Hacker is one of those terms that has a different meaning depending on who uses it. Among programmers, to be a hacker is to be a star. Hackers are programming code jockeys that can throw together bits of miraculous pieces of programming seemingly at will. They are gurus. People who modify computer and other pieces of electronic hardware are also sometimes called hackers.

Being a hacker can also be a bad thing. A hacker or hack can sometimes be someone that has no grace or elegance in his work and throws his projects together haphazardly. Among the general public (thanks to the media and perhaps Hollywood), a hacker is a person who gains illicit access to a computer and steals stuff or breaks into military networks and launches missiles for fun and with no conscience.

NOTE

You might hear the terms white-hat or black-hat in reference to a hacker or cracker. A black-hat is a bad person who gains unauthorized access to a computer or network for nonaltruistic reasons. A white-hat is a security expert who attempts to gain access to a computer or network to detect vulnerabilities so they can be patched. Pink-hats are just fashionable.

To complicate things even further, those that are hackers in the break-and-enter sense consider themselves crackers or black-hat hackers.

And among people who eat cheese, crackers are savory biscuits.

So you see the problem here. For simplicity’s sake, I am going to use the popular mass-media definition of hackers interchangeably with crackers. Both terms refer to bad people who divine access to your computer across the Internet by compromising its defenses or using electronic loopholes.

Explore More

Malaysia mymasjid.net.my’s Web Vulnerability, MySQL Injection

PlanetCreator has reported another critical MySQL Injection (vulnerability) on www.mymasjid.net.my This vulnerability has been alerted to :- Webmaster : [email protected] Applications: ———— PlanetCreator’s_Universal_Advanced_Internet_Securi ty_T00L System Time: ———— (UTC+08:00) Kuala Lumpur,

Metasploit Framework 3.7.0 Released!

The Metasploit team has spent the last two months focused on one of the least-visible, but most important pieces of the Metasploit Framework; the session backend. Metasploit 3.7 represents a

brb’s uninstaller 2009, Freeware

When brb’s Uninstaller is started, its main window fills with installed applications. Change View type From the uninstaller toolbar you can change the way that the list of applications may