|HOME | | IMPACTS | CYBER-CRIME | INTERVIEW| ABOUT US|
Hacker Versus Cracker
Hacker emerges in the early of year 1960-an between the member of student organizations Tech Model Railroad Club in Artificial Intelegence Labotatory, Massachusetts Institute of Technology ( MIT). Group of the student is one of development pioneer of computer technology and they operate with a number of mainframe computers. Said hacker first time emerges with positive meaning to call a member having expertise in the field of computer and can make better computer program from which has been designed together. Then in the year 1983, hacker analogy increasingly grows to call someone who is having obsession to comprehend and masters computer system. The reason is, in the year for the first time of FBI catchs criminal group of computer The 414s being based on in Milwaukee AS.
414 is local area code of the group that is then is called as the hacker expressed is guilty to leaking 60 fruit of computer, from computer property of finite Heart Center Memorial Sloan-Kettering of computer property of Laboratorium Nasional Los Alamos. One of the from between the perpetrators gets impenetrability because of it ( while 5 other perpetrator gets penalization of probation).
Then , after emerges other group confess they are hackers by themself, though not. They ( especially the adult mans) are getting satisfaction of through?Via leaking computer and angles telephone ( phreaking). Real hacker calls this people ' cracker ' and antisocial with them. Real hacker looks into cracker as a lazy, not responsible, and not too smart. Real hacker disagree if it’s tolds like if that by infiltrating security and safety, then someone has become hacker.
The hackers perform a meeting once a year that is performed every mid of July in Las Vegas. Meeting place of the biggest hacker in the world is named [by] Def Con. Event Of more Def Con to transfer place of information and technological related to hacking activity.
Understanding of Hacker and Cracker
Hacker is mention for them which giving useful contribution to computer network, makes small program and allots it with people in Internet. For example : digigumi ( Digital Group) be a group majoring peripatetic theirself in the field of game and computer. Digigumi this applies technique technique hexadecimal to change text which there is in game.
Cracker is mentioned for them, who stepping into others system and cracker is more to the character of destructive, usually in computer network, bypassing password or computer program license, intentionallyly fights against computer security, defacing ( changes home pages web) property of others even finite deleting others data, steals data and generally does cracking to the advantage [of] x'self, intention of bad, or because of other because they feel it’s challenging. Some leaking processes done is show safety system weakness .
Hierarchy / Hacker Levels
Marking : understands operating system inside out, configuraton ready to & joints network globally, does programming every day (its efficient & skilled), applies its(the knowledge is correctly, doesn't break data, and always go by the book) . Level Of this Elite often is conceived of master.
Marking : more youngly from smart set, has ability & wide knowledge about computer, understands about operating system including its(the hole), ability of its(the program is enough to change program exploits.
3. Developed Kiddie
Marking : its(the age still be young ( teenagers) & still at school, they read about hacking method & its way in various opportunities, tries various systems until finally success & proclaims victory to other, generally still using Grafik User Interface ( GUI) & has just learnt basic from UNIX without can find new weakness hole in operating system.
4. Script Kiddie
Marking : like developed kiddie as well as like Lamers, they only had technical knowledge of networking a real minimum, doesn't get out of GUI, hacking is done to applies trojan to daunt & troubles life some of consumers Internet.
Marking : doesn't have experience & knowledge but wants to be hacker so that lamer often is conceived of wanna-be hacker, usage of computer they especially for fun game, IRC, conversion converts software prirate, steals credit card, does hacking by using software trojan, nuke & Pack, likes blufves x'self through IRC channel, etcetera. Because many problems to reach elite, in its progress they will only grow until kiddie or script kiddie levels only.
Cracker didn't have any special hierarchy because its character only unloads and destroys.
Hacker Code Of Ethics
1. Can access unlimited computer and totality.
9. Hacking is majority weapon in action fights against collision of computer technology boundary.
10. Either Hacking and also Phreaking is the only other road or street to propagate information at mass that non muttering in computer.
Cracker doesn't have any code of ethics.
Hacker Rule Of The Game
Image of rule of the game, public that needs to know in following a hacker as in explaining by Scorpio, that is:
- Above anything, respects knowledge & information freedom.
