Hackers appeared in the early 1960s among the members of student organizations Tech Model Railroad Club in Artifisial Intelligence Laboratory Massachusetts Institute of Technology (MIT). Student group is one of the pioneers of the development of computer technology and they operate with a number of mainframe computers. The word hacker first appeared with a positive sense to refer to a member who has expertise in the field of computers and able to make computer programs better than what has been designed together. Then in 1983, growing hacker analogy to refer to someone who has an obsession to understand and master the computer system. The problem, in that year for the first time the FBI arrested a criminal group of computers The 414s are based in Milwaukee USA. 414 is their local area code. The group that came to be called a hacker was convicted of burglary 60 computers, from computers owned by Cancer Center Memorial Sloan-Kettering's computer to Los Alamos National Laboratory. One of the perpetrators are getting immunity for TESTIMONIALS, while the other 5 players get probation sentence.
Then, further up other groups to mention themselves hackers, but it's not. They are (especially the men) who have the satisfaction of breaking through computer and phone-jockey (phreaking). True hackers call these people 'crackers' and do not like to hang out with them. True hackers crackers as people look lazy, not
responsible, and not too bright. Real hackers do not agree to say that with a person through the security has become a hacker.
The hackers meeting each year which is held once every mid-July in Las Vegas. A meeting of the world's largest hacker is called Def Con. Def Con event to event is more exchange of information and technology related to hacking activities.
Understanding Hacker and Cracker
1. Hacker
Hacker is the name for those who provide a useful contribution to the computer network, making a small program and share it with people on the Internet. For example: digigumi (Digital Group) is a group that specializes in the field of games and computers.
This Digigumi hexadecimal engineering techniques to change the text contained in the game. For example, the game Chrono Trigger English language can be converted into Indonesian. Therefore, the status is Digigumi hackers, but not as a destroyer. Hacker here means, seek, learn and change things for hobbies and development by following the prescribed legal by game developers. Hackers usually do infiltration-infiltration with the intent to satisfy the knowledge and techniques. Average - the average company in the world of global networks (the Internet) also has a hacker. His job is to keep the network from possible destruction outsiders "crackers", the network testing of possible aperture into an opportunity of a cracker mengobrak - going through the network, for example: insurance companies and auditing "Price Waterhouse". He has a team of hackers called the Tiger Team. They work to test the security systems of their clients.
2. Cracker
Cracker is a term for those who go into someone else's system and crackers more destructive, usually on a computer network, bypassing passwords or licenses computer programs, intentionally against computer security, to deface (changing the web home page) belonged to someone else even to delete data to other people, steal data and generally do cracking for their own benefit, malice, or for any other reason because there are challenges. Some of the piercing done to show the security weaknesses of the system.
Hierarchy / Tier Hacker
1. Elite
The characteristics: understand the external operating system in, able to configure & connect a global network, perform daily pemrogramman, efficient & skilled, to use his knowledge to the right, do not destroy data, and always follow the rules. Elite level is often referred to as? Temperature?.
2. Semi Elite
The characteristics: younger than the elite, has the ability & extensive knowledge of computers, understanding of the operating system (including the lock), ability enough to change the program exploits program.
3. Developed Kiddie
The characteristics: young age (ABG) & was in school, they read about the methods of hacking & how on various occasions, tried different systems until they succeed & proclaiming victory to another, still use Graphic User Interface (GUI) & just learning basic from UNIX without being able to find a new weakness hole in the operating system.
4. Script Kiddie
The characteristics: such as kiddie as well developed as Lamers, they only have technical knowledge of networking is very minimal, not separated from the GUI, using a trojan hacking done to scare some life & troubled Internet users.
5. Lamer
The characteristics: does not have the experience & knowledge but want to be a hacker, so often referred to as lamer? Want to-be? hackers, use their computers mainly to play games, IRC, prirate exchange software, steal credit card, using hacking software trojan, nuke & Denial, like bragging on IRC channel, and so on. Because many shortcomings to reach the elite, in their development will only be up to the level of developed or script kiddie kiddie course.
Crackers do not have a specific hierarchy because it is only uncover and destroy.
