Understanding of Hackers and Crackers


 1.HACKER.Hacker is a term for those who provide a useful contribution to the network computers, create a small program and share with the people on the Internet. For example: digigumi (Digital Group) is a group specializing engaged in gaming and computers.
Digigumi uses hexadecimal techniques to change the text contained in the game. For example, the game Chrono Trigger English can be converted into the Indonesian language. Therefore, the status Digigumi are hackers, but not as a destroyer. Hacker here means, to seek, learn and change things for the hobby and development by following the legalities have been determined by the game developers. The hackers usually do infiltration-infiltration with the intention of satisfying the knowledge and techniques. Average - the average company in the world of global networks (the Internet) also has a hacker. His job is to keep the network from possible destruction of an outside party "crackers", test the network from possible holes that become opportunities the cracker tear - tear apart the network, for example: insurance companies and auditing "Price Waterhouse". He has a team of hackers called the Tiger Team. They work for their client to test security systems.
2. CrackerCracker is a term for those who go into other people's systems and crackers more destructive, usually on a computer network, bypassing passwords or licenses computer programs, computer security against intentional, deface (alter front page of the web) belongs to someone else even up to delete the data of others, stealing data and generally do the cracking to his own advantage, malicious intent, or for other reasons as there are challenges. Some of the piercing done to demonstrate the security weaknesses of the system.
HIERARCHY / LEVELS HACKER1. EliteCharacteristics: understand the operating system inside and out, able to configure & connect a global network, perform programming every day, efficient & skilled, to use his knowledge to the right, does not destroy data, and always follow the rules. Elite level is often referred to as? Temperature?.
2. Semi EliteThe characteristics: younger than the elite, have the ability & extensive knowledge of computers, understand the operating system (including holes), the ability of the program enough to change the program exploits.
3. Developed KiddieThe characteristics: young age (ABG) & still in school, they read about the methods of hacking & how on various occasions, tried different systems to ultimately succeed & proclaiming victory to another, generally still use Graphic User Interface (GUI) and just learn the basic of UNIX without being able to find a hole new weakness in the operating system.
4. Script KiddieCharacteristics: like a developed kiddie as well as Lamers, they only have technical knowledge of networking is very minimal, not separated from the GUI, hacking done using a trojan to scare & troublesome life most Internet users.
5. LamerThe characteristics: does not have the experience & knowledge but want to be a hacker, so often referred to as a lamer? Wanna-be? hackers, use their computers mainly to play games, IRC, exchange prirate software, stealing credit cards, using software hacking trojan, DoS nuke, likes to brag via IRC channels, and so on. Because many shortcomings to achieve the elite, in their development will only be up to the level of developed or script kiddie kiddie course.
Crackers do not have a specific hierarchy because it is only dismantle and destroy.

Hacker Code1. Being able to access computers and infinite totality.2. All information should be FREE.3. Do not believe in the authority, which means expanding decentralization.4. Do not use a false identity, such as the ridiculous pseudonym, age, position, etc..5. Being able to create beauty in the computer art.6. Computers can change lives for the better.7. The work will be undertaken solely for the sake of the truth of the information to be transmitted.8. Hold firm commitment not to defend the economic dominance of industry specific software.9. Hacking is the majority of weapons in the war against the encroachment of computer technology.10. Both Hacking and Phreaking is the only other way to disseminate information to the masses so as not to stutter in the computer.
CODE CRACKER NOT HAVE ANY.================================================== ==Code Hacker.General description of rules that should be followed a hacker as described by Scorpio, namely:• In above all, respect the knowledge & freedom of information.· Notifying the system administrator will be the security breach / security holes that you see.· Do not take unfair advantage of a hack.· Not collect & distribute pirated software.· Not ever taking a foolish risk? always know their own abilities.· Always be willing to be open / free / free inform & teach a variety of information & methods obtained.· Not have to hack a system to steal money.· Not ever give access to someone who will make mischief.· Not ever intentionally delete & destroy files on the hacked computer.· Respect the hacked machines, and treat him like my own machine.
Real hackers will always act based on the code of ethics and rules of the game was a cracker does not have a code of ethics or rules of the game because of its destructive crackers.================================================== ==Differences Hackers and CrackersHACKER1.Mempunyai ability to analyze the weaknesses of a system or site. For example: if a hacker tries to test the Yahoo! site confirmed the content of those sites will not be messy and disturb others. Usually hackers reported this incident to be fixed to be perfect.2.Hacker have ethical as well as creative in designing a program that is useful for anyone.3. A hacker is not stingy to share his knowledge to those who seriously the name of science and virtue.
CRACKER1. Being able to create a program for the benefit of himself and is destructive or damaging and make a profit. As our example: Viruses, Credit Card Theft, Warez Code, Bank Account Burglary, Theft E-mail/Web Password Server.2. Can stand alone or in groups in action.3. Having a site or our channel on IRC is hidden, only certain people can access it.4. Having an IP that can not be traced.5. The most frequent case is that Carding Credit Card Theft and burglary site and change everything in it becomes a mess. For example: Yahoo! never experienced anything like this so can not be accessed in a long time, the case of the most hotly discussed clickBCA.com 2001.

Alexa Traffic Rank

Enjoy in My Room's




tips and trik computer
  • Tips and Trik Computer
    Tips and Trik Computer for system...
  • INDONESIA You Can !!
    Free or.....
  • Theme Win8 For Win7
    Changing your windows 7 with the...
  • WINDOWS 8 ALL(microsoft)
    If you've been waiting to get your hands on Windows 8,...
  • Full AVG Anti-Virus Pro 2012
    AVG Anti-Virus offers real-time protection against...


  •