%PDF-1.3 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj 2 0 obj << /Type /Outlines /Count 0 >> endobj 3 0 obj << /Type /Pages /Kids [6 0 R ] /Count 1 /Resources << /ProcSet 4 0 R /Font << /F1 8 0 R /F2 9 0 R /F3 10 0 R >> /XObject << /I1 11 0 R >> >> /MediaBox [0.000 0.000 612.000 792.000] >> endobj 4 0 obj [/PDF /Text /ImageC ] endobj 5 0 obj << /Creator (DOMPDF) /CreationDate (D:20240517062447+00'00') /ModDate (D:20240517062447+00'00') /Title (IT-artikels) >> endobj 6 0 obj << /Type /Page /Parent 3 0 R /Contents 7 0 R >> endobj 7 0 obj << /Length 6392 >> stream 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 89.926 521.469 656.808 re f 0.773 0.773 0.773 RG 0.75 w 0 J [ ] 0 d 45.641 90.301 520.719 656.058 re S 0.773 0.773 0.773 rg 61.016 617.359 m 550.984 617.359 l 550.984 618.109 l 61.016 618.109 l f 1.000 1.000 1.000 rg BT 278.868 698.693 Td /F1 10.5 Tf [(POST LIST)] TJ ET 0.200 0.200 0.200 rg BT 212.789 670.111 Td /F1 14.4 Tf [(INFORMASIETEGNOLOGIE)] TJ ET BT 221.824 643.466 Td /F1 11.7 Tf [(INFORMATION TECHNOLOGY)] TJ ET BT 61.016 583.841 Td /F1 14.4 Tf [(HACKERS AND CRACKERS)] TJ ET 0.400 0.400 0.400 rg BT 61.016 564.033 Td /F3 9.0 Tf [(We all remember Lisbeth Salander from the)] TJ ET BT 237.578 564.033 Td /F3 9.0 Tf [(The Girl with the Dragon tattoo )] TJ ET BT 61.016 553.044 Td /F3 9.0 Tf [(movie or Neo in )] TJ ET BT 126.536 553.044 Td /F3 9.0 Tf [(The Matrix)] TJ ET BT 169.043 553.044 Td /F3 9.0 Tf [( - both)] TJ ET BT 194.558 553.044 Td /F3 9.0 Tf [( hackers.)] TJ ET BT 61.016 533.055 Td /F3 9.0 Tf [(Earlier this week even SU websites were targeted by the747crew, who )] TJ ET BT 61.016 522.066 Td /F3 9.0 Tf [(used it to proclaim their political and religious convictions.)] TJ ET BT 61.016 502.077 Td /F3 9.0 Tf [(But apparently there's a difference between hackers and crackers. In the )] TJ ET BT 61.016 491.088 Td /F3 9.0 Tf [(context of computer security a hacker is seen as someone who pinpoints )] TJ ET BT 61.016 480.099 Td /F3 9.0 Tf [(the weaknesses in a computer system or network and exploits them. His )] TJ ET BT 61.016 469.110 Td /F3 9.0 Tf [(motivation can be financial gain, a platform for protest or purely because )] TJ ET BT 61.016 458.121 Td /F3 9.0 Tf [(it's a challenge.)] TJ ET BT 61.016 438.132 Td /F3 9.0 Tf [(Over time, and partly thanks to the media, the association with the word "hacker" predominantly became a negative one. )] TJ ET BT 61.016 427.143 Td /F3 9.0 Tf [(Eric S. Raymond\(author of)] TJ ET BT 172.058 427.143 Td /F3 9.0 Tf [(The New Hacker's Dictionary)] TJ ET BT 287.798 427.143 Td /F3 9.0 Tf [(\) believes that members of the computer underground should be )] TJ ET BT 61.016 416.154 Td /F3 9.0 Tf [(called)] TJ ET BT 87.026 416.154 Td /F3 9.0 Tf [(crackers)] TJ ET BT 121.028 416.154 Td /F3 9.0 Tf [(.)] TJ ET BT 123.530 416.154 Td /F3 9.0 Tf [( According to)] TJ ET BT 181.058 416.154 Td /F3 9.0 Tf [(R.D.Clifford \(2006\) a c)] TJ ET BT 273.083 416.154 Td /F3 9.0 Tf [(racker )] TJ ET BT 300.587 416.154 Td /F3 9.0 Tf [(is someone who illegally gained access to a computer with )] TJ ET BT 61.016 405.165 Td /F3 9.0 Tf [(the intent of committing a crime, for example destroying data on a particular system.)] TJ ET BT 61.016 385.176 Td /F3 9.0 Tf [(More recently the word)] TJ ET BT 155.048 385.176 Td /F3 9.0 Tf [()] TJ ET BT 157.550 385.176 Td /F3 9.0 Tf [(hacker)] TJ ET BT 184.559 385.176 Td /F3 9.0 Tf [(has been reclaimed by computer programmers who agree with Raymond that those who )] TJ ET BT 61.016 374.187 Td /F3 9.0 Tf [(hack )] TJ ET BT 82.526 374.187 Td /F3 9.0 Tf [(with criminal intent, should be called a)] TJ ET BT 234.086 374.187 Td /F3 9.0 Tf [( cracker. )] TJ ET BT 271.094 374.187 Td /F3 9.0 Tf [(Several subgroups of this subculture have different approaches and )] TJ ET BT 61.016 363.198 Td /F3 9.0 Tf [(also use different terms to distinguish themselves from others.)] TJ ET BT 61.016 343.209 Td /F3 9.0 Tf [(A w)] TJ ET BT 76.019 343.209 Td /F3 9.0 Tf [(hite hat)] TJ ET BT 108.041 343.209 Td /F3 9.0 Tf [(won't break into a system with malicious intent, but rather to test their own security or for a company )] TJ ET BT 61.016 332.220 Td /F3 9.0 Tf [(manufacturing security software. The term)] TJ ET BT 231.575 332.220 Td /F3 9.0 Tf [(white hat )] TJ ET BT 270.095 332.220 Td /F3 9.0 Tf [(in internet slang refers to an ethical hacker.)] TJ ET BT 61.016 312.231 Td /F3 9.0 Tf [(A b)] TJ ET BT 74.525 312.231 Td /F3 9.0 Tf [(lack hat )] TJ ET BT 108.041 312.231 Td /F3 9.0 Tf [(hacker violates computer security for his own benefit. These are the stereotypical characters we see depicted )] TJ ET BT 61.016 301.242 Td /F3 9.0 Tf [(in popular culture, like movies.)] TJ ET BT 184.559 301.242 Td /F3 9.0 Tf [(Black hats )] TJ ET BT 228.578 301.242 Td /F3 9.0 Tf [(break into secure networks to destroy data or to render the network unusable for )] TJ ET BT 61.016 290.253 Td /F3 9.0 Tf [(those who need to access it.)] TJ ET BT 61.016 270.264 Td /F3 9.0 Tf [(A)] TJ ET BT 67.019 270.264 Td /F3 9.0 Tf [(grey hat)] TJ ET BT 102.038 270.264 Td /F3 9.0 Tf [(surfs the internet and breaks into a system only to notify it's administrator that it has a security