Mig33 News Community

Mig33 International Chatters Forum
 
HomeHome  PortalPortal  CalendarCalendar  GalleryGallery  FAQFAQ  SearchSearch  RegisterRegister  Log in  
Search
 
 

Display results as :
 
Rechercher Advanced Search
Latest topics
» MobileSystems Oxford Reference Suite V4.1 for s60v2
Tue Sep 16, 2008 1:10 pm by superior_vena_cava_

» Special Edition Nokia N73 to Celebrate Ramadan
Tue Sep 16, 2008 1:04 pm by superior_vena_cava_

» Opera mini 4.1 beta
Tue Sep 16, 2008 1:02 pm by superior_vena_cava_

» DriverScanner 2009 v2.0.0.20 - brd
Tue Sep 16, 2008 1:01 pm by superior_vena_cava_

»  Animation | V04:R2 - Total Textures "Humans & Creatures"
Tue Sep 16, 2008 1:01 pm by superior_vena_cava_

» WANTED TRAILER
Tue Sep 16, 2008 12:56 pm by superior_vena_cava_

» interview haha
Tue Sep 16, 2008 12:53 pm by superior_vena_cava_

» Doctor Visit
Tue Sep 16, 2008 12:51 pm by superior_vena_cava_

» My daughter
Tue Sep 16, 2008 12:49 pm by superior_vena_cava_

Navigation
 Portal
 Index
 Memberlist
 Profile
 FAQ
 Search
Forum
Affiliates
free forum
 



Share | 
 

 about hackers

Go down 
AuthorMessage
Maistro-a
Moderator
Moderator
avatar

Male
Number of posts : 52
Age : 29
Location : Sudan
Nationality : Ask Me
Registration date : 2008-07-21

Character sheet
Health:
500/1000  (500/1000)

PostSubject: about hackers   Mon Jul 21, 2008 1:43 pm

Hackers


"Hackers are the elite corps of computer designers and programmers. They like to see themselves as the wizards and warriors of tech. Designing software and inventing algorithms can involve bravura intellection, and tinkering with them is as much fun as fiddling with engines. Hackers have their own culture, their own language. And in the off-hours, they can turn their ingenuity to sparring with enemies on the Nets, or to the midnight stroll through systems you should not be able to enter, were you not so very clever. Dark-side hackers, or crackers, slip into systems for the smash-and-grab, but most hackers are in it for the virtuoso ingress.

It's a high-stress life, but it can be amazing fun. Imagine being paid - well paid - to play forever with the toys you love. Imagine."

From St. Jude, Mondo 2000: Users's Guide to the New Edge.




A hacker is the one who

1-enjoys exploring the details of programmable systems and how to stretch their capabilities, as opposed to most users, who prefer to learn only the minimum necessary.
2-programs enthusiastically (even obsessively) or who enjoys programming rather than just theorizing about programming.
3-is good at programming quickly.
4-is an expert at a particular program, or one who frequently does work using it or on it; as in `a Unix hacker'.
5-is an expert or enthusiast of any kind. One might be an astronomy hacker, for example.
6-enjoys the intellectual challenge of creatively overcoming or circumventing limitations.
7-is a malicious meddler who tries to discover sensitive information by poking around. Hence `password hacker', `network hacker'. The correct term for this sense is cracker.



Hacking and Cracking
The term "hacker" has come to be associated exclusively with breaking security. That isn't what it is at all, but hackers were willing to state their total contempt for security people, because security was one form of bureaucracy. First-generation hackers would break security because it was in the way of doing something useful. Now a lot of kids do it 'cause it's naughty. Though it is true that showing you can break security that's said to be unbreakable is a nice hack, the original hackers did not break security just to be naughty. They broke security if somebody had locked up a tool that you needed to use.

Different Types of Hackers
Hacking broadly refers to attempts to gain access to computers to which one does not possess authorization. The term "hackers" first came into use in the early 1960's when it was applied to a group of pioneering computer aficionados at MIT (Levy, 1984). Through the 1970s, a hacker was viewed as someone obsessed with understanding and mastering computer systems (Levy 1984). But, in the early 1980's, stimulated by the release of the movie "War Games" and the much publicized arrest of a "hacker gang" known as "The 414s", hackers were seen as young whiz-kids capable of breaking into corporate and government computer systems (Landreth 1985:34). The imprecise media definition and the lack of any clear understanding of what it means to be a hacker results in the mis-application of the label to all forms of computer malfeasance.

Despite the inter-relationship between phreaks and hackers, the label of "hacker" is generally reserved for those engaged in computer system trespassing. For CU participants, hacking can mean either attempting to gain access to a computer system, or the more refined goals of exploring in, experimenting with, or testing a computer system. In the first connotation, hacking requires skills to obtain valid user accounts on computer systems that would otherwise be unavailable, and the term connotes the repetitive nature of break-in attempts. Once successful entry is made, the illicit accounts are often shared among associates and described as being "freshly (or newly) hacked."

