Pencarian
Blog Archive
-
▼
2009
(52)
-
▼
December
(52)
- 140 Amazing Hacks For your PC
- Ultra Hacker 155 in 1
- Full Hack Pack 2009 [Exclusive]
- Wifi Hacks 2009 AIO
- Wireless Hack Toolz 2009
- Dangerous Hack Tool 2010
- KingCripts Hacking Pack
- ESET Nod32 Keys Finder V7
- A.I.O USB Utilities Tools
- Hacking Tools - 85 in 1
- Metasploit Framework
- Network Spy 2.0
- "UU ITE Bermasalah di Penerapan"
- Tifatul: UU ITE Miliki Beberapa Kejanggalan
- Tutorial LAN Hacking (Newbie)
- Nessus
- Linux sock_sendpage
- Linux kernel 2.4/2.6
- Kernel 2.6.17
- Bug&dork New
- Meffy Scanner
- Albania Scanner
- Defacing malaysuck site
- Defacing malaysian site
- Rose Scanner
- About | MIRC
- Make Proxy From Shell
- Rafly Scanner
- Pittbull Scanner
- SQL Injection Attacks by Example
- Bug Dork PHPBB
- Bug Dork WordPress
- Bajo Sanner
- HACK WIFI
- Joomla Bugs
- Remote File Include (RFI)
- Hacker
- Zell Scanner
- Install Eggdrop
- Alb Scanner
- Italian Scanner
- The Best Hack Tools Collection Ever
- Feelcomz Scanner
- Defacing Indonesian Site
- Mamboleto Joomla! component Remote File Include Vu...
- Old Bug&Dork
- Old Bug-Dork
- Joomla Component com_jphoto SQL injection vulnerab...
- Bug&Dork
- Joomla Component MojoBlog Multiple Remote File Inc...
- Joomla Component com_jsjobs Multiple SQL injection
- Bug-Dork
-
▼
December
(52)
Labels
- Article (17)
- bug dork lfi (5)
- bug dork list (5)
- bug dork rfi (5)
- bug dork sql (5)
- bug dork timthumb (5)
- bug dork xml (5)
- Dork RFI (8)
- Exploit (5)
- Hacking Tools (52)
- Kill-9 News (14)
- lfi bug dork (5)
- Lfi Dork (3)
- LFI Scanner (5)
- Linux-Kernel (17)
- list bug (5)
- list bug dork (5)
- rfi bug dork (5)
- Rfi Scanner (17)
- SQLi (15)
- tutorial (36)
Statistic User
Sunday, 13 December 2009
Hacker
Hacker is a person who breaks into computers, usually by gaining access to administrative controls. The subculture that has evolved around hackers is often referred to as the computer underground. Proponents claim to be motivated by artistic and political ends, and are often unconcerned about the use of criminal means to achieve them. The Jargon File, a compendium of hacker slang, defines hacker as "A person who enjoys exploring the details of programmable systems and how to stretch their capabilities, as opposed to most users, who prefer to learn only the minimum necessary." [1] The Request for Comments (RFC) 1392, the Internet Users' Glossary, amplifies this meaning as "A person who delights in having an intimate understanding of the internal workings of a system, computers and computer networks in particular." [2] These hackers are disappointed by the mass media and mainstream public's usage of the word hacker to refer to security breakers, calling them "crackers" instead. The difference between hackers and crackers is that where hackers use their skills and knowledge to learn more about how systems and networks work, crackers will use the same skills to author harmful software (like viruses, trojans, etc.) and illegally infiltrate secure systems with the intention of doing harm to the system. True hackers don't participate in these activities and generally frown upon them. Over time, the academic hacker subculture has tended to become more conscious, more cohesive, and better organized. The most important consciousness-raising moments have included the composition of the first Jargon File in 1973, the promulgation of the GNU Manifesto in 1985, and the publication of The Cathedral and the Bazaar in 1997. Correlated with this has been the gradual election of a set of shared culture heroes: Bill Joy, Donald Knuth, Dennis Ritchie, Alan Kay, Ken Thompson, Richard M. Stallman, Linus Torvalds, and Larry Wall, among others. The concentration of academic hacker subculture has paralleled and partly been driven by the commoditization of computer and networking technology, and has in turn accelerated that process. In 1975, hackerdom was scattered across several different families of operating systems and disparate networks; today it is largely a Unix and TCP/IP phenomenon, and is concentrated around various operating systems based on free software and open-source software development.
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment