⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 beinghacker.html

📁 黑客培训教程
💻 HTML
📖 第 1 页 / 共 3 页
字号:
These are clear examples of what the real intent of a hacker is when he breaks a system. It's very close to the idea of a child that opens a toy to see how it works. The difference is that the hacker tries not to destroy the toy (aside from the fact that the toy is not his own...).

<P>

Anyway, let's see the specific definition of the "cracker", according to the Jargon File:

<BLOCKQUOTE>

:cracker: n. One who breaks security on a system.  Coined ca. 1985

by hackers in defense against journalistic misuse of {hacker}

(q.v., sense 8).  An earlier attempt to establish `worm' in this

sense around 1981--82 on USENET was largely a failure.

<P>

Both these neologisms reflected a strong revulsion against the

theft and vandalism perpetrated by cracking rings.  While it is

expected that any real hacker will have done some playful cracking

and knows many of the basic techniques, anyone past {larval

stage} is expected to have outgrown the desire to do so.

<P>

Thus, there is far less overlap between hackerdom and crackerdom

than the {mundane} [the term "mundane" is taken from the Sci-Fi fandom and identifies everything outside the world of the computer science, or the hacking] reader misled by sensationalistic journalism

might expect.  Crackers tend to gather in small, tight-knit, very

secretive groups that have little overlap with the huge, open

poly-culture this lexicon describes; though crackers often like to

describe *themselves* as hackers, most true hackers consider

them a separate and lower form of life.

<P>

Ethical considerations aside, hackers figure that anyone who can't

imagine a more interesting way to play with their computers than

breaking into someone else's has to be pretty {losing}

[on the other hand, they have the same consideration for the people who use the computer in an absolute conventional way, such as only to write documents or to play] [...]

</BLOCKQUOTE>

Furthermore, about the "cracking" itself, the Jargon File says:

<BLOCKQUOTE>

:cracking: n. The act of breaking into a computer system; what a

{cracker} does.  Contrary to widespread myth, this does not

usually involve some mysterious leap of hackerly brilliance, but

rather persistence and the dogged repetition of a handful of fairly

well-known tricks that exploit common weaknesses in the security of

target systems.  Accordingly, most crackers are only mediocre

hackers.

</BLOCKQUOTE>

However, This is a superficial and reductive vision. In fact, as it is easily imaginable, there exist people, that are as experienced with computers and as thirsty of knowledge, that however don't have any respect of the hacker ethic and don't hesitate to perform actions meant to damage computer systems or other people.<BR>

They are the so-called <I>Dark-side hackers</I>.

This term derives from George Lucas' "Star Wars". A Dark-side hacker, just like Darth Vader, is <CITE>"seduced by the dark side of the Force"</CITE>. It has nothing to do with the common idea of <I>"good"</I> and <I>"bad"</I>, but it's closer to the idea of <I>"legal"</I> and <I>"chaotic"</I> in Dungeons&Dragons:

In substance, the dark-side hackers are accorded the same dignity and recognized as having the ability of a hacker, but their orientation makes them a dangerous element for the community.<BR>

A more common definition, reserved for those that damage someone else's computer systems without drawing any benefit from it, (therefore for pure stupidity or evilness), it is that of <I>Malicious hackers</I>.

<P>

More recent versions of the Jargon File (in which some most obsolete terms have been removed), as the version 4.0.0, 24 JUL 1996, makes clear, not only the distinction between hacker and cracker, but also between the entire hack scenes and other parallel realities, like piracy, and the <I>"warez d00dz"</I>, who collect an impressive amount of software (games and applications, or better said <I>"gamez"</I> and <I>"appz"</I>), that they are never likely to use, and whose greatest pride is to get software, break its protections, and distribute it on their website before their rival crew, where possible, within the same day it was released (<I>"0-day warez"</I>).

<P>

One could think that the Jargon File speaks only in theory, and that it describes the hacker ethic in a fantastic and utopian way. This is not so,  hackers really are attached to their principles. The following is a practical example concerning one of the most famous hacker crews, the LOD (Legions Of Doom, that takes its name from the group of baddies in the series of cartoons of Superman and his Superfriends), of which The Mentor was also a member during the years 1988-89 (the already cited author of "The conscience of a Hacker").

<P>

In "The History of LOD/H", Revision #3 May 1990, written by Lex Luthor (founder of the crew, from the name of the baddie in the movie Superman I), and published on their e-zine "The LOD/H Technical Journal", Issue #4, released on May 20, 1990 (File 06 of 10), we can read:

<BLOCKQUOTE>

Of all 38 members, only one was forcefully ejected. It was found out that

Terminal Man [member dof the LOD/H in 1985] destroyed data that was not related to covering his tracks. This

has always been unacceptable to us, regardless of what the media and law

enforcement tries to get you to think.

