Hacking/Cracking


What is a Hacker?

A hacker, in the modern day, is a person with great technical knowledge of how computers work and transmit data. Hackers are typically well versed in computer languages, and able to code their own programs for whatever purposes they have in mind. Hackers may choose to covertly infiltrate secure systems, look at some data, and leave with the system intact. Hackers claim their intentions to be benevolent; most of them simply find the challenge of hacking to be a reward in and of itself, and many more simply wish for information to be free.

What is a Cracker?

A cracker, simply put, is a destructive and malevolent hacker. Crackers infiltrate systems for the purpose of destroying critical or non-critical data, defacing public web pages, attaining sensitive data for profit or other non-educational purposes, breaking protection schemes on copyrighted programs, and so on.



How and why do people generally go about hacking and cracking?

Hacking and cracking follow the same procedures; it's what is done with the information that differentiates the two. Generally, hackers/crackers employ password cracking tools to bypass encrypted passwords, or passwords scrambled in some way as to render them unreadable by plain text methods. Hackers can also use social engineering to get password data out of unwitting parties. For a more detailed explanation, check out this article by IBM's security team. Hackers might hack to free information or expose security vulnerabilities that they feel a company should address; crackers generally do their work for personal amusement or profit, with disregard to the data they are damaging. For some examples of how hacking has shaped the world of the Internet, take a look at this story about the hacking of al-Jazeera's website during the Iraq war, and this article about the hacking of the RIAA's website over file sharing.

What are the ethical concerns for both hackers and crackers?

Obviously, cracking is immoral and unethical. The data they damage is considered to be private, secure, and the property of whoever created it or owns the servers it is stored on. Hacking is a more sensitive issue. On the one hand, there is no harmful intent, and in the vast majority of cases no damage done. On the other hand, the data is still private, the system was still infiltrated by someone who did not have permission to do so, and there could be unintentional damage done if the hacker is not careful. Any unauthorized infiltration of a secure, private system is illegal, as is any damage caused for any reason. The hacker has to make a judgment call before beginning his work: is it worth the risk? Can I justify to myself the risks involved in face of the legal prohibition?

Program Cracking                      Misuse of Information    

 

Internet Crime Home Page


Please Click on the Following Links to Explore our Website: