Tuesday, July 27, 2010

Hackers Don't Share; We Are No Hackers, Let's Share (Information)



Don't worry, i am no hacker as you all aware of. A hacker or commonly refer to as cyber-terrorist is a computer 'geek' who uses a computer system without a specific, constructive purpose or without proper authorization. In common usage, a hacker is a person who breaks into computers and computer networks, either for profit or motivated by the challenge. Because of that, hackers can easily break into federal database, bank account information, public record files or satellite communication network.

Not all hackers are as bad as their publicly labeled, though. There are hackers community in the EUROPE whom provide 'hacking' services through a proper and legal manner. To some people, they couldn't distinguish between 'hacker' and 'cracker'. At one point, they are no different but their activities and objectives are. Generally, hackers provide a significant contribution to networking and operating system usually develop backup program for computers. They are the most 'sought-after' individuals by the F.B.I and especially the defense and military department for their 'talent' and capability. As for crackers, they look for flaw or 'leak' in the system as personal interest and profit through data stealing, ceasing and many other.

Maintaining the security of computers and computer network is a critical issue for Operating system and software program developers. Hackers develop and deploy viruses, worms and, other malicious software programs. If you are wondering how these hackers community execute their objectives neither can i provide the answer. Seemingly, hackers develop and use Hacking Software Programs for certain objective. They eat and sleep by their computers, and ADORE their much alike supercomputers (..of course very POWER-FULL computers).

Not only sought-after, there are a lot of movies made after hackers (Hollywood, where else...) such as "WarGames (1983)" ;or you might like to see a more genuine hacker characters in "Hackers (1995)" where hackers used nicknames like "Ac|d_BuRN" and "Z3R0-CooL". You can also catch Hugh Jackman as the world's greatest hacker in "Swordfish (2001)".

Whether we are aware or not, 'They' are everywhere. So, if someone ask for your name and NRIC number PLEASE be extra caution and not simply disclose your personal information. We never know, not only hacking your FaceBook account 'They' could easily empty your bank account or manipulate your personal information in their favour. Hackers may also deploy viruses and worms unto your computer in 'first-hand'. The trend nowadays is, a hacker will act like a person in-need to use a computer and they will pick random 'victim'. That 'victim' could be me, you or anybody else browsing the internet in Starbucks or BigApple. Next thing you know, you're on your way to format your computer or perhaps buy a new one (brand switching).

8 comments:

Phemela K. Francis said...
This comment has been removed by a blog administrator.
FaruqMacho said...

Whatever you call it....the picture of this old guy is damn cool.....crackers...hackers...firecrackers.....are those IT dictionary words which we sould know and learn.....Concurs to this subject as we do need to face it in this real world.....

Anonymous said...

whatever the name is,it is still unethical issues which threat individual even organisation. The effect is,the confidentiality of information can't be assured. Think about our data put in the bank, is it save?

Hafizah said...

whatever the name is,it is still unethical issues which threat individual even organisation. The effect is,the confidentiality of information can't be assured. Think about our data put in the bank, is it save?

roslina said...

i agree with mr faruq n miss hafizah.. its really danger if our money simply gone like carl said in his article above. so,we must aware and careful about our data.

kaynasir said...

We are now in the information era. Sharing of information helps in the business activities. Information is an asset. Whether we like or not sharing of information is important. So in order to ensure out data is not stolen and wrongly used, the server must be protected. Organizations must provide a secured network and to allow only authorised user to access these data.

Matias Kundapin said...

I believe there must be solution to stop this hacker to harm an organization network, that why majority of the people on the street still have their confidence on IT innovation to protect their business & valuable asset.

apyz666 said...

wow wow chill, there is always a solution for everything, need to study more because it takes one to fight one, maybe we all need to be hackers so that we can protect ourselves hahahahahaahahaha