Gå til innhold

114 000 kroner for Chrome-innbrudd


Anbefalte innlegg

Videoannonse
Annonse

Det er vel strengt tatt crackere det er snakk om, ikke hackere (selv om de fleste crackere også er hackere). Jeg synes den første setningen i artikkelen var en tanke komisk:

 

[...]premie for hackere som kan knekke[...]

... der knekke er ekvivalent med engelske cracke.

 

Dere har jo til og med en fin artikkel der dere påpeker forskjellen på en cracker og en hacker:

http://www.hardware.no/artikler/naar_er_en_hacker_en_cracker/54806

Endret av Dauemannen
  • Liker 2
Lenke til kommentar

Sitat fra artikkelen jeg linket til:

En cracker derimot, er en som bryter sikkerheten til datasystemer. Dette kan være så lite som å unngå brannmuren på sin egen arbeidsplass, eller så mye som å bryte seg inn hos konkurrenten og stjele forretningshemmeligheter. Å bryte seg inn i et datasystem er altså cracking foretatt av en cracker.

Og det er da virkelig dette det er snakk om i denne artikkelen; å finne svakheter i et system som gjør det mulig å omgå sikkerheten i det. Det at formålet her er å hente en belønning, og ikke å spre virus, spam eller andre ulumskheter, endrer ikke på det faktum at det er snakk om å knekke, ergo cracke, et system.

Endret av Dauemannen
  • Liker 1
Lenke til kommentar

For ørtende gang blir altså dette diskutert, hacking er å bryte seg inn i noe (som navnet sier) mens cracking er å knekke kode (som også navnet sier). Feil bruk av disse ordene er veldig utbredt, og om ting skjer på lovlig eller ulovlig side av loven har ingen verdens betyning for navnet på det som gjøres.

  • Liker 2
Lenke til kommentar

Og jeg har enda en definisjon som er enda eldre. :)

 

Hack: Å greie noe.

Hacker: Noen som er flink i noe.

Cracke: Bryte seg inn en plass.

 

En "Linux hacker" f.eks er folk som Torvalds og Cox da de er drøyt dyktige. Beethoven hacket musikk og jeg hacket et problem i går. En safe cracker og en computer cracker er to som gjør innbrudd i henholdsvis safer og datasystemer.

  • Liker 1
Lenke til kommentar

Hacking og cracking er da begreper som er mye eldre enn datamaskiner. Det er forskjell på å hakke seg gjennom en mur på en festning og knekke en krypteringsalgoritme eller en "puzzle box". Dette daterer minimum tilbake til romersk tid. At mange nok bruker ordene feil endrer ikke på ordenes faktiske betydning. Cracking har alltid vært en mer intellektuell oppgave enn hacking.

Endret av efikkan
Lenke til kommentar

Nei og nei. Der er helt korrekt snakk om hackere.

Er ikke hacking en felles betegnelse på all form for hacking? Om det er cracking (criminal hacking som kom etter at ordet hacker oftere og oftere ble omtalt som noe ulovlig og de trengte et skille), white hat hacking, gray hat hacking, black hat hacking, eller hacking som ikke har noe med sikkerhetsbryting i det heletatt (subculture programmer).

 

I og med at dette ser ut til å oppfordre til å gjøre en "ulovlig" handling for å forbedre sikkerheten ser det ut til at dette går under begrepet white hat hackers, altså moralske sikkerhetsbrytere. I Tyskland eller Frankrike (om jeg husker korrekt), kom det et forslag om å gjøre hacking ulovlig, noe som førte til at mange som drev med sikkerhet truet med å flytte fra landet (noe de sannsynligvis måtte ha gjort om de skulle fortsette med hva de da drev med). Nå er det ikke alltid politikere vet hva de uttaler seg om når det kommer til IT, her i Norge var det jo forslag om å forby MP3-formatet for en del år siden.

 

... men ja, hva som enn angår hacking så er det helt korrekt snakk om hacking, det er bare litt lite spesifikt.

Endret av tamarin
Lenke til kommentar

For ørtende gang blir altså dette diskutert, hacking er å bryte seg inn i noe (som navnet sier) mens cracking er å knekke kode (som også navnet sier). Feil bruk av disse ordene er veldig utbredt, og om ting skjer på lovlig eller ulovlig side av loven har ingen verdens betyning for navnet på det som gjøres.

 

Slik har det alltid vært i min bok. Hva er en crack? Jo, det er et program for å cracke/forandre kode. Hva handler filmen Hackers om?

Lenke til kommentar

For ørtende gang blir altså dette diskutert, hacking er å bryte seg inn i noe (som navnet sier) mens cracking er å knekke kode (som også navnet sier). Feil bruk av disse ordene er veldig utbredt, og om ting skjer på lovlig eller ulovlig side av loven har ingen verdens betyning for navnet på det som gjøres.

 

Slik har det alltid vært i min bok. Hva er en crack? Jo, det er et program for å cracke/forandre kode. Hva handler filmen Hackers om?

Riktig. Cracker til spill lages ved å analysere maskinkoden og få deaktivert/erstattet kopibeskyttelsen, som etter hvert har blitt veldig avanserte. Til slikt brukes blant annet SoftICE, et program som er så beryktet at mange spill nekter å kjøre om dette finnes på maskinen. Det finnes enkelte halvautomatiserte verktøy for å deaktivere f.eks. SecuROM, men det kreves likevel veldig god kompetanse for å lage disse verktøyene. Det finnes mange dyktige programmerere som bruker evnene sine til slikt.
Lenke til kommentar

Cracker er Criminal hacker, og da som det er spurt om, crack blir criminal hack. Så alle crackere er hackere, det har bare med og gjøre hva de bruker ferdighetene sine til

Tull og tøys. Hvilken side av loven de opererer på har ingen betydning for hva teknikken heter, spesielt når reglene varierer fra land til land og det er snakk om to forskjellige tekniske ting.
  • Liker 1
Lenke til kommentar

Har ikke hacker i bunn og grunn opphav fra hva man nærmest kan se på som programmerere?

 

Når jeg hører ordet hacker, hacks eller hacking, så tenker jeg først å fremst på å skrive om programvaren til å fungere på en gitt enhet, eller for å få programvaren til å fungere annerledes. Noe som er veldig vanlig innen åpen kildekode.

 

Når jeg hører white hat hacker så tenker jeg på en som jobber innen sikkerhet. F.eks innen antivirus, står for sikkerheten til et selskap og prøver å bryte seg inn for å teste sikkerheten, eller andre som gjør dette med gode hensikter.

 

Det første som dukker opp i hodet når jeg hører black hat hackere og crackere er kriminelle hackere.

 

Gray hat hackere ser jeg på noe som ligger i mellom white hat og black hat hackere.

 

 

 

 

Fant forresten en god side som skriver om opprinnelsen til ordet hacking og hvordan det har blitt brukt over tid.

 

http://www.wordiq.com/definition/Hacker

 

 

Hacker - Definition

 

Hacker is a term used to describe different types of computer experts. It is also sometimes extended to mean any kind of expert, especially with the connotation of having particularly detailed knowledge or of cleverly circumventing limits. The meaning of the term, when used in a computer context, has changed somewhat over the decades since it first came into use, as it has been given additional and clashing meanings by new users of the word.

 

Currently, "hacker" is used in two main ways, one positive and one pejorative. It can be used in the computing community to describe a particularly brilliant programmer or technical expert (for example: "Linus Torvalds, the creator of Linux, is a genius hacker."). This is said by some to be the "correct" usage of the word (see the Jargon File definition below). In popular usage and in the media, however, it generally describes computer intruders or criminals. "Hacker" can be seen as a shibboleth, identifying those who use it in its positive sense as members of the computing community.

 

As a result of this conflict, the term is the subject of some controversy. The pejorative usage is disliked by many who identify themselves as hackers, and who do not like their label used negatively. Many users of the positive form say the "intruder" meaning should be deprecated, and advocate terms such as "cracker" or "black-hat" to replace it. Others prefer to follow common popular usage, arguing that the positive form is confusing and never likely to become widespread.

 

A possible middle ground position observes that "hacking" describes a specific (collection of) skill-set(s), and that these skills are utilized by hackers of both descriptions, though for differing reasons. The companion situation which illustrates this is the skills involved in locksmithing, specifically picking locks, which -- aside from its being a skill with a fairly high tropism to 'classic' hacking -- is a skill which can be used for good or evil.

