{"id":3537,"date":"2022-02-27T13:30:03","date_gmt":"2022-02-27T12:30:03","guid":{"rendered":"https:\/\/sajberinfo.com\/2022\/11\/21\/text-78\/"},"modified":"2024-02-04T21:59:57","modified_gmt":"2024-02-04T20:59:57","slug":"hakeri-eticki-hakeri-epizoda-2","status":"publish","type":"post","link":"https:\/\/sajberinfo.com\/en\/2022\/02\/27\/hakeri-eticki-hakeri-epizoda-2\/","title":{"rendered":"Hakeri: Eti\u010dki hakeri (Epizoda 2)"},"content":{"rendered":"<div id=\"attachment_3705\" style=\"width: 1034px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-3705\" class=\"size-full wp-image-3705\" src=\"https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/02\/hackers-e2-copy.jpg\" alt=\"ethical hackers or white hats\" width=\"1024\" height=\"561\" srcset=\"https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/02\/hackers-e2-copy.jpg 1024w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/02\/hackers-e2-copy-300x164.jpg 300w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/02\/hackers-e2-copy-768x421.jpg 768w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/02\/hackers-e2-copy-18x10.jpg 18w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><p id=\"caption-attachment-3705\" class=\"wp-caption-text\">Bijeli \u0161e\u0161ir; Design by Sa\u0161a \u0110uri\u0107<\/p><\/div>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\">T<\/span><\/span><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\">ermin eti\u010dko hakovanje prvi put se pojavljuje oko 1995. godine, a predstavlja klju\u010dni koncept u <a href=\"https:\/\/sajberinfo.com\/en\/2018\/12\/23\/sajber-bezbjednost\/\" target=\"_blank\" rel=\"noopener\">sajber bezbjednosti<\/a> i podrazumijeva zakonite ili ovla\u0161tene napade na ra\u010dunare, ra\u010dunarske mre\u017ee, hardver i softver. Na ovaj na\u010din, po\u0161tuju\u0107i zakonske norme, dolazi do spre\u010davanja zlonamjernih hakerskih napada. Trend porasta sajber napada i kra\u0111e podataka, zabrinjava mnoge poslovne organizacije, pa zbog toga raste potreba za eti\u010dkim hakerima koji mogu pove\u0107ati stepen za\u0161tite istih.<\/span><\/span><\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_82_2 counter-hierarchy ez-toc-counter ez-toc-custom ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Sadr\u017eaj<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #ffffff;color:#ffffff\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewbox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #ffffff;color:#ffffff\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewbox=\"0 0 24 24\" version=\"1.2\" baseprofile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/sajberinfo.com\/en\/2022\/02\/27\/hakeri-eticki-hakeri-epizoda-2\/#BIJELI_SESIRI\" >BIJELI \u0160E\u0160IRI<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/sajberinfo.com\/en\/2022\/02\/27\/hakeri-eticki-hakeri-epizoda-2\/#Poznavanje_racunara_i_racunarskih_mreza\" >Poznavanje ra\u010dunara i ra\u010dunarskih mre\u017ea<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/sajberinfo.com\/en\/2022\/02\/27\/hakeri-eticki-hakeri-epizoda-2\/#Poznavanje_operativnih_sistema\" >Poznavanje operativnih sistema<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/sajberinfo.com\/en\/2022\/02\/27\/hakeri-eticki-hakeri-epizoda-2\/#Spretnost_u_koristenju_metodologije_penetracijskog_testiranja_i_alata\" >Spretnost u kori\u0161tenju metodologije penetracijskog testiranja i alata<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/sajberinfo.com\/en\/2022\/02\/27\/hakeri-eticki-hakeri-epizoda-2\/#Dobro_poznavanje_programiranja\" >Dobro poznavanje programiranja<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/sajberinfo.com\/en\/2022\/02\/27\/hakeri-eticki-hakeri-epizoda-2\/#Dobro_poznavanje_osnova_sajber_bezbjednosti\" >Dobro poznavanje osnova sajber bezbjednosti<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/sajberinfo.com\/en\/2022\/02\/27\/hakeri-eticki-hakeri-epizoda-2\/#Vjestine_kriptografije\" >Vje\u0161tine