- Hacking never have a system to defalcate.
- Have never given access to someone which will make damage.
- Have never been intentionallyly vanishs & destroys file in computer hack.
- Respects machine which in hack, and treats him/her like machine .
Real hacker would acting medium code of ethics base and rule of the game of. Cracker doesn't have code of ethics or rule of the game.
Virus, worm, trojan, and spam ?
Virus, is a bunch of binary code or program code which have ability to duplicate itself to memory and hard disk and modifies any specified working process,it’s also can change the target internal structure,so the target must run the virus(autorun).
Example: Brain, Ohe half, Die hard, XM/Laroux, Win95/CIH.
Worm, is a bunch of binary code or program code which have ability to duplicate itself too,BUT ONLY to computer memory . The primary difference between worm and virus is the ability to infect target code. Virus infect target code,but once more, worm ONLY stay in memory.
Example: I-Worm/Happy99(Ska), I-Worm/ExploreZIP, Sobig, Nimda, Code Red, Sircam.
Usually,worm is in executable file form(with .EXE and .SCR extension),it’s usually attached in E-Mail.But,there is some kinds of worm which written in Visual Basic language(VBScript).Worm biasanya berbentuk file executable (berekstensi .EXE atau .SCR), yang terlampir (attach) pada email. Namun, ada beberapa jenis worm yang berbentuk script yang ditulis dalam bahasa Visual Basic (VBScript).
Example autorun.vbs, script.vbs, explore.vbs.
Trojan is group of binary code or program code which produced for bad purpose.It’s called as trojan because it’s use trojan horse tactic. Trojan cannot duplicate itself,but trojan can ‘ride’ another program utility as the ‘horse’.
Spam is a ‘send e-mail activity’,but emails here is keep coming and coming to someone inbox or newsgroup without agreement from acceptor. Spam is called junk-mail too. Actualy, we could call this spam as chain-mail too, because most of the spam always ask the acceptor to send the spam to next acceptor in address book. Spam is also definited as posting activity of advertisements or weird comment which don’t have any connection to the topic in forum thread.
Now in internet, we often see if plagiarism is happen any times and in any sites. The meaning of plagiarize is take and use someone else ideas, words, etc as if they were one’s own (in this case, it’s files), without any rights to do it. As an example, if there is document formatted file in internet, we can directly take (download) it and mostly without problem. Although there is written the name of the maker, it could be changed easily in a minute. We can call this action as plagiarize when the files has showed to the public without copyrights/any reserved rights. This is a very bad news for the maker/inventor of the files, because they lose their executive rights of the files.
In journalist world or even in laws, plagiarism is committed as an action that breaking laws of journalist ethics, and some journalists can catch the act for instance. Some commoners are say if they copy journalist and academic subjects with out wills to do it, but still, the first maker have the full rights of the files as we could see. Plagiarism is happen a lots of time and we often not realize if we sometimes do it, it happens in various ways like in culture, educations, business, and technologies. When internet is come to us for modern way of life, it’s also give plagiarism a modern way for grow bigger and smarter, where we can see without doubts if it’s more easy to copy text file than it’s physical body in book. Every ones can do it, and with internet plagiarism is like a piece of cake job, just press Ctrl+C and Ctrl+V and then voilaa, we get a new and fresh copy of instant hard-built file.
These are some example of plagiarize something:
However, an act is categorized as plagiarize ,if only when the plagiarist is think if that copy is very important and give the plagiarist useful things, either it’s profitable or non-profitable things.
A lots of people doesn’t know about the difference between doing a research with taking somebody file and plagiarism. The limit of plagiarism and that kind of research is often not as clear as water. As a key, it’s not categorized as plagiarism if we know and use the right to use it. For example, we can looked from a lots of software that we bought (original, of course) and installed in our computer , license agreement would be there. License agreement is one example of an official right distribution so when we copy it, we can own the right to use it and this is not plagiarism.
So, at last we can conclude two things. First, people often do plagiarism because it gives them something good, either it’s profitable or non-profitable. Second, we can avoid plagiarism when we know and do the rights we have. As long we have the right it mean there is no problem.