Don’t get me wrong. This blog post won’t teach you how to steal, but this will teach you about our modern era where technology is at large and where it is widely used by everyone and populated by what we call Hackers and Crackers.
Let’s start of by differentiating simply the difference between Hackers and Crackers. If we use Star Wars as an example, Hackers are like the Jedi Knights. They have mysterious powers and abilities. They are in fact, GOOD Jedi Knights. Crackers on the other hand, are the bad Jedi Knights. They are the dark side of the force. Did you get the point? I sure hope so.
Hackers are people who enjoy looking at systems and finding the loopholes and corner cases and ways around that system. In simpler terms, hackers are people who who come up with new ways to install phone lines as well as people who figure out (not read up on) tricks to get into some of the most complex systems of all (computer systems).
A hacker is someone who ‘hacks’. However let’s get something straight, we are referring to hacking here which is different from breaking into things. Hacker is being used by almost everyone to refer to someone who breaks into computer systems. This has been going for almost over a 10 years now. Hacker is being used incorrectly. People who breaks into computer systems “illegally” is what we call Crackers. Hackers or hack or hacking is used to express admiration for the work of a skilled software developer. Hackers don’t break into security programs because they want to, instead, hackers are being hired by computer companies to test their security. They hire hackers and let them hack into their system to know if there’s a flaw or loophole to their companies security. If they were able to hack the system, then it will be reported to the company and the company will then again test and make a new one or a new solution on how the hackers were able to hack into their system. After which, they let the hackers hack into their computer system again. This goes on until the hackers won’t be able to hack into the system which mean that the system is up and ready.
Hackers and hacking has been negatively used by the mass media. Media’s current usage of the term may be traced back to the early 1980’s. During this time, even those in the computer community referred to computer intrusion as hacking. Hacking and hackers was use by the media with ‘criminal connotations’. That’s why, several people though of ways to differentiate such. They provided the alternative terms such as “black hat” and “cracker” to distinguish those performing criminal activities and those performing legal activities as we call “hack”. However, even though hackers has been differentiated from crackers, still, the media keeps on using hacker or hacking to distinguish criminal activities. Due to this, even the general public continue to describe computer criminals with all levels of technical sophistication as “hackers” and does not generally make use of the word in any of its non-criminal connotations.
As a result of this difference, the definition is the subject of heated controversy. The wider dominance of the pejorative connotation is resented by many who object to the term being taken from their cultural jargon and used negatively[6], including those who have historically preferred to self-identify as hackers. Many advocate using the more recent and nuanced alternate terms when describing criminals and others who negatively take advantage of security flaws in software and hardware. Others prefer to follow common popular usage, arguing that the positive form is confusing and unlikely to become widespread in the general public. A minority still stubbornly use the term in both original senses despite the controversy, leaving context to clarify (or leave ambiguous) which meaning is intended. It is noteworthy, however, that the positive definition of hacker was widely used as the predominant form for many years before the negative definition was popularized.
“Hacker” can therefore be seen as a shibboleth, identifying those who use the technically-oriented sense (as opposed to the exclusively intrusion-oriented sense) as members of the computing community.
A possible middle ground position has been suggested, based on the observation that “hacking” describes a collection of skills which are used by hackers of both descriptions for differing reasons. The analogy is made to locksmithing, specifically picking locks, which — aside from its being a skill with a fairly high tropism to ‘classic’ hacking — is a skill which can be used for good or evil. The primary weakness of this analogy is the inclusion of script kiddies in the popular usage of “hacker”, despite the lack of an underlying skill and knowledge base
Considering all of this, A hacker COULD break into systems, but generally wouldn’t harm anything purposefully.
Did you know that without hackers, the computer revolution in the 1970’s is not going to be a reality that we enjoy and use nowadays? Did you know that Steve Wozniak and Steve Jobs who were the founder of Apple Computer Co., were hackers? Even Bill Gates and Paul Allen who founded Microsoft, one of the many companies who pioneered the development of the computer age, were also hackers. By this, we now know that hackers don’t merely make intrusion into computer systems and stealing valuable information illegally.
Crackers on the other hand are a different kind of people. Crackers attack corporate and government networks big time. When media found out about this, they still used the term Hackers instead of Crackers. A Cracker is someone who breaks into someone else’s computer system, often on a network; bypasses passwords or licenses in computer programs; or in other ways intentionally breaches computer security. A Cracker can be doing this for profit, maliciously, for some altruistic purpose or cause, or because the challenge is there. Some breaking-and-entering has been done ostensibly to point out weaknesses in a site’s security system.
Now that we know the differences between Hackers and Crackers, let’s not misuse these terms next time we use it. Also, check your computers, be sure that your computer is firewall ready from all Crackers out there. May these information that I’ve provided in this blog be an eye opener for all. Because now, the world wide web isn’t safe anymore. Who knows, your personal information might be circulating somewhere already. Or worse, your identity is being used by another person to do bad things. Be careful on what you put on the internet. Don’t use lame passwords that are easy to crack and easy to be guessed by other people. Use passwords that contain numbers and letters. There are password strength indicators in the internet, check if your password is strong enough. Regarding the I forgot password option, don’t use secret question that is connected to you and such. That could give a clue to your password. Don’t spill too much information on the net. Also, be sure that who you’re talking to is a trustworthy person because he might be the one that could ruin your internet and real life forever. When registering to websites, be sure to read the terms and conditions, license agreements and everything specified in that website. Check if it’s a secure site and such because there are a lot of scam sites already. Don’t be dumb! Open your eyes! Read read read! You’re identity is at stake here, even your life!
Technology: Now a part of our lives. It could help us, however, it could also destroy us
—
Sources:
Wikipedia.org
Samiam.org
White and Blue Magazine