HACKER
Hacker is a term for a person or group of people who
contributed useful to the world of networking and operating systems,
create a program
to help the world's networks and computers. Hackers can also categorize the
jobs are done to find the weaknesses of a system and provide ideas or opinions
that can improve system weaknesses are found
Hacker levels :
1. Elite
Characteristics: understood out of the operating
system, able to configure and connect
a global network, to programming each day, efficient
& skilled, using his knowledge* with
the right, does not destroy data, and always follow
the rules. Elite level is often referred
to as the ‘temperature'.
2. Semi Elite
Characteristics: younger than the elite, has the
ability and extensive knowledge of
computers understanding of operating systems (including holes), the
ability of the program
enough to change the program exploits.
3.
Developed Kiddie
Characteristics:
young age (ABG) and still in school, they read about the method of
hacking and how on various
occasions, tried many different systems to ultimately succeed
and proclaiming victory to
another, generally still use Graphic User Interface (GUI) and
just ' learn
the basic of Unix without being able to find a new hole in the operating
system
weaknesses.
4.
Script Kiddie
Characteristic : as well as developed kiddi Lamers, they
only have technical knowledge
of networking is very
minimal, not separated from the GUI, hacking done using a trojan to
frighten and distress of life most Internet
users
5.
Lammer
Characteristics: do not have the experience and knowledge but want
to be a hacker, so
lamer
often referred to as the 'wanna-be "hackers, use their computers mainly to
play
games, IRC,
exchange prirate software, stealing credit cards, using software hacking trojan,
nuke & DoS, likes to boast over the IRC
channel, and so forth. Because many shortcomings
to achieve the elite, in their development will only
be up to the level of developed or script
kiddie kiddie
course.
CRACKER
Cracker is a term for people looking for system weaknesses and
enter for personal gain and profit from the system that enter, such as:
theft, deletion, and many others. Cracker is corrupt.