: Monetizing massive networks of compromised computers for illicit advertising or DDoS attacks. The Legacy of the Zip File

: The idea that hackers should be judged by their technical prowess, not their credentials. From Curiosity to Commerce: The Great Shift

: Encrypting vital data and demanding payment for its release.