When a hacker wishes to enter a network or a computer, or server, or whatever, using two approaches (I'm over-simplifying, but follow me current) social engineering or brute force.
with social engineering the hacker investigates their victim. His behavior on the network, how they interact. I found the side, and attacked. For example, sending a bank mail on asking the key (yes, yes, there are people who fall into this yet) or trying to guess their passwords using known information (your birthday, anniversary or the birth of their children.)
with brute force, the hacker attacks against the system of algorithms and techniques rare-fetched, but often they work. The chances that the attack succeed are not many, but if he does, the damage is extensive.
Hackers prefer Social Engineering
This technique makes them think (that in itself makes it more attractive for this type of character) and allowed to repeat. If they do well, free will and free to re-enter the system. Brute Force exposes them more, and if things go wrong, it is easier to be tracked.
And here's something to learn.
Entrepreneurs Brute Force we love
Should we launch a product?
"hire more salespeople, more public, more events."
The market is more subtle. It's like a cat ... if you chase it with despair, will leave. But if you are patient and aware, comes closer to your feet and purr.
And that's the lesson Hackers give us.
Social Intelligence Vendor are merchants or market research (used, but they are not). Nor
brainstorms (or brainstorming) with super-creative people.
is learning to listen.
A "feel" our market. To do what the "Grandma's Corner" with his chocolate cake. Or the "Cupcake Madness."
bet that behind the ideas and new products coming out of these micro-corporations are not a marketing team to analyze the market variables.
bet it is someone who know their customers, their tastes and desires. Who feels. Who knows how to start a conversation with them.
These people are the real hackers Marketing.
0 comments:
Post a Comment