Hackers?
- Programming languages and systems who enjoys learning the details of
- Rather than merely theorized about programming and people who enjoy the programming itself
- Specialty, who would quickly write a program that
- An expert on a particular program
This article about doing so, he eonronmaechena hacker underground drifting through the following terms sum up to the classification of hacker silryeokbyeol.
1) The Elite
3133t, 31337, 3 also known as 337 l. Security at the forefront of the industry does not limit the ability of these. Compared to other industries to keep getting older and is characterized by mature level. Inside and outside of the operating system they are obliged to see through. Programming is the default.
The wheels are great natural talent.
Due to the nature of the security of these are engaged in the security industry and the very few, who works at the data input or the help desk, which is dirty.
An endless thirst for knowledge and curiosity got them to decide what success and failure factors.
"This code is run as a user other than root I would spark a segmentation fault," you have any questions for this kind of solution to try and try until you find.
Elite hackers by applying the knowledge it takes to make their fix in mind, and how to fix to improve the environment. If you discover a vulnerability in the operating system or software vulnerabilities sit down and trace the origin and cause, and sometimes also discover a possible solution produces.
Means of a highly skilled technique and as required, would have in order not to get caught. Elite hackers out of the system to be hacked without a trace.
The technology never even know that he's been hacked so close to amazing.
The reason for this is simple to make this hack. They can penetrate a system and then leave quietly geotppun want to prove that. Therefore, only data that can be traced to clear the rest of the other data do not touch.
They'll try and download the entire network can throw and make the system disables the ability to infiltrate the recovery hold the owner of the two.
However, they do not. Because the elite because.
2) semi-elite
Their age is slightly lower than the previous elite hackers side.
Have comprehensive knowledge about the computer, it does so to understand the system and
It does so in a particular vulnerability known to exist, its vulnerability to attack exploits a minimal degree of coding are armed with knowledge.
Most of the hacking incidents reported in the media of this sort is due to a hacker.
They themselves because of the talent wants to naeboyigo receives glare of elite hackers.
From the perspective of elite hackers because it's stupid jityigi. Their technology is the lack of being a elite level. After cracking a huge amount of logs and system administrators often leave a trail to nail caught are arrested.
3) Kiddy Loft Developments
Young ages, they usually consist of ten students in the second half.
They read many books about hacking techniques, the techniques you know where you want to use. It worked exploits a vulnerability found ten thousand and one times until you try to penetrate a system, if successful, usually (consciously or unconsciously) losing control of the system is destroyed.
Then they keep telling the act of boasting dongnebangne. Of these, the hacker to gain the title, but most keuraekeora referred to some of Ido.
Or newly discovered security vulnerabilities, according to a recently discovered vulnerability in a given situation for those who have skills that will change.
If you need to mobilize services and knowledge of the net, but there is no King of the GUI based operating systems other than the high-level operating system does not have a basic knowledge.
Unix has just started or is the mere foundation, if you know the most. They do not know the track well Prevention. Usually at home, dial-up accounts using stolen is cracking.
After a successful network penetration and carries everywhere proud. This level credit card fraud, warez (pirated software term) bootleg, nuking, DoS, etc. are involved in such a serious computer crime. To justice is deservedly.
When a society is bound to assess how their own sins, how will you realize just how making a strict punishment. Cracking usually quit after a life sentence.
4) The script kiddies
Loft Developments kiddies and Ray Price in the middle of bots, script kiddies have all the features of both.
They absolutely do not get the title of hacker. Newokingyina little about the operating system, scores of technical knowledge gojakin GUI operating system to the outside world, they have never been in his Iife.
They are used for warez computer knowledge. They have to hack usually use well-known Trojan attack and harass ordinary Internet users will
Ray script kiddies and bots, and some knowledge of the difference is age. Most of these computers as a student teacher in class, do not know if you ask them.
Because of these lower-level students, and they look up at the elite level, is mistaken.
5) reyimeo
Hackers and technology but also those who are experienced. Under no circumstances should these hackers that called you. Keuraekeora should call.
These networks and operating systems do not have knowledge regarding gisuljeokeuin. The sole purpose of using these computer games and IRC chat. Warez sites to find or include credit card fraud.
Through mass media such as newspapers, magazines heard of hackers learn that they deluded themselves into the elite is in a false sense of superiority.
Trojan software, nuking, DoS tool you can if you think about the fact that cracking Trojans and hacking the GUI operating systems are down.
The superiority of the same sort of would-be hackers, the same situation, the same level affects the others.
I mean they are an IRC and Internet communications to spread through space, and this cycle is repeated.
For the majority of them climb into the elite level of technical skills are lacking. Years studying and using the computer even if trained, the developmental level loft kiddies will retire in repose.
No comments:
Post a Comment