Logo en.artbmxmagazine.com

Characteristics of the hacker culture or hacking code

Table of contents:

Anonim

Summary

Through the years technology has been advancing, along with programming, the latter has taken many directions, since programming has become a necessity, since everything needs a little programming. There are many software developers, which have been suffering from piracy (for how lucrative their products are) these people who are dedicated to software piracy are called Crakers. There are also people who corrupt programming codes for the sole purpose of finding weak points in the program (which are the points that Crackers seek to steal the code), in order to correct them and be more secure, these people are called Hackers. The code of a cracker is very complicated and needs a very high level of programming knowledge.

Abstract

Over this years, technology has been moved forward, programming together to it, this last one has token so many directions, now that programming has become a necessity, because on this times everything needs at least a little bit of programming.. Exists several Software Development companies, that have been suffering of piracy (By its lucrative products) these people dedicated to software piracy are called Crackers. Also, exists people the break programming codes with just the objective to find weak points of the software (this points are what hackers looked for to steal the code), on this way correct them and make them safer, these people are code Hackers. Crackers code is very complicated and it is request a high level of programming knowledge.

1. Introduction

Virtually any kid who has grown up on a computer and has a passion for computing (that is, using it for more than just chatting on the MSN and downloading mp3) has wanted to be a Hacker at some point in their life. It's exciting for a teenager, because it provides a sense of limitless power: being able to access whatever information you want, putting security companies in check, and feeling the adrenaline rush of doing something prohibited.

Hacking, a practice normally driven by curiosity and the desire to learn (and not with destructive intentions, since this is called by other names such as cracking or phishing) puts the information within the reach of those who are "smart enough to get it."

What we want as authors is that you learn the difference of a hacker and a cracker because it is very easy to get terms wrong when you want to refer to a Cracker.

Introduction

Now at days, any child or teenager that has grown up with a computer and feel passion by computer science (people that do not use computers just for fun, download mp3 or chatting) has wanted to become a hacker some time on his life, because, it makes you feel unlimited power: to be able of accessing any kind of information wanted; to make security companies suffer and the adrenaline of making something forbidden.

Hacking, practice impulse by curiosity and getting knowledge (Not with bad intention, because that it is known as cracking or phishing) put information where anyone intelligent enough can get it. What we want as authors is you to learn the differences about a hacker and a cracker because it is easy to mistake these terms when one wants to call a Cracker.

2. Conceptualization

A hacker is a person who discovers the weaknesses of a Computer and Computer Networks. Hackers are also known as experts in computers and computer networks. There is much controversy in the use of the term hacking, since cracking is confused with hacking.

So what is a Cracker ?, a Cracker is a Black hat hacker named like this because they are people who modify certain software to eliminate the protection methods they have (Serials, hardware keys), in order to sell them without any protection as a Illegal software, which is a crime in many countries.

Classification

There are several subgroups of hackers, depending on their knowledge and objectives of which we will mention:

  • White hat hackers. This type of hacker corrupts security for no malicious reason. Its objective is to verify the weak points of a software so as to later improve them. These are hired by factories or Security Software companies. They are also known as ethical hackers. Black hat hackers. They are the aforementioned Crackers, whose sole objective is to corrupt software for their own profit and profit.Blue hat hackers. They are the ones who test software before it is released. They are like a kind of Computer Consulting. Nobs. They are inexperienced and lacking hacker knowledge. And that they use pre-made programs to corrupt some software.

Exploits

It is a piece of software, a piece of data or a script and / or actions, used in order to take advantage of a security vulnerability of an information system to achieve undesired behavior. Examples of erroneous behavior: Access in an unauthorized way, taking control of a computer system, obtaining privileges not lawfully granted, achieving denial of service attacks.

A Hacking Method

Heartbleed. It is a serious vulnerability in the popular one in the OpenSSL cryptographic software library. This weakness allows to steal information protected under normal conditions, by SSL / TLS encryption used for internet security. SSL / TLS provides communication security and privacy on the Internet for applications such as the web, email, instant messages and some virtual private networks (VPNs).

Heartbleed bug allows anyone on the Internet to read system memory protected by vulnerable versions of OpenSSL software. Secret keys are used to identify service providers and encrypt their traffic, names and passwords, and current content. This allows attackers to eavesdrop on communications, steal data directly from users, and impersonate them.

Concepts

A Hacker is a person that find computer and informatics nets weaknesses. Also, a Hacker is known as an expert computer programmer. There is so much controversy about hacking term use, because it is confused by cracking.

So, what is a Cracker? A Cracker is a “Black Hat Hacker” denominated ass that, because they are people that modify a determinate software to delete its protection methods (Serials, hardware password, etc.) to sell it without protection, this is illegal in several countries.

Classification

There are several hackers sub groups, it depends on their knowledge level and objectives, and we will show you some of them:

  • White hat hackers. This hacker type break security with any bad intention. Their objective is verify software weakness points to make them better. This hackers are contracted by Security Software Companies.Black hat hackers. They are the already mentioned Crackers, their only objective is breaking a software to get a benefit for themselves. Blue hat hackers. They try a software before put them on sale. They are token as Demos.Noobs. They are unexperienced and have no knowledge to hack. They use another programs to break software.

Exploits

It is a software fragment, command sequence, used to make advantage of system information security vulnerability to get a not wished performance. For example unauthorized accces, takes control of computer system.

A Hacking method

The heartbleed bug. The Heartbleed Bug is a serious vulnerability in the popular OpenSSL cryptographic software library. This weakness allows stealing the information protected, under normal conditions, by the SSL / TLS encryption used to secure the Internet. SSL / TLS provides communication security and privacy over the Internet for applications such as web, email, instant messaging (IM) and some virtual private networks (VPNs).

The Heartbleed bug allows anyone on the Internet to read the memory of the systems protected by the vulnerable versions of the OpenSSL software. This compromises the secret keys used to identify the service providers and to encrypt the traffic, the names and passwords of the users and the actual content. This allows attackers to eavesdrop on communications, steal data directly from the services and users and to impersonate services and users.

conclusion

We are now at the end of this Article, in which I managed to introduce you to the least of the Hack Culture, making clear the misuse of the word Hacker, since there is a difference in what a hacker and a cracker is.

Hacking culture is too broad to describe in an article, and learning is found in the Internet world. Being a Cracker or Hacker already depends on you, on your morals and ethics.

Conclusion

Now, we reach at this article's end, in which I get you to learn a little bit of Hacking Culture, putting on clear the bad use of the word hacker, because exists a difference about what a hacker and a cracker is.

Hacking Culture is very big to describe it on an article and knowledge could be found on internets world. Be a Hacker or Cracker depends on ourselves, our moral and etic.

References

  • http://heartbleed.com/, The heartbleed Bug.https: //blog.whitehatsec.com/, WhiteHatSecurity.es.wikipedia.org/wiki/Hacker, Wikipedia The Free Encyclopedia.https: //es.wikipedia.org / wiki / Cracking, Wikipedia The Free Encyclopedia.
Characteristics of the hacker culture or hacking code