Selasa, 08 November 2011

Hacker And Cracker


Hackers and Crackers
*      Hacker
Hacker is a term for those who provide a useful contribution to the network computer, make a small program and share it with people on the Internet. Hacker here mean, look, learn and change things for the hobby and development by following the legality of which has been determined by game developers. The hackers usually perform incursions for the purpose of satisfying the knowledge and techniques. - Average company in the world of global networks (the Internet) also has a hacker. His job is to keep the network from possible destruction outside party "crackers", testing the possibility of a network of holes that become opportunities for the cracker tear - torn tissues, for example: insurance companies and auditing "Price Waterhouse". He has a team of hackers called Tiger Team. They work for their client to test security systems.
*      Cracker
Cracker is a term for those who go into someone else's system and crackers more destructive, usually on a computer network, bypassing passwords or licenses computer programs, computer security against deliberate, to deface the (changing the web home page) belonged to someone else even to men-delete the data of others, stealing data and generally do the cracking for their own benefit, evil intent, or due to other causes because there are challenges. Some of the piercing done to show the security weaknesses of the system.
Differences Hacker and Cracker
Hacker
*      Hacker have ability to analyze the weaknesses of a system or site. For example: if a hacker tries to test the site Yahoo! confirmed the contents of those sites will not be messy and distracting others. Usually hackers reported this incident to be repaired to be perfect. 
*      Hacker have the ethical and creative in designing a program that is useful for anyone.
*      A hacker is not stingy to share his knowledge to people who seriously the name of science and virtue.
Cracker
*      to create a program for the benefit of himself and is destructive or damaging and make a profit. Sebagia example: Viruses, Theft of Credit Card, Code Warez, Defrauding Bank Account, Password Theft E-mail/Web Server.
*      Can stand alone or in groups in action.
*      Having your site or our channel in IRC are hidden, only certain people can access it.
*      Having an IP that can not be traced
*      The most frequent case is that Carding Credit Card Theft and burglary site and change everything in it becomes a mess. For example: Yahoo! never experienced anything like this so it can not be accessed in a long time, the case of the most hotly discussed clickBCA.com 2001.




Hacker's Ethical code
1.      Capable of unlimited computer access and totality.
2.      All information must be FREE
3.      Do not believe in the authority, means expanding decentralization
4.      Do not use a false identity, such as the ridiculous pseudonym, age, position, etc..
5.      Being able to create beauty in the computer art
6.      Computers can change lives for the better.
7.      The work will be undertaken solely for the sake of the truth of the information to be transmitted.
8.      Commit not to defend the economic dominance of industry specific software.
9.      Hacking is the majority of weapons in the war against the encroachment of computer technology
10.  Both Hacking and Phreaking is the only way to disseminate information to the masses so as not to stutter in the computer.
Crackers do not have any ethical code.
Rules of The Game Hacker
General description of the rules that need to follow a hacker as described by Scorpio, namely:
• In the above all, respect the knowledge and freedom of information.
· Notifying the system administrator that there is a security breach / hole in the security that you see.
• Do not take unfair advantage of the hack.
· Not distribute & collect pirated software.
· Not ever taking a foolish risk? always know their own abilities.
· Always willing to be open / free / free inform & teach a variety of information and methods are obtained.
· Not ever to hack a system to steal money.
· Not ever give access to someone who will make mischief.
· Not ever intentionally remove and destroy files on the hacked computer.
· Respect machines hacked, and treat him like their own machine.

True hackers will always act based on the code of ethics and rules of the game was a cracker does not have a code of ethics or rules of the game because crackers are destructive.

Conclusion
The hackers used his expertise in computers to view, find and fix vulnerabilities security system in a computer system or in a software. Therefore, thanks to the hackers, the Internet is there and can we enjoy today, and even continued to be improved to become an even better system. So hackers can be referred to a hero's network is a cracker can be called a criminal network because doing do infiltration with the intent to benefit himself personallity mean harming others. Hackers often called white hackers (which is the real hackers who are building) and the black hacker (cracker dismantle and destroy nature.)



Tidak ada komentar:

Posting Komentar