kriptografije<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/sajberinfo.com\/en\/2022\/02\/27\/hakeri-eticki-hakeri-epizoda-2\/#Vjestine_rjesavanja_problema\" >Vje\u0161tine rje\u0161avanja problema<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/sajberinfo.com\/en\/2022\/02\/27\/hakeri-eticki-hakeri-epizoda-2\/#POZNATI\" >POZNATI<\/a><\/li><\/ul><\/nav><\/div>\n\n<h2><span class=\"ez-toc-section\" id=\"BIJELI_SESIRI\"><\/span><strong><span style=\"font-size: 14pt;\">BIJELI \u0160E\u0160IRI<\/span><\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\">Eti\u010dki hakeri (eng. <em>ethical hackers<\/em>) ili Bijeli \u0161e\u0161iri (eng. <em>white hats<\/em>)<b> <\/b>koriste svoje vje\u0161tine za otkrivanje sigurnosnih propusta u sajber okru\u017eenju i poma\u017ee u njihovom ispravljanju. Za ovim tipom osoba postoji velika potra\u017enja od strane organizacija koje se bave osjetljivim poslovima i podacima, posebno dr\u017eavnih agencija koje se bave dr\u017eavnom bezbjedno\u0161\u0107u. Osobe ovog profila obi\u010dno zavr\u0161e u sigurnosnim timovima organizacije bave\u0107i se njenom sajber bezbjedno\u0161\u0107u, odnosno rade kao slobodnjaci obavljaju\u0107i konsultantske usluge ili u\u010destvuju u nagradim programima za otkrivanje propusta (eng.\u00a0 <em>bug bounty<\/em>). Njihov na\u010din razmi\u0161ljanja je skoro identi\u010dan na\u010dinu na koji napada\u010di na organizacije razmi\u0161ljaju, uz razliku \u0161to oni po dobijanju pristupa ne vr\u0161e zlonamjerne radnje i ne izazivaju haos. Da bi neko postao eti\u010dki haker treba da izbrusi svoje znanje i usavr\u0161i svoje vje\u0161tine u pravcu eti\u010dkog hakovanja \u0161to obuhvata \u010ditav skup vje\u0161tina, ali najva\u017enije je da ima visoke moralne standarde. Visoki moralni standardi su jedino \u0161to pravi razliku izme\u0111u eti\u010dkih hakera i napada\u010da. Da bi neko napravio karijeru kako eti\u010dki haker, mora imati vje\u0161tine navedene ispod:<\/span><\/span><\/p>\n<p>&nbsp;<\/p>\n<h3 class=\"MsoNormal\" style=\"text-align: left;\"><span class=\"ez-toc-section\" id=\"Poznavanje_racunara_i_racunarskih_mreza\"><\/span><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\"><strong>Poznavanje ra\u010dunara i ra\u010dunarskih mre\u017ea<\/strong><\/span><\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\">Odli\u010dno poznavanje ra\u010dunara i ra\u010dunarskih mre\u017ea je osnovni zahtjev za svakog ambicioznog hakera. Pronala\u017eenje ranjivosti u ra\u010dunarskim sistemima i ra\u010dunarskim mre\u017eama radi njihovog iskori\u0161tavanja je klju\u010d za otkrivanje potencijalnih prijetnji. <\/span><\/span><\/p>\n<p>&nbsp;<\/p>\n<h3 class=\"MsoNormal\" style=\"text-align: left;\"><span class=\"ez-toc-section\" id=\"Poznavanje_operativnih_sistema\"><\/span><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\"><strong>Poznavanje operativnih sistema<\/strong><\/span><\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\">Poznavanje operativnih sistema je jo\u0161 jedna klju\u010dna stvar. Potrebno je dobro poznavati kako funkcioni\u0161u <em>Windows, macOS, Linux, Android, iOS<\/em> kako bi se znalo gdje tra\u017eiti ranjivosti i kako ih iskoristiti.<\/span><\/span><\/p>\n<div id=\"attachment_3706\" style=\"width: 1034px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-3706\" class=\"size-full wp-image-3706\" src=\"https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/02\/OS-copy.jpg\" alt=\"operating system\" width=\"1024\" height=\"704\" srcset=\"https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/02\/OS-copy.jpg 1024w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/02\/OS-copy-300x206.jpg 300w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/02\/OS-copy-768x528.jpg 768w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/02\/OS-copy-18x12.jpg 18w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><p id=\"caption-attachment-3706\" class=\"wp-caption-text\">Operativni sistemi; Design by Sa\u0161a \u0110uri\u0107<\/p><\/div>\n<h3 class=\"MsoNormal\" style=\"text-align: left;\"><span class=\"ez-toc-section\" id=\"Spretnost_u_koristenju_metodologije_penetracijskog_testiranja_i_alata\"><\/span><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\"><strong>Spretnost u kori\u0161tenju metodologije penetracijskog testiranja i alata<\/strong><\/span><\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\">Potrebno je dobro poznavanje alata i tehnika za penetracijsko testiranje, ali i imati prakti\u010dnog iskustva u tome. Treba znati kako izvr\u0161iti penetracijsko testiranje da se prona\u0111u ranjivosti, a da se ne napravi \u0161teta organizaciji koja se testira.