Rabu, 27 Maret 2013

Hacker

They are opinions of the sense HACKER are :
           1. Ordinary people,
           2. Middle IT,
           3. Highly IT.

1.Opinions of ordinary people.
Hackers are people who break a system.
Hackers are people who steal other people's data through the Internet.
Hacker is having the ability to analyze the weaknesses of a system or site.

2. Middle IT.
Hacker is a term for those who provide a useful contribution to the computer network, creating a small program and give the people the internet.

 3. Highly IT.
Hacker Hacker is a computer or IT professional group, they may consist instead of computer Engineers, pengaturcara and so have a high knowledge in any computer system. Hackers have a deep interest and knowledge in the IT world to know that berkeupayaan decree anything definite flaws with the system to something cuba test system. However, the hackers are not going to do any kero \ usakkan against something that system and it is an ethical hacker.


HACKER These types can be divided into 2 types:

1. White Hat Hacker
The term in the English language are White hat: focusing action how to protect a system, which contradicts with the black hat is more focused on how the action through the system.

2. Black Hat Hacker
The term in the English language that refers to the hackers that those who break the security of computer systems without permission, usually for the purpose of accessing computers connected to the network.

On the negative side kracker :
Scanning is to know the basic things about the system that is used, either the operating system, file system, vulnerelability (Data Security) and so on.
Infiltrating into the system, this happens if there is a possibility of folders that can be accessed with Priviledge Read Write and Execute the Public. So that people can put the file on the server and then executes it. The second possibility is the weakness of the server configuration.
Breaking through the super user password, can occur if Point 2 have to do will be very easy.
Furthermore, changing the random data. damaged is the page for Junior X trus pages to 10. kracker work quickly so as not to be known by the administrator. If it should be known thinkers-thinkers administrator.
Deface (page replacement), as an example: in 2004, the last Web KPU, the party turned into a party-party Cassava, rice etc (wow, I've forgotten).

Advantages of HACKER is :
Can spread to various places
Can do programming, not just theory
Can quickly learn programming


The disadvantage of HACKER is :
Arrogant
Can steal passwords
Damaging the system

The positive side to the Hacker :
Namely Refining a system.
whereas a kracker more destructive. Generally cracking kracker do to use resources in a system for its own sake.

A. In the world of underground people who become hackers usually through the following stages :
1. Mundane Person
2. Lamer
3. Wannabe
4. Flyblow
5. Hacker

B. There are two levels of hackers based on their expertise, namely :
1. Wizard
2. Teacher

C. Hacker character itself is split into two, they are more inclined to lead to kracker properties. Both of these characters are :
1. Dark-side hacker
2. Malicious Hackers

A. Stages:
1. Mundane Person :
          Steps taken by those who become hackers. Mundane Person is the bottom level. Someone at this level basically do not know anything about the hacker and his ways, though he may have his own computer and Internet access. He only knew that the name hacker broke into the computer system and do things the negative (crime).

2. Lamer :
          Steps taken by those who become hackers. A person at this level is still confused by the ins and outs of hacking because he thought that doing the same hacking warez ways (in the world of underground means doubling the software illegally). His knowledge of such things is still minimal, but it's been trying to learn. Someone at this level are able to send trojan (made by others) to or on someone else's computer when doing a chat on IRC or ICQ and delete their files. Though he did not know exactly how the trojan works. Someone who went on to become a hacker usually can get through this stage quickly even jump.

3. Wannabe :
          Steps taken by those who become hackers. At this stage one has to know that taking action hack was more than just break into someone else's computer. He better think of it as a philosophy or a way of life. Finally he so wanted to know more. He began to search, read and learn about hacking methods from a variety of sources.

4. Larvae :
          Stage through which they are a hacker. Also known as the newbie. At this stage he had already had the basics of hacking techniques. He will try to break into other people's systems just to try what he had learned. However, at this stage he understood that when he did not have to hack the system damage or remove anything if it is not necessary to cover his tracks.

5. Hacker :
          The same sense in the first paragraph.


B. Levels of expertise:

1. Wizard :
          This term literally means Shaman, Necromancer. Wizard is one of guidance when running the program, either at the time of installation, setting, and sebagainya.Tingkatan skills of a hacker. The term is given to someone who has extensive knowledge in their field. His ability is not in doubt.

2. Teacher :
          The level of expertise of a hacker. This term is used on someone who knows all the things on the field, even that is not documented. He developed the tricks of its own beyond the limits required. If the application relates to the field, he knows more than the manufacturer's application.

C. Character Hacker :
1. Dark-side Hacker :
          Characters from destructive hackers. The term is derived from the movie Star Wars George Lucas. A Dark-side hacker just like Darth Vader (Star Wars character) are interested in the power of darkness. It has nothing to do with the issue of "good" or "bad" but rather to the problem of "illegal (according to law)" and "chaos". A Dark-side hacker has the same ability with all the hackers, but the "dark side" of the mind making it a dangerous element for the whole community.

2. Malicious Hackers :
          Characters from destructive hackers. Hackers have attacked the evil nature of the system with malicious intent. Term to refer to someone that damages someone else's system to a fad (not guilty) without obtaining any of these actions.



Tidak ada komentar:

Posting Komentar