defect and then )] TJ ET BT 61.016 259.275 Td /F3 9.0 Tf [(offer to fix it at a price.)] TJ ET BT 61.016 239.286 Td /F3 9.0 Tf [(A )] TJ ET BT 69.521 239.286 Td /F3 9.0 Tf [(blue hat)] TJ ET BT 104.045 239.286 Td /F3 9.0 Tf [(assists with the testing of a system before it's launched to establish it's weaknesses. Usually he's not part of a )] TJ ET BT 61.016 228.297 Td /F3 9.0 Tf [(computer security company.)] TJ ET BT 61.016 208.308 Td /F3 9.0 Tf [(Other terms include a)] TJ ET BT 149.549 208.308 Td /F3 9.0 Tf [(script kiddie)] TJ ET BT 199.562 208.308 Td /F3 9.0 Tf [(\(someone who's not an expert and uses other people's software to hack\) and a)] TJ ET BT 61.016 197.319 Td /F3 9.0 Tf [(neophyte, "n00b",)] TJ ET BT 134.456 197.319 Td /F3 9.0 Tf [(or)] TJ ET BT 147.461 197.319 Td /F3 9.0 Tf [("newbie)] TJ ET BT 179.168 197.319 Td /F3 9.0 Tf [(" is a novice who's still in training. )] TJ ET BT 61.016 177.330 Td /F3 9.0 Tf [(A)] TJ ET BT 69.521 177.330 Td /F3 9.0 Tf [(Hacktivist)] TJ ET BT 108.023 177.330 Td /F3 9.0 Tf [(is a)] TJ ET BT 127.031 177.330 Td /F3 9.0 Tf [(hacker)] TJ ET BT 154.040 177.330 Td /F3 9.0 Tf [(who misuses technology to convey his social, ideological and political message. The defacement )] TJ ET BT 61.016 166.341 Td /F3 9.0 Tf [(of the SU webpages earlier this week is an example of)] TJ ET BT 280.112 166.341 Td /F3 9.0 Tf [(hactivism.)] TJ ET BT 427.963 146.352 Td /F3 9.0 Tf [([SOURCE: www.wikipedia.org])] TJ ET BT 61.016 126.363 Td /F3 9.0 Tf [()] TJ ET BT 61.016 107.874 Td /F3 9.0 Tf [(Posted in:Security | Tagged:Security | With 0 comments)] TJ ET q 187.500 0 0 112.500 363.484 460.324 cm /I1 Do Q endstream endobj 8 0 obj << /Type /Font /Subtype /Type1 /Name /F1 /BaseFont /Helvetica-Bold /Encoding /WinAnsiEncoding >> endobj 9 0 obj << /Type /Font /Subtype /Type1 /Name /F2 /BaseFont /Helvetica /Encoding /WinAnsiEncoding >> endobj 10 0 obj << /Type /Font /Subtype /Type1 /Name /F3 /BaseFont /Helvetica-Oblique /Encoding /WinAnsiEncoding >> endobj 11 0 obj << /Type /XObject /Subtype /Image /Width 250 /Height 150 /ColorSpace /DeviceRGB /Filter /DCTDecode /BitsPerComponent 8 /Length 12129>> stream ExifII*Ducky<)http://ns.adobe.com/xap/1.0/ Adobed        !1"AQ2aqB#Rb3r$Ҕ5U!1AQaq"2RBr#b3$4 ?XIEP @(P @(P @(P @(P @(P @(P @(P @(P @(P @(P @(P @(P @(P @(P @(P @(7\*~]7g'spU2!%{ P4=nk3yЬ//E2![w n8>tr?y騔G B줢鉙^UǏ >E/nƹ qGW̎d)wKgurg3ςi۰7+WmwY탓/6݉+c]Nrlddi,6N5,’zıwswonzK//cqKN3- IV'M6#U|j+]UR]j?A򪜒)_I^>{_gǒktd_ңq7̯ٸu7]#$7ͥ't7Y.T9u݈´7*n:*$3F\5۞r{ѽ{T !