What is a HACKER ?
By defination, Hacking is gaining "Unauthorized Access" to a Computer system by exploiting the serious security bugs or "vulnerabilities".
So what do you think hacker is ?
A "computer hacker" then, is a person who lives and breathes computers, who knows almost everything about computers, who can get a computer to do anything.
A Hacker is always hungry for knowledge and tries diffrent techniques for ganing unauthorized access as well as hardening the security system by finding various solution to that problem so that other people who call themselves as hackers and do illegal work should not get unauthorized access .
Someone who sets out to crack the security of a system for financial gain is not a hacker at all. It's not that a hacker can't be a thief, but a hacker can't be a professional thief.
A hacker must be fundamentally an amateur, even though hackers can get paid for their expertise. A password hacker whose primary interest is in learning how the system works doesn't therefore necessarily refrain from stealing information or services, but someone whose primary interest is in stealing isn't a hacker.
The Conscience of a Hacker by +++The Mentor+++(PLZ READ THIS..)
The following was written shortly after my arrest...
\/\The Conscience of a Hacker/\/
by
+++The Mentor+++
Written on January 8, 1986
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
Another one got caught today, it's all over the papers. "Teenager Arrested in Computer Crime Scandal", "Hacker Arrested after Bank Tampering"...
Damn kids. They're all alike.
But did you, in your three-piece psychology and 1950's technobrain, ever take a look behind the eyes of the hacker? Did you ever wonder what made him tick, what forces shaped him, what may have molded him?
I am a hacker, enter my world...
Mine is a world that begins with school... I'm smarter than most of the other kids, this crap they teach us bores me...
Damn underachiever. They're all alike.
I'm in junior high or high school. I've listened to teachers explain for the fifteenth time how to reduce a fraction. I understand it. "No, Ms. Smith, I didn't show my work. I did it in my head..."
Damn kid. Probably copied it. They're all alike.
I made a discovery today. I found a computer. Wait a second, this is cool. It does what I want it to. If it makes a mistake, it's because I screwed it up. Not because it doesn't like me...
Or feels threatened by me...
Or thinks I'm a smart ass...
Or doesn't like teaching and shouldn't be here...
Damn kid. All he does is play games. They're all alike.
And then it happened... a door opened to a world... rushing through the phone line like heroin through an addict's veins, an electronic pulse is sent out, a refuge from the day-to-day incompetencies is sought... a board is found. "This is it... this is where I belong..."
I know everyone here... even if I've never met them, never talked to them, may never hear from them again... I know you all...
Damn kid. Tying up the phone line again. They're all alike...
You bet your ass we're all alike... we've been spoon-fed baby food at school when we hungered for steak... the bits of meat that you did let slip through were pre-chewed and tasteless. We've been dominated by sadists, or ignored by the apathetic. The few that had something to teach found us willing pupils, but those few are like drops of water in the desert.
This is our world now... the world of the electron and the switch, the beauty of the baud. We make use of a service already existing without paying for what could be dirt-cheap if it wasn't run by profiteering gluttons, and you call us criminals.
We explore... and you call us criminals.
We seek after knowledge... and you call us criminals.
We exist without skin color, without nationality, without
religious bias... and you call us criminals.
You build atomic bombs, you wage wars, you murder, cheat, and lie to us and try to make us believe it's for our own good, yet we're the criminals.
Yes, I am a criminal. My crime is that of curiosity. My crime is that of judging people by what they say and think, not what they look like. My crime is that of outsmarting you, something that you will never forgive me for.
I am a hacker, and this is my manifesto. You may stop this individual, but you can't stop us all... after all, we're all alike.
+++The Mentor+++
Why we need hackers
Life would be easier if we didn’t have to patch our operating systems and apps. Patrick Gray explores the real reasons why updating is important.
It would be easier if hackers, who say they’re acting in the public interest by releasing information on the vulnerabilities they find, would just get real jobs and stop pointing out the weaknesses in our software, right? Wrong.
As most who work in the IT security field will tell you, all the software that we use is shipped in a vulnerable state. The security holes are there from day one, and if the good guys don’t find the bugs, the bad guys will. The only way to defend an operating system or an application against a bug is to know of the existence of the bug in the first place.
Just 10 years ago, the bug-hunting community was a mish-mash of hackers, system administrators and programmers. Many were geeks seeking kudos for finding the latest "zero-day" or "fresh" vulnerability.
Since then, IT security has become a booming business and vulnerability information is worth its weight in gold. Scores, if not hundreds of full-time bug hunters now spend their days earning hefty salaries pulling apart software and looking for bugs — a weird sort of third-party quality assurance service for software companies.