The second connotation refers to someone possessing the knowledge, ability, and desire to fully explore a computer system. For elite hackers, the mere act of gaining entry is not enough to warrant the "hacker" label; there must be a desire to master and skill to use the system after access has been achieved:


"It's Sunday night, and I'm in my room, deep into a hack. My eyes are on the monitor, and my hands are on the keyboard, but my mind is really on the operating system of a super-minicomputer a thousand miles away - a super-mini with an operating systems that does a good job of tracking users, and that will show my activities in its user logs, unless I can outwit it in the few hours before the Monday morning staff arrives for work.....Eighteen hours ago, I managed to hack a password for the PDP 11/44. Now, I have only an hour or so left to alter the user logs. If I don't the logs will lead the system operators to my secret account, and the hours of work it took me to get this account will be wasted." (Landreth, 1985: 57-58)

An elite hacker must experiment with command structures and explore the many files available in order to understand and effectively use the system. This is sometimes called "hacking around" or simply "hacking a system". This distinction is necessary because not all trespassers are necessarily skilled at hacking out passwords, and not all hackers retain interest in a system once the challenge of gaining entry has been surmounted. Further, passwords and accounts are often traded, allowing even an unskilled intruder to erroneously claim the title of "hacker."

Our data indicate that, contrary to their media image, hackers avoid deliberately destroying data or otherwise damaging the system. Doing so would conflict with their instrumental goal of blending in with the average user to conceal their presence and prevent the deletion of the account. After spending what may be a substantial amount of time obtaining a high access account, the hacker places a high priority on not being discovered using it, and hackers share considerable contempt for media stories that portray them as "criminals."



Hacker's Ethic
Although sometimes skirting the law, hackers possess an explicit ethic and their primary goal is knowledge acquisition.

Hackers and the Law

Hacking is a crime in most countries today. Learn about the legal aspects of hacking today.

Hacker Mentality

What motivates hackers? Why are they compelled to penetrate closed systems

Major Personalities

Hackers are real people - meet some of the more famous hackers.

Hacker Attack Detection

Knowing how to tell when a hacker comes knocking may save your computer one day. A brief description with useful contacts

Timeline of Incidents

A timeline of the most famous hacking incidents helps track where hackers began and where they might be headed.


that is all

and thanks
Back to top Go down
View user profile
prince31
Site Administrator
Site Administrator
avatar

Male
Number of posts : 66
Age : 25
Location : sudan...
Nationality : student
Registration date : 2008-07-17

Character sheet
Health:
1000/1000  (1000/1000)

PostSubject: Re: about hackers   Tue Jul 22, 2008 2:21 am

wow that's really great.
thanks for sharing. Wink I love you
Back to top Go down
View user profile http://mig33news.forumotion.com
master-my
RegularII
RegularII


Number of posts : 14
Registration date : 2008-07-22

Character sheet
Health:
500/1000  (500/1000)

PostSubject: Re: about hackers   Fri Jul 25, 2008 7:03 am

thanks for your sharing.:d
Back to top Go down
View user profile
Usher
RegularIII
RegularIII
avatar

Male
Number of posts : 47
Age : 25
Location : Sudan
Nationality : Student
Mig33 ID : Am_usher
Registration date : 2008-07-24

Character sheet
Health:
500/1000  (500/1000)

PostSubject: Re: about hackers   Fri Jul 25, 2008 7:20 am

Wow that great maistro-a
Back to top Go down
View user profile http://Mig33news.Forumotion.Net
master-my
RegularII
RegularII


Number of posts : 14
Registration date : 2008-07-22

Character sheet
Health:
500/1000  (500/1000)

PostSubject: Re: about hackers   Fri Jul 25, 2008 7:30 am

i want to add asmall informatiom about hackers to maistor-a sharing. there are alot of hackers in mig33 Who hack idts (user name).it is very simple and any 1 can do that with message and hack idt:d.just idiot who give hackers his password
Back to top Go down
View user profile
master-my
RegularII
RegularII


Number of posts : 14
Registration date : 2008-07-22

Character sheet
Health:
500/1000  (500/1000)

PostSubject: Re: about hackers   Fri Jul 25, 2008 7:53 am

wew my information are very important :p
Back to top Go down
View user profile
prince_suhel
Site Administrator
Site Administrator
avatar

Male
Number of posts : 73
Age : 32
Location : india
Nationality : Indian
Mig33 ID : prince_suhel, prince._force
Chatrooms : all chatroom(UK-London)
Motto : IF YOU WANT TO SUCCESS IN LIFE, BE SWEET LIKE HONEY,
REGULAR LIKE CLOCK, FRESH LIKE ROSE, SOFT LIKE TISSUE
,
STRONG LIKE ROCK, SURE LIKE DEATH & SMART LIKE ME...

Registration date : 2008-07-23

Character sheet
Health:
1000/1000  (1000/1000)

PostSubject: Re: about hackers   Fri Jul 25, 2008 8:39 am

thanks for sharing it bro keep it god bless u

_________________


Back to top Go down
View user profile http://forceindia.logu2.com
superior_vena_cava_
RegularIII
RegularIII
avatar

Male
Number of posts : 54
Age : 29
Location : BANGLADESH
Nationality : BANGLADESHI
Mig33 ID : superior_vena_cava_
Chatrooms : BANGLADESH
Motto : Blank
Registration date : 2008-09-12

PostSubject: Re: about hackers   Tue Sep 16, 2008 12:23 pm

Thanx bro for ur sharing
Back to top Go down
View user profile http://www.psychosuperior.page.tl
Sponsored content




PostSubject: Re: about hackers   

Back to top Go down
 
about hackers
Back to top 
Page 1 of 1

Permissions in this forum:You cannot reply to topics in this forum
Mig33 News Community :: PC & MOBILE SECTION :: PC Talk & Tools-
Jump to: