Sunday, September 7, 2014

all about hacking - from outside

Posted By: jack - 1:16 AM

Share

& Comment


*RFC1392, the Internet Users Glossary,: Hacker is: A man who is interested to know in depth about the workings of a system, computers, or computer network"

Definition:
========
hack
[in general]
  1. Job done quickly and successfully, although not perfect
  2. A thing is impossible, and probably spend a lot of time but produces desired.
  3. For prove either emotionally or physically that this can be done
  4. Doing something in earnest, with high accuracy
  5. Interacting with computers in the play and explore
  6. Short for hackers
hackers
[originally, someone who makes crafts with an ax]
  1. A person who is very happy to explore a program of a system to limit its ability to determine,   using the basic ways that will be used by people who do not understand and know how the program was created and with minimum knowledge of the program.
  2. A person who is very enthusiastic in making a program, and enjoy making the program more than theorize about the program.
  3. A person who is able to do a "hack"
  4. Someone who is very good in programming
  5. Expert programming, or often do work with the program
  6. Experts who are interested in all things, examples of hackers in the field of astronomy.
  7. A person who likes the intellectual challenge with creative ideas
  8. A person who secretly trying to find important information by way of exploring, more commonly referred to as a cracker.
crack
[warez d00dz]
  1. Forced entry into a system
  2. Activity removes copy protection
  3. Program, the instructions used to remove copy protection
Cracker
  1. Someone trying to get into a network by force with the aim of taking advantage, damage, etc..
  2. A person who removes copy protection
  3. A person who carries on "crack"
Cracking
  1. Activity breaking into a computer system with the aim of damaging and destroying took this advantage with certain motives.
Ethical Hacker
===========
  1. The belief that information-sharing is a very good thing and useful, and it is an obligation (code of conduct) for a hacker to share the results of their research in a way to write code that "open- source" and provide facilities to access the information and use of equipment support where   possible.
  2. The belief that the "system-cracking" for fun and exploration is ethically not anything [OK] for a hacker, cracker remain committed not to steal, destroy and break the boundaries of             confidentiality.
 = (taken, interpreted and edited from the jargon file (version 4.4.4)) =

"Interestingly, it turns out the hacker's happening strata (levels) given by the hacker community to someone because of his skill, not because of age or seniority. I'm sure not everyone agrees with degrees that will be described here, because there is the impression of arrogance, especially in high level. to obtain recognition / degrees, a hacker must be able to create a program to exploit weaknesses in the system, write a tutorial (article), an active discussion on the mailing list, create a web site and so on. "

Hacker hierarchy
============
Maybe a bit too rough if the call hierarchy / levels hackers; I believe the term is not fully accepted     by the hacker community. I therefore apologize in advance. In general, the most high (temperature)   hackers often called 'Elite'; in Indonesia may be more often called 'temperature'. Meanwhile, at the other end of the degree of hackers known as 'wanna-be' hackers known as 'Lamers'.

Elite:
Also known as 3l33t, 3l337, 31337 or a combination of it; is spearheading the network security industry. They understand the operating system, able to configure and connect a global network. Capable of programming every day. A very natural grace, they are usually efficient and skilled, to use knowledge appropriately. They like stealth can enter the system without in the know, although they will not destroy the data. Because they always follow the rules.

Semi Elite:
Hackers are usually younger than the Elite. They also have the ability and extensive knowledge of computers. They understand about the operating system (including holes). Usually equipped with a small number of programs sufficient to alter the program exploits. Many of the attacks were conducted by hackers published this caliber, unfortunately by the Elite they are often categorized Lamer.

Developed Kiddie:
This designation is mainly because this age group is young and still in school. They read about the methods of hacking and how on various occasions. They tried various systems to ultimately succeed and proclaimed victory to another. Generally they still use Graphic user interface (GUI) and just learn the basic of Unix, without being able to find a new loophole in the operating system.

Script Kiddie:
As developed kiddie, Script Kiddie usually do these activities. As also Lamers, they only have the technical knowledge networking is very minimal. Usually can not be separated from the GUI. Hacking is done using a trojan to scare and lived most troublesome Internet users.

Lamer:
They are people without experience and knowledge who want to become hacker (wanna-be hackers). They usually read or hear about a hacker and want to like it. Use their computers mainly to play games, IRC, exchange private software, steal credit card. Usually hacking using Trojan software, nuke and DoS. Usually brag on IRC channels, etc.. Because many shortcomings to achieve elite, in their development will only be up to the level of developed kiddie or script kiddie.

Hacker Ethics and Rules
=================
  • Above all, respect knowledge and freedom of information.
  • Inform the system administrator would be a breach of security / security holes that you see.
  • Do not take unfair advantage of the hack.
  • Not distribute and collect the pirated software.
  • Never take stupid risks
  • Always know their own abilities.
  • Always willing to be open / free / free inform and teach a variety of information and methods are obtained.
  • Never hack a system to steal money.
  • Never give access to someone who will make mischief.
  • Never deliberately remove and destroy files on the hacked computer.
  • Respect hacked machine, and treats him like his own machine.
Clear of Ethics & Rules Hackers above, it is clear it is highly unlikely a real hacker will make damage in the computer.
 = (retrieved, and edited by writing: Onno w. Purbo) =

About jack

Techism is an online Publication that complies Bizarre, Odd, Strange, Out of box facts about the stuff going around in the world which you may find hard to believe and understand. The Main Purpose of this site is to bring reality with a taste of entertainment

0 comments:

Post a Comment

Copyright © 2013 BELAJAR KILAT SEO™ is a registered trademark.

Designed by Templateism. Powered By Blogger | Published By Gooyaabi Templates