Text of Valor

Valor Kedungjati on Jl. Perintis Kemerdekaan RT.2/RW.2 Kedungjati, Grobogan, Jawa Tengah 58167 (Depan Gereja Kedungjati) -New info: Check www.facebook.com/ValorKedungjati & don't forget to like it-

Monday, February 13, 2012

Hacker vs Cracker, What is the Difference?


Maybe there are a lot of people do not know the difference between hackers and crackers?
The following reviews are taken from detikinet.com on information.

Answer :

In essence, the hacker is a person of high caliber associated with the exploration of a system. The spirit of the hacker is the exploration and information disclosure. Hacker does not aim to do the destruction or other things that could harm others. As for those who wanted to destroy and / or just use the tools other people's work, usually referred to as a cracker.

For the history of terminology between the hacker vs cracker, I quote from the content of my thesis is as follows:

The term hacker came in the early 1960's among the members of student organizations, Tech Model Railroad Club at the Artificial Intelligence Laboratory Massachusetts Institute of Technology (MIT). The student group is one of the pioneering developments in computer technology and they are struggling with a number of mainframe computers. Hacker word first appeared in a positive sense to describe a member who has expertise in the field of computers and able to make a better computer program that has been designed together than ever before.

Then in 1983, growing hacker analogy to refer to someone who has an obsession to understand and master the computer system. This is because at that for the first time the FBI arrested a group of computer criminals 414s based in the U.S. Milwaukee. 414 is their local area code. The group that came to be called by the American mass media as a hacker was convicted of burglary 60 computers, from computers owned by Cancer Center Memorial Sloan-Kettering's computer to the Los Alamos National Laboratory. One of the perpetrators enjoy immunity as testimonials, while five other players get probation.

The same year also came out of a movie called War Games is one of the roles played by Matthew Broderick as David Lightman. The film tells of a young computer enthusiasts who accidentally connected with the secret super computer that controls the U.S. nuclear arsenal.

According to James O'Brien in his book Management Information System (McGraw-Hill, 1999), hacking is defined as an obsessive behavior and or without legal authorization to use a computer or computer network systems and the culprit is referred to as hackers. It added that illegal hackers, who often steal or destroy data or programs, steal credit card to change the look of a site on the Internet referred to as a cracker, and its activity is called cracking.

Specifically, Richard Mansfield in his book Hackers Attack (Sybex, 2000) defines a hacker as someone who has a desire to explore and penetrate to a computer operating system and other safety codes, but not doing damage of any kind, do not steal money or information. Mansfield added that the cracker is a dark side and have kertertarikan hacker to steal information, perform a variety of damage and occasionally also crippled the entire computer system.

Hackers actually have a code of ethics which was originally formulated in Steven Levy's book titled Hackers: Heroes of the Computer Revolution, in 1984. The hacker code of ethics, which are often adopted by the cracker, is:

- Access to a computer system, and any course can teach you about how the world works, should not be limited at all

- All information must be freely accessible

- Do not trust the authorities, promote their decentralization

- Hackers should be judged from the standpoint of hackingnya activity, not by the standards of a formal organization or irrelevant criteria such as degrees, age, race or position.
- One can create art and beauty on a computer
- The computer can transform one's life for the better.

Source news Translating from www.detikinet.com