Man
Professional
- Messages
- 3,079
- Reaction score
- 615
- Points
- 113
What do you want to become?
Hello everyone, dear friends!
Today we would like to explain the term "Hacker" in more detail.
We will tell you about the history of the emergence of this term, types of modern hackers and what a real pro should be able to do.
We are sure that the topic is more than interesting, so let's get started!
Around the same time, the school's management allowed students to use university computers and software for educational purposes only for a fee. Some students disagreed with this policy and began to hack programs for free use. They also began to be called hackers.
The third meaning of the term was to find bugs in hardware and/or software to fix them. The hacker would not just report them, but would also offer simple and elegant solutions, which were called "hacks." The word "lifehack" that is common today has a similar meaning.
With the development of telecommunications and computer networks for general use, hacking for fun, ideological or selfish reasons began to spread. People who were engaged in crimes also began to be called hackers. A textbook example of a hacker is Kevin Mitnick , who hacked into the telephone networks of telecommunications corporations, government and educational institutions in the United States.
Of course, the terms are quite vague and can be interpreted differently, both by the hackers themselves and by the wider community. In addition, some well-known hackers (the same Kevin Mitnick), having been convicted of their crimes, over time began to openly offer their services to human rights state bodies or owners of information systems for a fee or voluntarily, moving from "Black Hats" to "Gray" or "White". The status of various ideological formations of hackers using illegal methods to achieve good (in their understanding) goals is also considered uncertain.
In the Russian-speaking environment, there is also a similar ironic script-kiddie term "kulhatsker" (from the incorrect reading of the English "cool hacker"), which is used to describe an incompetent newbie who has little understanding of the technical side of things, but who consciously copies the slang and behavior of a professional hacker. Often, his idea of professional hackers is based not on reality, but on cyberpunk novels and Hollywood films.
By the way, the basic hacker skills and abilities, as well as value systems, are described in various unofficial documents, such as the “Hacker Manifesto” (USA) or the “Hacker Self-Discipline Convention” (China).
In general, regardless of the relationship between society and the law, the demand for hacker services remains not only high, but also continues to grow.
Hello everyone, dear friends!
Today we would like to explain the term "Hacker" in more detail.
We will tell you about the history of the emergence of this term, types of modern hackers and what a real pro should be able to do.
We are sure that the topic is more than interesting, so let's get started!
1. Who are hackers?
The word "hacker" was first used at the Massachusetts Institute of Technology (MIT) in the 1960s , long before computers were widely available. It was used to describe someone who came up with a crude solution to a technological problem, not necessarily related to computers.Around the same time, the school's management allowed students to use university computers and software for educational purposes only for a fee. Some students disagreed with this policy and began to hack programs for free use. They also began to be called hackers.
The third meaning of the term was to find bugs in hardware and/or software to fix them. The hacker would not just report them, but would also offer simple and elegant solutions, which were called "hacks." The word "lifehack" that is common today has a similar meaning.
With the development of telecommunications and computer networks for general use, hacking for fun, ideological or selfish reasons began to spread. People who were engaged in crimes also began to be called hackers. A textbook example of a hacker is Kevin Mitnick , who hacked into the telephone networks of telecommunications corporations, government and educational institutions in the United States.
2. Types of hackers
2.1 By ideology
Over time, computer hackers formed a kind of subculture, whose members were united by a love of technology, deep knowledge of it and unconventional thinking. However, ideologically the community is very heterogeneous, so now it is customary to divide hackers into the following types:- White hats. These are specialists who look for errors and vulnerabilities of an object (program, website, computer network, etc.) to eliminate and improve information security. As a rule, they work with the permission of the owners of the object being checked or are even its employees.
- Black hats. These are criminals who hack into information systems (computers, servers, websites, programs, etc.) to stop them from working, extort money, steal data, for personal revenge, material or other gain, as well as for ideological and political reasons. Obviously, he does this without the permission of the owner of the object, trying to hide his identity from him and law enforcement agencies in order to avoid responsibility.
- Gray hats. Usually this is the name given to hackers who hack into information systems without permission from the owners, but then openly point out vulnerabilities and offer solutions for a fee or for their own popularity. Such hacking is not encouraged, as it always brings certain inconveniences, although it often turns out to be useful.
Of course, the terms are quite vague and can be interpreted differently, both by the hackers themselves and by the wider community. In addition, some well-known hackers (the same Kevin Mitnick), having been convicted of their crimes, over time began to openly offer their services to human rights state bodies or owners of information systems for a fee or voluntarily, moving from "Black Hats" to "Gray" or "White". The status of various ideological formations of hackers using illegal methods to achieve good (in their understanding) goals is also considered uncertain.
2.2 By skills
The hacker community is also divided by skills and competencies into the following categories:- Script-kiddie - a newbie who uses utilities developed by other hackers to perform minor pranks and does not have a deep understanding of how information systems work;
- Cracker is a mid-level specialist who can hack software protection using other people's utilities (for example, for personal use), but cannot find vulnerabilities himself or create his own tools;
- Hacker is a hacker, an expert in hardware and software, who can independently find vulnerabilities and create tools to exploit and/or eliminate them.
In the Russian-speaking environment, there is also a similar ironic script-kiddie term "kulhatsker" (from the incorrect reading of the English "cool hacker"), which is used to describe an incompetent newbie who has little understanding of the technical side of things, but who consciously copies the slang and behavior of a professional hacker. Often, his idea of professional hackers is based not on reality, but on cyberpunk novels and Hollywood films.
3. What can a hacker do?
The most important skills of a hacker include:- Understanding the principles of operation of information systems at an expert level;
- Knowledge of the latest advances in computer and telecommunications technology, software, and information security;
- Understanding not only the technical, but also the social aspects of information security - for example, stereotypical user behavior, etc.;
- Ability to develop your own tools for searching for vulnerabilities and their use (relevant for professionals with extensive experience) ;
- The ability to think outside the box to find elegant solutions, but avoid complex methods.
By the way, the basic hacker skills and abilities, as well as value systems, are described in various unofficial documents, such as the “Hacker Manifesto” (USA) or the “Hacker Self-Discipline Convention” (China).
In general, regardless of the relationship between society and the law, the demand for hacker services remains not only high, but also continues to grow.