Contents [showhide]

1 History

2 Categories of hacker

 

2.1 Hacker: Brilliant programmer

2.2 Hacker: Intruder and criminal

2.3 Hacker: Security expert

3 Jargon File definition

4 Summary of terms

5 Notable hackers

 

5.1 Brilliant programmers

5.2 Intruders and criminals

5.3 Security experts

5.4 Hacker media personalities

5.5 Other notable characters

6 See also

7 External links

 

7.1 Commercials

8 Other meanings of the word "hacker"

History

 

Here is a timeline of the noun "hack" and etymologically related terms as they evolved in historical English:

 

* In French, haquenée means an ambling horse.

* In Old English, tohaccian meant hack to pieces.

* At some point in the 14th century, the word haquenée became hackney, meaning a horse of medium size or fair quality.

* Shortly after, hackney was shortened to hack, and in riding culture the act of "hacking" (as opposed to fox-hunting) meant riding about informally, to no particular purpose.

* 1393 (at the latest): the word had also acquired the meaning of a horse for hire and also "prostitute."

* 1596: hackney was being used as an adjective meaning tired or worn out. Shakespeare also used the word to mean "to make common and overly familiar" in Henry IV, Part I.

* 1700: a hack is a "person hired to do routine work".

* 1704: hack now also means a "carriage for hire".

* 1749: hack means "one who writes anything for hire" (still in use today among writers); see hack writer

* 1802: hack is used to mean a "short, dry cough" (still in use)

* 1826: the expression hack writer is first recorded though hackney writer appeared at least 50 years earlier

* 1898: hack is given the figurative sense of "a try, an attempt".

* 1950s: ham radio fans borrowed the term hacking from riding and defined it as creatively tinkering to improve performance.

* 1955: American English gives it the slang sense of "cope with" (as in "can't hack it"). On the U.S. East Coast, cars were substituted for horses, and hacking was a precursor to cruising.

* 1988: Stalking the Wily Hacker, an article by Clifford Stoll appears in the May 1988 issue of the Communications of the ACM and uses the term hacker in the sense of a computer criminal. Later that year, the release by Robert Tappan Morris, Jr. of the so-called Morris worm provoked the popular media to spread this usage.

* 1989: The Cuckoo's Egg by Clifford Stoll is published, and its popularity further entrenches the term in the public's consciousness.

 

The modern, computer-related form of the term is likely rooted in the goings on at the Massachusetts Institute of Technology (MIT)in the 1960s, long before computers became common; the word "hack" was local slang which had a large number of related meanings. One was a simple, but often inelegant, solution to a problem. It also meant any clever prank (http://hacks.mit.edu/) perpetrated by MIT students; logically the perpetrator was a hacker. To this day the terms hack and hacker are used in several ways at MIT, without necessarily referring to computers. When MIT students surreptitiously put a police car atop the dome on MIT's Building 10, that was a hack, and the students involved were therefore hackers. Another type of hacker is now sometimes called a reality hacker or urban spelunker.

 

The term was fused with computers when members of the Tech Model Railroad Club started working with a Digital Equipment Corporation PDP-1 computer and applied local model railroad slang to computers.

 

The earliest known use of the term in this manner is from the 20 November 1963 issue of The Tech, the student paper of MIT:

 

"Many telephone services have been curtailed because of so-called hackers, according to Prof. Carlton Tucker, administrator of the Institute phone system. [...] The hackers have accomplished such things as tying up all the tie-lines between Harvard and MIT, or making long-distance calls by charging them to a local radar installation. One method involved connecting the PDP-1 computer to the phone system to search the lines until a dial tone, indicating an outside line, was found. [...] Because of the "hacking," the majority of the MIT phones are "trapped.""

 

In the nascent computer culture of the 1960s, the unavoidable analogy to "hacking" programs was the already-established counter-culture practice of chopping Harley-Davidsons in Southern California: taking them apart and "chopping" their frames, improvising to make them lower, sleeker, faster, hotter than their uncustomized "stock" originals.

 

Originally, the term applied almost exclusively to programming or electrical engineering, but it has come to be used in some circles for almost any type of clever circumvention, in phrases such as "hack the media", "hack your brain" and "hack your reputation".

Categories of hacker

 

The hacker community (the set of people who would describe themselves as hackers, or who would be described by others as hackers) falls into at least three partially overlapping categories.

