Joke Collection Website - Blessing messages - What is a "hacker"
What is a "hacker"
Hackers originated from English hacker, and were highly respected in American computer field in the early days. But in media reports, the word hacker often refers to those "software crackers".
The word hacker originally refers to computer experts, especially programmers, who are enthusiastic about computer technology and have a high level.
But today, the word "hacker" has been used to refer to those who use computers to sabotage or play pranks. The correct English name of these people is Cracker, which translates as "hacker"
The fundamental difference between hackers and hackers is that hackers build and hackers destroy.
The word hacker generally has the following four meanings:
A person who knows enough programming languages can create useful software without long thinking.
Malicious (usually illegal) attempts to crack or destroy programs, systems and network security. This meaning will often bring serious trouble to those qualified hackers (1). They suggested that the media call this group "hackers". Sometimes these people are also called "black hat hackers".
An attempt to crack a system or network to warn the system owner of a system security vulnerability. This group of people is usually called "white hat hackers" or "anonymous" or honker. Many of these people are employees of computer security companies, attacking a system under completely legal circumstances.
A person who modifies a program (usually good) through knowledge or speculation and changes (or enhances) the purpose of the program.
"script kiddies" refers to those who have no or only a little hacking skills, but can achieve the purpose of cracking as long as they follow the instructions or run some hacking programs.
Famous hacker
Richard Stallman, a traditional hacker, was hired as a programmer by the Artificial Intelligence Laboratory of MIT on 197 1.
Ken Thompson and Dennis Ritchie-programmers of Bell Labs Computer Science Operations Group. They invented the Unix operating system in 1969.
John Draper (known as "Captain crunch") invented a plastic whistle to make free calls.
Mark abene (also known as Phiber Optik) has inspired countless American teenagers to "learn" how the internal telephone system in the United States works.
Robert Morris, a graduate of Cornell University, inadvertently spread the first network worm in 1988.
Kevin Mitnick-the first hacker on the FBI's most wanted list.
On 1990, Kevin Poulsen successfully controlled all the telephone lines that entered the KIIS-FM radio station in Los Angeles, and won the prize-winning listener game sponsored by the radio station.
Vladimir Levin —— The mathematician led a Russian hacker group to defraud Citibank of $654.38 million.
Steve Wozniak-one of the founders of Apple Computer Company.
Left, Muxia Village-1994, he broke into the bank account of Steve Wozniak, the most famous hacker at that time.
Linus Torvalds-He developed the famous Linux kernel at 199 1, when he was a computer major at the University of Helsinki, Finland.
Johan Helsingius-Helsenius closed his shop on 1996 and developed the world's most popular anonymous reply program "penet.fi", and his troubles began to follow. The most tragic thing is that the Finnish police searched a penet.fi user at 1995 because he complained about publishing church secrets online. Later, he blocked the reply program.
Tsutomu Shimomura.-I remember he arrested mitnick.
Eric Raymond-Eric Raymond has been active in the computer field and engaged in the development of various computer systems. At the same time, Eric Raymond is more keen on the development and promotion of free software, writing articles and giving speeches, actively promoting the development of the free software movement and making great contributions to free software. His articles, such as Cathedral and Market, are classic works in the field of free software. Under the influence of this article, Netscape decided to open their source code, making the browser an important member of the free software family.
Honker-an awesome name!
Honker was named by a hacker in China. The English word "honker" is a transliteration of honker.
Honker is a group of hackers fighting to defend China's sovereignty!
Their spirit is admirable!
Like to explore software programs!
Cookies.-cookies
Hackers, their goal is some software that needs to be registered. They usually use Debug to find out the password in memory.
Michelle-I especially like blue hackers!
Michelle also belongs to the hacker group.
Hackers refer to people who exploit or exploit system vulnerabilities, such as D.o.S (Denial of Service) system or personal operating system (Windows) blue screen.
