CHAPTER I
INTRODUCTION

1.1 Background
In building an Internet-based network systems, security issues become a matter of absolute necessity. The system that was built without a good security system as well as by inviting the thieves to get into our house and let him take everything we have.
Often, when construction of a system, we find many vulnerabilities in our system. But we consider it a small thing because we do not consider it a security hole (hole). We are not aware that the vulnerability of small vulnerability like this is used by people who are not responsible for the running action crime.
Two terms are most often mentioned when we talk about data security. Hackers and crackers are considered as people who are responsible for many cases of computer crime (cybercrime) are increasingly prevalent today. Whereas if we will see who and what is
being done by hackers and crackers, then we can call that assumption is not 100% correct.
Hacker is a term for those who use his expertise in computers to view, find and fix weaknesses in the security system of a computer system or in a software. The results of their work is usually published widely in the hope that the system or software that was found to have weaknesses in terms of security can be enhanced in future. Meanwhile, cracker-weakness exploit weaknesses in a software system or for committing a crime.
In the hacker community, known as the hierarchy or levels. Hacker occupies second place in these levels and crackers are on the third level. A hacker has a goal which is to refine a system while a cracker is more destructive. Generally, cracking cracker do to use resources in a system for its own sake.



1.2 The Problems
Based on the above background, the formulation of the problem to be discussed in this paper are:
1. How the history of hackers and crackers?
2. What is a hacker and a cracker?
3. How does the role of hackers and crackers in the development of technology?

1.3 The Purpose
The purpose of this paper is:
1. Knowing about the history of hackers and crackers
2. Knowing the broad understanding about the hackers and crackers
3. Knowing the role of hackers and crackers in the development of technology



1.4 The Limitation
Discussion of problems in this paper merely to know the role of hackers and crackers in the development of technology by understanding the history and understanding of hackers and crackers.


CHAPTER II
DISCUSSION

2.1 History of Hacker and Cracker
Hacker emerged in the early 1960s among members of student organizations Tech Model Railroad Club at the Artificial Intelligence Laboratory Massachusetts Institute of Technology (MIT). The student group is one of the pioneering developments in computer technology and they operate with a number of mainframe computers. The word hacker first appeared with a positive sense to describe a member who has expertise in the field of computers and able to make a computer program that is better than which has been designed together. Then in 1983, growing hacker analogy to refer to someone who has an obsession to understand and master the computer system. Because, in that year for the first time the FBI arrested a criminal group of computers The 414s are based in Milwaukee, USA. 414 is their local area code. Group that came to be called hackers are convicted of burglary 60 computers, from computers owned by Cancer Center
Memorial Sloan-Kettering's computer to Los Alamos National Laboratory. One of the perpetrators enjoy immunity because testimonials, while five other players get probation. Then in the subsequent development of other groups appear to mention themselves hackers, but it's not. They are (especially the men) who get the satisfaction of breaking through computer and telephone outsmart (phreaking). True hackers call these people 'crackers' and do not like hanging out with them. Real hacker cracker as people look lazy, no responsibility, nor too bright. Real hackers do not agree to say that with a person through the security has become a hacker. The hackers meeting each year of that is held every mid-July in Las Vegas. Arena of the world's largest hacker conference is called Def Con. Def Con event to event is more exchange of information and technology related to hacking activities.




