Wednesday, July 9, 2014

Apakah itu Hacker? Siapakah Mereka ini ?....Kawan@ Lawan


Assalamualaikum dan salam sejahtera kepada semua pembaca Petiktetikus Apakah itu Hacker?. Adakah mereka ini individu yang baik atau berbahaya?. Pada hari ini saya ingin kongsikan siapakah mereka ini dan bagaimana kewujudan mereka ini merevolusikan sistem pengkomputeran seperti kita ketahui sekarang. Hacker adalah orang yang "memecah masuk" komputer dan rangkaian sistem komputer, sama ada untuk mendapat keuntungan ataupun didorong oleh cabaran.Dahulunya budaya menggodam sebenarnya berasal daripada kumpulan "Underground" yang mana ia sulit dan bergerak secara rahsia.tetapi tahun demi tahun ia telah berkembang dan kini terbuka kepada masyarakat.Penggodam merupakan seseorang yang menikmati dan meneroka butiran sistem aturcara dan bagaimana hendak meningakatkan keupayaan komputer tersebut. Kebiasaannya, mereka ini mempunyai penegtahuan mendalam mengenai komputer dan rangkaian internet.

Menggodam komputer adalah amalan mengubahsuai perkakasan dan perisian komputer untuk mencapai matlamat di luar maksud asal pencipta. Orang yang terlibat dalam aktiviti menggodam komputer sering dipanggil pengodam(hacker). Oleh kerana perkataan "hack" telah lama digunakan untuk menggambarkan seseorang yang tidak cekap pada profesion /, ada penggodam yang mendakwa istilah ini adalah menyakitkan hati dan tidak memberi pengiktirafan yang sesuai dengan kemahiran mereka.Sebagai perbandingan kepada orang-orang yang membangunkan kepentingan dalam menggodam komputer daripada rasa ingin tahu intelektual mudah, sesetengah penggodam mempunyai motif yang kurang mulia seperti mencuri maklumat peribadi, menukar data kewangan sebuah perbadanan, memecahkan kod keselamatan untuk mendapatkan akses rangkaian yang tidak dibenarkan, atau menjalankan aktiviti-aktiviti yang boleh menyebabkan kerugian kepada mangsa.Ini dipanggil sebagai"cracker".



Terdapat 2 jenis Hacker iaitu Whaite Hat dan Black Hat

WHITE HAT

Mereka ini boleh digelar sebagai 'penguji' kerana mereka menguji sistem keselamatan sesuatu perkakasan komputer dan rangkaian. Jenis-hacker ini lebih suka menikmati pembelajaran dan bekerja dengan sistem komputer, dan seterusnya mendapat pemahaman yang lebih mendalam mengenai subjek. Orang seperti ini menggunakan kemahiran hacking mereka dengan cara yang sah, seperti menjadi perunding keselamatan.Mereka menulis program komputer untuk memastikan keselamatan komputer terjaga. Antara White Hat terkenal seperti dibawah :

Konrad Zuse


It all begins with Konrad Zuse, arguably the very first computer hacker. He may not have been a hacker in the modern sense of the word, but none of it would have been possible without him. You see, Zuse made the world’s very first fully programmable (Turing-complete as they say) computer, known as the Z3. It began, of course, as the Z1, and while it wasn’t built in a cave with a box of scraps, Zuse did build it himself in his parents’ apartment, completing it in 1938. Zuse eventually gained some backing by the German government, leading to the evolution from the Z1 to the Z3, which, complete in 1941, is considered the mother of modern computing.

John “Captain Crunch” Draper


John Draper was hacking computers long before computers were even common place. Draper’s hacking heyday was back in the early 1970’s, when the largest computer network to which the general public had any access was the telephone system. At the time, telephones were managed by an automated system using specific analogue frequencies which could be exploited to make free long distance or even international calls. It was called “Phreaking,” and one of the most well-known Phreaking tools was a toy whistle that came in a box of Cap’n Crunch cereal. With this whistle, Draper created another popular Phreaking tool known as the Blue Box, a device that could produce many other tones used by the phone companies.

Steve Wozniak



A contemporary to John Draper, Wozniak was no stranger to Phreaking. In fact, after Draper shared the details of his Blue Box design during a Homebrew Computer Club meeting, Wozniak built a version of his own. Steve Jobs saw the marketing potential in the device, and the two Steves began their first joint venture together. Wozniak’s hacking days weren’t all spent on projects of questionable legality, though. With the proceeds from their blue boxes as well as selling Wozniak’s cherished HP calculator and Jobs’ VW van, Wozniak created the Apple I. With the other Steve’s marketing prowess, their company became the industry leader it is today.

