{"id":4729,"date":"2013-10-18T14:55:16","date_gmt":"2013-10-18T12:55:16","guid":{"rendered":"http:\/\/blogs.sun.ac.za\/it\/?p=4729"},"modified":"2013-10-21T15:59:53","modified_gmt":"2013-10-21T13:59:53","slug":"hackers-and-crackers","status":"publish","type":"post","link":"https:\/\/blogs.sun.ac.za\/it\/2013\/10\/hackers-and-crackers\/","title":{"rendered":"<!--:en-->Hackers and crackers<!--:--><!--:af-->Kappers en krakers<!--:-->"},"content":{"rendered":"<p><!--:en--><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" alt=\"\" src=\"http:\/\/blogs.sun.ac.za\/it\/files\/2013\/10\/hacked.jpg\" width=\"250\" height=\"150\" align=\"right\" \/><\/p>\n<p>We all remember Lisbeth Salander from the\u00a0<em>The Girl with the Dragon tattoo <\/em>movie or Neo in <em>The Matrix<\/em> &#8211; both<em> hackers.<\/em><\/p>\n<p>Earlier this week even SU websites were targeted by the\u00a0747crew, who used it to proclaim their political and religious convictions.\u00a0<\/p>\n<p>But apparently there&#8217;s a difference between hackers and crackers. In the context of computer security a hacker is seen as someone who pinpoints the weaknesses in a computer system or network and exploits them. His motivation can be financial gain, a platform for protest or purely because it&#8217;s a challenge.<\/p>\n<p>Over time, and partly thanks to the media, the association with the word &#8220;hacker&#8221; predominantly became a negative one. Eric S. Raymond\u00a0(author of\u00a0<i>The New Hacker&#8217;s Dictionary<\/i>) believes that members of the computer underground should be called\u00a0<em>crackers<\/em>.<em>\u00a0 According to\u00a0<\/em>R.D.\u00a0Clifford (2006) a c<em>racker <\/em>is someone who illegally gained access to a computer with the intent of committing a crime, for example destroying data on a particular system.<\/p>\n<p>\u00a0More recently the word<em>\u00a0<\/em><em>hacker<\/em>\u00a0has been reclaimed by computer programmers who agree with Raymond that those who <em>hack <\/em>with criminal intent, should be called a<em> cracker. <\/em>Several subgroups of this subculture have different approaches and also use different terms to distinguish themselves from others.<\/p>\n<p>A w<em>hite hat\u00a0<\/em>won&#8217;t break into a system with malicious intent, but rather to test their own security or for a company manufacturing security software. The term\u00a0<em>white hat <\/em>in internet slang refers to an ethical hacker.<\/p>\n<p>A b<em>lack hat <\/em>hacker violates computer security for his own benefit. These are the stereotypical characters we see depicted in popular culture, like movies.\u00a0<em>Black hats <\/em>break into secure networks to destroy data or to render the network unusable for those who need to access it.<\/p>\n<p>A<em>\u00a0grey hat<\/em>\u00a0surfs the internet and breaks into a system only to notify it&#8217;s administrator that it has a security defect and then offer to fix it at a price.<\/p>\n<p>A <em>blue hat\u00a0<\/em>assists with the testing of a system before it&#8217;s launched to establish it&#8217;s weaknesses. Usually he&#8217;s not part of a computer security company.<\/p>\n<p>Other terms include a\u00a0<em>script kiddie\u00a0<\/em>(someone who&#8217;s not an expert and uses other people&#8217;s software to hack) and a<em>\u00a0neophyte, &#8220;n00b&#8221;,<\/em>\u00a0or\u00a0<em>&#8220;newbie<\/em>&#8221; is a novice who&#8217;s still in training. \u00a0<\/p>\n<p>A\u00a0<em>Hacktivist<\/em>\u00a0is a\u00a0<em>hacker<\/em>\u00a0who misuses technology to convey his social, ideological and political message. The defacement of the SU webpages earlier this week is an example of\u00a0<i>hactivism.<\/i><\/p>\n<p style=\"text-align: right;\">[SOURCE: www.wikipedia.org]<\/p>\n<p>&nbsp;<\/p>\n<p><!--:--><!--:af--><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" alt=\"\" src=\"http:\/\/blogs.sun.ac.za\/it\/files\/2013\/10\/hacked.jpg\" width=\"250\" height=\"150\" align=\"right\" \/><\/p>\n<p>Wie van ons onthou nie vir Lisbeth Salander van <em>The Girl with the Dragon tattoo<\/em> fliek of Neo in\u00a0<em>The Matrix <\/em>nie\u00a0&#8211; beide voorbeelde van <em>hackers.\u00a0<\/em><\/p>\n<p>Vroe\u00ebr die week het selfs US-webwerwe deurgeloop onder die 747crew, wat dit gebruik het as platform om hul politiese en godsdienstige oortuigings te verkondig.