Hacker



Hackers are people who study, analyze, and further if wanted, can create, modify, or even exploited the system contained in a device such as computer software and computer hardware such as computer programs, administrative and other matters, particularly security.

History

Terminology hackers emerged in the early 1960s among members of student organizations Tech Model Railroad Club at the Artificial Intelligence Laboratory Massachusetts Institute of Technology (MIT). The student group is one of the pioneering developments in computer technology and they are struggling with a number of mainframe computers. The English word "hacker" first appeared with a positive sense to describe a member who has expertise in the field of computers and able to make computer programs better than what has been designed together.
Then in 1983, the term hacker began a negative connotation. Because, in that year for the first time the FBI caught the 414s computer criminal groups based in Milwaukee, United States. 414 is their local area code. Group that came to be called hackers are convicted of burglary 60 computers, from computers owned by Cancer Center Memorial Sloan-Kettering's computer to Los Alamos National Laboratory. One of the perpetrators enjoy immunity because TESTIMONIALS, while five other players get probation.
Then in the next development comes another group that mention themselves as hackers, but it's not. They are (especially the men) who get the satisfaction of breaking through computer and telephone outsmart (phreaking). True hackers call these people do not like crackers and mix with them. True hackers crackers as people look lazy, irresponsible, and not too smart. Real hackers do not agree to say that with a person through the security has become hackers.
The hackers entered the annual meeting, that each mid-July in Las Vegas. Arena of the world's largest hacker conference is called Def Con. Def Con event to event is more exchange of information and technology related to peretasan activity.
Hacker has a negative connotation because people will be differences in terms misunderstanding about hackers and crackers. Many people understand that peretaslah resulting in loss of certain parties, such as changing the look of a web site (defacing), insert the virus code, and others, although they are a cracker. Cracker is using vulnerabilities that have not been repaired by the manufacturer software (bugs) to infiltrate and damage a system. For this reason the hackers usually understood is divided into two groups: White Hat Hackers, the true hackers and crackers are often referred to as Black Hat Hackers.