*RFC1392, the Internet Users Glossary,: Hacker is: A man who is interested to know in depth about the workings of a system, computers, or computer network"
Definition:
========
hack
[in general]
- Job done quickly and successfully, although not perfect
- A thing is impossible, and probably spend a lot of time but produces desired.
- For prove either emotionally or physically that this can be done
- Doing something in earnest, with high accuracy
- Interacting with computers in the play and explore
- Short for hackers
[originally, someone who makes crafts with an ax]
- A person who is very happy to explore a program of a system to limit its ability to determine, using the basic ways that will be used by people who do not understand and know how the program was created and with minimum knowledge of the program.
- A person who is very enthusiastic in making a program, and enjoy making the program more than theorize about the program.
- A person who is able to do a "hack"
- Someone who is very good in programming
- Expert programming, or often do work with the program
- Experts who are interested in all things, examples of hackers in the field of astronomy.
- A person who likes the intellectual challenge with creative ideas
- A person who secretly trying to find important information by way of exploring, more commonly referred to as a cracker.
[warez d00dz]
- Forced entry into a system
- Activity removes copy protection
- Program, the instructions used to remove copy protection
- Someone trying to get into a network by force with the aim of taking advantage, damage, etc..
- A person who removes copy protection
- A person who carries on "crack"
- Activity breaking into a computer system with the aim of damaging and destroying took this advantage with certain motives.
===========
- The belief that information-sharing is a very good thing and useful, and it is an obligation (code of conduct) for a hacker to share the results of their research in a way to write code that "open- source" and provide facilities to access the information and use of equipment support where possible.
- The belief that the "system-cracking" for fun and exploration is ethically not anything [OK] for a hacker, cracker remain committed not to steal, destroy and break the boundaries of confidentiality.
"Interestingly, it turns out the hacker's happening strata (levels) given by the hacker community to someone because of his skill, not because of age or seniority. I'm sure not everyone agrees with degrees that will be described here, because there is the impression of arrogance, especially in high level. to obtain recognition / degrees, a hacker must be able to create a program to exploit weaknesses in the system, write a tutorial (article), an active discussion on the mailing list, create a web site and so on. "
Hacker hierarchy
============
Maybe a bit too rough if the call hierarchy / levels hackers; I believe the term is not fully accepted by the hacker community. I therefore apologize in advance. In general, the most high (temperature) hackers often called 'Elite'; in Indonesia may be more often called 'temperature'. Meanwhile, at the other end of the degree of hackers known as 'wanna-be' hackers known as 'Lamers'.
Elite:
Also known as 3l33t, 3l337, 31337 or a combination of it; is spearheading the network security industry. They understand the operating system, able to configure and connect a global network. Capable of programming every day. A very natural grace, they are usually efficient and skilled, to use knowledge appropriately. They like stealth can enter the system without in the know, although they will not destroy the data. Because they always follow the rules.
Semi Elite:
Hackers are usually younger than the Elite. They also have the ability and extensive knowledge of computers. They understand about the operating system (including holes). Usually equipped with a small number of programs sufficient to alter the program exploits. Many of the attacks were conducted by hackers published this caliber, unfortunately by the Elite they are often categorized Lamer.
Developed Kiddie:
This designation is mainly because this age group is young and still in school. They read about the methods of hacking and how on various occasions. They tried various systems to ultimately succeed and proclaimed victory to another. Generally they still use Graphic user interface (GUI) and just learn the basic of Unix, without being able to find a new loophole in the operating system.
Script Kiddie:
As developed kiddie, Script Kiddie usually do these activities. As also Lamers, they only have the technical knowledge networking is very minimal. Usually can not be separated from the GUI. Hacking is done using a trojan to scare and lived most troublesome Internet users.
Lamer:
They are people without experience and knowledge who want to become hacker (wanna-be hackers). They usually read or hear about a hacker and want to like it. Use their computers mainly to play games, IRC, exchange private software, steal credit card. Usually hacking using Trojan software, nuke and DoS. Usually brag on IRC channels, etc.. Because many shortcomings to achieve elite, in their development will only be up to the level of developed kiddie or script kiddie.
Hacker Ethics and Rules
=================
- Above all, respect knowledge and freedom of information.
- Inform the system administrator would be a breach of security / security holes that you see.
- Do not take unfair advantage of the hack.
- Not distribute and collect the pirated software.
- Never take stupid risks
- Always know their own abilities.
- Always willing to be open / free / free inform and teach a variety of information and methods are obtained.
- Never hack a system to steal money.
- Never give access to someone who will make mischief.
- Never deliberately remove and destroy files on the hacked computer.
- Respect hacked machine, and treats him like his own machine.
Clear of Ethics & Rules Hackers above, it is clear it is highly unlikely a real hacker will make damage in the computer.
= (retrieved, and edited by writing: Onno w. Purbo) =
0 comments:
Post a Comment