One may know the proverb: “He who does not howl with the wolves will be eaten by them” or something similar. In this text, I refer to this proverb, but in a figurative sense to the computer and the “myth” of the hacker.
That’s not to say I’m showing you how to use the server to break in, that would take at least 100,000 pages are needed to explain all individual topics comprehensively and comprehensively. Here it is more about the basic knowledge, the philosophy and how one can acquire the specialized knowledge.
First of all to the definition of hacking, or hacker. In the media, a hacker is described as someone who has the power and knowledge of all computers to crash, steal data and do global damage. Okay, the media is starting to realize they’re overestimating everything. However, this explanation is completely wrong. What fits in this description are not hackers but crackers.
Crackers are so to speak the evil hackers. Although these very often also do not offer the possibilities in order to do justice to the descriptions of the media. Then there are the would-be hackers, also called ScriptKiddies who use themTrojan2 and pre-programmed programs to get into computers and do damage.
The “Kiddie” leads is a departure from the English “kid” (child), since young people are often behind such attacks. Due to their young age and lack of experience, ScriptKiddies often do not even know what they are doing. Let me give you an example. I have seen ScriptKiddies that use methods to intrude into Windows NT Calculator tried to break into a Linux machine. ScriptKiddies are often bored teenagers who try to have fun with the first tool. These tools are usually so simply knitted that actually, each normal, somewhat educated user can serve them.
So, and then there’s a third group, those are the people who are doing their programs, etc. Write it yourself and really do something of matter, the construction of a system. Not that these people always write their own programs, but they usually have experience with them. These people live out a philosophy, one could certainly call it a lifestyle.
For this group, the term hacker would apply, but most of these people refuse to refer to it as a hacker because this term has been dragged into the dirt by the media. Earlier, when the term hacker was coined, it meant “someone picking on the keyboard”. According to Jon of DlCompare since computers were not so widespread at that time (around 1960, when the term was coined), being a hacker was something special, but nothing out of the ordinary. If you had a computer, you were automatically a hacker.
Later, in the late 1970s and early 1980s, the term hacker was used to describe for a programmer. It was not until the end of the 80s and the beginning of the 90s that the meanings already mentioned came into being. If you read reports or texts from programmers from that time, e.g. from Linus Torvalds (inventor of Linux), you notice that they often call themselves and other programmers hackers.
They remain true to their name. And I hope that this form of word meaning will prevail again. What some may also know, there are other terms for hackers and crackers. Some prefer the terms WhiteHat and BlackHat (admitted, they sound more like good and evil). WhiteHat’s are people who break into computers to learn they do no harm, but usually, leave the Admin a humorous message or a hint about the security vulnerability that you are trying to exploit.
So WhiteHats are useful; better a WhiteHat in the server than a real polluter. BlackHat’s, on the other hand, penetrate systems to steal data and destroy the system. So to speak, BlackHat’s are the crackers. Who is perhaps still worth mentioning, are the GreyHat’s. These are “hackers” (you know what I mean) who have been hired by the state or a company to run the company system on to check for deficiencies or track down criminals. The terms probably come from the western movies. There was always the good one with the white hat.
A few words about the philosophy and way of life of real hackers.
Who doesn’t know them, the young, well-trained hackers from the films? Admittedly, hackers like that exist. But actually, when you hear the term hacker, you always think of a more corpulent man with a full beard, jeans, and sandals. That’s always been a hacker’s ideal. These hackers are the older generation the generation that helped to design the computers and systems as they are today.
These people, such as Richard Stallman, have shaped the philosophy behind the whole technology. Through Stallman’s manifesto of openness (freedom) of source codes the end of the 80s, beginning of the 90s there was a Mass movement that did not yet exist in the world of technology. Thousands of hackers have helped with programs released under Stallman’s GPL and still stand, to improve the quality of and to expand. This network of volunteers controlled the work of their comrades-in-arms by using Bugs eliminated or implemented new functions.
Hackers live by a few basic principles. There are different explanations of the exact regulations, but I will list the most basic ones here:
· All information must be free
· Only enter protected systems to draw attention to security vulnerabilities and to learn
· Never use your abilities to destroy or steal data
· Judge a hacker or other user by what they do and not by race, color, sex, etc.
This feeling of finally having something perfectly adjusted and then integrating it into the system is like a drug. Anybody who knows that feeling will agree that it’s just terrific. Being a hacker means creating something, some call it art, some call it source code, and the media that are only superficially deal with the whole subject, call it a danger. But is it really danger that emanates from such lines of code?
If you take a closer look, such programs did take advantage of security holes to “open” the system and perhaps cause damage, but the creators of these programs often have little to do with it. What counts for them is to draw attention to the problem. What others do with it may not be in their senses. But if it was always a matter of what potential attackers could do with special things, medicine and technology would not be up to date.
The philosophy behind it is laudable, but it cannot be held responsible for the actions of others. I hope that I could give a little insight into the philosophy of hackers:
· Little Book Tip
· The book “Netzpiraten” by Armin Medosch & Janko Röttgers is a well-researched reading about Internet culture.
The various groups on the Internet, such as virus programmers, freedom fighters, and professors that hack too much. In any case worth reading in order to better understand the processes within the network.
According to Blendrit, co-founder at Tactica “One thing is clear: this language culture is constantly evolving, and many words find their way into the media, where they have a completely different meaning. Just as our most famous word, “hacker”, has fared.”