History Of Hacker And Cracker

Hacker emerged in the early 1960s among the members of student organizations Tech Model Railroad Club, artificial intelligence laboratory at the Massachusetts Institute of Technology (MIT). Groups of students is one of the pioneering development of computer technology and they operate with a number of mainframe computers. The word first appeared hacker

with a positive meaning to mention a member who has expertise in the field of computer and able to create computer programs that better than that has been designed together. Then in 1983, growing analogy hackers to mention someone who has the obsession to understand and control the computer system. Parties, in the year for the first time the FBI arrest criminal groups The computer 414s based in Milwaukee U.S.. 414 is their local area code. The group then called a hacker is guilty of the 60 fruit piercing computer, computer property from the Cancer Center Memorial Sloan-Kettering to a computer owned by the Los Alamos National Laboratory. One of the actors Mary says, while the other actors get 5 penalty trial.

Then, on further development of other groups appear that breathe themselves hackers, and is not. They are (especially the men) who get satisfaction through the break and seek a computer phone (phreaking). True hackers call these people 'cracker' and do not like interacting with them. True hacker cracker look as lazy people, not
responsible, and not too smart. Hacker is not true if you agree with the decision said that security has become a hacker.

The hacker conferences each year that is held once every mid-July in Las Vegas. The largest meeting place in the hacker world is called Def Con. Events Def Con is to place the exchange of information and technology related to hacking activity.



Hacker understanding and cracker

1. Hacker

Hacker is the name for which they provide a useful contribution to the computer network, to create small programs, and gave the people on the Internet. For example: digigumi (Digital Group) is a group that specializes in the field of games and computers. Digigumi use this technique to change the technique hexadecimal text in the game. For example, the game Chrono Trigger in English language can be changed to Indonesia. Therefore, the status is Digigumi hackers, but not as a destroyer. Hacker here means, search, learn and change things hobby and the need for development with the legality of which has been determined by the game developer. The hackers usually do infiltration-infiltration with the purpose of satisfying the knowledge and techniques. Average - the average company in the world of global networks (the Internet) also has a hacker. Duty, namely to maintain a network of possible destruction of outside parties "cracker", to test the network from the pit possibility that the opportunity to become the cracker mengobrak - destroy the network, for example, insurance companies and auditing "Price Waterhouse." He has a team of hackers called the Tiger Team. They work for the client to test their security systems.



2. Cracker

Is a cracker for them to the system, and other cracker destruktif more, usually in the computer network, mem-shunt password or license computer program, deliberately against the security of the computer, downloading it (the home page of the web) owned by other people even to delete data downloading other people, stealing data, and generally make their own profits to cracking, malice, or because of other reasons because there is a challenge. Some of the piercing is done to show the weakness of the security system.



Hierarchy / Tier Hacker

1. Elite

Features: understand the system operating outside in, able to configure and connect the global network, pemrogramman do every day, effisien & deft, with the right knowledge to use, does not destroy data, and always follow the rules. Elite level is often referred to as temperature.

2. Semi Elite

Features: young people from elite class, have the ability and extensive knowledge about computers, understanding of the operating system (including lubangnya), the ability to change course enough eksploit program.

3. Developed Kiddie

Features: young age (awesome party just) & the school, they read about the hacking method, and how the various opportunities, try different systems to ultimately succeed and proclaim victory to the other, are still using Graph User Interface (GUI) & learning new basic from UNIX able to find the hole without the weakness in the new operating system.

4. Script Kiddie

Features: developed, such as kiddie and also as Lamers, they only have the technical knowledge of networking is very minimal, not separated from the GUI, Trojan hacking is done using & distressing to frighten some Internet users live.

5. Wshin

Features: do not have the knowledge and experience but want to become a hacker wshin so often referred to as wanna-duty hackers, use their computers mainly for gaming, IRC, exchanges of software prirate, stealing a credit card, make hacking by using Trojan software, nuke & DOS, like swagger through IRC channels, and so forth. Because many drawbacks to reach the elite, in its development, they will only be developed until the level of kiddie script kiddie or alone.

Cracker does not have a hierarchy are special because only dismantle and destroy.



Hacker code of ethics

1. Able to access the computer and infinite totality.

2. All information should be FREE.

3. Do not believe in the authority, expand the meaning of decentralization.

4. Do not use a false identity, such as the incompetent fictitious name, age, position, etc..

5. Able to create beautiful art in the computer.

6. Computers can change lives for the better.

7. Work to do in solely for the truth of the information that must assigned luaskan.

8. Adhere to the commitment not overshadow the economic domination of certain software industry.

9. Hacking is a major weapon in the war against the violation of the limit of computer technology.

10. Both Hacking and Phreaking is the only way to disseminate information on the mass that is not stutter in the computer.
Cracker does not have any code of ethics.