Hacker: Brilliant programmer

 

The positive usage of hacker. One who knows a (sometimes specified) set of programming interfaces well enough to write software rapidly and expertly. This type of hacker is well-respected, although the term still carries some of the meaning of hack, developing programs without adequate planning. This zugzwang gives freedom and the ability to be creative against methodical careful progress.

 

At their best, hackers can be very productive. The downside of hacker productivity is often in maintainability, documentation, and completion. Very talented hackers may become bored with a project once they have figured out all of the hard parts, and be unwilling to finish off the "details". This attitude can cause friction in environments where other programmers are expected to pick up the half finished work, decipher the structures and ideas, and bullet-proof the code. In other cases, where a hacker is willing to maintain their own code, a company may be unable to find anyone else who is capable or willing to dig through code to maintain the program if the original programmer moves on to a new job.

 

Types of hackers in this sense are gurus and wizards. "Guru" implies age and experience, and "wizard" often implies particular expertise in a specific topic, and an almost magical ability to perform hacks no one else understands.

Hacker: Intruder and criminal

 

The most common usage of "hacker" in the popular press is to describe those who subvert computer security without authorization or indeed, anyone who has been accused of cyber-crime. This can mean taking control of a remote computer through a network, or software cracking. This is the pejorative sense of hacker, also called cracker or black-hat hacker in order to preserve unambiguity.

 

There are several recurring tools of the trade used by hackers to gain unauthorized access to computers:

 

* Trojan horse -- These are malicious programs that are disguised as legitimate software. A trojan horse can be used to set up a back door in a computer system so that the criminal can return later and gain access. Viruses that fool a user into downloading and/or executing them by pretending to be useful applications are also sometimes called trojan horses. See also: Dialer.

* Virus -- A virus is a self-replicating program that spreads by inserting copies of itself into other executable code or documents (for a complete definition: see the article about computer viruses). Thus, a computer virus behaves in a way similar to a biological virus, which spreads by inserting itself into living cells.

* Worm -- Like a virus, a worm is also a self-replicating program. The difference between a virus and a worm is that a worm does not attach itself to other code. After the comparison between computer viruses and biological viruses, the obvious comparison here is to a bacterium. Many people conflate the terms "virus" and "worm", using them both to describe any self-propagating program.

* Vulnerability scanner -- A tool used to quickly check computers on a network for known weaknesses. Hackers also use port scanners. These check to see which ports on a specified computer are "open" or available to access the computer. (Note that firewalls defend computers from intruders by limiting access to ports/machines both inbound and outbound.)

* Sniffer -- An application that captures password and other data while it is in transit either within the computer or over the network

* Exploit -- A prepared application that takes advantage of a known weakness.

* Social engineering -- Asking someone for the password or account (possibly over a beer). Also includes looking over someone's shoulder while they enter their password, or posing as someone else in order to get sensitive information.

* Root kit -- A toolkit for hiding the fact that a computer's security has been compromised. Root kits may include replacements for system binaries so that it becomes impossible for the legitimate user to detect the presence of the intruder on the system by looking at process tables.

* Leet -- An English pidgin that helps to obscure hacker discussions and web sites, and paradoxically it simplifies the location of resources in public search engines for those who know the language. This is arguably more of a social phenomenon than anything very useful for breaking security, however. To more effectively keep conversations private, encryption can be used.

 

An incompetent black-hat hacker, one who does not write their own tools, and probably does not really understand computers' inner workings, is derisively known as a script kiddie. The term expresses considerable contempt, being meant to indicate that they are immature, and only use "scripts" and programs created by other people, in what is merely simple vandalism (if not outright theft).

Hacker: Security expert

 

There is a third meaning which is a kind of fusion of the positive and pejorative senses of hacker. The term white hat hacker is often used to describe those who attempt to break into systems or networks in order to help the owners of the system by making them aware of security flaws, or to perform some other altruistic activity. Many such people are employed by computer security companies (such professionals are sometimes called sneakers). Collections of these people are often called Tiger Teams.

 

White hat hackers often overlap with black hat depending on your perspective. The primary difference is that a white hat hacker claims to observe the hacker ethic. Like black hats, white hats are often intimately familiar with the internal details of security systems, and can delve into obscure machine code when needed to find a solution to a tricky problem without requiring support from a system manufacturer.

