Home > Science > Security Alert

Security Alert

In building an internet-based network systems, security issues become a thing that is absolutely necessary. System that was built without a good security system as well as invite thieves to break into our house and let him take everything we have.

 

Often when building a system, we find many vulnerabilities in our system. But we consider it a small thing because we do not consider it a security hole (hole). We are not aware that such a small vulnerabilities is utilized by people who are not responsible for running the crimes.
Hacker Vs Cracker, two terms are most often mentioned when we talk about data security. Hackers and crackers are considered as the person responsible for the various cases of computer crime (cybercrime) is increasingly prevalent today. And if we want to see who and what is done by hackers and crackers, then the assumption can be said to be 100% not true

 

Hacker is a term for those who use its expertise in the computer to view, find and fix flaws in the security system of a computer system or a software. Their work is usually published widely in the hope of a system or software was found to have weaknesses in terms of security could be enhanced in the future. While the cracker to exploit the weaknesses-weaknesses in a system or software to commit a crime.

 

In the hacker community, known hierarchy or level. Hacker was second in the level and crackers are on the third level. In addition there are several other levels as lamer (wanna be). In contrast to the hackers and crackers who seek and find his own weakness of a system, a lamer use the findings to commit a crime. A lamer is usually only have a little knowledge of computers, especially regarding security systems and programming. In the hacker community, lamer is a designation that could be considered embarrassing.

 

A hacker has a purpose which is to refine a system whereas a cracker is more destructive. Generally cracker cracking to use resources in a system for its own sake.

 

Speaking about the security of a computer system, will not be separated from how a cracker can penetrate into the system and to wreak their havoc. There are many ways that are typically used to perform penetration include: IP Spoofing (Counterfeiting of IP addresses), FTP Attack, Finger Unix Exploit, Flooding, Exploitsm Email Password Attacks, Remote File Sisem Attacks, etc.. In general, these measures aim to create a server in a system becomes very busy and work on the limits that the system will become weak and easily cracked.

 

A hacker can be employed to find the gaps (holes) in a security system. Hackers will use a variety of known techniques including the above techniques to penetrate into the system. Hackers also will combine a variety of ways over and use the latest techniques are more sophisticated. It is expected the critical points in a system is known to be repaired later. After the repair is done, the system will be re-tested. Thus the process is repeated so that all the gaps that exist in the security system can be closed. To perform this process, of course, it takes a hacker who is really experienced and have a high level of knowledge. Not all hackers can do this well, especially if you are taking a cracker.

 

A hacker can now play a role as a security consultant for the vendors or software developers and for companies that use computer systems as the backbone of the passage of the company’s activities. With this role, the hacker is expected to create a system or a software still survive and do not suffer from the damage caused by computer crimes committed by the attackers. Being a hacker is a good but to be a cracker is a crime.

___________________________
Articel By Rachmat | 201210370311333 at UMM

Categories: Science Tags:
  1. No comments yet.
  1. No trackbacks yet.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s