Senin, 18 Juni 2012

Hacker and cracker

Differences Hacker and Cracker

In Indonesia, Hacker is identical to a computer expert on the evil and destroy people's computer system / other institutions, but did you know that this opinion was a big mistake! There are misperceptions about the hacker, the hacker is not like that image. For more details, let us trace the origins of what the difference is by Hacker and cracker.

History Hacker and Cracker

Hackers appear at the beginning of the 1960s among the members of student organizations, Tech Model Railroad Club at the Artificial Intelligence Laboratory Massachusetts Institute of Technology (MIT). The student group is one of the pioneering developments in computer technology and they operate with a number of mainframe computers. Hacker word first appeared in a positive sense to describe a member who has expertise in the field of computers and able to make a computer program that is better than that has been designed together. Then in 1983, growing hacker analogy to refer to someone who has an obsession to understand and master the computer system. Because, in that year for the first time the FBI arrested a group of computer criminals 414s based in the U.S. Milwaukee. 414 is their local area code. The group that came to be called hackers are convicted of burglary 60 computer, the computer's Cancer Center Memorial Sloan-Kettering's computer to the Los Alamos National Laboratory. One of the perpetrators enjoy immunity as testimonials, while five other players get probation.



Then in the next development comes another group mention themselves hackers, but it's not. They are (especially men) who get the satisfaction of breaking through to outsmart the computer and telephone (phreaking). True hackers call these people 'crackers' and do not like hanging out with them. True hackers crackers as the lazy, do not
responsible, and not too smart. Real hackers do not agree to say that through the security has become a hacker.

The hackers hold a meeting once every year which is held every mid-July in Las Vegas. The session's biggest hacker in the world is called Def Con. Def Con event to event is more exchange of information and technology related to hacking activities.

Understanding Hacker and Cracker

A. Hacker

Hacker is a term for those who provide a useful contribution to the network computers, create a small program and share with the people on the Internet. For example: digigumi (Digital Group) is a group specializing in the field of mobile and computer gaming. Digigumi uses hexadecimal techniques to change the text contained in the game. For example, the English game Chrono Trigger can be converted into the Indonesian language. Therefore, the status Digigumi are hackers, but not as a destroyer. Hacker here mean, look, learn and change things for the hobby and to follow the development of legality set by the game developer. The hackers usually do infiltration-infiltration with the intention of satisfying the knowledge and techniques. Average - average company in the world of global networks (the Internet) also has a hacker. His job is to keep the network from possible destruction of an outside party "crackers", test the network from the possibility of a hole that the chances of the cracker tear - tear apart the network, for example, insurance companies and auditing "Price Waterhouse". He has a team of hackers called the Tiger Team. They work for their client to test security systems.

2. Cracker

Cracker is a term for those who go into other people's systems and more destructive cracker, usually on a computer network, bypassing passwords or licenses computer programs, computer security against deliberate, deface the (changing the face of web pages) of others even up to delete the data of others, stealing data and generally do their own cracking for profit, malice, or for other reasons as there are challenges. Some of the burglary carried out to demonstrate the security weaknesses of the system.

Hierarchy / level Hacker

A. Elite

Characteristics: understood out of the operating system, able to configure and connect a global network, to programming each day, efficient and skilled, to use his knowledge to the right, does not destroy data, and always follow the rules. Elite level is often referred to as the 'temperature'.

2. Semi Elite

Characteristics: younger than the elite, has the ability and extensive knowledge of computers, understand the operating system (including holes), the ability of the program enough to change the program exploits.

3. Developed Kiddie

Characteristics: young age (ABG) and still in school, they read about the method of hacking and how on various occasions, tried many different systems to ultimately succeed and proclaiming victory to another, generally still use Graphic User Interface (GUI) and just learn the basic of UNIX without being able to find a new hole in the operating system weaknesses.

4. Script Kiddie

Characteristics: as well as developed kiddie Lamers, they only have technical knowledge of networking is very minimal, not separated from the GUI, hacking done using a trojan to frighten and distress of life most Internet users.

5. Lamer

Characteristics: do not have the experience and knowledge but want to be a hacker, so lamer often referred to as the 'wanna-be "hackers, use their computers mainly to play games, IRC, exchange prirate software, stealing credit cards, using software hacking trojan , nuke & DoS, likes to boast over the IRC channel, and so forth. Because many shortcomings to achieve the elite, in their development will only be up to the level of developed or script kiddie kiddie course.

Cracker has no particular hierarchy because it is only to dismantle and destroy.

The Code Hacker

A. Capable of accessing a computer and an infinite totality.

2. All information should be FREE.

3. Do not believe in authority, that is expanding decentralization.

4. Do not use a false identity, like a silly pseudonym, age, position, etc..

5. Being able to create beauty in the computer art.

6. Computers can change lives for the better.

7. Work that is done solely for the information to be transmitted.

8. Not uphold the commitment to defend the economic dominance of industry specific software.

9. Hacking is the majority of weapons in the war against the encroachment of computer technology.

10. Both Hacking and Phreaking is the only way to disseminate information to the masses so as not to stutter in the computer.

Cracker does not have any ethical code.

Code Hacker

Overview of rules that should be followed as a hacker described by Scorpio, namely:

• Above all, respect for knowledge and freedom of information.

• Inform the system administrator will be a breach of security / security hole that you see.

• Do not take unfair advantage of a hack.

• Not distribute and collect the pirated software.

• Never take stupid risks - always know their own abilities.

• Always willing to be open / free / free inform and teach a variety of information and methods available.

• Never to hack a system to steal money.

• Never give access to someone who will make mischief.

• Never intentionally removing and destroying files on the hacked computer.

• Respects the hack machine, and treats him like his own machine.

True hackers will always act based on the code of ethics and rules of the game was a cracker does not have a code of conduct or rules of the game because of its destructive cracker.

0 komentar:

Posting Komentar