History HACKER and CRACKER

Hacker appear in the early 1960s among the members of the student organization's Tech Model Railroad Club in artificial Intelligence Laboratory Massachusetts Institute of Technology (MIT). The student group is one of the pioneering development of computer technology and they operate with a number of Mainframe computers. The word hacker was first shown with a positive meaning to mention a member who has expertise in the field of computers and able to create a computer program that is better than that has been designed together. Then in 1983, growing hacker analogy to mention someone who has to understand the obsession and the computer system. Section, in the year for the first time the FBI catch the computer criminals 414s based in Milwaukee USA. 414 is the code of their local area. Group, which was then called a hacker is declared guilty over piercing 60 computer, the computer's property Cancer Center Memorial Sloan-Kettering to a computer owned by Los Alamos National Laboratory. One of the perpetrators are getting TESTIMONIALS immunity because, while the other 5 to get the punishment trial.

Then on the next development of the other groups that appear breathe themselves hackers, but is not. They (especially adult men) who get satisfaction through the computer and break outmanoeuvre phone (phreaking). Hacker sejati call these people 'cracker' and do not like to interact with them. Hacker cracker sejati looked as lazy people, not
responsible, and not too smart. Hacker sejati not agree if it is said that someone with a security breach has been a hacker.

The hackers meet once each year that is held every mid-July in Las Vegas. Ajang meeting hacker in the world is called Def Con. Def Con event to event is more exchange of information and technology related to hacking activities.

The Hacker and cracker

1. HACKER

Hacker is a for those who provide a useful contribution to the network computer, and create a small program nito with people on the Internet. For example: digigumi (Digital Group) is a group that specializes in moving and the computer game field. Digigumi this technique using the technique to change the hexadecimal text that is in the game. For example, the game Chrono Trigger English language could be changed to English. Therefore, the status Digigumi is a hacker, but not as a destroyer. Hacker here means, explore, learn and change things for the hobby and with the development of legality has been determined by the game developer. The hackers usually do infiltration-infiltration with a satisfactory knowledge and techniques. Average - the average company in the world that the global network (the Internet) also has a hacker. Duty to protect the network from possible destruction outsiders "cracker", the network of holes that it is likely to be opportunities for cracker mengobrak - destroy their network, for example: insurance companies and auditing "Price Waterhouse". He has a team of hackers called the Tiger Team. They work for the client to test their security systems.

2. CRACkER

Is a cracker for those who enter the system to other people and more cracker destruktif, usually in a computer network, mem-bypass password or license a computer program, deliberately against computer security, men-deface (the home page of the web) the property of another person even to delete the data men-men, steal data and generally do their own advantage to cracking, malice, or because the other because there are challenges. Some of the piercing is done to show the security weakness of the system.

Hierarchy / Tier Hacker

1. Elite

Characteristics: the operating system in the outside, able to connect & configure the network globally, pemrogramman do every day, effisien & adept, with the appropriate knowledge to use, does not destroy data, and always follow the rules. Elite level is often referred to as the 'temperature'.

2. Semi Elite

Characteristics: younger of the elite, have the ability & knowledge knowledgeable about computers, understanding of the operating system (including lubangnya), the ability to change the program enough eksploit program.

3. Developed Kiddie

Characteristics: young age (ABG) & the school, they read about a method of hacking & how the various opportunities, try different systems to ultimately succeed & proclaiming victory to another, generally still use Graphic User Interface (GUI) & learning new basic UNIX's are able to find holes without new weakness in the system operation.

4. Script Kiddie

Characteristics: as developed and kiddie also like Lamers, they only have the technical knowledge of networking is very minimal, not separated from the GUI, hacking is done using a trojan to frighten incommode & live in part of Internet users.

5. Picassoseven

Characteristics: does not have experience & knowledge but wish to become a hacker picassoseven so often referred to as a 'wanna-be' hackers, use their computers mainly to play the game, IRC, prirate exchange switch software, credit card theft, hacking to do with the software trojan , nuke & DoS, like proud through the IRC channel, and so forth. Because many kekurangannya to reach the elite, in their development will only be until the level of developed or kiddie script kiddie course.

Cracker does not have any hierarchy are special because only dismantle and destroy.

Hacker Ethics

1. Able to access the computer and infinite totality.

2. All information should be FREE.

3. Does not believe in the authority, means expanding the decentralization.

4. Do not use a false identity, as incompetent a fictitious name, age, position, etc..

5. Able to create beautiful art in the computer.

6. Computers can change the life to be better.

7. Work that is done purely for the sake of information that must be assigned luaskan.

8. To uphold the commitment does not defend the economic dominance industry specific software.

9. Hacking is a major weapon in the war against the encroachment computer technology.

10. Both Hacking and Phreaking is the only way to disseminate information to the masses so that no stutter in the computer.
Cracker does not have any code of ethics.