Code Hacker
1. Able to access computers and the infinite totality.
2. All information must be FREE.
3. Do not believe in the authority, means extending decentralization.
4. Do not use a false identity, such as the ridiculous pseudonym, age, position, etc..
5. Able to create beauty in the computer art.
6. Computers can change lives for the better.
7. The work will be undertaken solely for the sake of the truth of information that must be deployed spread.
8. Do not uphold the commitment to defend the economic dominance of certain software industry.
9. Hacking is the majority of weapons in the war against the encroachment of computer technology.
10. Both Hacking and Phreaking is the only other way to disseminate information to the masses so that no stuttering in the computer.
Crackers do not have any ethical codes.
Hacker Rules
General description rules that needs to follow a hacker as described by Scorpio, namely:
· Above all, respect the knowledge & freedom of information.
· Notify system administrators will be the security breach / security holes that you see.
· Do not take unfair advantage of the hack.
· Not distribute & collect pirated software.
· Never take stupid risks? always know their own abilities.
· Always willing to be open / free / free inform & teach a variety of information & methods obtained.
Never · to hack a system to steal money.
· Never give access to someone who will make mischief.
· Never intentionally delete & destroy files on a computer that dihack.
· Respect the hack machine, and treated her like his own machine.
True hackers will always act based on a code of ethics and rules of the game was a cracker does not have a code of ethics or rules of the game because its damage crackers.
Differences Hacker and Cracker
HACKER
1.Mempunyai ability to analyze the weaknesses of a system or site. For example: if a hacker trying to test the Yahoo! confirmed the content of these sites will not be messy and distracting others. Usually hackers reported this incident to be a perfect repair.
2.Hacker have ethical and creative in designing a program that is useful for anyone.
3. A hacker is not stingy to share his knowledge to the people who seriously on behalf of science and virtue.
CRACKER
1. Able to make a program for the benefit of himself and is destructive or damaging and make a profit. Sebagia example: Viruses, Credit Card Theft, Code Warez, hacking Bank Account, Password Theft E-mail/Web Server.
2. Can stand alone or in groups in action.
3. Having a site or our channel on IRC is hidden, only certain people can access it.
4. Having IP that can not be traced.
5. The most common case is that Carding Credit Card Theft and burglary site and change everything in it fell apart. For example: Yahoo! never experienced anything like this that can not be accessed in a long time, clickBCA.com case of the most hotly talked about 2001 years ago.
Two Hacking Activity:
1. Social Hacking, who need to know: what information about the system used by the server, who owns the server, the administrator who manages the server, the connection is used and what kind of how it connects the internet server, who then use the connection any information provided by these servers , whether the server is also connected to the LAN in an organization and other information.
2. Technical Hacking, is a technical act to perform infiltration into the system, either with the tool (tool) or using the facility's own system which is used to attack the weakness (security holes) found in the system or service. The core of this activity is to get full access to the system in any way and no matter what.
Hacker Case Example:
1. In 1983, the first time the FBI arrested a criminal group of computers The 414s (414 is their local area code) based in the U.S. Milwaukee. The group that came to be called a hacker is doing 60 fruit computer break-ins, from the computer's Cancer Center Memorial Sloan-Kettering's computer to Los Alamos National Laboratory. One of the perpetrators are getting immunity for TESTIMONIALS, while the other 5 players get probation sentence.
2. Digigumi (Digital Group) is a group that specializes in the field of computer games and using hexadecimal engineering techniques to change the text contained in the game. For example: the game Chrono Trigger English language can be converted into Indonesian. Therefore, the status is Digigumi hackers, but not as a destroyer.
3. On the day Saturday, April 17, 2004, Dani Firmansyah, consultant Information Technology (IT) PT Danareksa in Jakarta managed to break into the site of the General Elections Commission (KPU) in http://tnp.kpu.go.id and change the names of parties in it became the names of "unique", like a drawstring Ijo Party, Party Mbah Jambon, Cashew Party, and so forth. Dani using SQL Injection techniques (basically the technique is by typing a specific string or command in the browser address bar) to break through the Commission website. Then Danny was caught on Thursday, April 22, 2004.
Due to the Ditimbulakan by Hacker and Cracker
Hacker: make more advanced Internet technologies for hackers to use his expertise in computers to view, find and fix security weaknesses in a computer system or in a software, make the passion to work an administrator back to life as a hacker helps administrators to strengthen their networks.
Cracker: damage and crippling the entire computer system, so that the user data networks damaged, lost, or changed.
