Thursday, January 29, 2009

Hacker vs Cracker

The New Hacker's Dictionary defines Hacker as:

  1. "A person who enjoys exploring the details of programmable systems and how to stretch their capabilities, as opposed to most users, who prefer to learn only the minimum necessary. RFC1392, the Internet Users' Glossary, usefully amplifies this as: A person who delights in having an intimate understanding of the internal workings of a system, computers and computer networks in particular.
  2. One who programs enthusiastically (even obsessively) or who enjoys programming rather than just theorizing about programming.
  3. One who enjoys the intellectual challenge of creatively overcoming or circumventing limitations."


The term Cracker was introduced later in defense against journalistic misuse of Hacker, to differentiate between ethical hackers and the malicious hackers who subvert computer security for vandalism, personal gain, or other types of crime.

As the Jargon File states, "While it is expected that any real hacker will have done some playful cracking and knows many of the basic techniques, anyone past larval stage is expected to have outgrown the desire to do so except for immediate, benign, practical reasons (for example, if it's necessary to get around some security in order to get some work done)."


"Hacking is probably a natural part of exploring computers, no more malicious than figuring out how to put graphics in the border of the C64, disassembling executables, running programs through hex editors or trying to crack copy-restriction schemes on early software. With a world as vast and seemingly limitless as the Net, (and especially in the days before everyone was on it, when commercialism was strictly forbidden) reaching out to the far tentacles of the matrix was an exciting way to learn what was out there, and that included digging around through various computers. What's here? It's a host. What is it? Let's get in and see. Where does it come from? What does it do? Whose is it? Why is it here? What's on it? These sorts of explorations are a large part of the excitement of youth... Indeed, computer crime, as it is often called, is one of the few ways to keep entertained in the suburbs...

Too many people are quick to see a few 37337 h4x0r5 d3f4c3 4 w3bp4g3 and jump to the conclusion that everyone out there interested in network security is a little kid with a script who wants to write cryptic messages about owning so-and-so and playing games on irc. Beneath this superficial layer is a group of extremely dedicated advocates of freedom, truth, fair treatment, free information, sharing, exploration, curiosity, and knowledge, a true counter-culture which has remained steadfast as a vanguard against injustices perpetrated by the government, by corporations, by authoritarians. Yes, sometimes people think they go too far and probably suspect they're characters in a post-apolocyptic sci-fi movie. Still, the diversity among these people who get written off as "crackers" is such that it is unfair to characterize the group as a whole..." (Jason Kroll, Linux Journal editor)


"It all boils down to what kind of motivations and opportunities the hacker has. If the hacker is unethical, many times his motivations will be based upon greed, hate, bias, and a destructive mindset. If the hacker is ethical, then he may be motivated by an intellectual challenge, innovative ingenuity, and the like. The opportunities for hackers to hack depends heavily upon their own skills and abilities, as well as the targeted system's own deficiencies. The line between ethical and unethical hacking is a thin one, one which many do not dare to walk on." (Rich Christie)

0 comments:

Post a Comment