The typical profile given for a hacker is a young male, typically a loner, somewhat deviant, and who has poor social skills. But that is only a start and does not tell the whole story. Some are the self-styled mavericks, some are white collar professionals, and some are con men and scammers. So their motives vary.
According to taxonomists such as Marcus Rogers, there are at least 8 types of computer criminals. They are:
1. Novices - They rely on rootkits, they have little actual computer knowledge, they may be looking for media exposure, and they may cause extensive damage because they don't know what they are doing.
2. Cyber-punks - They typically understand the systems they are hacking and can write code. They are likely to be involved in fraud, and they typically want bragging rights.
3. Company insiders, type A - These are company insiders. They may be disgruntled employees of IT jobs who use their privileges to help them in their criminal endeavors.
4. Company insiders, type B - They are petty thieves who work in an IT capacity and are computer literate. They may be opportunistic and motivated by greed, and they may have a drug habit or gambling debts.
5. Coders - They mentor the newbies, write tools that others use, and are motivated by power and prestige. They tend to have hidden agendas and use Trojan horses.
6. Old guard hackers - They seem to have no real criminal intent, but little respect for the property of others either. Their main motivation is intellectual.
7. Professional criminals - They are likely to specialize in corporate espionage, and usually are available for hire by others. They have access to sophisticated equipment. They are also highly motivated and skilled.
8. Cyber-terrorists - A good number of these are from Europe where they may have been a part of intelligence agencies. Their motivations are mainly political in nature though they may engage in criminal activities for income. They use hacking as a form of political activism.
Profile it.
Her profile is a beautiful one. The profile of the criminal helped the police catch him. The psychologist can profile people based on their behavior.
Computer Profiles are usually termed as being everything associated with a user. In windows, you can make a new user to make a new profile. In firefox, you can setup your browsing preferences with a profile.Or you could be talking about making a criminal profile on a specific person on your computer. There are several sites you can search to collect data.But since "profile" is a common term, there is no specific answer unless we know more about what type of profile you mean.
Criminal profiling doesn't help the criminal. It is used as a tool by law enforcement and detectives to narrow the field of suspects. Profiling is also helpful when interrigating a suspect, asking the right questions helps in getting the right answers.
Computer HiJack is the crime where the criminal takes over your computer and you are unable to control anything that is being done to your computer. This is a federal offence and the criminal will be jailed if caught.
Zombie
Click on your profile picture from your profile, and then in the lower right hand corner, click download.
yes
a mandatory A local user profile is stored on the computer to which the user logs on.
Yes super computer does.
Here is a whole tutorial to do this: How to automatically tweet Now Playing song on your computer to your twitter profile ?
A Roaming profile is where setting established by a user at one computer are stored in a file on a file server on the network and shared with all computers in the workgroup, When a user moves from one computer to the next in the workgroup the roaming profile follows the user so that he or she does not have to redo settings at each computer. A Mandatory profile is a roaming profile that applies to all users in a user group, and individual users cannot change that profile. It is used in situations were users perform only specific job-related task.