CHAPTER I
INTRODUCTION
1.1 Background
In building an Internet-based network systems, security issues become a matter of absolute necessity. The system that was built without a good security system as well as by inviting the thieves to get into our house and let him take everything we have.
Often, when construction of a system, we find many vulnerabilities in our system. But we consider it a small thing because we do not consider it a security hole (hole). We are not aware that the vulnerability of small vulnerability like this is used by people who are not responsible for the running action crime.
Two terms are most often mentioned when we talk about data security. Hackers and crackers are considered as people who are responsible for many cases of computer crime (cybercrime) are increasingly prevalent today. Whereas if we will see who and what is
being done by hackers and crackers, then we can call that assumption is not 100% correct.
Hacker is a term for those who use his expertise in computers to view, find and fix weaknesses in the security system of a computer system or in a software. The results of their work is usually published widely in the hope that the system or software that was found to have weaknesses in terms of security can be enhanced in future. Meanwhile, cracker-weakness exploit weaknesses in a software system or for committing a crime.
In the hacker community, known as the hierarchy or levels. Hacker occupies second place in these levels and crackers are on the third level. A hacker has a goal which is to refine a system while a cracker is more destructive. Generally, cracking cracker do to use resources in a system for its own sake.
1.2 The Problems
Based on the above background, the formulation of the problem to be discussed in this paper are:
1. How the history of hackers and crackers?
2. What is a hacker and a cracker?
3. How does the role of hackers and crackers in the development of technology?
1.3 The Purpose
The purpose of this paper is:
1. Knowing about the history of hackers and crackers
2. Knowing the broad understanding about the hackers and crackers
3. Knowing the role of hackers and crackers in the development of technology
1.4 The Limitation
Discussion of problems in this paper merely to know the role of hackers and crackers in the development of technology by understanding the history and understanding of hackers and crackers.
CHAPTER II
DISCUSSION
2.1 History of Hacker and Cracker
Hacker emerged in the early 1960s among members of student organizations Tech Model Railroad Club at the Artificial Intelligence Laboratory Massachusetts Institute of Technology (MIT). The student group is one of the pioneering developments in computer technology and they operate with a number of mainframe computers. The word hacker first appeared with a positive sense to describe a member who has expertise in the field of computers and able to make a computer program that is better than which has been designed together. Then in 1983, growing hacker analogy to refer to someone who has an obsession to understand and master the computer system. Because, in that year for the first time the FBI arrested a criminal group of computers The 414s are based in Milwaukee, USA. 414 is their local area code. Group that came to be called hackers are convicted of burglary 60 computers, from computers owned by Cancer Center
Memorial Sloan-Kettering's computer to Los Alamos National Laboratory. One of the perpetrators enjoy immunity because testimonials, while five other players get probation. Then in the subsequent development of other groups appear to mention themselves hackers, but it's not. They are (especially the men) who get the satisfaction of breaking through computer and telephone outsmart (phreaking). True hackers call these people 'crackers' and do not like hanging out with them. Real hacker cracker as people look lazy, no responsibility, nor too bright. Real hackers do not agree to say that with a person through the security has become a hacker. The hackers meeting each year of that is held every mid-July in Las Vegas. Arena of the world's largest hacker conference is called Def Con. Def Con event to event is more exchange of information and technology related to hacking activities.
2.2 What is Hacker and Cracker
2.2.1 Hacker
Hacker is a term for those who provide a useful contribution to the computer network, creating a small program and share it with people on the Internet. For example: digigumi (Digital Group) is a specialized group that is engaged in gaming and computers. Digigumi technique using hexadecimal techniques to change the text contained within the game. For example, game Chrono Trigger English language can be changed into Indonesian. Therefore, the status Digigumi are hackers, but not as a destroyer. Hacker here means, to seek, learn, and change things for hobby purposes and development by following the legality that has been determined by game developers. Hackers usually do infiltration-infiltration with the intention of satisfying the knowledge and techniques. - Average company in the world of global networks (the Internet) also has a hacker. His job is to keep the network from possible destruction of an outside party "crackers", examining tissue from the possibility of a hole into the cracker opportunity tore - torn tissue, for example: insurance companies and auditing "Price Waterhouse". He has a team of hackers called the Tiger Team. They work to test the security systems of their clients. Hierarchy / Rankings hackers
a. Elite
Characteristics: understand the operating system inside and out, able to configure and connect a global network, do pemrogramman every day, efficient and skilled, to use knowledge appropriately, does not destroy data, and always follow the rules. Elite level is often called the "temperature".
b. Semi Elite
Characteristics: younger than the elite, has the ability and extensive knowledge of computers, understand the operating system (including the hole), the ability of the program enough to change the program exploits.
c. Developed Kiddie
Characteristics: young age (ABG) and still in school, they read about the method of hacking and how at various times, tried different systems to ultimately succeed and proclaimed victory to another, generally still use Graphic User Interface (GUI) and just learning basic from UNIX without being able to find a new hole in the operating system weaknesses.
d. Script Kiddie
Characteristics: such as kiddie as well developed as Lamers, they only have the technical knowledge networking which is very minimal, not separated from the GUI, hacking is carried out using a trojan to frighten and distress some Internet users live.
e. Lamer
Characteristics: do not have the experience and knowledge but want to be a hacker so that Lamer is often referred to as the 'Want-be' hackers, use their computers primarily to play games, IRC, exchange prirate software, steal credit cards, using software hacking trojan , nuke and DoS, like brag about themselves through the IRC channel, and so forth. Since many shortcomings to achieve the elite, in its development, they will only be up to the level of developed or script kiddie kiddie course.