}D)߭eؿzünoݚn:e8kq=yl}\rFыYUnXAK^Y-nڞpϯ?0MhtPr`y@Zm~7cX5A]6GaH6nȻvg=I[18V睼~h/FG0烬rWԛv m|܀IJYY-=G5%D;񦕞_DLwoRXjX˅[rElMjf' )΂EMf(KGmA>wg+ON֩K#;(1G̚٢)d J"}Ma |K4T%G+ŗ.lYUHu`UTV$\OG E5>!eشՂ{_/v]3Y˵Hhۖ6MbCt}*@6M|/y+OUhqAѯj1Uq396Dٷ)6޷̬.bŊ\DI-݄-Ne9NI܂Kvf団1IiMj=*XYp%mS%~⡐Ki|O.iwEׁ|󍟹cPd$AqQӫoj˻Q\bCFc*y׉,y@#iqn ^Oq:ZIr ׍%9,JW J`[zwvKRtFaҘ6#&q݀eV?a.8p<+yWV8cON}LeT. 豘ԫuzwsƋΥ[ۿS-;|o~۽u>^ߪٖ.fbXW/:?۶0qM/h7wHd=rVB1Mvf-;z!.>lWn ssdm(G t$Fr& ӥ֚*/߳%?2r}^)n6'w.}=PE^j6bmAB8EBa@(P{{Veǝf"L^氉{V1 Z\]:/o[$*/e|o,/8`ћ"%M !n X U]z۶u*M.S(ER Yʾ*M',ccdYx:5XVmҸ[mKZUk7늚Uk5u 2ZhqVIiN*4pZY 5~JK/ =Ec²*}|H7c#d$ZQH:Ul=nʍ ۨCr/|#,8%uמV)5:'#ܸ4Kɋb}R5V4\j^j?yv5I:b0Uم;{)G_z}OZ\O:Y {f.<8GLLR@4ׯInCqmUKnpn:0}ɛ64}9[X=j.9jWqʷZ!O7[|b3E;#Cs/]nqz;w+ve]݆[g$S=&`D~ҮcG˵h @(ӖGvdyY̱7ZEOحtGFf3cee4б U׮buKHm*2'-,ELm>UT@VA-gr*ebY(n͟/~~WN_Nm{ Ԑ}ԗa-0݊b-8+x"M9PL1(lpEFVMQDO{e6ƫȱ۱|Daݱ'Q8r\:m~m'Dg'mC7U qxU+, CInͧG֬Ytà]#mK+`E}{[o?+󳲳+)mo`, 'mAiGtv(P @(N^~FzÞgG+qТ 1cs((ƑjyqmCK##=lL dţomSZ0NujS#ݾˏ#m͕ 6B#-9oDzzz\|RWRR9\毨Utu|p"x;'rٲ%ώr7hX%C#5jNc V%VITnnaB=8 X,S_VBҲ:zͻ*gr=عzqtoqO,%e8,J =}A{k\u8v-a(9\Xt˷',2𲣏. xhDanCN|=kgmFX7RNqj1JKV3wعtv˓iphdF=inӔO:ڶ9ܭy/Çr}/gqm+˗4qbld9z|j-.*vܨI}oqNto$U{ʎG˷T}4a;dxH}j>-Xb<=*GV,[vNTȌ":FXufԫf%ó%*%s ' ypٲQ V\ SXtK`uV[kԍ8bnsjV*5-NILdL|^ֈ%moS#K˭[RYɹMJju˷1|P @(P @(%x}<̐.0m5p\s19t 3sAy;^#豝yzIJ=PJkv O>v\jrϫ/㜓XrgG)Kbd=ׯT;nfBbqT]l.\q#2dK/!k}\(]?%榞'cr yf߸bmBhԘUVR{FoK\)mEkC=N.? |(`1NwrL $y]j^Ѫ#waZܫzbznխiKSKd_֫sGy*sH<=a jbc Z6Y`UK[fA=U(X(JqjZ2{s7.,rV4:qY:Wիm?NXE2=/|xEcDG2:Y=H6^~K5Ægk5z̿1^@6&>Ӗ܁&$5!{ 'ZÞ22]E)ͬg9ǫMVGw>N `It2<[:uݶ| iirz1<9zN=?X9[vV5KlGfrP @(P @(:'1o! HVʬ,ޚҩߟз.EF:t*vN6ể>ᴼJ$S MT8^w۬a IOn0봓w>Yq>Ǫ!+jZsYc V'mB1q]w|ll=T}#ZRUfU?0߅qF|UB$+:ZVg)Fi~݆:_GG㹜xlŸ@^Qrָw7ըjgl[swel\G&.;(~g`B$#V\͕6$}hǎxݰ:uU㴦,X}$zsATo&V۷-*]%GySż~H%N\>bu8l5yzkƇW.ex`Iwdd o!qAUy@btV.Re[t20!u208-Wfe67Wa'zKWIõU6?;W.5}cm5KV2wapFǡ+^\O:J4}GsJ(Qhl!>)_k5ŕV~$ֺm ^'{az/}^g&ѕ-hӕ xQ־G{zKRj90N:k2\ppŌC3~[25[sR$͢ڌ+b6:m?FK &Dpnx+2x߅Xm0Z)`P @(P M|w+D9nck/jrlu:G7R3ێ&F4<@bcNYmB Iѥķ!n1iux}pCbm@4/oe%ؠf۔]֜e\̋S' JigN{3u"Ti bU:V;z3hIqxNw!iqnp9p0l .Je,!\oֳ.)ZF=+vLl0lQu@\zTmqٹnyy˃,Scƨϐ1D*}%zWRwkW\4I{8]zcؚ-b?12M4 :Q_nnzzUK;_NnI_e\rOT82Aq ,R] B{ل5c$byt+^Fy Se z~U3_\q#U+M8^\Y9)7i9+}so޾򴕷؎*Jӥ>iS䅲8&"ڊATVC;Y+P?]2@&YKH:hS_ZtCz(޵@(P @(<žhwvae=Rp-XNK"]&V&_~`Ww_N^]=F3Rm_Ggi|?+`gH1rB.A(]C:֎vF{ŭ|R4ĞG$ Xڈ,J!>k$yC-*C oU](ZT\FSFJ2ZP @(>4r7*o֯UPJ|V}o!WV~ˣeS?[//Aݱ"1{pB-"߲n蹷X[X%([[(zz$%Z;#x)7ȥIl-QǗXN{߉ yN:?0a̎4T/.+0ESD[}/'Vus؛)x{y~.vwpa[Cޣ_mlJQXukط%(ƍu.ʷM$<,E]J8=Tѹd.J|Uݔ{y{2XϤUW!R|J<~]C4tM6 `vҬk ۤ-oӧۦ&n,2!#R?x-Wk" x1rXanI wBTXɫA{]˗i'\;<I$v?O1qz,m \_ɛ:Fa5UW?s`='ʾ˗Aw\R_}2n\i21F@5rE)/9\)R3O 1=RV,6?wWSsLZ_=!\F.fOfU?RKa۬$,zRYcmkȹg̐*?濇xNk)O-qFΘز#ҫ[^V-m! s}~-Y۷G~)aXeIvh> startxref 19633 %%EOF Hackers and crackers « Informasietegnologie
Language:
SEARCH
  • Recent Posts