 

An example of a hack: Microsoft Windows ships with the ability to use cryptographic libraries built into the operating system. When shipped overseas this feature becomes nearly useless as the operating system will refuse to load cryptographic libraries that haven't been signed by Microsoft, and Microsoft will not sign a library unless the US Government authorizes it for export. This allows the US Government to maintain some perceived level of control over the use of strong cryptography beyond its borders.

 

While hunting through the symbol table of a beta release of Windows, a couple of overseas hackers managed to find a second signing key in the Microsoft binaries. That is, without disabling the libraries that are included with Windows (even overseas), these individuals learned of a way to trick the operating system into loading a library that hadn't been signed by Microsoft, thus enabling the functionality which had been lost to non-US users.

 

Whether this is good or bad may depend on whether you respect the letter of the law, but is considered by some in the computing community to be a white hat type of activity. Some use the term grey hat to describe someone on the borderline between black and white.

Jargon File definition

 

The following is the definition given by the most recent edition of the Jargon File (a dictionary of hacker jargon), which emphasizes the positive sense of "hacker". The definitions in this dictionary were not made through research into common usage, but reflect to some extent the opinions of its editors. Hence, the following is accepted by some but not all of the hacker community.

 

hacker n. [originally, someone who makes furniture with an axe]

 

1. A person who enjoys exploring the details of programmable systems and how to stretch their capabilities, as opposed to most users, who prefer to learn only the minimum necessary.

2. One who programs enthusiastically (even obsessively) or who enjoys programming rather than just theorizing about programming.

3. A person capable of appreciating hack value.

4. A person who is good at programming quickly.

5. An expert at a particular program, or one who frequently does work using it or on it; as in "a Unix hacker". (Definitions 1 through 5 are correlated, and people who fit them congregate.)

6. An expert or enthusiast of any kind. One might be an astronomy hacker, for example.

7. One who enjoys the intellectual challenge of creatively overcoming or circumventing limitations.

8. [deprecated] A malicious meddler who tries to discover sensitive information by poking around. Hence "password hacker", "network hacker". The correct term for this sense is cracker.

 

The term "hacker" also tends to connote membership in the global community defined by the net (see the network and Internet address). For discussion of some of the basics of this culture, see the How To Become A Hacker FAQ. It also implies that the person described is seen to subscribe to some version of the hacker ethic. It is better to be described as a hacker by others than to describe oneself that way. Hackers consider themselves something of an elite (a meritocracy based on ability), though one to which new members are gladly welcome. There is thus a certain ego satisfaction to be had in identifying yourself as a hacker (but if you claim to be one and are not, you'll quickly be labelled bogus). See also geek, wannabe. This term seems to have been first adopted as a badge in the 1960s by the hacker culture surrounding TMRC and the MIT AI Lab. We have a report that it was used in a sense close to this entry's by teenage radio hams and electronics tinkerers in the mid-1950s.

 

The earliest Stanford revisions of the Jargon file (1975) did not describe the term so positively, including only definitions 4, 5 and 8. The current definition was written in more or less its current form around 1980 at MIT. Definition 8 was "deprecated" in the 1990s by Jargon File editor Eric S. Raymond, a known advocate of the positive usage of "hacker". This deprecation is considered somewhat controversial by some, although use of the term "hacker" (in the computer-related sense) predates the first computer system with security (CTSS), and thus necessarily pre-dates any security-related meaning.

Summary of terms

 

Guru, Wizard: Types of hacker in the positive sense.

 

Cracker, Black-hat: A hacker in the negative sense.

 

Script kiddie: A hacker, in the negative sense, with little or no skill. A script kiddie simply follows directions or uses a cook-book approach without fully understanding the meaning of the steps they are performing.

 

Whitehat, Sneaker, Grey-hat: A hacker who breaks security but who does so for altruistic or at least non-malicious reasons. The darker the hat, the more the ethics of the activity can be considered dubious.

 

Note also that even among users of the positive sense of "hacker", the noun "hack" often means kludge, and in those cases has a negative connotation of being ugly, inelegant, and inefficient. The practical joke form of the noun "hack" is considered to have a positive meaning. Meanwhile, the verb "hack" can and often does share the same positive connotations as the noun "hacker".

Notable hackers

Brilliant programmers

 

* Seymour Cray -- He was a supercomputer architect who founded the company Cray Research.

