The term hacker, originated from english hack, which means to cut something coarsely or irregularly, is popularly used to define computer experts who use high knowledge to commit cyber crimes. However, this definition is wrong!
hackers they are people with a deep knowledge of computers and computing who work developing and modifying computer software and hardware, not necessarily to commit a crime. They also develop new features with regard to computer systems.
Therefore, anyone who has deep knowledge in some specific area of computing, discovering uses beyond those provided for in the original specifications, can be called a hacker.
Origin of the term hacker
The origin of the term hacker emerged in the 1960s, in the United States. It started with the use of the expression “hack” to designate an innovative solution to any problem. Over the years, the term was associated with computer programmers, who at the time were making their name at the Massachusetts Institute of Technology (MIT) and elsewhere in the world. They combined specific computer knowledge with creative instinct.
Despite having appeared in the United States, hackers ended up becoming a global phenomenon, being possible to find them in any part of the world. There are places, like Pakistan and India, where there is fierce competition between them for the best jobs.
Where does the hacker work?
Hackers today have a very broad market to act, especially for those who decide to dedicate themselves to information security systems. With everything today being done over the internet, from a simple purchase of shoes to financial transactions with cryptocurrencies, the area has expanded a lot for those who have programming knowledge.
Hackers can work in sectors related to forensic expertise, vulnerability research, project engineering, software development, penetration testing, risk management, among others. A hacker can earn a lot of money from the rewards given by companies that launch challenges to have their systems hacked and, with that, develop security improvements.
The hacker's role usually requires training in some area related to information technology, since most of these courses have subjects related to information security. Among the options are the graduations of Science of computing, Com Engineeringput-up, Networks of Computers, Information systems, Software Engineering and Technology ofthe information (YOU).
Read too: Cyberbullying: learn more about this type of aggression that happens in the virtual environment
Hacker x Cracker
But if hackers don't commit cyber crimes, what expression do you use for those who do? In this case, it is correct to use the term "cracker”.
We can define crackers as hackers who use knowledge in computing, computing and other technologies to illegally invade systems, websites, servers, databases, etc. In some cases the aim is just to test the vulnerability of the services, but in others it is to gain some financial or personal gain.
So, a cracker is someone who can circumvent operational security systems in order to gain personal advantage, like modifying a program so that it no longer needs to be paid, throwing viruses onto the network, cloning data, stealing passwords etc.
Basically, we can say that the cracker would be the "evil hacker”. The expression was created in 1995, precisely to distinguish them from those who would be the "good hackers”.
Read too: Fake news – how they came about and dangers
You hackers most known crackers
History is marked by large (and recent) cases of system invasions by large companies, media vehicles and governments by crackers, with the purpose of stealing personal information, confidential files or even exposing the intimacy of famous.
We separated some attacks from hackers – actually crackers – that have been marked in history. Look:
- Adrian Lamo
Lamo became known after hacking into The New York Times, Google, Yahoo! and Microsoft. He only stopped when he was arrested in 2003. He became known as “the homeless hacker” as he used cafes and libraries to carry out his actions. He was investigated for 15 months and imprisoned in California, when he made an agreement which stipulated that he would serve six months of house arrest. Lamo is known as a snitch in the hacker community.
- Jeanson "Resilient" Ancheta
Resilient was the first person to be accused of controlling an army of hijacked computers known as "botnets”, for shooting many spam (most invasive e-mails) over the internet. It also used the “rxbot” virus to control 500,000 computers and sold its services to anyone who wanted to take down large sites. He was arrested in 2005 by an FBI agent who pretended to be interested in his services.
- Kevin "Dark Dante" Poulsen
Kevin was the first American banned from the internet after being imprisoned for five years. In the early 1990s, he hacked into phone lines. Upon being released, he was banned from using the internet for three years. After his sentence, he went on to write for Wired magazine, in a column about technology.
- Kevin “The Condor” Mitnick
Despite not considering himself a cracker, but a “social engineer”, Mitnick started his “journey” at age 15, breaking into the systems of Nokia, IBM and Motorola. He was arrested in 1995, being held in solitary confinement as the judge in his case considered that he could "start a nuclear war using the keys on the prison phone". Even after a year in prison, he continued to hack computers. In 1999, he was the most wanted hacker in the United States, being sentenced to four years in prison. He is currently a security consultant and author of two books on the topic.
- Anonymous
Recognized as activist hackers, Anonymous is the best known hacker group in the world. It was initiated in a discussion forum and has progressively grown to assume a prominent role in various events in recent history. It is formed by anonymous members, not all hackers, who work on the most varied fronts, which are generally in defense of causes in favor of society as a whole. As a form of protest, Anonymous invades pages on the internet, takes down websites and leaks confidential data.
How to prevent a hacker attack?
To protect yourself against such threats, it is important to keep your computer's antivirus up to date and never download unknown files, especially on third-party machines. Also, it is always good to back up whatever materials you archive in a given system.
Always make software updates to reduce the chances of leaving your machine's system vulnerable and installing any type of virus.
Read: Security in computer networks
Be suspicious of emails, apps, and websites that are aimed at you, but you never ask for or don't know about. This is a very common way for hackers to install and deploy a virus.
Change passwords after a certain time of use. Despite being secure and non-transferable, it can be misused by criminals. Even more so if the password is used for many services.
Remember that hackers can currently break in too smartphones and mobile apps. So, the above precautions also apply to cell phones.
by Erica Caetano
Journalist
Source: Brazil School - https://brasilescola.uol.com.br/informatica/o-que-e-hacker.htm