<\/p>\n<p>Daar kan egter `n onderskeid getref word tussen kappers <em>(hackers<\/em>) en krakers (<em>crackers<\/em>). In die konteks van rekenaarsekuriteit is `n kapper iemand wat swakplekke in `n rekenaarstelsel of -netwerk opspoor en uitbuit. Sy motivering kan finansie\u00ebl wees, `n platform vir protes of bloot net omdat dit `n uitdaging bied.<\/p>\n<p>Met tyd, en deels te danke aan die media, is die assosiasie met die woord <em>hacker<\/em>\u00a0grotendeels `n negatiewe een.\u00a0Eric S. Raymond\u00a0(skrywer van\u00a0<i>The New Hacker&#8217;s Dictionary<\/i>) voer aan dat lede van die ondergrondse rekenaarbeweging eerder <em>crackers <\/em>genoem moet word.<em>\u00a0 <\/em>Volgens\u00a0\u00a0R.D.\u00a0Clifford (2006) is `n <em>cracker\u00a0<\/em>iemand wat ongemagtigde toegang tot `n rekenaar verkry met die doel om `n misdaad te pleeg, byvoorbeeld om inligting binne die bepaalde stelsel te vernietig.<\/p>\n<p><em><\/em>Die woord<em> hacker<\/em> is die afgelope tyd teruggeeis deur rekenaarprogrammeerders wat saamstem met Raymond se teorie dat diegene wat vir krininele doeleindes <em>hack, <\/em>eerder `n<em> cracker <\/em>genoem moet word. Subgroepe van die ondergrondse rekenaarkultuur het verskillende benaderings ten opsigte van die twee definisies en gebruik verskillende terme om hulself te onderskei van ander groepe.<\/p>\n<p>\u00a0`n <em>White hat\u00a0<\/em>breek nie by stelsels in met kwaadwillige bedoelings of voorbedagte rade nie, maar eerder om hul eie sekuriteit te beproef of namens `n maatskappy wat sekuriteit-sagteware vervaardig. In internet slang verwys\u00a0<em>white hat\u00a0<\/em>\u00a0na `n etiese kuberkraker.<\/p>\n<p>\u00a0&#8216;n <em>Black hat<\/em>\u00a0skend rekenaarsekuriteit vir sy eie voordeel. Hulle is die stereotipiese kriminele krakers wat dikwels in popul\u00eare kultuur, soos flieks, uitgebeeld word.\u00a0<em>Black hats <\/em>breek by sekure netwerke in om data te vernietig of om die netwerk onbruikbaar te maak vir diegene wat toegang daartoe het.<\/p>\n<p>`n<em> Grey hat<\/em>\u00a0 probeer inbreek by `n stelsel bloot om die administrateur daarop te wys dat sy stelsel `n veiligheidsdefek het. Hulle bied aan om hierdie fout reg te maak &#8211; teen `n koste natuurlik.<\/p>\n<p>`n <em>Blue hat <\/em>toets stelsels voordat dit bekendgestel word sodat swakplekke bepaal en gekorrigeer kan word. Hulle is tipies nie deel is van `n rekenaar sekuriteitsfirma nie.\u00a0<\/p>\n<p>Ander terme sluit in `n\u00a0<em>script kiddie\u00a0<\/em>(iemand wat nie `n kundige is nie en ander se sagteware gebruik om te <em>hack<\/em>) en `n<em>\u00a0neophyte, &#8220;n00b&#8221;,<\/em> of <em>&#8220;newbie<\/em>&#8221; is `n beginner wat nog kennis en ondervinding moet opdoen.<\/p>\n<p>`n <em>Hacktivist<\/em> is `n <em>hacker<\/em> wat tegnologie misbruik om sy sosiale, ideologiese of politieke boodskap oor te dra. Die skending van die US-webwerwe vroe\u00ebr die week is `n voorbeeld van<i> hactivism.<\/i><\/p>\n<p style=\"text-align: right;\">[BRON: www.wikipedia.org]<\/p>\n<p><!--:--><\/p>\n","protected":false},"excerpt":{"rendered":"<p>We all remember Lisbeth Salander from the\u00a0The Girl with the Dragon tattoo movie or Neo in The Matrix &#8211; both hackers. Earlier this week even SU websites were targeted by the\u00a0747crew, who used it to proclaim their political and religious convictions.\u00a0 But apparently there&#8217;s a difference between hackers and crackers. In the context of computer [&hellip;]<\/p>\n","protected":false},"author":259,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29187],"tags":[3636],"class_list":["post-4729","post","type-post","status-publish","format-standard","hentry","category-security-2","tag-security"],"publishpress_future_action":{"enabled":false,"date":"2026-05-09 10:50:41","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/posts\/4729","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/users\/259"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/comments?post=4729"}],"version-history":[{"count":21,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/posts\/4729\/revisions"}],"predecessor-version":[{"id":4869,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/posts\/4729\/revisions\/4869"}],"wp:attachment":[{"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/media?parent=4729"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/categories?post=4729"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/tags?post=4729"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}