BELAJAR KILAT SEO

Belajar SEO dengan step by step secara cepat, mudah dimengerti dan mudah untuk diterapkan BELAJAR KILAT SEO
BELAJAR KILAT SEO. Powered by Blogger.
Showing posts with label Hacking Activity. Show all posts
Showing posts with label Hacking Activity. Show all posts

Monday, September 8, 2014

[HACKER VS CRACKER]

Posted By: jack - 1:31 AM

On the other side of the world Hacker. There is also a set of expert computer underground, 'Techno Junkies', or better known as CRACKER. 

Cracker is the dark side of the Hacker. They use traditional their ability to gain access to the computer/data bank and secret data. basically they are smart people, their brilliance in computer science to match even more than Hacker, but unfortunately the science they used to things that are not useful. 

From this we can draw the conclusion that, there is a gap between the Hacker Cracker. Both are relevant but not the same. Both keep electronic activists, but runs on a different path. 

For Hackers, they are usually a bit reluctant to get in touch with Cracker. Crackers should get out of the 'Play Pen'(a box of baby play) and begin to respond to serious computer not just play(read: experiment)

[IDENTIFICATION OF HACKER]

Posted By: jack - 1:30 AM

According to Marc Rogers, Hacker can be identified above: 

[1]. Old School Hackers 
The group's oldest and pioneer of mythology Hacker. They are a group of young people 'Techno Nerd' from MIT or Stanford University. They so enjoy programming and systems analysis system without interest to vandalism and theft of data. 

[2]. Script Kiddies or Cyber ​​Punks 
This group usually younger. They were aged 12-30 years and most are still in school. Bored to school, but they have a broad knowledge of technology. They took the scripts/exploits then use it to destroy the system as much as possible that can be done. 

[3]. Professional criminal or CRACKERS 
This group has a very high computer skills, but has a great destruction of nature instinct. They are usually paid by a company for its business knockdown. 

[4]. Coder/Virus Writer 
Natural talent programmer. They are able to do Coding every day, and find weaknesses. They are attracted to an artificial life. Make something that 'lives' in the computer. Try it in a lab computer virus called 'ZOO', then release it in the wild (read: Internet)

[THE HACKER]

Posted By: jack - 1:28 AM

Let's start stepping ...
'I am a hacker, enter my world.'

[The Conscience of Hacker, The Mentor]
Hacker dominated by men, and most of the young men. Fair enough I guess, considering every man has a dream and the will to make it happen. Hackers socially, intermediate social status. Medium in the sense that they are quite wealthy and could have a computer and internet access. Indeed, the Internet can not be separated from life hacker. On the internet was the Hackers meet, discuss and joke with each other. 

In psychology and instinctively Hackers have many similarities. Every hacker is basically the anti-authority. Where the arbitrary authority will make all the new thinking and scientific abused. Authorities also makes the system and order of life is so boring. Freedom is beautiful, but remember your freedom is the freedom of others as well. Be prepared to pull away if you start to feel quite selfish. 

In social life Hackers usually do not have a place. Dissolved in social life will make you careless and even lazy. Social life was not disgusting, it's just that mainstream culture is now very hard. When the beat management techniques. Everyone is vying to create a management ideal, without ever thinking whether the system is ideal for applied engineering. 

Social life too much negative impact. Rationality has now faded. Every new theory is applied in the social life is rejected with very skeptic. And most obviously, the more a Hacker plunge into social life (non-scientific) they already do not have time to read, learn, and develop his theory. 

But this should not be judged by so extreme. After all every human being is a social being. It took others 'real'. And it is not unusual if a hacker has a good social life, participating in the social organization of society, has a boyfriend and normal life in the community. It is actually very good! 

Hackers can physically be identified with a penchant reading, eccentric, and have the mindset that even slightly deviates much. 

Fond of reading is the main requirement to become a Hacker. World can be explored through the book. Hackers are usually interested in the discussion-oriented techniques, also science fiction computer manuals (commonly called RTFM, Read The Fuckin 'Manual). 

Reading science fiction indirectly will inspire us some new things. Reading science fiction also gives us enlightenment freedom of thought. Start imagining, dreaming of something, learn and achieve! Believe it or not, but most of the discoveries of this decade is the dream of the previous decades. 

Hackers and 'eccentric' is actually no relationship at all.However with freedom of thought earlier, every Hacker applying a concept of living and a unique lifestyle, which inevitably with 'so' they feel comfortable. 

Hackers life as a teenager can be quite difficult. Teens are still not able to understand the life of a 'geek'. Geek as labeling of Hacker impressed 'glow in the dark'. Both physically and psychologically they are quite different from the 'popular kids' at school. Such as 'Peter Deutsch' (one of the first wave Hacker), 'child' does not have any capability in the field of sports, but the 'master' in mathematics. Teens today are much more appreciative of the physical appearance and ability in the field. Someone should not appreciated because 'beauty', because he is a '.....', but in the world of Hackers someone appreciated what was done and what he was thinking. 