Conclusion
The hackers used his skills in computer to view, find and fix security weaknesses in a computer system or in a software. Therefore, thanks to the hackers, the Internet is there and can we enjoy today, even kept in repair for a better system again. So hackers can be called a hero's network crackers can be called a criminal for doing network intrusions with the intent to do him a personallity benefit with the intention of harming others. Hackers often called white hackers (which is the true nature hackers build) and black hackers (crackers that unpacking and destructive nature).
Then, further up other groups to mention themselves hackers, but it's not. They are (especially the men) who have the satisfaction of breaking through computer and phone-jockey (phreaking). True hackers call these people 'crackers' and do not like to hang out with them. True hackers crackers as people look lazy, not
responsible, and not too bright. Real hackers do not agree to say that with a person through the security has become a hacker.
The hackers meeting each year which is held once every mid-July in Las Vegas. A meeting of the world's largest hacker is called Def Con. Def Con event to event is more exchange of information and technology related to hacking activities.
Understanding Hacker and Cracker
1. Hacker
Hacker is the name for those who provide a useful contribution to the computer network, making a small program and share it with people on the Internet. For example: digigumi (Digital Group) is a group that specializes in the field of games and computers.
This Digigumi hexadecimal engineering techniques to change the text contained in the game. For example, the game Chrono Trigger English language can be converted into Indonesian. Therefore, the status is Digigumi hackers, but not as a destroyer. Hacker here means, seek, learn and change things for hobbies and development by following the prescribed legal by game developers. Hackers usually do infiltration-infiltration with the intent to satisfy the knowledge and techniques. Average - the average company in the world of global networks (the Internet) also has a hacker. His job is to keep the network from possible destruction outsiders "crackers", the network testing of possible aperture into an opportunity of a cracker mengobrak - going through the network, for example: insurance companies and auditing "Price Waterhouse". He has a team of hackers called the Tiger Team. They work to test the security systems of their clients.
2. Cracker
Cracker is a term for those who go into someone else's system and crackers more destructive, usually on a computer network, bypassing passwords or licenses computer programs, intentionally against computer security, to deface (changing the web home page) belonged to someone else even to delete data to other people, steal data and generally do cracking for their own benefit, malice, or for any other reason because there are challenges. Some of the piercing done to show the security weaknesses of the system.
Hierarchy / Tier Hacker
1. Elite
The characteristics: understand the external operating system in, able to configure & connect a global network, perform daily pemrogramman, efficient & skilled, to use his knowledge to the right, do not destroy data, and always follow the rules. Elite level is often referred to as? Temperature?.
2. Semi Elite
The characteristics: younger than the elite, has the ability & extensive knowledge of computers, understanding of the operating system (including the lock), ability enough to change the program exploits program.
3. Developed Kiddie
The characteristics: young age (ABG) & was in school, they read about the methods of hacking & how on various occasions, tried different systems until they succeed & proclaiming victory to another, still use Graphic User Interface (GUI) & just learning basic from UNIX without being able to find a new weakness hole in the operating system.
4. Script Kiddie
The characteristics: such as kiddie as well developed as Lamers, they only have technical knowledge of networking is very minimal, not separated from the GUI, using a trojan hacking done to scare some life & troubled Internet users.
5. Lamer
The characteristics: does not have the experience & knowledge but want to be a hacker, so often referred to as lamer? Want to-be? hackers, use their computers mainly to play games, IRC, prirate exchange software, steal credit card, using hacking software trojan, nuke & Denial, like bragging on IRC channel, and so on. Because many shortcomings to reach the elite, in their development will only be up to the level of developed or script kiddie kiddie course.
Crackers do not have a specific hierarchy because it is only uncover and destroy.
Code Hacker
1. Able to access computers and the infinite totality.
2. All information must be FREE.
3. Do not believe in the authority, means extending decentralization.
4. Do not use a false identity, such as the ridiculous pseudonym, age, position, etc..
5. Able to create beauty in the computer art.
6. Computers can change lives for the better.
7. The work will be undertaken solely for the sake of the truth of information that must be deployed spread.
8. Do not uphold the commitment to defend the economic dominance of certain software industry.
9. Hacking is the majority of weapons in the war against the encroachment of computer technology.
10. Both Hacking and Phreaking is the only other way to disseminate information to the masses so that no stuttering in the computer.
Crackers do not have any ethical codes.
