In building an internet-based network systems, security issues become a thing that is absolutely necessary. System that was built without a good security system as well as invite thieves to break into our house and let him take everything we have.
Hacker is a term for those who use its expertise in the computer to view, find and fix flaws in the security system of a computer system or a software. Their work is usually published widely in the hope of a system or software was found to have weaknesses in terms of security could be enhanced in the future. While the cracker to exploit the weaknesses-weaknesses in a system or software to commit a crime.
In the hacker community, known hierarchy or level. Hacker was second in the level and crackers are on the third level. In addition there are several other levels as lamer (wanna be). In contrast to the hackers and crackers who seek and find his own weakness of a system, a lamer use the findings to commit a crime. A lamer is usually only have a little knowledge of computers, especially regarding security systems and programming. In the hacker community, lamer is a designation that could be considered embarrassing.
A hacker has a purpose which is to refine a system whereas a cracker is more destructive. Generally cracker cracking to use resources in a system for its own sake.
Speaking about the security of a computer system, will not be separated from how a cracker can penetrate into the system and to wreak their havoc. There are many ways that are typically used to perform penetration include: IP Spoofing (Counterfeiting of IP addresses), FTP Attack, Finger Unix Exploit, Flooding, Exploitsm Email Password Attacks, Remote File Sisem Attacks, etc.. In general, these measures aim to create a server in a system becomes very busy and work on the limits that the system will become weak and easily cracked.
A hacker can be employed to find the gaps (holes) in a security system. Hackers will use a variety of known techniques including the above techniques to penetrate into the system. Hackers also will combine a variety of ways over and use the latest techniques are more sophisticated. It is expected the critical points in a system is known to be repaired later. After the repair is done, the system will be re-tested. Thus the process is repeated so that all the gaps that exist in the security system can be closed. To perform this process, of course, it takes a hacker who is really experienced and have a high level of knowledge. Not all hackers can do this well, especially if you are taking a cracker.
Articel By Rachmat | 201210370311333 at UMM