* Bill Gosper

* Richard Greenblatt

* Bill Joy -- Co-founder of Sun Microsystems and author of many fundamental UNIX utilities.

* Richard Stallman -- A hacker of the old school, Stallman walked in off the street and got a job at MIT's Artificial Intelligence Lab in 1971. Stallman is a legendary hacker, the founder of the free software movement, a MacArthur "genius grant" recipient and a programmer capable of prodigious exploits. Stallman is also the founder of the GNU project, which produced the majority of the software considered to be part of the GNU/Linux operating system.

* Ken Thompson and Dennis Ritchie -- The driving creative force behind Bell Labs' legendary computer science operating group, Ritchie and Thompson created Unix in 1969. Ritchie is also notable for having created the C programming language.

* Linus Torvalds -- Torvalds was a computer science student at the University of Helsinki when he wrote the Linux kernel in 1991.

* Larry Wall -- The creator of the Perl programming language.

* Steve Wozniak -- The co-founder of Apple Computer got his start making devices for phone phreaking.

* Rob Pike -- a software engineer and author. He is best known for his work at Bell Labs, where he was a member of the Unix team and was involved in the creation of the Plan 9 and Inferno operating systems.

 

Intruders and criminals

 

Note that many of these have since turned to fully legal hacking.

 

* Mark Abene (a.k.a. Phiber Optik) -- Inspired thousands of teenagers around the country to "study" the internal workings of the United States phone system. One of the founders of the Masters of Deception group.

* Dark Avenger -- Bulgarian virus writer that invented polymorphic code in 1992 as a mean to circumvent the type of pattern recognition used by Anti-virus software, and nowadays also intrusion detection systems.

* Adrian Lamo -- Modified a Yahoo! news article and was prosecuted for a New York Times break-in.

* Robert Tappan Morris, Jr. -- This Cornell University graduate student unleashed the first major Internet worm in 1988.

* Kevin Mitnick -- The first hacker to have his face immortalized on a US Marshal Wanted poster, Kevin Mitnick made the cocky mistake of targeting the computer of Tsutomu Shimomura, a well known "anti-hacker."

* Kevin Poulsen -- In 1990 Poulsen took over all telephone lines going into Los Angeles area radio station KIIS-FM to win an automobile in a call-in contest.

* Vladimir Levin -- This mathematician allegedly masterminded the Russian hacker gang that tricked Citibank's computers into spitting out $10 million. To this day, the method used is unknown.

 

Security experts

 

* Solar Designer -- Founder of the Openwall Project.

* Fyodor -- The author of Nmap.

* Johan "Julf" Helsingius -- Operated the world's most popular anonymous remailer, the Penet remailer (called penet.fi), until he closed up shop in September 1996.

* Tsutomu Shimomura -- Shimomura helped catch Kevin Mitnick, the United States' most infamous cracker, in early 1994. He is the co-author of a book about the Mitnick case, Takedown: The Pursuit and Capture of Kevin Mitnick, America's Most Wanted Computer Outlaw-By the Man Who Did It (ISBN 0786889136).

* Michal Zalewski (lcamtuf) -- prominent security researcher.

* Marty Roesch -- Creator of Snort, a network Intrusion Detection System.

 

Hacker media personalities

 

* Eric Corley (a.k.a Emmanuel Goldstein) -- Long standing publisher of 2600: The Hacker Quarterly and founder of the H.O.P.E. conferences. He has been part of the hacker community since the late 70's.

* Cult of the Dead Cow -- a high profile hacker group that has both made news and been consulted by the media on numerous occasions.

 

??

Other notable characters

 

* Eric S. Raymond -- He is one of the founders of the Open Source Initiative. He wrote the famous text The Cathedral and the Bazaar and many other essays. He also maintains the Jargon File for the Hacker culture, which was previously maintained by Guy L. Steele, Jr..

* Bruce Perens -- He is also one of the Open Source Initiative. He was the former Debian GNU/Linux Project Leader, and is the primary author of the Open Source Definition.

