Encyclopedia > Hacking

  Article Content


Recently hacking has come to mean unauthorized access to data/information, to obtain or to modify it.

Previously, it referred to many things, usually related to a style of working that is either very good or carried out in a spirit of experimentation, possibly originating at MIT, where "hacks" or clever pranks were carried out. When free software authors use the word, they usually mean the old meaning.

"exploring the limits of what is possible, in a spirit of playful cleverness."
--Richard Stallman

A group known as the "Hacker Antidefamation League", wish to restore the old meaning to "hacking", preferring the word "cracking" to refer to unauthorised access.

Table of contents

What are some methods that hackers use?

Since Hacking is the process of making a computer program work better, then any tools used by a system administrator or a computer programmer are part of the methods used by hackers.

What have (some) hackers done to earn their reputation (unauthorized access)?

NO hacker ever engages in unauthorized access, so any reputation they receive is based on a misunderstanding by the public that a person who understands the details about how a computer works will use that knowledge to break into other people's computers. This misunderstanding is spread by crackers calling themselves hackers, and the press perpetuating the term.

Have there been some famous hacks?

There have been many wonderful hacks, emacs is one example. I doubt many of them are famous, however, because noncomputer people rarely understand exactly what makes a hack famous. To be famous, a hack must show a high degree of novelty, as well as a deep understanding of the way computers work, and must be significantly more elegant than a kludge.

What are some methods that crackers use? Some recent crackers have sent programs in email to unsuspecting users as attachments. Running these programs will give the cracker access to the computer. The programs can be classified as worms, viruses[?], and trojan horses. They work in different ways, but mainly they become zombies to the person who sent the original email. After recruiting these zombies, a cracker can remotely command them to attack other computers to take them over, more zombies, or overload a computer that can not be taken over (Denial of Service attack). It is generally thought that crackers do this to be noticed by their peers.

Have there been some famous cracks?

Definitely. The Morris Worm is famous, as the first worm that went out of control and slowed much of the Internet of its day to a crawl. It had no payload, but simply tried to reproduce, which it did in an uncontrollable manner.

See also: Cracking, Hacker

External Link

All Wikipedia text is available under the terms of the GNU Free Documentation License

  Search Encyclopedia

Search over one million articles, find something about almost anything!
  Featured Article
Talk:Michael Faraday

... Davy a sample of nbote that he had made' No, It's note. I actually typed that line ages back, and the typo slipped through. - look at the keyboard... -- {{Malcolm ...