Hacker Rules
General description rules that needs to follow a hacker as described by Scorpio, namely:
· Above all, respect the knowledge & freedom of information.
· Notify system administrators will be the security breach / security holes that you see.
· Do not take unfair advantage of the hack.
· Not distribute & collect pirated software.
· Never take stupid risks? always know their own abilities.
· Always willing to be open / free / free inform & teach a variety of information & methods obtained.
Never · to hack a system to steal money.
· Never give access to someone who will make mischief.
· Never intentionally delete & destroy files on a computer that dihack.
· Respect the hack machine, and treated her like his own machine.
True hackers will always act based on a code of ethics and rules of the game was a cracker does not have a code of ethics or rules of the game because its damage crackers.
Differences Hacker and Cracker
HACKER
1.Mempunyai ability to analyze the weaknesses of a system or site. For example: if a hacker trying to test the Yahoo! confirmed the content of these sites will not be messy and distracting others. Usually hackers reported this incident to be a perfect repair.
2.Hacker have ethical and creative in designing a program that is useful for anyone.
3. A hacker is not stingy to share his knowledge to the people who seriously on behalf of science and virtue.
CRACKER
1. Able to make a program for the benefit of himself and is destructive or damaging and make a profit. Sebagia example: Viruses, Credit Card Theft, Code Warez, hacking Bank Account, Password Theft E-mail/Web Server.
2. Can stand alone or in groups in action.
3. Having a site or our channel on IRC is hidden, only certain people can access it.
4. Having IP that can not be traced.
5. The most common case is that Carding Credit Card Theft and burglary site and change everything in it fell apart. For example: Yahoo! never experienced anything like this that can not be accessed in a long time, clickBCA.com case of the most hotly talked about 2001 years ago.
Two Hacking Activity:
1. Social Hacking, who need to know: what information about the system used by the server, who owns the server, the administrator who manages the server, the connection is used and what kind of how it connects the internet server, who then use the connection any information provided by these servers , whether the server is also connected to the LAN in an organization and other information.
2. Technical Hacking, is a technical act to perform infiltration into the system, either with the tool (tool) or using the facility's own system which is used to attack the weakness (security holes) found in the system or service. The core of this activity is to get full access to the system in any way and no matter what.
Hacker Case Example:
1. In 1983, the first time the FBI arrested a criminal group of computers The 414s (414 is their local area code) based in the U.S. Milwaukee. The group that came to be called a hacker is doing 60 fruit computer break-ins, from the computer's Cancer Center Memorial Sloan-Kettering's computer to Los Alamos National Laboratory. One of the perpetrators are getting immunity for TESTIMONIALS, while the other 5 players get probation sentence.
2. Digigumi (Digital Group) is a group that specializes in the field of computer games and using hexadecimal engineering techniques to change the text contained in the game. For example: the game Chrono Trigger English language can be converted into Indonesian. Therefore, the status is Digigumi hackers, but not as a destroyer.
3. On the day Saturday, April 17, 2004, Dani Firmansyah, consultant Information Technology (IT) PT Danareksa in Jakarta managed to break into the site of the General Elections Commission (KPU) in http://tnp.kpu.go.id and change the names of parties in it became the names of "unique", like a drawstring Ijo Party, Party Mbah Jambon, Cashew Party, and so forth. Dani using SQL Injection techniques (basically the technique is by typing a specific string or command in the browser address bar) to break through the Commission website. Then Danny was caught on Thursday, April 22, 2004.
Due to the Ditimbulakan by Hacker and Cracker
Hacker: make more advanced Internet technologies for hackers to use his expertise in computers to view, find and fix security weaknesses in a computer system or in a software, make the passion to work an administrator back to life as a hacker helps administrators to strengthen their networks.
Cracker: damage and crippling the entire computer system, so that the user data networks damaged, lost, or changed.
Conclusion
The hackers used his skills in computer to view, find and fix security weaknesses in a computer system or in a software. Therefore, thanks to the hackers, the Internet is there and can we enjoy today, even kept in repair for a better system again. So hackers can be called a hero's network crackers can be called a criminal for doing network intrusions with the intent to do him a personallity benefit with the intention of harming others. Hackers often called white hackers (which is the true nature hackers build) and black hackers (crackers that unpacking and destructive nature).
No comments:
Post a Comment