Minggu, 08 Juli 2018

Sponsored Links

Can you hire a hacker? | Open Data Security Cyber Security Services
src: opendatasecurity.io

The hacker computer is any skilled computer expert who uses their technical knowledge to fix the problem. While "hackers" may refer to skilled computer programmers, the term has become associated in popular culture with a "security hacker", someone who, with his technical knowledge, uses bugs or exploits to break into computer systems.


Video Hacker



Definition

Reflects two types of hackers, there are two definitions of the word "hacker":

  1. technologists and subculture programming.
  2. someone capable of subverting computer security. If doing so for malicious purposes, that person can also be called a cracker.

Currently, the main use of "hackers" mostly refers to computer criminals, due to the mass media usage of the word since the 1980s. These include so-called hacker slang "script kiddies", people break into computers using programs written by others, with very little knowledge of how they work. This use has become so dominant that most people are unaware that different meanings exist. While the self-appointment of fans as hackers is generally recognized and accepted by computer security hackers, people from programming subcultures perceive computer intrusions related to wrong usage, and emphasize the difference between the two by calling the cracker security cracker (analogous to safecracker).

Controversy is usually based on the assertion that the term originally meant someone was tinkering with something in a positive sense, that is, using the versatility of play to achieve a goal. But then, supposedly, the meaning of the term shifted for decades and came to refer to computer criminals.

Because security-related uses have spread more widely, the original meaning becomes less known. In popular use and in the media, "computer intruders" or "computer criminals" are the exclusive meaning of the word today. (For example, "An Internet hacker 'breaks through state government security systems in March.") In the computer enthusiast community (Hacker Culture), the primary meaning is a free description for a brilliant programmer or technical expert. (For example, "Linus Torvalds, the creator of Linux, is considered by some as a hacker.") A large segment of the technical community insists the latter is the use of the word "true" (see Jargon File definition below)).

Current mainstream media usage can be traced back to the early 1980s. When the term was introduced to a wider society by mainstream media in 1983, even those in the computer community called computer intrusion "hacking", though not as an exclusive definition of the word. In reaction to increasing media use of the term exclusively with criminal connotations, the computer community began to distinguish their terminology. Alternative terms like "cracker" were created in an attempt to maintain the distinction between "hackers" within the legit programmer community and those who hack computer. Further terms such as "black hat", "white hat" and "gray hat" were developed when laws against computer break-ins took effect, to distinguish criminal activity from legal activities.

However, the use of news networks of this term consistently deals primarily with criminal activity, despite attempts by the technical community to defend and distinguish its original meaning, so today the mainstream media and the general public continue to portray computer criminals, with all levels of technical sophistication, as "hackers "and generally do not use the word in its non-criminal connotation. Media members sometimes seem unaware of the differences, grouping legitimate "hackers" like Linus Torvalds and Steve Wozniak along with criminal "crackers".

As a result, the definition is still the subject of heated debate. The wider dominance of the pejorative connotations is hated by many people who object to terms taken from their cultural jargon and used negatively, including those who historically prefer to identify themselves as hackers. Many advocates use newer and more nuanced alternative terms when describing criminals and others who negatively exploit security flaws in software and hardware. Others prefer to follow common popular usage, arguing that its positive form is confusing and impossible to expand in the general public. A few still use the term in both senses despite the controversy, leaving the context to clarify (or leave ambiguous) meaning intended.

However, since the positive definition of hackers has been widely used as the primary form for many years before a negative definition was popularized, "hackers" can therefore be seen as a shibboleth, identifying those using technical-oriented senses (as opposed to exclusively intrusion-oriented sense) as members of the computing community. On the other hand, since various industrial software designers may find themselves in, many prefer not to be called hackers because they keep negative denotations in many of these industries.

A midway position might have been suggested, based on the observation that "hacking" describes the collection of skills and tools used by the hackers of both descriptions for different reasons. An analogy is made for locksmiths, specifically choosing keys, which are skills that can be used for good or evil. The main disadvantage of this analogy is the inclusion of script kiddies in the popular use of "hackers", regardless of the lack of skills and the underlying knowledge base.

Sometimes, the "hacker" is only used synonymously with "geek": "True hacker is not a group person, he's a person who likes to stay up all night, he and the machine in a love-hate relationship... They're back kids who tend to be brilliant but not too interested in conventional goals [...] This is a term of derision and also ultimate praise. "

Fred Shapiro thinks that "the general theory that 'hackers' at first is a harmless term and the evil connotation of the word is the latter deviation is not true." He discovered that the evil connotation was at MIT in 1963 (quoting The Tech , an MIT student newspaper), and at the time referred to an unauthorized telephone network user, that is, the phreaker movement that developed into subculture of computer security hackers today.

Maps Hacker



Type

The hacker culture

The hacker culture is an idea derived from the community of enthusiastic computer programmers and system designers in the 1960s around the Tech Model Railroad Club (TMRC) at the Massachusetts Institute of Technology (MIT) and the MIT Artificial Intelligence Laboratory. This concept extended to a home-based hobby computer community, focused on hardware in the late 1970s (eg Homebrew Computer Club) and on software (video games, cracking software, demoscene) in the 1980s/1990s. Then, it will continue to include many new definitions such as art, and Life's hacking.

Hacking related security

Security hackers are the ones who are involved with circumventing computer security. Among the security hackers, there are several types, including:

White hat is a hacker that works to keep data secure from other hackers by finding system vulnerabilities that can be reduced. White hat is usually used by the owners of the target system and is usually paid (sometimes quite well) for their work. Their work is not illegal because it is done with the approval of the system owner.

Black hat or cracker is a hacker with malicious intent. They often steal, exploit, and sell data, and are usually motivated by personal gain. Their work is usually illegal. A cracker is like a black hat hacker, but in particular someone who is highly skilled and tries through hacking to make a profit or to gain a profit, not just to ruin. Crackers find exploits for system vulnerabilities and often use them to their advantage by selling fixes to system owners or selling exploits to other black hat hackers, who in turn use them to steal information or earn royalties.

Gray hat includes people who hack for fun or for trolls. They may repair and exploit vulnerabilities, but usually not for financial gain. Even if harmless, their work can still be illegal, if done without the owner's approval of the target system, and a gray hat usually associated with a black hat hacker.

British Hacker Stole $600,000 in Bitcoin, Sentenced 10 Years ...
src: www.bitcoinmarketinsider.com


Motives

Four main motives have been suggested as a possible reason why hackers are trying to break into computers and networks. First, there are criminal financial benefits that can be gained when hacking the system with the specific purpose of stealing credit card numbers or manipulating the banking system. Second, many hackers have succeeded in increasing their reputation in the hacker subculture and will leave their grip on the damaged website or leave some other evidence as evidence that they are involved in a particular hack. Third, corporate espionage enables companies to obtain information about products or services that can be stolen or used as an influence in the market. And fourth, state-sponsored attacks provide countries with wartime and intelligence-gathering options conducted in, at, or through cyberspace.

Hacker Stealing Dollars From Bank Stock Photo, Picture And Royalty ...
src: previews.123rf.com


Overlaps and differences

The main basic difference between the programmer subculture and the computer security hacker is that most of the origins and development of their separate histories. However, the Jargon File reported that many overlaps emerged for early phreaking in the early 1970s. An article from the student paper MIT The Tech uses the term hacker in this context already in 1963 in the pejorative sense for someone who messes up the phone system. Overlaps quickly begin to break when people join in activities that do so in a way that is less responsible. This is the case after the publication of an article that exposes the activities of Draper and Engressia.

According to Raymond, hackers from programmer subcultures usually work openly and use their real names, while computer security hackers prefer secret groups and identity-hiding identities. Also, their activities in practice are largely different. The first focuses on creating new infrastructure and improving existing ones (especially the software environment in which they work), while the latter primarily and heavily emphasizes the general action of security measures, with effective use of knowledge (which can report and help fix bugs security, or reason for exploitation) becomes somewhat secondary. The most visible difference in these views is in the design of an incompatible Team Matching System of MIT hackers, who deliberately have no security measures whatsoever.