<\/span><\/span><\/p>\n<p>&nbsp;<\/p>\n<h3 class=\"MsoNormal\" style=\"text-align: left;\"><span class=\"ez-toc-section\" id=\"Dobro_poznavanje_programiranja\"><\/span><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\"><strong>Dobro poznavanje programiranja<\/strong><\/span><\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\">Dobro poznavanje programskih jezika kao \u0161to su <em>Python, BASH i C++\/C, Java, Perl<\/em> omogu\u0107ava uspje\u0161no \u010ditanje i analiziranje programskog k\u00f4da, a samim tim olak\u0161ava identifikaciju zlonamjernog softvera i pronala\u017eenje ranjivosti u programskom k\u00f4du.<\/span><\/span><\/p>\n<p>&nbsp;<\/p>\n<h3 class=\"MsoNormal\" style=\"text-align: left;\"><span class=\"ez-toc-section\" id=\"Dobro_poznavanje_osnova_sajber_bezbjednosti\"><\/span><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\"><strong>Dobro poznavanje osnova sajber bezbjednosti<\/strong><\/span><\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\">Poznavanje osnovnih vrijednosti sajber bezbjednosti je veoma va\u017ena vje\u0161tina za nekoga ko ho\u0107e da postane eti\u010dki hakeri. Da bi neko postao dobar profesionalac mora da zna osnovne stvari funkcionisanja sajber bezbjednosti kao \u0161to su: antivirusna za\u0161tita, za\u0161tita ure\u0111aja i baza podataka, upravljanje sistemima i lozinkama i sli\u010dno.<\/span><\/span><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\">\u00a0<\/span><\/span><\/p>\n<p>&nbsp;<\/p>\n<h3 class=\"MsoNormal\" style=\"text-align: left;\"><span class=\"ez-toc-section\" id=\"Vjestine_kriptografije\"><\/span><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\"><strong>Vje\u0161tine kriptografije<\/strong><\/span><\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\">Nije dovoljno smo izvr\u0161iti analizu stanja i opisati uo\u010dene prednosti i nedostatke. Potrebno je osigurati da dobijeni rezultati ne zavr\u0161e u pogre\u0161nim rukama. Zato je za\u00a0 eti\u010dkog hakera va\u017eno da ima kriptografske vje\u0161tine, kako bi mogao osigurati da komunikacija izme\u0111u razli\u010ditih ljudi unutar organizacije bude bez ugro\u017eavanja povjerljivosti i privatnosti. <\/span><\/span><\/p>\n<p>&nbsp;<\/p>\n<h3 class=\"MsoNormal\" style=\"text-align: left;\"><span class=\"ez-toc-section\" id=\"Vjestine_rjesavanja_problema\"><\/span><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\"><strong>Vje\u0161tine rje\u0161avanja problema<\/strong><\/span><\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\">Za kraj mo\u017eda i najva\u017enija i najkompleksnija vje\u0161tina. Sajber prostor je pun izazova sa stalnim napredovanjem tehnologije, \u0161to zna\u010di da i napadi postaju kompleksniji. Zbog toga je potrebno da osoba koja se odlu\u010di da postane eti\u010dki haker ima dobre analiti\u010dki i kriti\u010dke vje\u0161tine rezonovanja kako bi bila kompetentna da odgovori na sve izazovnije okru\u017eenje. Uz to mora imati dobre komunikacijske vje\u0161tine, jer posao podrazumijeva kretanje izme\u0111u razli\u010ditih odjeljenja u organizaciji gdje se mora osigurati da ona budu bezbjedna, a samim tim i organizacija. Pored toga, mora se stalno pratiti aktuelna situacija kroz pra\u0107enje industrijskih trendova i uvijek tragati za informacijama o otkrivenim ranjivostima i napadima na korisnike.