2.2 What is Hacker and Cracker
2.2.1 Hacker
Hacker is a term for those who provide a useful contribution to the computer network, creating a small program and share it with people on the Internet. For example: digigumi (Digital Group) is a specialized group that is engaged in gaming and computers. Digigumi technique using hexadecimal techniques to change the text contained within the game. For example, game Chrono Trigger English language can be changed into Indonesian. Therefore, the status Digigumi are hackers, but not as a destroyer. Hacker here means, to seek, learn, and change things for hobby purposes and development by following the legality that has been determined by game developers. Hackers usually do infiltration-infiltration with the intention of satisfying the knowledge and techniques. - Average company in the world of global networks (the Internet) also has a hacker. His job is to keep the network from possible destruction of an outside party "crackers", examining tissue from the possibility of a hole into the cracker opportunity tore - torn tissue, for example: insurance companies and auditing "Price Waterhouse". He has a team of hackers called the Tiger Team. They work to test the security systems of their clients. Hierarchy / Rankings hackers
a. Elite
Characteristics: understand the operating system inside and out, able to configure and connect a global network, do pemrogramman every day, efficient and skilled, to use knowledge appropriately, does not destroy data, and always follow the rules. Elite level is often called the "temperature".
b. Semi Elite
Characteristics: younger than the elite, has the ability and extensive knowledge of computers, understand the operating system (including the hole), the ability of the program enough to change the program exploits.
c. Developed Kiddie
Characteristics: young age (ABG) and still in school, they read about the method of hacking and how at various times, tried different systems to ultimately succeed and proclaimed victory to another, generally still use Graphic User Interface (GUI) and just learning basic from UNIX without being able to find a new hole in the operating system weaknesses.
d. Script Kiddie
Characteristics: such as kiddie as well developed as Lamers, they only have the technical knowledge networking which is very minimal, not separated from the GUI, hacking is carried out using a trojan to frighten and distress some Internet users live.
e. Lamer
Characteristics: do not have the experience and knowledge but want to be a hacker so that Lamer is often referred to as the 'Want-be' hackers, use their computers primarily to play games, IRC, exchange prirate software, steal credit cards, using software hacking trojan , nuke and DoS, like brag about themselves through the IRC channel, and so forth. Since many shortcomings to achieve the elite, in its development, they will only be up to the level of developed or script kiddie kiddie course.
This is about hacker ethics :
a. Unlimited access to computers and totality.
b. All information must be FREE.
c. Do not believe in the authority, which means expanding decentralization.
d. Do not use a false identity, such as the ridiculous pseudonym, age, position, etc.
e. Ability to create beauty in the computer art.
f. Computers can change lives for the better.
g. The work is done solely for the sake of the truth of the information to be transmitted.
h. Firmly committed not to defend the economic dominance of certain software industry.
i. Hacking is a major weapon in the fight against violations of the limits of computer technology.
j. Good hacking and phreaking is the only other way to disseminate information on the mass so as not to stutter in a computer.
This is short story about Hacker Rules :
General description of the rules that needs to follow a hacker as described by Scorpio, namely:
a. Above all, respect the knowledge and freedom of information.
b. Notifying the system administrator will be a breach of security or security holes that you see.
c. Do not take unfair advantage of the hack.
d. Not to distribute and collect the pirated software.
e. Never take stupid risks - always know their own abilities.
f. Always willing to openly / free / free inform and teach a variety of information and methods provided.
g. Never hacked a system to steal money.
h. Never given access to someone who will make mischief.
i. Never intentionally removing and destroying files on a computer that dihack.
j. Respect the machine to hack, and treat him like their own machine.
True hackers will always act based on a code of ethics and rules of the game was a cracker does not have a code of ethics or rules of the game because crackers are destructive.
2.2.2 Cracker
Cracker is a term for those who go into others and the cracker system more destructive, usually on a computer network, bypassing passwords or licenses computer programs, computer security against deliberate, to deface (changing the web home page) belonged to someone else even up to other people delete data, steal data and generally do cracking for their own benefit, malice, or due to other causes because there are challenges. Some piercing process carried out to show the security weaknesses of the system.
2.2.3 Differences Hacker and Cracker
1. Hacker
a. Having the ability to analyze the weaknesses of a system or site. For example: if a hacker tries to test the Yahoo! Confirmed the contents of those sites will not be messy and distracting others. Usually hackers reported this incident to be repaired to be perfect.
b. Hackers have the ethical and creative in designing a program that is useful for anyone.
c. A hacker is not stingy to share his knowledge to people who seriously on behalf of science and virtue.
d. Hackers have a code of ethics and rules of the game.
2. Cracker
a. Ability to create a program for the benefit of himself and is destructive or damaging and make a profit. Partially example: Viruses, Theft of Credit Card, Code Warez, Defrauding Bank Account, Password Theft E-mail/Web Server.
b. Can stand alone or in groups in action.
c. Having a website or an IRC channel in which is hidden, only certain people can access it.
d. Having an IP that can not be traced.
e. The most common is that Carding Credit Card Theft and burglary site and change everything in it becomes a mess. For example: Yahoo! Never experienced anything like this so can not be accessed in a long time, the case of the most hotly discussed clickBCA.com 2001.
f. Crackers do not have a code of ethics and rules of the game.