The term "Michelle" was put forward by the Michelle League of China (www.cnlanker.com) in September 2006. The former Michelle League (China Michelle League) is a non-commercial non-governmental network technology organization, which conducts organized and planned research, exchange, collation and promotion of computer and network security technologies, and advocates the principles of freedom, openness, equality and mutual assistance. At the same time, it is also a folk patriotic group, and its actions are always closely combined with current politics. All its words and actions are based on patriotism and safeguarding China's dignity, sovereignty and territorial integrity, and its voice and actions are the embodiment of China's national integrity. China Michelle League (LUC) was established on 200 1, 10, 1. In April 2002, the public security department began to investigate the incident under the pressure of the Ministry of Foreign Affairs. The core personnel of the Blue League were summoned by the public security organs for investigation that month, and their computers were confiscated and sent to the public security departments at higher levels for evidence collection and investigation. The post-Alliance was told that the website must be closed unconditionally and indefinitely, and the name of "Michelle Alliance" should be permanently stopped.
On June 2nd, 2002, the Blue League held "China Michelle League Farewell" on IRC channel. Hundreds of netizens at the meeting learned and witnessed the inside story of the formation and forced closure of the Blue League.
There is only one Michelle League in China, that is, cnlanker.net from 200 1 10 to June 2002. That's our fond memory.
Once shared the joy of victory together, the only witness to spend those gloomy days together. Unfortunately, this domain name is no longer in the hands of China.
Since June 2002, any organization or website claiming to be Michelle League or Meng Lan belongs to the spontaneous personal behavior of other netizens, which is different from the original Meng Lan.
It has nothing to do with this.
Today's Cnlanker.com is the memory of a group of people who originally formed the Blue League, and the Blue League will never be rebuilt.
Phreak- the pioneer of telecommunication network!
Phreak often uses the loopholes of program-controlled switches to enter and study telecommunication networks.
Although unknown, it has made great contributions to the telecommunications system!
I. What is a hacker
Before trying to be a hacker, we must first understand what a hacker is.
Hacker-hacker
Professionals who are keen on researching and writing programs must have the characteristics of being willing to get to the bottom of the matter and poor ability to study problems.
In the hacker circle, the word hacker is undoubtedly positive, for example, system hackers are familiar with the design and maintenance of operating systems; Password hackers are good at finding out users' passwords. If they are computer hackers, they are experts who are familiar with computers and can make them obey.
Hacking is basically a hobby, usually out of one's own interest, not for making money or working.
According to Eric Raymond, the founder of the open source project, hackers and crackers belong to two different worlds. The basic difference is that hackers are constructive, while crackers are good at destruction.
Hacker originally meant workers who cut wood with axes, and it was first introduced into the computer circle from 1960' s.
Brian Harvey, a computer professor at the University of California, Berkeley, wrote when studying the word that MIT students are usually divided into two factions. One is tool, which means "dear" students, and their grades are all A; The other is the so-called hacker, that is, those students who often skip classes and love to sleep in class, but are full of energy and like to engage in extracurricular activities at night.
What does this have to do with computers? Not at first. But at that time, hackers were graded, just like tool used grades to compete. A truly first-class hacker is not ignorant all day, but keen to pursue a special hobby, such as studying telephone, railway (model or reality), science fiction, radio or computer. So the so-called computer hacker appeared later, which means computer expert.
For a hacker, it is necessary to learn to invade and crack, but the most important thing is programming. After all, using tools is to reflect other people's ideas, and procedures are your own ideas. In short, programming realizes everything!
For a hacker, they only pursue the pleasure of invasion and don't care about technology. They can't program and don't know the details of the invasion.
The image of "hacker" in people's minds is a person with unkempt hair, high-rimmed glasses and hunchback, who faces the computer all day. In fact, hackers are exactly the same as normal people, nothing special. Some people may rarely get on the computer and exercise all day, but their skills and spirit have reached the standard of hacking. Some people crawl in front of the computer and fool around every day, but they are still not hackers.
