Know The History of The Hacker Culture

There are the same hackers who do not already know? or perhaps one of your friends are hackers, see ya ... first on the History Hacker .... Well I'm not a hacker so I don't know what I'm supposed to have done for which I should be proud. I am encouraged by some of the developments yes.

The term Hacker himself was born circa 1959 of MIT (Massacusetts Institute of Technology), a university in America composed of intelligent people but tend not to trust in God (atheist). That's when everything began, of a new room, "EAM room" in Building 26 at MIT, a place that is the ancestor of the "new world" we now know, where the ancestors of a machine which we now refer to as "computer", the machine who can bring us toward kelebih better with the freedom of information, the world of the true hacker.

The Hackers always cooperate voluntarily resolve problems and build things. They always share information, provide answers and are keen to do my best to be respected in his neighborhood. They never stop learning to be an expert and very anti to do something repetitive and boring. They are guided by the wise words: "To follow the road - look at the expert - follow the experts - to walk with the master - the master-Be familiar with the experts"

Meanwhile, cracker busy to satisfy themselves with the activities of Cracking. ranging from breaking into your computer, spread viruses (without purpose - there are few true hackers who write viruses, but with a clear purpose), to outsmart the phone (Phreaking). The Hacker calls them as lazy people who are not responsible. So, it is not fair if we still assume that hackers are evil and frightening as it is very clear that Hacker Cracker is constructive while unpacking.

Want to be a Hacker? There are no hard words for those who want to learn. To be a hacker you have to master several programming languages and of course the attitudes that can make you acceptable in their environment. Usually candidates Hackers start by learning the language [Python] because the language is relatively the easiest programming language. Discussion of this language you can see in www.python.org. After that you also have to master [java] a little more difficult but it produces faster code than Python, [C], [C + +] which became the core of UNIX, and [Perl] (www.perl.com) and [LISP ] for advanced.

Having mastered all basic skills above, candidates are advised to open Hacker sati open-source version of UNIX or LINUX learn, read the code, modify it and run it again. If you're having trouble, it is advisable to communicate with Linux users club [www.linpeople.org]

Attractive side of a Hacker is where they were shoulder to shoulder in solving a problem and build something. But unfortunately, the lives of those who spend 90% of their time to hacking activity is not a good thing. If you really want to be a hacker, be a good hacker ...

In the tiers of the World Hacker

Elite:

Also known as 3l33t, 3l337, 31337, or a combination of it, is the spearhead of the network security industry. They understand sistemoperasi outside in, able to configure and connect a global network. Capable of programming each day. A very natural grace, they are usually efficient and skilled, to use knowledge appropriately. They are like stealth to enter the system without in the know, although they will not destroy the data. Because they always follow the rules.

Semi Elite:

Hackers are usually more mudadaripada Elite.Mereka also has the ability and extensive knowledge of computers. They understand about operating systems (including holes). Usually equipped with a number of kecilprogram enough to change the program exploits. Many of the attacks carried out by a hacker published this caliber, unfortunately, by the Elite they are often categorized Lamer.

Developed Kiddie:

This title terutamakarena this young age group (ABG) and still in school. They read about the methods of hacking and how on various occasions. They tried different systems to ultimately succeed and proclaiming victory to lainnya.Umumnya they still use Graphic UserInterface (GUI) and just learning the basic of Unix, without being able to find a new weakness hole in the operating system.

Script Kiddie:

As developed kiddie, Script Kiddie usually do the activity above. As also Lamers, they only have technical knowledge networking is very minimal. Usually not separated from the GUI. Hacking is using trojans to scare the living & troublesome part of Internet users.

Lamer:

They are people without experience and knowledge who want to be a Hacker (wanna-be hacker). They usually read or hear about Hackers & want to be like that. The use their computers mainly to play games, IRC, exchange prirate software, steal credit card. Usually trojan hacking software, nuke & DoS. Usually boasting via IRC channels etc.. Since many shortcomings to achieve elite, in their development will only be up to the level of developed or script kiddie kiddie course.

Share on...