2.3 The Role Hacker and Cracker in Development of Technology
Hackers and crackers are virtually identical, which differentiate only goal of the acts that performed. The role of hackers and crackers who did not much different, where the existence of hackers and crackers right now, due to lack of alertness, accuracy, and the system used. Hackers and crackers are closely related with the data security technology. Both hackers and crackers can perform actions that may penetrate a security system.
Hackers or crackers are not limited to illegal activities that are identical with the destruction of a system and applications, or limited to the activities of the theft of an important data, but to act to make substantial changes or improvements to the system and applications, either in the form software or hardware. So that a system can develop better and more sophisticated. The role of hackers and crackers that is what should be a motivation for the development of technology.


CHAPTER III
CONCLUSIONS AND SUGESSTION

3.1 Conclusion
The hacker used his skills with computers to view, find and fix weaknesses in the security system of a computer system or in a software. Therefore, thanks to Internet hackers is there and can we enjoy today, even kept in repair for a better system. So hackers can be called a hero is a cracker network can be referred to as the infiltration of criminal networks with the purpose for doing his advantage in personallity with the intention of harming others. Hackers often called white hackers (which is a true hacker who are building) and the black hacker (cracker who are dismantling and destroying).

3.2 Sugesstion
Whatever the reason 'hacking' is an action that does not violate the law, but is called "cracking" when used to destroy, remove data or something that is not ours. But what we know
together - the same that there is no guarantee that ensures the data or information we have is 100% safe and this is the condition that people use to start the "job" damaging than initially idle until professional. So we should always be aware of current technological developments such as the increasingly sophisticated. The most important thing we can do is cover all the possible vulnerabilities that open and always update the data or information in order to avoid the negative things that are not desired.


REFERENCES

1. http://itemzztar.multiply.com/journal/item/43, on Sunday 13 June 2010, 23:45 PM
2. http://heeery.wordpress.com/2008/07/10/apa-itu-hacker/, on Sunday 13 June 2010, 23:50 PM
3. http://www.indoforum.org/showthread.php?t=29960, on Saturday 19 June 2010, 21:00 PM
4. http://www.kecoak-elektronik.net, on Monday, 21 June 2010, 11:15 AM

kiasan iseng.kyu

ternyata sulit merasa sendiri dikala kita tak bisa bertahan dengan rasa yang tak menentu....., rasa ingin tentang sesuatu tak bisa lagi dikejar karena keras diri......!!!??
gampang berbicara tentang apapun ternyata sakit dijalani, tidak sempurna, tidak hebat dan tentunya tidak bahagia dengan semua ini,
gampang gampang susah tetapi tetap haruz berlalu n' berjalan karena semua ada kalanya n' ada waktunya....!!?

siapa bilang itu semua biasa n' wajar, tak ada yang tahu apa maksud dari semua...!!??
bila ada yang merasa ini bohong, boleh dirasa, dikata, n' dilakukan.....
aku yang terdulu untuk semua ini..........!!!??

