Have you heard the word 'hackers'? Or do you know anything about it? It's not a movie. I repeat, it is NOT a movie. Anyway, have you watch this movie? HAHAHA. You should. An interesting story.
Okay! back to the topic.
Hackers... What can i say about this? So many things. But before i further into the details, I'll explain the meaning of hack, hacking and hackers briefly.
Hack means a clever or quick fix to a computer program problem, or to a clumsy or inelegant solution to a problem. The term is also used to refer to a modification of a program or device to give the user access to features that were otherwise unavailable.
Did you know that the word 'hack' comes from the German word meaning "someone who makes furniture with an axe". How come it can be related to IT, and ethical issues? Weird, isn't it? Confused? Don't be. Sir Razi will be so happy if we're confused.
The term computer hacker first showed up in the mid-1960s around the Massachusetts Institute of Technology (MIT)'s Tech Model Railroad Club (TMRC) and MIT Artificial Intelligence Laboratory Fact. I do not know where it is, but the place exist, believe me. A hacker was a programmer or also known as someone who hacked out computer code. Hackers were visionaries who could see new ways to use computers, creating programs that no one else could conceive. They were the pioneers of the computer industry, building everything from small applications to operating systems. In this sense, people like Bill Gates, Steve Jobs and Steve Wozniak were all hackers. Believe it or not, they saw the potential of what computers could do and created ways to achieve that potential. No wonder Bill Gates is so rich right now. He's creative and have long-tem vision.
Computer hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose. People who engage in computer hacking activities are often called hackers. Since the word “hack” has long been used to describe someone who is incompetent at his/her profession, some hackers claim this term is offensive and fails to give appropriate recognition to their skills.
Do you participate in computer hacking? Computer hacking is most common among teenagers and young adults, although there are many older hackers as well. Many hackers are true technology buffs who enjoy learning more about how computers work and consider computer hacking an “art” form. They often enjoy programming and have expert-level skills in one particular program. For these individuals, computer hacking is a real life application of their problem-solving skills. It’s a chance to demonstrate their abilities, not an opportunity to harm others.
Get it? If not, try to understand this. Hacker is a person who enjoys exploring the details of programmable systems and how to stretch their capabilities. A person who delights in having an intimate understanding of the internal workings of a system, computers and computer networks in particular.
But, don't miss understand. Not all hackers violate IT ethics. There are several types of hackers:
Black hats - break in a communication network like Internet.
White hats - debug or fix security problems.
Hacker (hobbyist) - The hobbyist home computing community, focusing on hardware in the late 1970s (e.g. the Homebrew Computer Club) and on software (computer games, software cracking, the demo scene) in the 1980s/1990s.
You might keep on questioning and anxious to know how these hackers and hacking works. As I browse through and find information about it, it came to my surprise. They are brilliant! There are so many things they can do. It is scary too.There are thousands of different programs hackers use to explore computers and networks. These programs give hackers a lot of power over innocent users and organizations. Once a skilled hacker knows how a system works, he can design programs that exploit it. Someone may be hacking you right now! Careful, people! These are the things they can do:
~ Log keystrokes: Some programs allow hackers to review every keystroke a computer user makes. Once installed on a victim's computer, the programs record each keystroke, giving the hacker everything he needs to infiltrate a system or even steal someone's identity.
~ Create zombie computers: A zombie computer, or bot, is a computer that a hacker can use to send spam or commit Distributed Denial of Service (DDoS) attacks. After a victim executes seemingly innocent code, a connection opens between his computer and the hacker's system. The hacker can secretly control the victim's computer, using it to commit crimes or spread spam.
~ Gain backdoor access: Similar to hacking passwords, some hackers create programs that search for unprotected pathways into network systems and computers. In the early days of the Internet, many computer systems had limited security, making it possible for a hacker to find a pathway into the system without a username or password. Another way a hacker might gain backdoor access is to infect a computer or system with a Trojan horse.
Did you know who are the famous hackers?

KEVIN MITNICK
Kevin Mitnick gained notoriety in the 1980s as a hacker who allegedly broke into the North American Aerospace Defense Command (NORAD) when he was 17 years old. Mitnick's reputation seemed to grow with every retelling of his exploits, eventually leading to the rumor that Mitnick had made the FBI's Most Wanted list. In reality, Mitnick was arrested several times for hacking into secure systems, usually to gain access to powerful computer software.
At the age of 16, Jonathan James became the first juvenile hacker to get sent to prison. He committed computer intrusions on some very high-profile victims, including NASA and a Defense Threat Reduction Agency server. Online, Jonathan used the nickname (called a handle) "c0mrade." Originally sentenced to house arrest, James was sent to prison when he violated parole.Hacking is an example of unethical behavior. They intrude into people's privacy and sometimes they steal other people's identity. Do you like to receive pages of bills of your credit card. But all the expenses is made by someone else. Some may say hacking is exploring the IT and an effort to improve and expand technology. But, how many hackers do follow the rules? Most of them miss from tracks and violate the ethics. Ethic is important.
We ROCK,
Sohifatul & Nazarina
=)
No comments:
Post a Comment