This is about hacker ethics :
a. Unlimited access to computers and totality.
b. All information must be FREE.
c. Do not believe in the authority, which means expanding decentralization.
d. Do not use a false identity, such as the ridiculous pseudonym, age, position, etc.
e. Ability to create beauty in the computer art.
f. Computers can change lives for the better.
g. The work is done solely for the sake of the truth of the information to be transmitted.
h. Firmly committed not to defend the economic dominance of certain software industry.
i. Hacking is a major weapon in the fight against violations of the limits of computer technology.
j. Good hacking and phreaking is the only other way to disseminate information on the mass so as not to stutter in a computer.
This is short story about Hacker Rules :
General description of the rules that needs to follow a hacker as described by Scorpio, namely:
a. Above all, respect the knowledge and freedom of information.
b. Notifying the system administrator will be a breach of security or security holes that you see.
c. Do not take unfair advantage of the hack.
d. Not to distribute and collect the pirated software.
e. Never take stupid risks - always know their own abilities.
f. Always willing to openly / free / free inform and teach a variety of information and methods provided.
g. Never hacked a system to steal money.
h. Never given access to someone who will make mischief.
i. Never intentionally removing and destroying files on a computer that dihack.
j. Respect the machine to hack, and treat him like their own machine.
True hackers will always act based on a code of ethics and rules of the game was a cracker does not have a code of ethics or rules of the game because crackers are destructive.
2.2.2 Cracker
Cracker is a term for those who go into others and the cracker system more destructive, usually on a computer network, bypassing passwords or licenses computer programs, computer security against deliberate, to deface (changing the web home page) belonged to someone else even up to other people delete data, steal data and generally do cracking for their own benefit, malice, or due to other causes because there are challenges. Some piercing process carried out to show the security weaknesses of the system.
2.2.3 Differences Hacker and Cracker
1. Hacker
a. Having the ability to analyze the weaknesses of a system or site. For example: if a hacker tries to test the Yahoo! Confirmed the contents of those sites will not be messy and distracting others. Usually hackers reported this incident to be repaired to be perfect.
b. Hackers have the ethical and creative in designing a program that is useful for anyone.
c. A hacker is not stingy to share his knowledge to people who seriously on behalf of science and virtue.
d. Hackers have a code of ethics and rules of the game.
2. Cracker
a. Ability to create a program for the benefit of himself and is destructive or damaging and make a profit. Partially example: Viruses, Theft of Credit Card, Code Warez, Defrauding Bank Account, Password Theft E-mail/Web Server.
b. Can stand alone or in groups in action.
c. Having a website or an IRC channel in which is hidden, only certain people can access it.
d. Having an IP that can not be traced.
e. The most common is that Carding Credit Card Theft and burglary site and change everything in it becomes a mess. For example: Yahoo! Never experienced anything like this so can not be accessed in a long time, the case of the most hotly discussed clickBCA.com 2001.
f. Crackers do not have a code of ethics and rules of the game.
2.3 The Role Hacker and Cracker in Development of Technology
Hackers and crackers are virtually identical, which differentiate only goal of the acts that performed. The role of hackers and crackers who did not much different, where the existence of hackers and crackers right now, due to lack of alertness, accuracy, and the system used. Hackers and crackers are closely related with the data security technology. Both hackers and crackers can perform actions that may penetrate a security system.
Hackers or crackers are not limited to illegal activities that are identical with the destruction of a system and applications, or limited to the activities of the theft of an important data, but to act to make substantial changes or improvements to the system and applications, either in the form software or hardware. So that a system can develop better and more sophisticated. The role of hackers and crackers that is what should be a motivation for the development of technology.
CHAPTER III
CONCLUSIONS AND SUGESSTION
3.1 Conclusion
The hacker used his skills with computers to view, find and fix weaknesses in the security system of a computer system or in a software. Therefore, thanks to Internet hackers is there and can we enjoy today, even kept in repair for a better system. So hackers can be called a hero is a cracker network can be referred to as the infiltration of criminal networks with the purpose for doing his advantage in personallity with the intention of harming others. Hackers often called white hackers (which is a true hacker who are building) and the black hacker (cracker who are dismantling and destroying).
3.2 Sugesstion
Whatever the reason 'hacking' is an action that does not violate the law, but is called "cracking" when used to destroy, remove data or something that is not ours. But what we know
together - the same that there is no guarantee that ensures the data or information we have is 100% safe and this is the condition that people use to start the "job" damaging than initially idle until professional. So we should always be aware of current technological developments such as the increasingly sophisticated. The most important thing we can do is cover all the possible vulnerabilities that open and always update the data or information in order to avoid the negative things that are not desired.
REFERENCES
1. http://itemzztar.multiply.com/journal/item/43, on Sunday 13 June 2010, 23:45 PM
2. http://heeery.wordpress.com/2008/07/10/apa-itu-hacker/, on Sunday 13 June 2010, 23:50 PM
3. http://www.indoforum.org/showthread.php?t=29960, on Saturday 19 June 2010, 21:00 PM
4. http://www.kecoak-elektronik.net, on Monday, 21 June 2010, 11:15 AM