Many hackers are bored with the formalities and social demands. Even among them, trying to break the social demands. 

For example, schools. Young hackers usually hate school. School is often described as the 'Baby Food'. When Hacker growing up and an insatiable curiosity to school, they learn from the world. Learn by observing, which is referred to as visual learning. Schools sometimes almost certainly does not provide an answer to the curiosity of a Hacker. One of the reasons why they hate school. 

The only way to know the world is watching. We must learn from the world. Pay attention to the world, looking for patterns and similarities then we will be able to learn a lot of things. 

For example: 
We learn in the school of law of inertia. Where an object tends to maintain its position to remain stationary or moving through a straight line. Let us connect with life. You must have to try to relax for a while on the day off. The first day you spend to play Play Station (not learned). Day 2 you spend 8 to try the latest games that you downloaded along with his crack (without learning). Likewise, the next day you spend with playing without learning, until after the holidays. And when you start to re-learn, you will get into trouble and sometimes you have to start from scratch (scratch) anymore. When this is the 'inertia' happen to you. Yourself you tend to retain a position to keep playing and without you realizing that you have to be 2 units on the right point of balance (2 points goodness), it is now being 2 units left of the equilibrium point (2 points ugliness). You have shifted the 4 steps backward from the starting position. So to reach a value higher than the initial position before, you have to expend energy by: 

2 (to the point of balance) + 2 (your starting position) + n (the position you want to achieve). 

All things in life are interconnected. Learn !! 

"Learn this universe. Do not feel disappointed if the world does not know you, but was disappointed if you do not know the world"

[Kong Fu Tse]

And I found a world out there..

Posted By: jack - 1:23 AM

[H3D87] 
Back in 1959 when this all began. No one can imagine "EAM room" in Building 26, MIT at that time. A new room at MIT, Massacusetts Institute of Technology where a machine that works like a computer fast asleep. 

At that time not many people who can imagine a smart machine, a computer. However, a fortune for some young people who are members of the 'TECH MODEL RAILROAD CLUB', TMRC. When the gates are wide open, and it's time to HACKING and discover how this machine works. 

Hacker is a nickname for a programmer who is able to make an application or a problem-solving algorithm that is better than the one designed together. Broader than that Hacker is a person who can overcome the limitations of the better ways and simple, impressed even unique. 

Hackers have a steady mindset in solving problems about logic and analysis. This is a lot to make Hacker melabelisasi themselves as a 'NERD'. The same principle is carried out as a social leap where the lack of public recognition will 'mental / behavioral' Hacker itself. 

With the passage of time, the meaning of Hacking began to spread even infringe on the true meaning. 

Hacking. Every computer maniac, 'Techno Nerd', 'Hackivist', 'hacker' has its own sense of Hacking. 

[1] H3D87 (Author) 
Hacking is a form of thinking and problem-solving techniques are better than that has been designed with a unique and sometimes impressed. 

For me, Hacking is not just hanging in the context of computers, software hacking, kernel hacking, hardware hacking. But in the context of the world. The world is a beautiful place to Hacking. Pay attention to the world, take a problem and start looking for ways to better cope with. 

'Look, Learn, Master'

[H3D87] 

[2] R. Kresno Aji 
Hacking is an art to understand the operating system and also one of the ways to explore the network security system, so that we can find better ways to secure systems and networks.

(Thanks for the input :), H3D87) 

[3] y3dips (echo staff) 
Hacking is how to provide "nutrition" is more to your brain, how fun to be able to carry out all possible certainty hacking was a spur of the limits of the ability to find satisfaction, find, discover and find. hacking is not a crime but an art to "live" in cyberspace

[4] on your own ... (find) 
Before going any further, it helps you absorb the meaning of Hacking in your life. Every human being has their own way of thinking and understanding, it is time for you to search for the meaning of Hacking, according to your conscience !! 

