Language

5.10.2011

History About Hacker

Now start flying the Indonesian flag in the world of the Internet because the hacker community that Indonesia is very compact, attractive, advanced, innovative and open. Therefore, let us continue the struggle of the unders / ups ground Indonesia Hacker.
For the progress of informatics technology world today let's all Hacker Indonesia supports the development of technology and open source.

Here's a little review that I can describe about The history of Hack, Hackers, and Hacking :

Before the formation of the communication on the Internet, in the 1960's some computer science student at the Massachusetts Institute of Technology (MIT) who likes to perform engineering and re-engineering of the hardware and software often do open discussions of what there is to discuss issues :

    * The ideas about the development of hardware and software
    * The ideas about the transformation of technology and information

Signification of the word "Hack" is actually a word that at that time not yet have specific meaning and truth. Habits of saying "I Hack Stuff This" as if to give the sense that the term Hack is an activity that is and get the result after doing development against everything done. Developments that are specifically given to the minicomputer and microcomputer tersebutlah term "Computer Hacker" is formed.
In other words, Computer Hacker is someone who is applying the skills in the scope of computer software, computer hardware, computer architecture, computer design, and administration contained therein. A hacker has to have ability in terms of programming for the level of software, and expertise in hardware. Demands that such a breadth to the side of safety systems and network applications, providing a motivation for hackers to develop these skills so that the results of research conducted will provide a positive impact on the continuity of IT itself.
By seeing a bit of explanation above, we can give the conclusion that Hacking is not limited to illegal activity that is identical with the destruction of a system and applications, or limited to the activities of the theft of an important data, but to act to make fundamental changes or improvements improvements to the system and applications, whether in the form of software or hardware.

HACKER GROUP BY MOTIVE:

    * Black Hat Hackers who becomes the cracker / attacker who uses his ability for criminal purposes and are likely to jeopardize the interests of other parties. In general, people who joined in this group are moving individually or according to certain ideals and not bound in the interests of certain parties.
    * Grey Hat Hackers who provide information obtained to the attacker as well as vendors, to obtain certain rewards. This group is also known as crackers, ie, those who do not have any partiality on the part and sell a variety of information required according to existing needs.
    * White Hat (true hacker) People who do hacking activity in order to obtain information about the vulnerabilities, as well as the weaknesses that have to be given back to the parties concerned for an enhanced return.
    * Blue Hat who have capabilities such as white hat, but engaged in the world of education.

HACKER GROUP BASED ON ABILITY PROFILE:

Distribution of hackers based on their professional skills profile is divided into seven groups. This was as described by Marc Rogers MA, a professor of psychology at the University of Manitoba Hawaii, namely:

    * Tool Kids / Newbies The people who learn new hacking activity, but the ability of computer skills and programming techniques is relatively limited and were only able to create basic programs. Hacking activities that do, generally use the help found on the internet application to not rely purely individual capacity.
    * Cyber ​​Punk People who have the knowledge and computer engineering is higher than the newbies. They've been able to understand the characteristics of the network system or systems they are attacking. Their knowledge of programming languages ​​more reliable, because it is able to define the general characteristics. With this ability, he was able to create a tool of infiltration itself, to no longer use the auxiliary programs that are available on the internet. The activities undertaken have a tendency to crime, such as defacing web, carding, or spamming.
    * Internals People who still join or never (former) with IT companies, with the ability of your computers and programming. And perform various hacking activities by relying on various combinations of internal and external resources available for various purposes. For example, the most frequent violation is breaking over privilege activity, ie, all activities that violate the limits owned rights.
    * Coders Group this is also known as resources, ie people who sell a variety of information available on the internet to those in need. Technical programming skills and very reliable and this group malakukan infiltration activities in order to obtain various data or information which can be sold. Coders also help create a variety of applications that need help hacking by the hacker or attacker / cracker in need.
    * Old Guard Hackers (Idealism Gate Keepers) The true hacker-pure kativitas hacking activity in order for scientific purposes and the good of all parties. The amount is relatively very small group, because idealism which upheld forcing them to use a code of ethics upheld by the hackers, the ability above all else.
    * Professional Criminals of the attacker / cracker that moves on behalf of groups or individuals and do various activities of cyber crime as its main source of life. Abilities possessed by this group is perfect because it combines a variety of hardware and programming knowledge you can rely assisted data / information obtained from Coders. Activities crimes no longer in the classroom cyber punk more on individual targets, but instead on the corporate by way of robbing the available funds by transferring the hidden.
    * Cyber ​​Terrorist group of people or individuals acting on the basis of sentiment to a certain group or party, and do various activities that aim to demonstrate their existence in the world environment. Depth capabilities of this group is the highest because it combines various existing resources, level of ability, even the use of infrastructure assistance from the sponsors who help such as satellite communications.

Whatever the reason "hacking" is the action does not violate the law, but is called "cracking" when used to destroy, eliminate data / something that does not belong to us. But we all know - just that there is no guarantee that ensures the data or information we have is 100% safe and condition is what people used to start the "job" damaging than initially fun to professional. The most important thing we can do is close all the possible vulnerabilities that are open and always update the data / information [alert].


[How About You? What Type Of Hackers You Want? Ready To Hack? ]
Let us lift the red and white Indonesian flag on Cyber ​​World!
We are Indonesian Hacker (We are Hacker Indonesia)
That Pancasila High Respect and Unity in Diversity.
Viva Hacker Indonesia - Indonesian Hacker Onward.
^_^

No comments:

Post a Comment