</BLOCKQUOTE>

Yet, not all agree upon the same principles, and there are some "grey areas": for example, taking possession of objects that allow you to access information, or pursuing a personal purpose, can be considered "ethical" by some. A specific example could be <I>"grabbing"</I>: the theft of things like keys, magnetic cards, manuals or technical schemes, anyway this is a  debatable activity, since a hacker  prefers to copy rather to subtract, not only to not damage the "victim", but also to avoid leaving traces of his intrusion. A more acceptable and legal variant is <I>"trashing"</I>, that consists in looking inside the garbage of the subject, searching for objects and/or useful information.

<P>

But breaking into computer systems is only a small activity amongst the many things that hackers are involved in, and the aversion against the virtual vandal actions are a small part of the hacker ethic.<BR>

The hacker ethic is something greater, almost mystic, and draws its origins from the first hackers, those that programmed the TX-0, using the first available computers in the big American universities like MIT or Stanford.<BR>

From the already cited "Hackers, Heroes of the Computer Revolution" by Steven Levy:

<BLOCKQUOTE>

Something new was coalescing around the TX-0:  a new way of life,

with a philosophy, an ethic, and a dream.

<P>

There was no one moment when it started to dawn on the TX-0

hackers that by devoting their technical abilities to computing

with a devotion rarely seen outside of monasteries they were the

vanguard of a daring symbiosis between man and machine.  With a

fervor like that of young hot-rodders fixated on souping up

engines, they came to take their almost unique surroundings for

granted, Even as the elements of a culture were forming, as

legends began to accrue, as their mastery of programming started

to surpass any previous recorded levels of skill, the dozen or so

hackers were reluctant to acknowledge that their tiny society, on

intimate terms with the TX-0, had been slowly and implicitly

piecing together a body of concepts, beliefs, and mores.

<P>

The precepts of this revolutionary Hacker Ethic were not so much

debated and discussed as silently agreed upon.  No manifestos

were issued ["The Mentor"'s one, very polemic, was written only about twenty years later].  No missionaries tried to gather converts.  The

computer did the converting [...]

</BLOCKQUOTE>

Shortly, Steven Levy sums up the "hacker ethic" this way:

<BLOCKQUOTE>

Access to computers -- and anything which might teach you something about the way the world works -- should be unlimited and total. Always yield to the Hands-On imperative.

<P>

All information should be free.

<P>

Mistrust Authority.  Promote Decentralization.

<P>

Hackers should be judged by their hacking, not bogus criteria such as degrees, age, race, or position.

<P>

You can create art and beauty on a computer.

<P>

Computers can change your life for the better.

<P>

LIKE ALADDIN'S LAMP, YOU COULD GET IT [THE COMPUTER] TO DO YOUR BIDDING.

</BLOCKQUOTE>

<P><BR>

<B>THE LAMER</B>

<P>

From "The Hacker Crackdown - Law and Disorder on the Electronic Frontier" by Bruce Sterling, Bantam Books, 1992.

(ISBN 0-553-08058-X, paperback: ISBN 0-553-56370-X, released as free electronic text for non-commercial purposes)

<BLOCKQUOTE>

There are hackers today who

fiercely and publicly resist any besmirching of the noble

title of hacker.   Naturally and understandably, they

deeply resent the attack on their values implicit in using

the word "hacker" as a synonym for computer-criminal.

<P>

[...]

<P>

The term "hacking" is used routinely today  by

almost all law enforcement officials with any professional

interest in computer fraud  and abuse.   American police

describe almost any crime committed with, by, through, or

against a computer as hacking.

</BLOCKQUOTE>

If the differentiation between hacker, cracker and dark-side hacker can result a very tiny distinction for the ones who live outside of the computer scene, nobody, especially a journalist, should confuse a hacker with the poor idiot that was locked up for using, with no thought to the consequences,  programs that he found somewhere. (even if using the term "hacker" does sell more newspapers... The difference between hackers and journalists is that the aforementioned have ethics, the latter, not even a sense of modesty... but this is often simply mere ignorance).

<P>

Let's take as an example the following article published on the Italian newspaper "L'Unione Sarda" (<A HREF="http://www.unionesarda.it/">http://www.unionesarda.it/</A>), by Luigi Almiento (<A HREF="mailto:almiento@unionesarda.it">almiento@unionesarda.it</A>).

<BLOCKQUOTE>

<P ALIGN=CENTER>

<B>

POLICE.

<BR><BR>

The arrested hacker is a surveyor, aged 25

<BR><BR>

Files were stolen from the computers of internet "navigators", with the aid of a virus<BR>

spread on the Internet<BR>

</B>

<P>

Many people from different national service providers, recently learned to their own detriment, that it is better not to stay and chat to strangers on the <I>chat-lines</I> of the Internet.

This occured when a <I>hacker</I> aged 25, obtained the user names and passwords of their dial up accounts, while they were on-line.

<P>

[...]

<P>

"Harris", explains the lieutenant Saverio Spoto, commander of the Police Station [actually they are "Carabinieri", not the normal Police, because in Italy there are two different polices, don't ask why], 

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -