Preview

Difference Between Hackers and Crackers

Satisfactory Essays
Open Document
Open Document
501 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Difference Between Hackers and Crackers
the diferences between a hacker and a cracker

When the definition between a hacker and a cracker seems cloudy to you remember to look at motivation. A true hacker is a tinkerer, one with a curious mind, they push to the limits and take things apart in order to further their own understandings.

The Cracker may be teaching himself to do more too, but his motive is to use what he learns, to exploit weaknesses and to do harm. Where the hacker is an explorer, the cracker is an exploiter. The hacker explores and takes notes, while the cracker explores and takes advantage.

Hackers don't leave tracks. About the only changes they make to any systems they get in to are to change the logs to hide that they got inside. Crackers are the ones who delete files, make changes, and generally need to show off that they finally managed to enter a machine.

People generally don't have complaints about hackers unless they are really concerned about anyone reading sensitive information. Crackers are a whole different matter however. Crackers are in the system to take advantage where and how they can.

Why do hackers take the rap for crackers you may ask. Well there are three reasons for it. First, early hackers while in it to learn were just as tempted as anyone else would be to find themselves with control of the transfers of money inside a financial institution's mainframe. Hackers can be tempted too and so some high profile cases came to light.

Second, Hollywood likes the term hacker. They don't want to use terms they have to explain. In a film they can say hacker and you immediately know roughly what the guy does. Hacker was the word in the papers when the screenplays were written and hackers is still the word known to the uninitiated today.

Third, Crackers like to be thought of as hackers. As with Hollywood, its the word people know. A hacker gets more respect than a cracker, and a cracker wants respect desperately. Even the no-brain flooders of IRC would

You May Also Find These Documents Helpful

  • Satisfactory Essays

    In the television program “American Greed - Hackers : Operation Get Rich or Die Tryin’ “they explain the the reason most folks get into criminal hacking is because of credit and attention and not well thought out long term plans. The program also show how the team adapted to evade law enforcement measures by not being flashy and making spaced out recreational purchases such as cars and using cash when need be.…

    • 339 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Final Exam

    • 393 Words
    • 2 Pages

    Computer Hacking in 1960’s up to 1970’s – an individual working with computers who were technically gifted and skilled it was defined by computer ethicist Duncan Langford (1995).…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Nt1310 Unit 3 Essay

    • 1872 Words
    • 8 Pages

    There are cybercriminals who commit crimes using the computers and networks. They spread malicious viruses through the networks such as worms and Trojan horses. They hack other people's computers to steal important data and identity or destroy data. A hacker uses a packet sniffer to intercept the unencrypted network traffic and capture the passwords or other important information which was communicated through the network. Botnet or a Zombie computer is a computer which a hacker uses to spread viruses and to commit cybercrimes while the owner of the computer is unaware of it.…

    • 1872 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    Tim J. Watts goes more into the dark side of the “hacker” community by bringing up the constant back in forth between computer security officers and the so called hackers. This article, being written this year is able to reflect on the events of September 11, 2001 and new homeland security measures. He represents this viewpoint of a dangerous hacker in his definition: “While some hackers are harmless, others break into systems with the intent to steal information or to do destruction to the system. Hackers performing the latter pose a serious threat to the economic future of the United States” (Watts). Tim Watt outright blames the hacker community of accessing information that should be private. Only looking and reflecting on the serious threat…

    • 154 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Hacking is when a highly technical skilled individual or a group pass their way into a computer network or program without permission. This ends up in important data being stolen by the hacker which is illegal.…

    • 769 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Crt 205 Final Project

    • 2361 Words
    • 10 Pages

    | | |cracking; which is similar to hacking, is a process use by individuals |…

    • 2361 Words
    • 10 Pages
    Satisfactory Essays
  • Good Essays

    Cracker: A malicious attacker who deliberately intrudes upon systems or networks to gain unauthorized access or unauthorized resources.…

    • 413 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Testbacksecurity

    • 2284 Words
    • 10 Pages

    Expert hackers are extremely talented individuals who usually devote lots of time and energy to attempting to break into other people’s information systems.…

    • 2284 Words
    • 10 Pages
    Good Essays
  • Satisfactory Essays

    Final Exam Paper

    • 491 Words
    • 2 Pages

    ____ are hackers of limited skill who use expertly written software to attack a system…

    • 491 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Computer Memory Hacking

    • 820 Words
    • 2 Pages

    that they are capable of doing so. By demonstrating this skill, the hacker (the person gaining…

    • 820 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    ARTICLE SUMMARY

    • 1028 Words
    • 7 Pages

    An ethical hacker is a person who performs most of the same activities a cracker does, but with the owner or company’s permission.…

    • 1028 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    Hackers: A hacker is someone who finds weaknesses in a computer or computer network, enters, and modifies or/and steals data this could slow down performance very much or even completely halt it.…

    • 555 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Cyber Crime

    • 1094 Words
    • 5 Pages

    for the hacker is for financial gain. Cybercrime is about making a profit and continuing to make…

    • 1094 Words
    • 5 Pages
    Good Essays
  • Better Essays

    Hacker

    • 1123 Words
    • 5 Pages

    First of all, the definition of hacking and hackers need to be clearly understood so as to have an insight into hacking. Hacking can be defined as any kind of computer crimes. Pirating is the most popular form of hacking, which relates to the stealing information from written software programmes. In the computer security context, hackers are people who try to find the weaknesses of the computer network and exploit the information from software. Hackers may be encouraged by a variety of reasons, for instance profits, protests, or challenges. Hackers can be categorised into the three types, which are black hats, grey hats, and white hats. Black hat group or cracker is expertise in carrying out the harmful to the computer system. A grey hat is a hacking group that will not violate the law and help the government to defend the system. However, grey hat will apply the same methods to revert to black hat approaches. The white hat hacker has their own abilities and professional computing skills to protect the malicious threads and…

    • 1123 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Causes Of Identity Theft

    • 1108 Words
    • 5 Pages

    Hackers are people who hack into other people’s computers or electronic devices so they can take control over their things. A book titled Net Crimes and Misdemeanors written by J. A. Hitchcock takes us through many different aspects of how people take and control our things. She explains to us “When you’re connected to the internet, your computer is part of a worldwide network and anyone can try to connect to your system. The best way to describe it is by contrasting it to your television, a one-way communication mechanism” (Hitchcock 237). Hackers can reach any personal information located on an individual’s computer. Any accounts or credit card numbers in the system, they can get ahold of. We use many internet softwares today that can help prevent hackers, but not all the time. Hackers are extremely knowledgeable with computers and can find their way in. Hitchcock also gives us a little background information on when many viruses and softwares were introduced. She states, “…there was a good enough market for a security suite that included a personal firewall and antivirus capability. They were right. When NIS was introduced in December 1999, the U.S. retail market for internet security software grew more than 140 percent” (Hitchcock 236). Throughout the years, many software updates came out to help protect people and their information. The problem is that the more…

    • 1108 Words
    • 5 Pages
    Good Essays

Related Topics