They disclose their findings to the vendor, which releases a patch, then they release information about the bug to the wider community. But what are the ethics of security research? How much information should researchers release when they find a bug?
'You talk about why people crack things; I think the benefit is that it keeps the vendors in line, its holds them accountable,” says Rick Forno, the former chief security officer of Internic. 'And chances are if the good guys find something, the bad guys have known about it longer than the good guys.'
US-based Forno is currently studying for a PhD on vulnerability disclosure at Curtin University in Western Australia. In his role as Internic’s CSO, he was responsible for securing the Internet’s root domain name servers — the core directories responsible for matching domain names to IP addresses. In short, they’re important machines.
While Forno defends security researchers who disclose information on the vulnerabilities they uncover — even "proof of concept exploit code", the software researchers sometimes release, which allows all and sundry to use the vulnerability — he says there’s a right way to do it and a wrong way.
'Knowledge is neutral. How do you use it, to patch a system or exploit a system,?' he asks. 'There is a big movement now to restrict adverse information ... but where do you draw the line between where information is deemed to be adverse or helpful. Too often people err on the side of caution.”
In this feature, you’ll hear from the hackers themselves, who largely serve the public interest. Some have disclosed information that’s led to computer worms being unleashed by unscrupulous hackers. Others have written tools the bad guys use to penetrate networks. All say they’ve acted in the public interest.
Thought of gud hacker
nice one....
Hack, Hack, hack
Well, she got her dad's account
And she broke into his office mainframe, now
Seems like she forgot all about the term paper
Like she told her old man, now
And with her eye on the modem
Goes typin' just as fast as she can, now
And she'll just hack, hack, hack
'Till her daddy takes her keyboard away
Well, the sysops can't stand her
'Cause she speaks Unix just like an ace, now
(She speaks like an ace, now, she speaks like an ace)
She takes the BBS software
And really puts it through its pace, now
(Puts through its pace, now, puts through its pace)
IBM tried to catch her
But she led 'em on a wild goose chase, now
(Wild goose chase, now, wild goose chase)
And she'll just hack, hack, hack
'Till her daddy takes her keyboard away
Well, you knew all along
That the Feds were gettin' wise to you, now
(You shouldn't have tried, now, you shouldn't have tried)
And since they took your set of disks
You've been thinkin' that your fun is all through, now
(You shouldn't have lied, now, you shouldn't have lied
But you can come and work for me
'Cause we've got a lot of things to do, now
(Do you think you can help me finish debugging Windows 95?)
And we'll just hack, hack, hack
Uncle Sammy took your keyboard away
And we'll just hack, hack, hack
Now that daddy took your keyboard away...
Well, she got her dad's account
And she broke into his office mainframe, now
Seems like she forgot all about the term paper
Like she told her old man, now
And with her eye on the modem
Goes typin' just as fast as she can, now
And she'll just hack, hack, hack
'Till her daddy takes her keyboard away
Well, the sysops can't stand her
'Cause she speaks Unix just like an ace, now
(She speaks like an ace, now, she speaks like an ace)
She takes the BBS software
And really puts it through its pace, now
(Puts through its pace, now, puts through its pace)
IBM tried to catch her
But she led 'em on a wild goose chase, now
(Wild goose chase, now, wild goose chase)
And she'll just hack, hack, hack
'Till her daddy takes her keyboard away
Well, you knew all along
That the Feds were gettin' wise to you, now
(You shouldn't have tried, now, you shouldn't have tried)
And since they took your set of disks
You've been thinkin' that your fun is all through, now
(You shouldn't have lied, now, you shouldn't have lied
But you can come and work for me
'Cause we've got a lot of things to do, now
(Do you think you can help me finish debugging Windows 95?)
And we'll just hack, hack, hack
Uncle Sammy took your keyboard away
And we'll just hack, hack, hack
Now that daddy took your keyboard away...
Ethics Of Hacker
The moral principles of hackers are not much different from those of who consider hacking wrong. As hackers never damage or steal stuff.
It's necessary for hackers to be ethical and there is just a difference of ethics between a hacker and a computer criminal. Hackers hack stuff to gain knowledge and to expose the vulnerabilty so that technology can devlop.
However computer criminal just get the unauthorized access to the system or account and do exploit it for the personal benefit and do harm others and damage the stuff.
One should always keep this thing in mind that with knowledge there comes power and responsibilty and it should never be misused.
MORE 2 COME....PLZZ WAIT.......
No comments:
Post a Comment