Friday, December 10, 2010

Cool Jelly Bracelet Ideas

Hackers, crackers, pirates, phreaks, spoofers, hackers, etc. Who's who? Founder

With the computer age have been a number of classifications and appellations that are used to designate those persons or groups engaged in illegal activities, using computers. There is confusion in the concepts used, because there are definitely differences between them and we intend to give details of their true meanings.
With the passing of the years news media, influenced by the multinational software, adopted the name "hacker" to describe anyone involved in acts that infringe against intellectual property, network security, virus writers, hackers servers, email interceptors, vandals in cyberspace, and so on.,

Hackers


HACKER

Although the word Pirate is evocatively romantic, this name is attributed to people who use software created by third parties through copies obtained illegally, ie without permission or license from the author. The original software does is called "bootleg", but in real terms and should be called a raw stolen software.

The word pirate, associated with illegal use of software, was first appointed in 1976 by William Gates, in his "Open letter to hobbyists" in which he stated his objection because many computer users were using software developed by him, without his authorization.

worldwide illegal software use is subject to sanctions and penalties that get worse when the pirate becomes a marketer of illegally copied software for profit gain. In Peru, the penalty for this crime varies from 1 to 4 years 'imprisonment, suspended for end users and a maximum of 8 years' imprisonment for marketers. HACKER



Hacker is an English idiomatic expression whose literal translation into English has several meanings, the most popular one attributed to "a person hired for a routine" and that the nature of the work is tedious, given, one could maniac.

The hacker nickname is created at the end of last century United States begins to receive a massive migration of people from all countries of the world they expected to find in the "land of opportunity" economic well-being and progress.

casual hackers were stevedores who spent all day down the suitcases and bundles of individuals and whole families who arrived on ships to the ports of New York, Boston, San Francisco, etc. They were tireless workers, they often worked without rest and to sleep and eat between packages of the springs in order not to miss an opportunity to make money. The word "hack" in English has multiple meanings in English, including "ax." As if loggers were using their hoe tirelessly to get him down, his tenacious goal earned them this name. The word hacker

applied in computing refers to the person who is dedicated to the task of research or development efforts beyond the normal and conventional, prepending a passion that goes beyond its normal energy. The hacker is someone who is passionate about computers and is dedicated to them beyond the limits. Hackers have "a healthy sense of curiosity, try all the locks on the doors to see if they are closed. Do not drop a system under investigation until the problems submitted to it are resolved. "

" The computer revolution has been achieved thanks to the hackers "say categorically famous scholars and researchers pioneers of computer viruses and Ross Rosenberg Rob Greenberg.

Since the inception of computer-based electromechanical relays, coils and vacuum tubes of glass, programming tasks are very tedious and language of those years was the cryptic machine language and then used the Assembler Pnemónico. Phase Initial computers, not as now conceived, there were men, women, youth and adults provided by diversified tasks entirely to research and experimentation, considering his work, routine, highly persistent and the results will not have been recognized through the years.

One woman, the U.S. Navy Admiral Grace Hooper is considered the first hacker in the computer age. While she was working and researching on the computer Mark I, during the Second World War was the first person who said that computers were used not only for military purposes but also could be very useful for several purposes for humanity. She created a programming language called FLOWMATIC and years later he invented nothing less than the famous language COBOL.

For some time the FBI of the United States uses the software "Carnivore" spying on Internet users and the U.S. Senate recently granted the right to use without a warrant.



It the question: Who "hacks" to whom?

CRACKER

Someone who boasting large computer literate and obsessed with a purpose to fight against what is forbidden, start investigate how to block protections to achieve their goal. The modern crackers use their own programs or many of which are distributed free in hundreds of Internet websites, such as routines Unlocker passwords or number generators to randomly and automatically run can make key disclosures violate the systems. Obviously

before becoming a cracker should be a good hacker. Also should mention that not all hackers become crackers. Phreak



The phreaker is a person with extensive knowledge of telephony can become authorized activities not phones, usually phones. Craft built electronic equipment that can intercept and even run cellular telephones calls without the owner realizing it. Internet maps are distributed to the instructions and nomenclature of the components to build various models of these devices.

Computer Crime

is the person or group of persons in partnership conducted illegal activities using computers and to the detriment of others, locally or over the Internet. One of the most popular practice is to intercept purchases on-line through Internet, to using name, credit card number and expiration date, make purchases of any goods, mostly software, or even hardware and which provide a shipping address different from the number holder's credit card used illegally.

hacker is also a "pirate" to distribute software without licenses for use provided by the author or representatives, as it not only violates the intellectual property, causing the brain drain computer, it is an enrichment and tax evader.

Cyberpunks (?)

In 1982, William Gibson wrote a science fiction novel called Neuromancer ", the same that was published in 1984, which deals with the Cyberpunks. This work was inspired by the novel, as well as science fiction, written 3 years ago by Victor Vinger and James Frenkel, entitled "True Names , and the opening of the Cyberspace Frontier " . Vinger was Victor who really created the concept of cyber-space, but William Gibson won best use of the word, making it very popular.

The Gibson almost total ignorance about computers and the current hacker culture enabled him to speculate about the alleged role of those called "Cyberpunks" and the use of computers in the future. Their stories have led to rejection by the hacker community and inspired contemporary film and television writers to create and produce works related to the so-called cyberpunks and cyberspace.

Since the late 90's, popular culture promoted a movement in fashion apparel, also known as "cyberpunk", associated with the techno subculture. Its main features are the skinheads display, except for one part of hair is pulled up as spikes, using a cosmetic glue called "gels." Wear earrings and tattoos on the body, some are wearing leather jackets with prints, pins or metal tip, other in bizarre ways.

Crackers
These terms are used inappropriately to describe the intrusion of cyberspace. Visit Hackers Gallery.

0 comments:

Post a Comment