Sunday 15 May 2011

Hackers vs. crackers

HACKER. noun.
1. A person WHO enjoys exploring the details of programmable systems and how to stretch Their capabilities, as opposed to most users, the WHO prefer to learn only the minimum Necessary.
2. One WHO programs enthusiastically (even obsessively) or WHO enjoys programming rather Than just theorizing about programming.

3. A person capable of appreciating hack value.
4. A Person Who is good at programming Quickly.
5. An expert at a particular program, or one WHO frequently does work using it or on it, as in `a Unix hacker '. (Definitions 1 through 5 are correlated, and people congregate Them WHO fit.)
6. An expert or enthusiast of any kind. One Might be an astronomy hacker, for example.
7. One WHO enjoys the intellectual challenge of creatively Overcoming or circumventing limitations.
8. [Deprecated] A malicious meddler WHO tries to discover sensitive information by poking around. Hence `password hacker ',` network hacker'. The correct term for this sense is cracker.
Meanwhile, according to Concise Dictionary Oxfor Home
hacker / n.
1. A person or thing That WHO hacks or cuts roughly.
2. A person whose uses computers for a hobby, esp. to gain unauthorized access to data.
The term itself is still not standard hackers due to some hackers have positive connotations, while for some others have negative connotations. For the first group (old school), for
perpetrators of evil are called crackers. Boundaries between hackers and crackers are very thin. These limits are determined by ethics. morals, and integrity of the actors themselves. For further in this book we will use the word hacker as generalisir from hackers and crackers, except when explicitly indicated. Paul Taylor in PhDnya dissertation [42] revealed the existence of three groups, namely the Computer Underground (CU), Computer Security Industry (CSI), and academic groups. The difference between these groups sometimes indecisive. For systems that are domiciled in Indonesia are physically (physical) and logical (logical) security threats can come from various parties. Based on the source, acaman can be categorized as originating from abroad and from within the country. Acaman originating from overseas hackers example is Portugal's rampage through
Web site owned by the Indonesian government. Based on the motives of the destroyer, is based politics, Economy, and some are just looking for fame. Political problems seem to often be a reason to attack a system (both inside and outside the country). Some examples of attacks that use political reasons, among others:
• Attacks from hackers Portugal which alter the contents of some web sites owned by the government of Indonesia is because hackers do not agree with what the Indonesian government in East Timor. In addition to changing the content of the web site, they also tried to damage the existing system by removing the entire disk (if possible).
• Attacks from hackers China and Taiwan on some web site of riots in Jakarta, Indonesia (May 1998) which led to ethnic Chinese in Indonesia has received unfair treatment. Hackers are changing some of the web site of Indonesia to express their distaste for what has happened.
• Some of the hackers in the United states will damage the system of government-owned Iraq when terjeadi political tensions between America and Iraq.

No comments:

Post a Comment