Topics: Black hat, Hacker, Grey hat, Youth detention center / Pages: 2 (377 words) / Published: Feb 24th, 2014
White Hat Hackers- These are Hackers that try to break into systems in order to help a company/corporation find the weaknesses in their system. They have no malicious intent and they are used to deter black hat hackers.

Black Hat Hackers- Hackers with malicious intent that try to hack into corporation websites, people’s personal info, and whatever other helpful info they can get ahold of that will benefit them financially.
Gray Hat Hackers- These are hackers that do it just for the sport of it. They typically don’t have any malicious intent behind their hacking but only want to see if they can do it as a challenge.

For the past 9 years I have been working in the pharmaceutical manufacturing field producing drugs in a GMP environment. Currently, I work for a company that produces cancer drugs. The majority of my work duties are performed in a sterile environment under a class 100 hood. Over the course of my work experience in the pharmaceutical field I have been exposed to various high grade equipment, job duties, procedures, and validation teams that would make me a perfect candidate for your opening.

As you can see from my resume, I have an extensive background in the manufacturing field. I would love the challenge of breaking into the bio manufacturing field because I know that it has a very strong future and is very important to the development of our society. With the experience I have gained over the years I am confident I could perform at consistently high levels for your company.

Jonathan James was the first black hat hacker juvenile at the age of 16 to be sentenced to serve time in a juvenile detention center. He broke successfully hacked into NASA and the Department of Defense and had access to highly confidential information. While he didn’t steal anything he did cause tens of thousands of dollars in damage repairing systems. After his release he was later tied to a ring of hackers that were involved in a credit card scam that stole

You May Also Find These Documents Helpful

  • Hackers
  • Hacker
  • Hackers
  • Hacking and Hacker
  • Ethical Hacker
  • Anonymous hackers
  • Hacker and Dreifus
  • Computer Software and Hacker
  • The Need for Ethical Hackers
  • Hackers Angels and Outlaws