<\/span><\/span><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\">\u00a0<\/span><\/span><\/p>\n<div id=\"attachment_3707\" style=\"width: 1034px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-3707\" class=\"size-full wp-image-3707\" src=\"https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/02\/wp7219485-computer-hacker-wallpapers-copy.jpg\" alt=\"Protected system\" width=\"1024\" height=\"653\" srcset=\"https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/02\/wp7219485-computer-hacker-wallpapers-copy.jpg 1024w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/02\/wp7219485-computer-hacker-wallpapers-copy-300x191.jpg 300w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/02\/wp7219485-computer-hacker-wallpapers-copy-768x490.jpg 768w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/02\/wp7219485-computer-hacker-wallpapers-copy-18x12.jpg 18w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><p id=\"caption-attachment-3707\" class=\"wp-caption-text\">Za\u0161ti\u0107en sistem; Source: <a href=\"https:\/\/wallpapercave.com\/w\/wp7219485\" target=\"_blank\" rel=\"noopener\"><em>Wallpapercave<\/em><\/a><\/p><\/div>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\">Prije nego \u0161to se neko odlu\u010di da postane eti\u010dki haker mora da bude siguran da je za to zainteresovan. Slijede\u0107i korak je sticanje znanja kroz programe certifikacije koji obuhvataju vje\u0161tine navedene iznad, a posjedovanje certifikata je klju\u010dno za dobijanje posla u industriji sajber bezbjednosti. Nakon svega mo\u017eemo re\u0107i da su eti\u010dki hakeri ovla\u0161teni hakeri da koriste svoje vje\u0161tine i znanje za \u010duvanje odre\u0111enog resursa od napada\u010da. Ova grupa ljudi preuzima odgovornost i za softver i hardver organizacije u kojoj rade, pa \u010dak su nekada odgovorni i za edukaciju korisnika unutar organizacije. Imaju obavezu da naprave izvje\u0161taj o svim otkri\u0107ima vezanim za bezbjednost organizacije i da po\u0161tuju zakon i pravila organizacije u kojoj ili za koju rade.<\/span><\/span><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\">\u00a0<\/span><\/span><\/p>\n<p>&nbsp;<\/p>\n<h2 class=\"MsoNormal\" style=\"text-align: left;\"><span class=\"ez-toc-section\" id=\"POZNATI\"><\/span><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\"><strong>POZNATI<\/strong><\/span><\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\">Neki od najpoznatijih Bijelih \u0161e\u0161ira su:<\/span><\/span><\/p>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\"><strong>Stiv Voznijak<\/strong> (<em>Stephen Wozniak<\/em>) poznat po tome \u0161to je sa Stiv D\u017eobsom (<em>Steven Jobs<\/em>) osnovao kompaniju <em>Apple Computer<\/em>. Po\u010deo je prave\u0107i i prodaju\u0107i ilegalne \u201c<em>plave kutije<\/em>\u201d koje su omogu\u0107avale besplatno zvanje udaljenih telefonskih korisnika. Najpoznatiji je po dizajnu <em>Apple I <\/em>i <em>Apple II <\/em>prototipa ra\u010dunara prakti\u010dno bez i\u010dije pomo\u0107i.<\/span><\/span><\/p>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\"><strong>Tim Berners-Li<\/strong> (<em>Tim Berners-Lee<\/em>) je poznat kao \u010dovjek koji je izmislio <em>web<\/em> \u2013 sistem svjetske mre\u017ee me\u0111usobno povezanih hajpertekstualnih dokumenata koji se nalaze na Internetu. Na koled\u017eu je uhva\u0107en prilikom hakovanja i dobio je zabranu kori\u0161tenja ra\u010dunara. Nakon toga je od starog televizora koji je kupio iz radionice za popravku uspio da napravi ra\u010dunar. Najve\u0107i uspjeh posti\u017ee za vrijeme svog rada u \u017denevi, kada shvata da se hajpertekst mo\u017ee sjediniti sa Internetom. Izjavio je: \u201c<em>Samo sam trebao da uzmem ideju hajperteksta i pove\u017eem sa TCP-om\u00a0 i DNS-om i gotovo: World Wide Web<\/em>.\u201d<\/span><\/span><\/p>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\"><strong>Linus Torvalds<\/strong> (<em>Linus Benedict Torvalds<\/em>) otac operativnog sistema <em>Linux<\/em>. Po\u010deo je sa <em>Commodore VIC-20<\/em>, 8-bitnim ku\u0107nim ra\u010dunarom. Posle je koristio <em>Sinclair QL<\/em> koji je dosta modifikovao tokom kori\u0161tenja, posebno operativni sistem. Inspirisan sa <em>Minix<\/em> operativnim sistemom 1991. stvara jezgro <em>Linux<\/em> operativnog sistema. Danas, samo oko 2% trenutnog <em>Linux<\/em> jezgra je k\u00f4d napisan od strane\u00a0 Torvaldsa. Uspjeh njegove inovacije je ozna\u010den kao jedan od istaknutih primjera softvera otvorenog k\u00f4da.