Robert Tappan Morris



As a graduate student at Cornell University, Robert Morris created his claim to fame: the computer worm. According to Morris, he created the worm as an attempt to gauge the size of the internet at the time. After its release on Nevember 2nd, 1988, the Morris Worm went on to infect approximately 6,000 systems (about 10 percent of the internet attached computers at the time). The worm was intended to be unobtrusive, but due to a flaw in its replication algorithm, it copied itself excessively, causing heaving system loads and ultimately leading back to Morris. In 1989, Morris became the first person indicted and later convicted under the Computer Fraud and Abuse Act of 1986.

Mark “Phiber Optik” Abene



Here’s a name you may not be familiar with: Mark Abene. He never hacked into the D.O.D. nor did he steal millions of dollars in some Swordfish-style bank heist. What he did do was piss off AT&T. As a member of the hacker group Masters of Destruction, Abene was often poking around on AT&T’s systems. When AT&T’s telephone system crashed, leaving 60,000 customers without phone service for over 9 hours, they quickly blamed Abene. The Secret Service paid him a rather aggressive visit, confiscating his equipment, and while AT&T eventually admitted that the crash was a mistake on its part, Abene was charged with computer tampering and computer trespassing in the first degree. Later, he would face more charges and ultimately serve a year in federal prison, making him the first hacker to do so.

Kevin “Dark Dante” Poulsen

                                      
                          
Poulsen holds claim to one of the more amusing hacks of all time. A radio contest held by KIIS-FM promised a shiny new Porsche 944 S2 to the 102nd person to call into the station. Rather than try his luck among the multitude of Los Angeles listeners, Poulsen took over all of the telephone lines to the station to ensure he’d be the 102nd caller. He eventually had to disappear once he became a fugitive of the FBI. This landed him a spot on the popular TV show Unsolved Mysteries. The show’s hotlines crashed when the episode aired. Coincidence? In 1991, Poulsen was arrested and eventually pled guilty to various counts of computer fraud, money laundering, and obstruction of justice. Interestingly, since his incarceration, Poulsen made a complete 180, helping in cyber crime cases, and even capturing sexual predators on MySpace.             

Kevin Mitnick



Kevin Mitnick is perhaps the most famous hacker in computer history, likely due to his being the first hacker to make the FBI’s Most Wanted list. As a master of social engineering, Mitnick didn’t just hack computers; he hacked the human mind. In 1979, at the age of 16, he hacked his way into his first computer system and copied proprietary software. He would often engage with admin personnel, such as in phone calls and e-mail messages, and trick them into giving up passwords and other security information. After a two and a half year pursuit, Mitnick was finally arrested and served five years in prison. He now runs his own computer security consultancy, Mitnick Security Consulting LLC.         

Richard Stallman


In his early years, Stallman was a graduate student and programmer at MIT’s Artificial Intelligence Labs where he would constantly engage with MIT’s rich hacking culture. As an advocate for just about everything Open Source, Stallman fought back when MIT installed a password system in its Computer Science department. He would decrypt users’ passwords (not an easy task given the processing power of the 1970’s) and send them a message with their password in plaintext, suggesting they leave the password blank in order to re-enable anonymous use. Going into the 1980’s, Stallman didn’t like the proprietary stance many manufacturers were taking on their software. This eventually led Stallman to create the GNU General Public License and GNU operating system, a completely free Unix-like OS that is completely Unix-compatible.

Tsutomu Shimomura



Not all hackers fall under the Black-Hat umbrella. Tsutomu Shimomura is a White-Hat hacker credited with capturing Kevin Mitnick. In 1994, Mitnick stole some of Shimomura’s personal files and distributed them online. Motivated by revenge, Shimomura came up with a trace-dialing technique to back-hack his way in to locating Mitnick. With Shimomura’s information, the FBI was able to pinpoint and arrest Mitnick.


BLACK HAT

Kadang-kadang dipanggil "cracker", seseorang yang memecah keselamatan komputer tanpa kebenaran atau menggunakan teknologi (biasanya sebuah komputer, telefon, sistem atau rangkaian) untuk vandalisme, penipuan kad kredit, kecurian identiti, cetak rompak, atau jenis lain aktiviti yang menyalahi undang-undang.Biasanya mereka adalah bersalah di sisi undang2.Mereka mempunyai pengetahuan komputer yng baik dan menulis program komputer untuk melakukan penggodaman.


No comments:

Post a Comment