Hackers and Crackers
Hacker
Hacker is a term for those who provide a useful contribution
to the network computer, make a small program and share it with people on the
Internet. Hacker here mean, look, learn and change things for the hobby and
development by following the legality of which has been determined by game
developers. The hackers usually perform incursions for the purpose of
satisfying the knowledge and techniques. - Average company in the world of
global networks (the Internet) also has a hacker. His job is to keep the network
from possible destruction outside party "crackers", testing the
possibility of a network of holes that become opportunities for the cracker
tear - torn tissues, for example: insurance companies and auditing "Price
Waterhouse". He has a team of hackers called
Tiger Team. They work for their client to test
security systems.
Cracker
Cracker is a term for those who go into someone else's system and crackers more destructive, usually on a computer network, bypassing passwords or licenses computer programs, computer security against deliberate, to deface the (changing the web home page) belonged to someone else even to men-delete the data of others, stealing data and generally do the cracking for their own benefit, evil intent, or due to other causes because there are challenges. Some of the piercing done to show the security weaknesses of the system.
Cracker is a term for those who go into someone else's system and crackers more destructive, usually on a computer network, bypassing passwords or licenses computer programs, computer security against deliberate, to deface the (changing the web home page) belonged to someone else even to men-delete the data of others, stealing data and generally do the cracking for their own benefit, evil intent, or due to other causes because there are challenges. Some of the piercing done to show the security weaknesses of the system.
Differences Hacker and Cracker
Hacker
Hacker have
ability to analyze the weaknesses of a system or site. For example: if a hacker
tries to test the site Yahoo! confirmed the contents of those sites will not be
messy and distracting others. Usually hackers reported this incident to be
repaired to be perfect.
Hacker have the
ethical and creative in designing a program that is useful for anyone.
A hacker is not
stingy to share his knowledge to people who seriously the name of science and
virtue.
Cracker
to create a
program for the benefit of himself and is destructive or damaging and make a
profit. Sebagia example: Viruses, Theft of Credit Card, Code Warez, Defrauding
Bank Account, Password Theft E-mail/Web Server.
Can stand alone
or in groups in action.
Having your site
or our channel in IRC are hidden, only certain people can access it.
Having an IP
that can not be traced
The most
frequent case is that Carding Credit Card Theft and burglary site and change
everything in it becomes a mess. For example: Yahoo! never experienced anything
like this so it can not be accessed in a long time, the case of the most hotly
discussed clickBCA.com 2001.
Hacker's Ethical
code
1. Capable
of unlimited computer access and totality.
2. All
information must be FREE
3. Do not believe in the authority, means expanding
decentralization
4. Do
not use a false identity, such as the ridiculous pseudonym, age, position,
etc..
5. Being able to create beauty in the computer art
6. Computers
can change lives for the better.
7. The
work will be undertaken solely for the sake of the truth of the information to
be transmitted.
8. Commit
not to defend the economic dominance of industry specific software.
9. Hacking
is the majority of weapons in the war against the encroachment of computer
technology
10. Both Hacking and Phreaking is the only way to disseminate
information to the masses so as not to stutter in the computer.
Crackers do not have any
ethical code.
Rules of The
Game Hacker
General description of the rules that need to follow a hacker as described by Scorpio, namely:
• In the above all, respect the knowledge and freedom of information.
· Notifying the system administrator that there is a security breach / hole in the security that you see.
• Do not take unfair advantage of the hack.
· Not distribute & collect pirated software.
· Not ever taking a foolish risk? always know their own abilities.
· Always willing to be open / free / free inform & teach a variety of information and methods are obtained.
· Not ever to hack a system to steal money.
· Not ever give access to someone who will make mischief.
· Not ever intentionally remove and destroy files on the hacked computer.
· Respect machines hacked, and treat him like their own machine.
True hackers will always act based on the code of ethics and rules of the game was a cracker does not have a code of ethics or rules of the game because crackers are destructive.
General description of the rules that need to follow a hacker as described by Scorpio, namely:
• In the above all, respect the knowledge and freedom of information.
· Notifying the system administrator that there is a security breach / hole in the security that you see.
• Do not take unfair advantage of the hack.
· Not distribute & collect pirated software.
· Not ever taking a foolish risk? always know their own abilities.
· Always willing to be open / free / free inform & teach a variety of information and methods are obtained.
· Not ever to hack a system to steal money.
· Not ever give access to someone who will make mischief.
· Not ever intentionally remove and destroy files on the hacked computer.
· Respect machines hacked, and treat him like their own machine.
True hackers will always act based on the code of ethics and rules of the game was a cracker does not have a code of ethics or rules of the game because crackers are destructive.
Conclusion
The hackers used his expertise in computers to view, find and fix vulnerabilities security system in a computer system or in a software. Therefore, thanks to the hackers, the Internet is there and can we enjoy today, and even continued to be improved to become an even better system. So hackers can be referred to a hero's network is a cracker can be called a criminal network because doing do infiltration with the intent to benefit himself personallity mean harming others. Hackers often called white hackers (which is the real hackers who are building) and the black hacker (cracker dismantle and destroy nature.)
The hackers used his expertise in computers to view, find and fix vulnerabilities security system in a computer system or in a software. Therefore, thanks to the hackers, the Internet is there and can we enjoy today, and even continued to be improved to become an even better system. So hackers can be referred to a hero's network is a cracker can be called a criminal network because doing do infiltration with the intent to benefit himself personallity mean harming others. Hackers often called white hackers (which is the real hackers who are building) and the black hacker (cracker dismantle and destroy nature.)
Tidak ada komentar:
Posting Komentar