  • Categories

  • Archives

Hackers and crackers

We all remember Lisbeth Salander from the The Girl with the Dragon tattoo movie or Neo in The Matrix – both hackers.

Earlier this week even SU websites were targeted by the 747crew, who used it to proclaim their political and religious convictions. 

But apparently there’s a difference between hackers and crackers. In the context of computer security a hacker is seen as someone who pinpoints the weaknesses in a computer system or network and exploits them. His motivation can be financial gain, a platform for protest or purely because it’s a challenge.

Over time, and partly thanks to the media, the association with the word “hacker” predominantly became a negative one. Eric S. Raymond (author of The New Hacker’s Dictionary) believes that members of the computer underground should be called crackers.  According to R.D. Clifford (2006) a cracker is someone who illegally gained access to a computer with the intent of committing a crime, for example destroying data on a particular system.

 More recently the word hacker has been reclaimed by computer programmers who agree with Raymond that those who hack with criminal intent, should be called a cracker. Several subgroups of this subculture have different approaches and also use different terms to distinguish themselves from others.

A white hat won’t break into a system with malicious intent, but rather to test their own security or for a company manufacturing security software. The term white hat in internet slang refers to an ethical hacker.

A black hat hacker violates computer security for his own benefit. These are the stereotypical characters we see depicted in popular culture, like movies. Black hats break into secure networks to destroy data or to render the network unusable for those who need to access it.

A grey hat surfs the internet and breaks into a system only to notify it’s administrator that it has a security defect and then offer to fix it at a price.

A blue hat assists with the testing of a system before it’s launched to establish it’s weaknesses. Usually he’s not part of a computer security company.

Other terms include a script kiddie (someone who’s not an expert and uses other people’s software to hack) and a neophyte, “n00b”, or “newbie” is a novice who’s still in training.  

Hacktivist is a hacker who misuses technology to convey his social, ideological and political message. The defacement of the SU webpages earlier this week is an example of hactivism.

[SOURCE: www.wikipedia.org]

 

Tags:

Comments are closed.

 

© 2013-2024 Disclaimer: The views and opinions expressed in this page are strictly those of the page author(s) and content contributor(s). The contents of this page have not been reviewed or approved by Stellenbosch University.