Mig33 ASIA

Would you like to react to this message? Create an account in a few clicks or log in to continue.
Mig33 ASIA

Mig33 Asia Community The World On Your Hand


5 posters

    about hackers

    Maistro-a
    Maistro-a
    Moderator
    Moderator


    Male
    Jumlah posting : 738
    Age : 35
    Location : Sudan (Middle East)
    Interest : ask me
    Mig33 Username : maistro-a
    WARNING :
    about hackers Left_bar_bleue0 / 1000 / 100about hackers Right_bar_bleue

    Reputation : 0
    Level : 18
    Registration date : 13.05.08

    about hackers Empty about hackers

    Post by Maistro-a Thu Jul 24, 2008 1:18 am

    Hackers


    "Hackers are the elite corps of computer designers and programmers. They like to see themselves as the wizards and warriors of tech. Designing software and inventing algorithms can involve bravura intellection, and tinkering with them is as much fun as fiddling with engines. Hackers have their own culture, their own language. And in the off-hours, they can turn their ingenuity to sparring with enemies on the Nets, or to the midnight stroll through systems you should not be able to enter, were you not so very clever. Dark-side hackers, or crackers, slip into systems for the smash-and-grab, but most hackers are in it for the virtuoso ingress.

    It's a high-stress life, but it can be amazing fun. Imagine being paid - well paid - to play forever with the toys you love. Imagine."

    From St. Jude, Mondo 2000: Users's Guide to the New Edge.




    A hacker is the one who

    1-enjoys exploring the details of programmable systems and how to stretch their capabilities, as opposed to most users, who prefer to learn only the minimum necessary.
    2-programs enthusiastically (even obsessively) or who enjoys programming rather than just theorizing about programming.
    3-is good at programming quickly.
    4-is an expert at a particular program, or one who frequently does work using it or on it; as in `a Unix hacker'.
    5-is an expert or enthusiast of any kind. One might be an astronomy hacker, for example.
    6-enjoys the intellectual challenge of creatively overcoming or circumventing limitations.
    7-is a malicious meddler who tries to discover sensitive information by poking around. Hence `password hacker', `network hacker'. The correct term for this sense is cracker.



    Hacking and Cracking
    The term "hacker" has come to be associated exclusively with breaking security. That isn't what it is at all, but hackers were willing to state their total contempt for security people, because security was one form of bureaucracy. First-generation hackers would break security because it was in the way of doing something useful. Now a lot of kids do it 'cause it's naughty. Though it is true that showing you can break security that's said to be unbreakable is a nice hack, the original hackers did not break security just to be naughty. They broke security if somebody had locked up a tool that you needed to use.

    Different Types of Hackers
    Hacking broadly refers to attempts to gain access to computers to which one does not possess authorization. The term "hackers" first came into use in the early 1960's when it was applied to a group of pioneering computer aficionados at MIT (Levy, 1984). Through the 1970s, a hacker was viewed as someone obsessed with understanding and mastering computer systems (Levy 1984). But, in the early 1980's, stimulated by the release of the movie "War Games" and the much publicized arrest of a "hacker gang" known as "The 414s", hackers were seen as young whiz-kids capable of breaking into corporate and government computer systems (Landreth 1985:34). The imprecise media definition and the lack of any clear understanding of what it means to be a hacker results in the mis-application of the label to all forms of computer malfeasance.

    Despite the inter-relationship between phreaks and hackers, the label of "hacker" is generally reserved for those engaged in computer system trespassing. For CU participants, hacking can mean either attempting to gain access to a computer system, or the more refined goals of exploring in, experimenting with, or testing a computer system. In the first connotation, hacking requires skills to obtain valid user accounts on computer systems that would otherwise be unavailable, and the term connotes the repetitive nature of break-in attempts. Once successful entry is made, the illicit accounts are often shared among associates and described as being "freshly (or newly) hacked."

