full blown hackers. They are often found asking questions of fellow hackers and listening with childlike curiosity.&lt;/p&gt;

&lt;h3 style=&quot;text-align: center;&quot;&gt;Red Hat&lt;/h3&gt;

&lt;p style=&quot;text-align: center;&quot;&gt;Red Hat hackers are the vigilantes of the hacker world. They&amp;rsquo;re like white hats in the sense that they put a stop to Black hat attacks, but they are downright scary in how they do it. Instead of reporting the malicious hacker they find lurking inside a business, they shut them down by uploading viruses, DoSing and accessing their computer to destroy it form the inside out. Red hats use many different aggressive methods to force the cracker out and potentially even kill their computer. The good news is, businesses don&amp;rsquo;t need to worry about these.&lt;/p&gt;

&lt;h3 style=&quot;text-align: center;&quot;&gt;Blue Hat&lt;/h3&gt;

&lt;p style=&quot;text-align: center;&quot;&gt;And finally, we have the Blue Hat hackers. If a Script Kiddie ever took revenge, he would become a Blue Hat Hacker. Blue Hat hackers will seek vengeance on anyone who has made them angry. Most Blue Hat hackers are fairly new to the hacking world, but unlike green hats they have no desire to learn.&lt;/p&gt;

&lt;p style=&quot;text-align: center;&quot;&gt;&amp;nbsp;&lt;/p&gt;

&lt;p style=&quot;text-align: center;&quot;&gt;So hopefully that clears a few things up, and gives you a bit of an insight into the world of hacking in all of its color.&lt;/p&gt;

&lt;p style=&quot;text-align: center;&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;/blockquote&gt;</content:encoded>
			<link>https://dombnexen.do.am/blog/7_types_of_hackers_you_should_know_about/2018-05-03-16</link>
			<category>Other</category>
			<dc:creator>dombnexen</dc:creator>
			<guid>https://dombnexen.do.am/blog/7_types_of_hackers_you_should_know_about/2018-05-03-16</guid>
			<pubDate>Thu, 03 May 2018 18:01:37 GMT</pubDate>
		</item>
	</channel>
</rss>