Sunday, September 7, 2014

all about hacking - from outside

Posted By: jack - 1:16 AM

*RFC1392, the Internet Users Glossary,: Hacker is: A man who is interested to know in depth about the workings of a system, computers, or computer network"

Definition:
========
hack
[in general]
  1. Job done quickly and successfully, although not perfect
  2. A thing is impossible, and probably spend a lot of time but produces desired.
  3. For prove either emotionally or physically that this can be done
  4. Doing something in earnest, with high accuracy
  5. Interacting with computers in the play and explore
  6. Short for hackers
hackers
[originally, someone who makes crafts with an ax]
  1. A person who is very happy to explore a program of a system to limit its ability to determine,   using the basic ways that will be used by people who do not understand and know how the program was created and with minimum knowledge of the program.
  2. A person who is very enthusiastic in making a program, and enjoy making the program more than theorize about the program.
  3. A person who is able to do a "hack"
  4. Someone who is very good in programming
  5. Expert programming, or often do work with the program
  6. Experts who are interested in all things, examples of hackers in the field of astronomy.
  7. A person who likes the intellectual challenge with creative ideas
  8. A person who secretly trying to find important information by way of exploring, more commonly referred to as a cracker.
crack
[warez d00dz]
  1. Forced entry into a system
  2. Activity removes copy protection
  3. Program, the instructions used to remove copy protection
Cracker
  1. Someone trying to get into a network by force with the aim of taking advantage, damage, etc..
  2. A person who removes copy protection
  3. A person who carries on "crack"
Cracking
  1. Activity breaking into a computer system with the aim of damaging and destroying took this advantage with certain motives.
Ethical Hacker
===========
  1. The belief that information-sharing is a very good thing and useful, and it is an obligation (code of conduct) for a hacker to share the results of their research in a way to write code that "open- source" and provide facilities to access the information and use of equipment support where   possible.
  2. The belief that the "system-cracking" for fun and exploration is ethically not anything [OK] for a hacker, cracker remain committed not to steal, destroy and break the boundaries of             confidentiality.
 = (taken, interpreted and edited from the jargon file (version 4.4.4)) =

"Interestingly, it turns out the hacker's happening strata (levels) given by the hacker community to someone because of his skill, not because of age or seniority. I'm sure not everyone agrees with degrees that will be described here, because there is the impression of arrogance, especially in high level. to obtain recognition / degrees, a hacker must be able to create a program to exploit weaknesses in the system, write a tutorial (article), an active discussion on the mailing list, create a web site and so on. "

Hacker hierarchy
============
Maybe a bit too rough if the call hierarchy / levels hackers; I believe the term is not fully accepted     by the hacker community. I therefore apologize in advance. In general, the most high (temperature)   hackers often called 'Elite'; in Indonesia may be more often called 'temperature'. Meanwhile, at the other end of the degree of hackers known as 'wanna-be' hackers known as 'Lamers'.

Elite:
Also known as 3l33t, 3l337, 31337 or a combination of it; is spearheading the network security industry. They understand the operating system, able to configure and connect a global network. Capable of programming every day. A very natural grace, they are usually efficient and skilled, to use knowledge appropriately. They like stealth can enter the system without in the know, although they will not destroy the data. Because they always follow the rules.

Semi Elite:
Hackers are usually younger than the Elite. They also have the ability and extensive knowledge of computers. They understand about the operating system (including holes). Usually equipped with a small number of programs sufficient to alter the program exploits. Many of the attacks were conducted by hackers published this caliber, unfortunately by the Elite they are often categorized Lamer.

Developed Kiddie:
This designation is mainly because this age group is young and still in school. They read about the methods of hacking and how on various occasions. They tried various systems to ultimately succeed and proclaimed victory to another. Generally they still use Graphic user interface (GUI) and just learn the basic of Unix, without being able to find a new loophole in the operating system.

Script Kiddie:
As developed kiddie, Script Kiddie usually do these activities. As also Lamers, they only have the technical knowledge networking is very minimal. Usually can not be separated from the GUI. Hacking is done using a trojan to scare and lived most troublesome Internet users.

Lamer:
They are people without experience and knowledge who want to become hacker (wanna-be hackers). They usually read or hear about a hacker and want to like it. Use their computers mainly to play games, IRC, exchange private software, steal credit card. Usually hacking using Trojan software, nuke and DoS. Usually brag on IRC channels, etc.. Because many shortcomings to achieve elite, in their development will only be up to the level of developed kiddie or script kiddie.

Hacker Ethics and Rules
=================
  • Above all, respect knowledge and freedom of information.
  • Inform the system administrator would be a breach of security / security holes that you see.
  • Do not take unfair advantage of the hack.
  • Not distribute and collect the pirated software.
  • Never take stupid risks
  • Always know their own abilities.
  • Always willing to be open / free / free inform and teach a variety of information and methods are obtained.
  • Never hack a system to steal money.
  • Never give access to someone who will make mischief.
  • Never deliberately remove and destroy files on the hacked computer.
  • Respect hacked machine, and treats him like his own machine.
Clear of Ethics & Rules Hackers above, it is clear it is highly unlikely a real hacker will make damage in the computer.
 = (retrieved, and edited by writing: Onno w. Purbo) =

Copyright © 2013 BELAJAR KILAT SEO™ is a registered trademark.

Designed by Templateism. Powered By Blogger | Published By Gooyaabi Templates