    The second connotation refers to someone possessing the knowledge, ability, and desire to fully explore a computer system. For elite hackers, the mere act of gaining entry is not enough to warrant the "hacker" label; there must be a desire to master and skill to use the system after access has been achieved:


    "It's Sunday night, and I'm in my room, deep into a hack. My eyes are on the monitor, and my hands are on the keyboard, but my mind is really on the operating system of a super-minicomputer a thousand miles away - a super-mini with an operating systems that does a good job of tracking users, and that will show my activities in its user logs, unless I can outwit it in the few hours before the Monday morning staff arrives for work.....Eighteen hours ago, I managed to hack a password for the PDP 11/44. Now, I have only an hour or so left to alter the user logs. If I don't the logs will lead the system operators to my secret account, and the hours of work it took me to get this account will be wasted." (Landreth, 1985: 57-5

    An elite hacker must experiment with command structures and explore the many files available in order to understand and effectively use the system. This is sometimes called "hacking around" or simply "hacking a system". This distinction is necessary because not all trespassers are necessarily skilled at hacking out passwords, and not all hackers retain interest in a system once the challenge of gaining entry has been surmounted. Further, passwords and accounts are often traded, allowing even an unskilled intruder to erroneously claim the title of "hacker."

    Our data indicate that, contrary to their media image, hackers avoid deliberately destroying data or otherwise damaging the system. Doing so would conflict with their instrumental goal of blending in with the average user to conceal their presence and prevent the deletion of the account. After spending what may be a substantial amount of time obtaining a high access account, the hacker places a high priority on not being discovered using it, and hackers share considerable contempt for media stories that portray them as "criminals

    Hacker's Ethic
    Although sometimes skirting the law, hackers possess an explicit ethic and their primary goal is knowledge acquisition.

    Hackers and the Law
    about hackers Hack_and_law
    Hacking is a crime in most countries today. Learn about the legal aspects of hacking today.

    Hacker Mentality
    about hackers Hack_ment
    What motivates hackers? Why are they compelled to penetrate closed systems

    Major Personalities
    about hackers Major_pers
    Hackers are real people - meet some of the more famous hackers.

    Hacker Attack Detection
    about hackers How_to_detect
    Knowing how to tell when a hacker comes knocking may save your computer one day. A brief description with useful contacts

    Timeline of Incidents
    about hackers Timeline
    A timeline of the most famous hacking incidents helps track where hackers began and where they might be headed.


    that is all

    and thanks
    shunno
    shunno
    VVIP MEMBER


    Male
    Jumlah posting : 385
    Age : 35
    Location : MIG33
    Interest : Chatting&foruming
    Mig33 Username : shunno
    WARNING :
    about hackers Left_bar_bleue0 / 1000 / 100about hackers Right_bar_bleue

    Reputation : 0
    Level : 0
    Registration date : 05.06.08

    about hackers Empty Re: about hackers

    Post by shunno Thu Jul 24, 2008 5:13 am

    w0w maistro bro,great info..how you knw all about this?can you hack also?hehehe...
    WEBMASTER
    WEBMASTER
    Web master
    Web master


    Male
    Jumlah posting : 1001
    Age : 35
    Location : boyolali
    Interest : Mig33
    Mig33 Username : max.overdrive
    WARNING :
    about hackers Left_bar_bleue0 / 1000 / 100about hackers Right_bar_bleue

    Reputation : 0
    Level : 118
    Registration date : 17.01.08

    about hackers Empty Re: about hackers

    Post by WEBMASTER Thu Jul 24, 2008 6:03 am

    Thats was a long story,thanks for share,we will be aware now
    sodong
    sodong
    VIP MEMBER


    Male
    Jumlah posting : 328
    Age : 35
    Location : **in ur heart**
    Interest : mig33,reading book,browsing
    Mig33 Username : sodong
    WARNING :
    about hackers Left_bar_bleue0 / 1000 / 100about hackers Right_bar_bleue

    Reputation : 0
    Level : 0
    Registration date : 29.07.08

    about hackers Empty Re: about hackers

    Post by sodong Fri Aug 15, 2008 9:23 pm

    thanks 4 info
    keep it up rock
    id_666
    id_666
    Super member ll


    Male
    Jumlah posting : 237
    Age : 33
    Location : Indonesia
    Interest : Friendship
    Mig33 Username : id_666
    WARNING :
    about hackers Left_bar_bleue0 / 1000 / 100about hackers Right_bar_bleue

    Reputation : 0
    Level : 0
    Registration date : 20.08.08

    about hackers Empty Re: about hackers

    Post by id_666 Tue Sep 16, 2008 2:40 pm

    Wew... Thats perfect information. Thanks maistro. Keep it up.
    ** regards **

    Sponsored content


    about hackers Empty Re: about hackers

    Post by Sponsored content


      Waktu sekarang Thu Mar 28, 2024 6:57 pm