There is some subtle overlap, however, since basic knowledge about computer security is also common in the hacker programmer subculture. For example, Ken Thompson noted during the 1983 Turing Award that it was possible to add the code to the UNIX "login" command which would receive the encrypted password in question or a known known password, allowing the backdoor into the system with the last password.. He named his invention the "Trojan horse". Furthermore, Thompson argues, the C compiler itself can be modified to automatically generate rogue code, to make detecting modifications harder. Since the compiler itself is a program generated from the compiler, Trojan horses can also be automatically installed in the new compiler program, with no detectable modifications to the source of the new compiler. However, Thompson separated himself strictly from computer security hackers: "I want to criticize the press on handling the 'hackers', gang 414, Dalton gang, etc. These children's actions are the best vandalism and probably the worst offense and theft... I have watched the children testify before Congress, it is clear that they are totally unaware of the seriousness of their actions. "

The hacker subculture programmer sees the secondary security mechanism as a legitimate mechanism if it is done to gain a practical obstacle from the road to doing the actual work. In special forms, it can even be an expression of playfulness. However, systematic and major involvement in such activities is not one of the true interests of hacker subculture programmers and it has no significance in its actual activities. The further difference is that, historically, members of the hacker programmer subculture work in academic institutions and use the computing environment there. In contrast, prototypical computer security hackers have access exclusively to home computers and modems. However, since the mid-1990s, with home computers that can run Unix-like operating systems and with Internet access cheap internet available for the first time, many people from outside the academic world began to take part in the subculture of hacker programmers.

Since the mid-1980s, there has been some overlap in ideas and members with the computer security hacking community. The most notable case is Robert T. Morris, who is a MIT-AI user, but writes the Morris worm. The Jargon File therefore calls him "a true hacker who made a mistake". However, members of the programmer subculture have a tendency to underestimate and break away from this overlap. They usually refer to belittling people in computer security subcultures as crackers and refuse to accept the definition of hackers that include such activities. However, computer security hacking subcultures tend not to distinguish two subcultures as rude, admitting they have many similarities including many members, political and social goals, and a love of learning about technology. They limit the use of the term cracker to the kiddies script category and their black hat hackers instead.

These three subcultures are related to hardware modifications. In the early days of network hacking, phreaks were building blue boxes and various variants. The hacker subculture programmer has stories about some hardware hacking in his folklore, such as the mysterious 'magic switch' attached to the PDP-10 computer in the MIT AI laboratory, which, when turned off, crashed into a computer. The early hobby hackers built their own home computers, ranging from construction equipment. However, all of these activities had died during the 1980s, when the telephone network switched to digitally controlled switchboards, causing network hacking to switch to long-distance computer calls with modems, when inexpensive home-based computers were previously assembled, and when academic institutions began giving individual workstation computers to scientists rather than using a central timesharing system. The only type of hardware modification that extends today is the modding case.

A meeting of computer security hacker programmers and subcultures occurred in the late 1980s, when a group of computer security hackers, sympathetic to the Chaos Computer Club (who denied knowledge of this activity), entered the computer of an American military organization. and academic institutions. They sell data from these machines to the Soviet secret service, one of them to finance drug addiction. The case was resolved when Clifford Stoll, a scientist working as a system administrator, found a way to record attacks and trace them (with the help of many others). 23 , a German film adaptation with a fictional element, showing events from an attacker's perspective. Stoll describes the case in his book The Cuckoo's Egg and in the KGB, The Computer, and Me documentaries from another perspective. According to Eric S. Raymond, it "well illustrates the difference between 'hackers' and 'crackers.' Stoll's portrait of herself, the woman Martha, and her friends at Berkeley and on the Internet paints a very clear picture of how hackers and people around they love life and how they think. "

Hackers using fake Swift emails to deploy Adwind RAT, steal bank ...
src: d.ibtimes.co.uk


See also

  • Script kiddie, unskilled computer security attacker

The Hacker - Wikipedia
src: upload.wikimedia.org


References


33 different ways to be a hacker (according to Hollywood, do not ...
src: cdn.tn.com.ar


Further reading

Computer security

Free/open source software


The Complete List of Hacker And Cybersecurity Movies, Version 1.0
src: cybersecurityventures.com


External links

  • Hacking on Wikibooks
  • Definition of Hacker dictionary in Wiktionary
  • Media related to Hackers on Wikimedia Commons

Source of the article : Wikipedia

Comments
0 Comments