 

See also

 

* Hacker culture

* Hacker Emblem

* Hacker Manifesto

* Hackers (short stories)

* Hackers Heroes of the Computer Revolution

* A Hacker History a timeline of events relating to hacking

* List of fictional hackers

* Quick-and-dirty

* Jargon File

* Biohacker

* Astalavista Security Group

 

External links

 

* The Hacker Dictionary (http://www.hacker-dictionary.com)

* The MIT Gallery of Hacks (http://hacks.mit.edu/)

* The Jargon File (http://www.catb.org/~esr/jargon)

* The Hacker Emblem (http://www.catb.org/~esr/hacker-emblem)

* How To Become A Hacker (http://www.catb.org/~esr/faqs/hacker-howto.html)

* Free Software Foundation (http://www.fsf.org)

* Open Source Initiative (http://www.opensource.org)

* Digital Information Society (http://www.phreak.org)

* Hacker News (http://www.hackwire.com/)

* Hacker Games (http://hackergames.net/)

* Paul Graham's Hackers & Painters Essay (http://www.paulgraham.com/hp.html)

* Paul Graham's Great Hackers Essay (http://www.paulgraham.com/gh.html)

* WPI Hackers of the '70's (http://www.wpi.edu/~trb/hacker70s.html)

 

Commercials

 

* Hacking Challenges (http://www.clubhack.com)

* Hacker Shirts & Stickers (http://www.hackerstickers.com/)

* Monthly Hacker meeting in Helsinki, Finland (http://www.2600.fi/)

 

Other meanings of the word "hacker"

 

Hacker (and Hack) are also terms for a taxicab driver (because a taxicab can be called a hack, a shortened form of hackney carriage).

 

A hacker, in golf, means a duffer, a mediocre player who enjoys playing but makes no serious effort to improve his skill.

 

Hacker (game) is a card game released by Steve Jackson Games.

 

Also, Hacker is the name of the Russian cyberculture journal XAKEP.

 

 

Lenke til kommentar

Ah, med en gang ordet 'sandbox' dukket opp forstod jeg mye bedre.

Med tanke på hva norske lesere er vandt med å søke etter så skjønner jeg ikke hvorfor norske sider ikke bruker engelske ord som vil gjøre at sidene kommer bedre ut i søkemotorer iht hvordan søkemotorer indekserer søk. Heller ikke under keywords ser sandbox ut til å være nevnt, men er vel ikke mange søkesider som tar dette så seriøst lenger på grunn av missbruk.

 

<meta name="keywords" content="nyhet, chrome os, sikkerhet, data, it, ikt">

 

Om jeg ville lest om ny firmware til en eller annen enhet hadde jeg søkt etter "ny firmware for x", ikke skrevet fastvare. <html lang=""> hjelper vel søkesider til å begrense søk til geografiske området om man kun ønsker å søke etter norske sider?

Lenke til kommentar

Dere må da innse at hacking og cracking er to forskjellige handlinger:

 

Hacking:

I tradisjonell betydning å hakke seg inn, bryte gjennom forsvarsverk.

I datamaskiner: bryte seg inn i et system eller nettverk, og få tilgang til ting som hackeren egentlig ikke skulle.

 

Cracking:

I tradisjonell betydning kodeknekking og dekryptering av meldinger.

I datamaskiner: knekke krypteringsalgoritmer eller kopisperrer.

 

Samme hvordan dere venter og vrir på det så er dette to forskjellige typer handlinger som krever ulike tekniske ferdigheter. I tillegg er konsekvensen av å bli utsatt for hacking i forhold til cracking veldig stor. Hacking medfører at noen faktisk har vært inne i systemet og kan ha gjort skade. Cracking kan medføre at andre får lese kommunikasjon eller fjerne kopisperrer, konsekvensene av dette kan variere mye. At hvor lovlig/ulovlig en handling er skal bestemme om det er hacking eller cracking er noe av det mest tåpelige jeg har hørt i mitt liv. Cracking har aldri stått for "criminal hacking". Konklusjonen er at kunsten om å knekke koder er en helt annen handling enn å bryte seg inn i noe, begge deler kan være ulovlig.

Lenke til kommentar

Opprett en konto eller logg inn for å kommentere

Du må være et medlem for å kunne skrive en kommentar

Opprett konto

Det er enkelt å melde seg inn for å starte en ny konto!

Start en konto

Logg inn

Har du allerede en konto? Logg inn her.

Logg inn nå
  • Hvem er aktive   0 medlemmer

    • Ingen innloggede medlemmer aktive
×
×
  • Opprett ny...