Penjelajah Web


Penjelajah web pertama kali berbasis teks, seperti halnya Lynx yang populer hingga sekarang, karena memang sistem dengan antarmuka grafis belum umum digunakan pada saat itu. Baru setelah sistem berbasis grafis mulai banyak digunakan, seorang mahasiswa bernama Marc Andressen di University of Illinois di Urbana-Champaign, Amerika Serikat, membuat sebuah penjelajah web berbasis grafis pertama yang berjalan di atas sistem operasi Windows dan UNIX (berbasis Motif). Penjelajah web tersebut dinamai Mosaic. Selanjutnya, setelah lulus dari universitas, Marc ditawari oleh Jim Clarc, salah seorang petinggi Silicon Graphics Incorporated (SGI), untuk membuat perusahaan dengan nama Mosaic Communication, yang kemudian berubah menjadi Netscape Communication. Marc membuat sebuah penjelajah web populer pertama yang digunakan oleh umum, yang disebut dengan Netscape Navigator. Pada saat pengembangannya, Navigator memiliki nama kode Mozilla. Navigator merupakan penjelajah web komerisal, akan tetapi seiring dengan waktu akhirnya Navigator pun menjadi dapat diperoleh secara gratis. Sementara itu, penjelajah web Mosaic yang gratis tidak diteruskan lagi pengembangannya, dan diserahkan kepada NCSA (National Computing for Supercomputer Application). Karena NCSA tidak memiliki izin untuk mengomersialkan produk Mosaic, NCSA akhirnya menjual Mosaic kepada Spyglass, yang akhirnya membuat Mosaic menjadi penjelajah web komersial. Microsoft, yang terlambat turun di pasar penjelajah web, pun membeli lisensi Mosaic dari Spyglass, sehingga pada akhirnya merilis produk penjelajah web-nya, yang disebut sebagai Internet Explorer. Dengan dirilisnya Internet Explorer, muncullah perang besar antara web browser populer, yakni antara Netscape Navigator, dan Microsoft Internet Explorer.
Penjelajah web bisa dibedakan lewat fitur-fitur yang mereka dukung. Browser modern dan halaman web biasanya menggunakan banyak fitur dan teknik yang tidak ada pada masa-masa awal web. Disebabkan adanya perang penjelajah web, fitur-fitur Web dan penjelajah web semakin cepat dikembangkan. Berikut daftar beberapa elemen dan fitur-fitur tersebut:
  • ActiveX
  • Autocompletion (Pengisian otomatis) URL dan formulir data
  • Bookmark untuk mengikuti lokasi yang sering diakses
  • Cascading Style Sheet (CSS)
  • Cookie yang membolehkan sebuah website untuk mengetahui seorang pengguna lama
  • Web cache - Halaman web "disimpan" dalam memori ketika kita membukanya agar dapat diakses lagi walaupun sedang offline
  • Digital certificate (Sertifikat Digital)
  • DHTML
  • Pemuatan gambar menggunakan format gambar yang sudah terkenal seperti GIF, PNG, JPEG, SVG
  • Flash
  • Favicon
  • Font, ukuran, warna
  • Formulir untuk mengirimkan informasi
  • Frame dan Iframes
  • Gambar
  • HTTPS
  • Integrasi dengan aplikasi desktop lainnya
  • Offline browsing terhadap isi web yang sudah dicache terlebih dahulu
  • Java applet
  • JavaScript untuk isi yang lebih dinamis
  • Pengaturan Download
  • Penyaringan iklan (Ad filtering)Plug-in
  • Sejarah kunjungan ke halaman-halaman web terakhir
  • Session management
  • Tabbed browsing
  • Tabel
  • XHTML dan XML


Tentang pemikiran

Pemikiran tentang ’sistem’ bukan hal baru dan sudah lama jadi perhatian para ilmuwan. Namun pemikiran tentang ’sistem yang kompleks’ (complex system) memang baru marak di tahun 1950an. Lebih baru lagi adalah pemikiran tentang ’sistem informasi’, yang merebak setelah mesin komputasi mulai menjejali setiap aspek kehidupan kita.