<\/span><\/span><\/p>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\"><strong>Tsutomu Shimomura<\/strong> (<em>\u4e0b\u6751 \u52aa, Shimomura Tsutomu<\/em>) je stekao slavu na pomalo neslavan na\u010din \u2013 bio je \u017ertva hakovanja od strane zloglasnog hakera Kevina Mitnika. Shimomura je uspio uz pomo\u0107 posebne antene za telefonski spektar frekvencija spojene na laptop i podr\u0161ke tehni\u010dara telefonske kompanije da odredi lokaciju na kojoj se nalazi Mitnik. FBI ga je uhapsio odmah po dobijanju ove informacije od Shimomure.<\/span><\/span><\/p>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 50%; text-align: center;\">\n<p><div id=\"attachment_3698\" style=\"width: 310px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/sajberinfo.com\/en\/2022\/02\/20\/hakeri-upoznavanje-epizoda-1\/\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-3698\" class=\"wp-image-3698 size-medium\" src=\"https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/02\/hackers-copy-300x164.jpg\" alt=\"Types of hackers\" width=\"300\" height=\"164\" srcset=\"https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/02\/hackers-copy-300x164.jpg 300w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/02\/hackers-copy-768x421.jpg 768w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/02\/hackers-copy-18x10.jpg 18w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/02\/hackers-copy.jpg 1024w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><p id=\"caption-attachment-3698\" class=\"wp-caption-text\">HAKERI: Upoznavanje (Epizoda 1)<\/p><\/div><\/td>\n<td style=\"width: 50%; text-align: center;\">\n<p><div id=\"attachment_3710\" style=\"width: 310px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/sajberinfo.com\/en\/2022\/03\/19\/hakeri-crni-sesiri-epizoda-3\/\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-3710\" class=\"wp-image-3710 size-medium\" src=\"https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/11\/black-hat-copy-300x164.jpg\" alt=\"Black hat\" width=\"300\" height=\"164\" srcset=\"https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/11\/black-hat-copy-300x164.jpg 300w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/11\/black-hat-copy-768x421.jpg 768w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/11\/black-hat-copy-18x10.jpg 18w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/11\/black-hat-copy.jpg 1024w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><p id=\"caption-attachment-3710\" class=\"wp-caption-text\">Hakeri: Crni \u0161e\u0161iri (Epizoda 3)<\/p><\/div><\/td>\n<\/tr>\n<\/tbody>\n<\/table>","protected":false},"excerpt":{"rendered":"<p>Termin eti\u010dko hakovanje prvi put se pojavljuje oko 1995. godine, a predstavlja klju\u010dni koncept u sajber bezbjednosti i podrazumijeva zakonite ili ovla\u0161tene napade na ra\u010dunare, ra\u010dunarske mre\u017ee, hardver i softver. Na ovaj na\u010din, po\u0161tuju\u0107i&#46;&#46;&#46;<\/p>","protected":false},"author":1,"featured_media":3705,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[179,178,141,54,177],"class_list":["post-3537","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-info","tag-ethical-hackers","tag-hacker","tag-linux","tag-sajber-bezbjednost","tag-white-hats"],"_links":{"self":[{"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/posts\/3537","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/comments?post=3537"}],"version-history":[{"count":0,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/posts\/3537\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/media\/3705"}],"wp:attachment":[{"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/media?parent=3537"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/categories?post=3537"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/tags?post=3537"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}