Main Rules Hacker

The description of the general rules that need to follow in such a hacker in the hereafter by Leo, namely:

Ã, Â At the top of everything, respect knowledge and freedom of information.

Ã, Â tells the system administrator will be in violation of the security / security hole in that you see.

Ã, Â Do not take advantage of the fair is not a hack.

Ã, Â not collect & distribute pirated software.

Ã, Â Never take a stupid risk always know their own ability.

Ã, Â Always willing to be open / free to tell & teach a variety of methods and information obtained.

Ã, Â I have never had to hack a system to steal money.

Ã, Â Never give access to someone who will make mischief.

Ã, Â Never deliberately remove and destroy files on the computer that dihack.

Ã, Â Respect the engine in a hack, and treats him as the machine itself.

Hackers will always act based on the code of ethics and rules are cracker does not have a code of ethics or rules are harmful because the cracker.



Differences Hacker and cracker

a. Hacker

1.Mempunyai ability to analyze the weakness of a system or site. For example: if a hacker trying to test the Yahoo! be sure that the content of these sites will not fall apart and disrupt the other. Usually hackers to report the incident to be improved to become perfect.

2.Hacker have the ethical and creative in designing a program that is useful for anyone.

3. A Hacker is not stingy to share his knowledge to those who seriously in the name of science and virtue.

b. Cracker

1. Ability to create a program for himself and destruktif or damage and make a profit. Sebagia example: Viruses, Credit Card Theft, Code Unless piercing Bank Account, Password Theft E-mail/Web Server.

2. Stand alone or be grouped in the act.

3. Having cenel site or in IRC, which is hidden, only certain people can access them.

4. Having IP that can not be tracked.

5. The most often is the Carding Credit Card Theft, and the piercing site and change all the contents to be shattered. For example: Yahoo! had any incidents like this that can not be accessed in a long time, the case clickBCA.com the most warm and discussed in 2001.



Two Types of activities Hacking

1. Social Hacking, who need to know: what information about the system used by the server, the server who the owner, who manages the Admin server, the connection that is used and how what type of server that connects the Internet, who make the connection and any information provided by the server , Whether the server is also connected to the LAN in an organization and other information

2. Technical Hacking, is a technical measures to make infiltration into the system, both with the tools (the tool) or using the facilities the system itself that is used to attack the weakness (security holes), which is in the system or service. The core of this activity is to get full access into the system by any means and how it.



Hacker Case

1. In 1983, the first group of FBI criminal computer captures the 414s (414 is their local area code) based in Milwaukee U.S.. The group then called a hacker is doing 60 piercing fruit computer, computer property from the Cancer Center Memorial Sloan-Kettering to a computer owned by the Los Alamos National Laboratory. One of the actors Mary says, while the other actors get 5 penalty trial.

2. Digigumi (Digital Group) is a group that specializes in the field of computer games and using the hexadecimal engineering techniques to change the text in the game. For example: the game Chrono Trigger in English language can be changed to Indonesia. Therefore, the status is Digigumi hackers, but not as a destroyer.

3. On Saturday, April 17, 2004, Dani Firmansyah, a consultant Information Technology (IT) PT Danareksa in Jakarta successfully break the site owned by the General Election Commission (KPU) in http://tnp.kpu.go.id and change the names in the party the names become a "unique", such Ijo shorts Party, Party Mbah Jambon, Cashew Party, and others. Dani technique using SQL Injection (basically the technique is by typing the command string or in the browser address bar) to penetrate the site KPU. Dani then caught on Thursday, 22 April 2004.



As a result of the Ditimbulakan by Hacker and cracker

Hacker: make the internet more advanced technology because hackers are using their expertise in computer to view, find and fix security system in a computer system or in a software package, create a spark of an administrator working life again because hackers administrators to help strengthen their network.

Cracker: damage and crippling the entire computer system, so that the data network users damaged, lost or changed.



Conclusion

The hackers are using their expertise in computer to view, find and fix security system in a computer system or in a software. Therefore, owing to the hacker, the Internet is there and we can now enjoy such as this, even continue to refine the system to become better again. But hackers can be called a hero is a network cracker can be called as criminals because of the network to make do with the purpose of the infiltration of personallity himself with the intention of harming others. Hacker hackers often called white (which is true hackers who are building) and the black hacker (cracker, which is dismantle and destroy)

But it's information



0 comments: