Hacker or Cracker ? are you?

About Hacker n Cracker
1. Hacker

Hacker is someone who give their contribution n knowledge about software n computer-network with people on internet. As example: Digigumi (digital group) is a group who special move in game n computer scope. Digigumi use hexadecimal tech to change text in the game (Ex:Crono Trigger) , they translate English to Indonesian language. So because of that Digigumi we can call them a hacker, but not as destructive.
Hacker in here mean search, learn n change just for a hobby n developing of somethings with following a legality from game developer. The hacker usually doing penetration or infiltration just for their satisfy of knowledge n technique. generally the companies who active at global-networking(internet) have a hackers.
Their jobs are guard network from other companies destruction "Cracker", testing the net-hole who can to be an opportunities for cracker to destructive the net (Ex: the insurance company and auditing "Price Waterhouse" who had own hacker team n it call "Tiger Team")

2. Cracker


Cracker the name for who infiltrate other system n cracker more destructive, usually in computer-network, they can bypass program computer password or license, against security, defacing, deleting n stealing someone data,with conscious n generally cracking for advantageous their-self, has evil purpose, or had another reasons cause have challenge. Some penetration process just to show how weak the security system.

Hierarchy / Level of Hacker

1. Elite

Char : knowing the operation system in and out, capable of configure and connect the net on global scale, doing a programming everyday, efficient and skilled,using their knowledge with right, not smash data, and always follow the rule. In this rate call as "suhu" or master

2. Semi Elite

Char : more young then elite, have talent and large-knowledge about computer, know about operating system (including the hole), their program can change exploit program.

3. Developed Kiddie

Char : generally kiddie and still school, they read about hacking and how to method at anytime, try various system until successfully and announce to the others, usually still use Graphic User Interface(GUI) and just learn basic of UNIX without find new weak-hole from operating system

4. Script Kiddie

Char : like developed kiddie and the lamers, they just have a minimum technique networking , still use GUI, doing hacking using trojan for scary and bother internet user.

5. Lamer

Char : do not have experience and knowledge but want to be a hacker so lamers also call 'wanna-be' hacker, they using a computer just for faming, IRC, stole credit card, barter a software pirate, hacking with software trojan, nuke n DoS, mess up using IRC channel, and so on. Because a lot of weakness to convenient elite, in fact they just until developed kiddie or script kiddie

the cracker don't have special hierarchy cause their behavior just infiltrate and ruin.


Code ethical Hacker

1. can access computer without limit and totally

2. All information must Free

3. Not trust of the authority, its mean large decentralization

4. Not use fake identity, like silly name, etc

5. capable in art of computer

6. Computer can change life better

7. Doing just for justice of information and must be publish

8. Strict commitment not stand guard over certain the software economic industry domination

9. Hacking is majority weapon in war against limit infraction of computer technology

10. Hacking or phreaking is the only way to spread information to people in order that not blind of computer

Cracker not have any code ethical


Deference of Hacker and Cracker

a. Hacker

1. Capable of analysis weakness of system or site. As ex: if a hacker trying to test Yahoo! site certainly that site not mess and annoying something else . Usually hacker report this case to retrieve

2. Hacker have ethical and creative in program design that useful for everyone

3. A hacker not stingy to share their knowledge to someone who seriously upon name of knowledge and goodness

b. Cracker

1. Can creating a program for him-self and have a destructive characteristic or messing and could be some profit for him-self.

2. can stand alone or not group in action

3. Have site or channel in IRC there is hide, just certain man who can access

4. Have IP who could not be trace

5. Most happen case is carding

there are 2 activating of Hacking

1. Social Hacking
Just need to know the information about what the system their use, who had the server, using what the connection, who is the administrator, is it connect to internet , like that

2. Technical Hacking
just technical how to infiltrate the system, it doesn't matter using tool or not, but the point is to get full access into the system with anything-way

Site-effect of Hacker and Cracker

Hacker : creating internet technology move forward cause hacker using his talent to look, search, and repairing the weakness of security system in the computer or software, and create work -passion of administrator life back cause hacker helping administrator to support their network

cracker : destructive and paralyzed all computer system, so the data of the net-user mess, gone or change

0 comments: