: Monetizing massive networks of compromised computers for illicit advertising or DDoS attacks. The Legacy of the Zip File
: The idea that hackers should be judged by their technical prowess, not their credentials. From Curiosity to Commerce: The Great Shift
: Encrypting vital data and demanding payment for its release.