Hackers and crackers are usually highly intelligent social misfits who tend to have a strong curiosity and often have an anarchist or, at very least, anti-authoritarian bent. They see the Internet as a playground and they tend to believe information should be free. Sometimes they are described as digital joy riders.

In an interview on SafeMode.org, one hacker—who used the nickname xentric—explained why he hacks:

“It’s just that feeling when you finally get something done. You put lots of effort into some hacks and I feel a rush of excitement whenever I succeed in doing something. What is the incentive that keeps (me) doing it? Curiosity…”

It’s safe to say that the vast number of people who try to gain illegal access to computers are young men. Many high-profile hackers are in their 20s and 30s. However, many are simply teenagers who have access to publicly available hacking tools that can be downloaded easily from the Internet.

There’s a hierarchy in the hacker community. High-status crackers write their own tools and develop their own break-in mechanisms to gain access to computers. Lower down on the hacker food chain are script kiddies. These electronic intruders use freely distributed tools designed by others to engage in computer vandalism, break-ins, or electronic theft.

Explore More

Zlob hacker writes love letter to Microsoft

Here’s a new way to get Microsoft to pay attention to you: slip a brief message into the malicious Trojan horse program you just wrote. That’s what an unnamed Russian

Critical SQL Injection in GK Power System (Myanmar)

PlanetCreator reported another Critical SQL injection (vulnerability) on GK Power System (Myanmar) URL : http://www.gkmyanmar.com/ SQL injection is a code injection technique that exploits a security vulnerability occurring in the

SQL Commandos (usefull for injections)

Here is a list of SQL commands and what they do, these would be used in some injection methods and of course legitimate sql functions. On thier own they wont