Main Rules Hacker

A general rule that need to be in the main follow a hacker as described by the Scorpio, which are:

Above all, respect the freedom of information & knowledge.

Will notify the system administrator of a security breach / hole in security that you see.

Do not take advantage of the hack is not fair.

Does not collect & distribute pirated software.

Never take a foolish risk - always know your own ability.

Always willing to be open / free / free to inform & teach a variety of information & method obtained.

Never to hack a system to steal money.

Never give access to someone who will make mischief.

Never deliberately damage & remove the file on the computer that dihack.

Engine in respect of hack, and treat him like their own machine.

Hackers will always be sincere act on the code of ethics and rules are in play cracker does not have any rules or code of ethics as main damage is cracker.

Differences Hacker and cracker

a. Hacker

1. Mempunyai ability to analyze the weaknesses of a system or site. For example: if a hacker trying to test the Yahoo! ascertain the content of the site will not fall apart and disrupt the others. Usually hackers to report this incident to be perfectly restored.

2. Hacker have ethical and creative in designing a program that is useful for everyone.

3. A Hacker is not stingy to share knowledge to people with serious in the name of science and virtue.

b. Cracker

1. Able to create a program for the interests of himself and destruktif or damage and make a profit. Sebagia example: Virus, Credit Card Theft, Code warez, piercing Bank Account, Password Theft E-mail/Web Server.

2. Can stand on its own or in groups to act.

3. Cenel have a site or in the IRC that is hidden, only certain people can access them.

4. Have IP that can not be tracked.

5. Cases that most often is the carding Credit Card Theft, and then change the piercing site and all its contents become disorganized. For example: Yahoo! had experienced events such as this, so can not be accessed in a long time, the case of the most warm clickBCA.com discussed years ago in 2001.

Two Types of Activities Hacking

1. Social Hacking, who need to know: what information about the system used by the server, the server who the owners, who manage the Admin Server, which is the type of connection is what then the server is connected the internet connection to handle ago any information provided by the server , whether the server is also connected to the LAN in an organization and other information

2. Technical Hacking, is a technical action to make penetration into the system, either with the tool (tool) or with the practice facility system itself that is used to attack the weakness (security hole) that is in the system or service. The core of this activity is to get full access into the system in any way and any how.

Example Hacker Case

1. In the year 1983, the first time the FBI catch the computer criminals The 414s (414 is their local area code) based in the U.S. Milwaukee. Group, which was then called a hacker is doing 60 piercing fruit machine, from a computer owned by Cancer Center Memorial Sloan-Kettering to a computer owned by Los Alamos National Laboratory. One of the perpetrators are getting TESTIMONIALS immunity because, while the other 5 to get the punishment trial.

2. Digigumi (Digital Group) is a group that specializes in the field of mobile gaming and computer techniques by using techniques to change the hexadecimal text that is in the game. For example: game Chrono Trigger English language could be changed to English. Therefore, the status Digigumi is a hacker, but not as a destroyer.

3. On Saturday, April 17, 2004, Dani Firmansyah, information technology consulting (IT) Jakarta PT Danareksa successful break in the site owned by General Elections Commission (KPU) in http://tnp.kpu.go.id and change the names of the parties in in a name "unique", such as shorts Ijo Party, Party leader Jambon, Cashew Party, and others. Dani using SQL Injection techniques (the technique is basically the way a string or a command in the browser address bar) to penetrate the site KPU. Then Dani caught on Thursday, 22 April 2004.

Due to the Ditimbulakan by Hacker and cracker

Hacker: internet technology to create more advanced because hackers using the expertise in the computer to view, find and improve the system security weaknesses in a system in a computer or software, create a spark of an administrator to work again because life hacker help administrators to strengthen their network.

Cracker: damage and paralyze the entire computer system, so the data user-data network is broken, missing, or changed.

Conclusion

The hackers use the expertise in the computer to view, find and improve the system security weaknesses in a computer system or in a software. Therefore, thanks to the hackers, and there is the Internet we can now enjoy, such as this, even continue to refine the system to become better again. Hacker can then referred to as the heroes are in the network can be called a cracker as criminals because of the network to infiltration with the intent to benefit himself in personallity with a disadvantage of others. Hacker hackers often called white (which is a hacker that is built) and the black hacker (cracker that is dismantle and destroy).

Source: http://portal.purwokerto.asia/index.php?option=com_content&view=article&id=151&Itemid=37

0 komentar