Demikian pula, perpustakaan sebagai sebuah sistem sudah dipelajari sejak 1920an, tetapi sebagai ’sistem informasi’ baru sejak institusi ini menjajal teknologi komputer untuk katalog dan temu-kembali.
Setelah berkembang sedemikian jauh, maka kini sistem informasi tidak lagi dapat dilihat sebagai semata-mata penerapan teknologi atau penggunaan mesin. Sebagaimana dikatakan oleh Gregor (2005), sistem informasi adalah bidang yang memerlukan pengetahuan tentang dunia sistem fisik, dunia perilaku manusia, dan dunia artefak buatan. Dengan begitu, kajian tentang sistem informasi memerlukan teori yang membahas ketiganya secara integratif.



teknologi hardware

Seperti yang kita ketahui bahwa diabad – 20 ini, dengan berkembangnya teknologi hardware membuat semua orang tidak bisa lepas dari kata komputer, apakah kalian mengetahui apa itu komputer?. Komputer generasi pertama tercipta saat perang dunia I, dan pada saat perang dunia ke-2 tahun 1943 pemerintah inggris mengembangkan komputer untuk memecahkan kode-kode rahasia, diberi nama colossus. Setelah itu muncullah komputer generasi kedua, pada saat itu untuk pertama kali terciptanya disket, memory, dan sistem operasi. Generasi komputerpun berlanjut dari generasi kedua ke generasi ketiga, keempat, dan pada saat awal tahun 2000-an terciptalah generasi komputer kelima dengan feature – feature yang hampir sempurna. Baru – baru ini Microsoft corp menciptakan komputer masa depan dengan feature serba touchscreen dan portable.

Begitu juga dengan Perkembangan Teknologi Informasi sampai dengan saat ini berkembang dengan pesat seiring dengan penemuan dan pengembangan Ilmu Pengetahuan dalam bidang Informasi dan Komunikasi sehingga mampu menciptakan alat-alat yang mendukung perkembangan Teknologi Informasi, mulai dari sistem komunikasi sampai dengan alat komunikasi yang searah maupun dua arah (interaktif).
Teknologi Informasi adalah suatu teknologi yang digunakan untuk mengolah data, termasuk memproses, mendapatkan, menyusun, menyimpan, memanipulasi data dalam berbagai cara untuk menghasilkan informasi yang berkualitas, yaitu informasi yang relevan, akurat dan tepat waktu, yang digunakan untuk keperluan pribadi, bisnis, dan pemerintahan dan merupakan informasi yang strategis untuk pengambilan keputusan. Teknologi ini menggunakan seperangkat komputer untuk mengolah data, sistem jaringan untuk menghubungkan satu komputer dengan komputer yang lainnya sesuai dengan kebutuhan, dan teknologi telekomunikasi digunakan agar data dapat disebar dan diakses secara global.
Peran yang dapat diberikan oleh aplikasi teknologi informasi ini adalah mendapatkan informasi untuk kehidupan pribadi seperti informasi tentang kesehatan, hobi, rekreasi, dan rohani. Kemudian untuk profesi seperti sains, teknologi, perdagangan, berita bisnis, dan asosiasi profesi. Sarana kerjasama antara pribadi atau kelompok yang satu dengan pribadi atau kelompok yang lainnya tanpa mengenal batas jarak dan waktu, negara, ras, kelas ekonomi, ideologi atau faktor lainnya yang dapat menghambat bertukar pikiran. Perkembangan Teknologi Informasi memacu suatu cara baru dalam kehidupan, dari kehidupan dimulai sampai dengan berakhir, kehidupan seperti ini dikenal dengan e-life, artinya kehidupan ini sudah dipengaruhi oleh berbagai kebutuhan secara elektronik. Dan sekarang ini sedang semarak dengan berbagai huruf yang dimulai dengan awalan e seperti e-commerce, e-government, e-education, e-library, e-journal, e-medicine, e-laboratory, e-biodiversitiy, dan yang lainnya lagi yang berbasis elektronika.

Kutipan

Kadang orang tak sadar, segala sesuatu yang terjadi di dunia ini sudah diatur Tuhan. Tapi percayalah dibalik semua kejadian yang menimpa, ada rahasia yang sangat berharga. Selama ada kemauan yang kua, segala masalah pasti dapat teratasi....



"Karena dunia itu letaknya di tangan kita masing-masing bukan di hati.....