People always think that hackers are saboteurs. In fact, in a sense, hackers are also making great contributions to the development of computer technology. If there is no perfect Trojan horse, there will be no excellent antivirus software; Without hackers, network technology is difficult to develop. Of course, the network administrator is actually a hacker. How can he defend himself if he doesn't know how others attack?
The term hacker is usually defined as a computer expert who invades other people's systems for illegal activities outside the circle or in the media. However, in the eyes of hackers, such people belong to relatively low-level crackers. If a hacker is an expert at making bombs, then a cracker is a terrorist.
Now, there are more and more hackers on the Internet. They only invade, scan around with scanners, bomb people with IP bombs, and invade and destroy them aimlessly. They are not conducive to the development of computer technology, but endanger network security, cause network paralysis, and bring huge economic and spiritual losses to people.
We can't be a hacker, we should try to be a hacker! !
2. The hacker's preparatory network knowledge
1. What is IP?
IP is an address, and there is no same IP on the external network. It is like an ID number, giving each computer accessing the network an ID number. But for most users, this number is not fixed. When you reconnect to the Internet, this IP may be redistributed. However, some machines have applied for fixed IP, which is convenient for other computers to find and provide services. The general IP format is: A.B. = a, b, c, d< For example, 218.242.10.2312./kloc. That is to say, 127.0. 1 belongs to any computer, whether it is connected to the internet or not. In other words, each computer is composed of 4 digits and 256 hexadecimal digits.
2. What is a network protocol, a data packet?
Network protocol is a set of communication protocols agreed by both parties. Just like a password, there is a specific protocol to achieve the connection. In which "data packets" are one by one.
(1) connection-oriented TCP protocol
TCP is connection-oriented. "Connection-oriented" means that you must establish a connection with the other party before you can formally communicate. For example, if you call someone, you must wait until the line is connected and the other person picks up the phone before you can talk to the other person. Transmission control
Protocol (Transmission Control Protocol) is a connection-based protocol, that is, a reliable connection must be established with the other party before sending and receiving data formally. A TCP connection can only be established after three sessions, and the process is very complicated. We only make a simple and vivid introduction here, as long as you can understand the process. Let's take a look at the simple process of these three conversations: Host A sends a connection request packet to Host B: "I want to send you data, can I?" This is the first conversation; Host B sends a data packet to host A, and host A agrees to connect and asks for synchronization (synchronization means that the two hosts are sending and receiving and coordinating their work): "OK, when will you send it?" This is the second conversation; Host A sends another data packet to confirm the request of synchronizing host B: "I'll send it now, you can continue!" " "This is the third conversation. The purpose of the three sessions is to synchronize the sending and receiving of data packets. After three conversations, Host A will formally send data to Host B.. TCP protocol can provide reliable communication connection for applications, so that the byte stream sent by one computer can be sent to other computers on the network without error. A highly reliable data communication system usually uses TCP protocol to transmit data.
(2) Non-connected UDP protocol
"Non-connection-oriented" means that you don't need to establish a connection with the other party before formal communication, and you can send it directly regardless of the other party's status. This is very similar to the popular mobile phone short message: when sending a short message, you only need to enter the other party's mobile phone number. Udp (User Datagram Protocol) is a protocol corresponding to TCP. It is a non-connection-oriented protocol, it does not establish a connection with the other party, but sends data packets directly! UDP protocol is a non-connection oriented protocol, and there is no process of establishing a connection. Because UDP protocol has no connection process, the communication effect is high; But because of this, its reliability is not as high as TCP protocol. QQ uses UDP to send messages, so sometimes you can't receive messages.
Schedule: differences between tcp and udp protocols
| - |
| Properties \ Protocol |TCP |UDP |
| - + - + - |
| Whether to connect | Connection-oriented | Nonconnection-oriented |
| - + - + - |
Transmission reliability | reliable | unreliable |
| - + - + - |
| Application | A lot of data | A little data |
| - + - + - |
Speed | Slow | Fast |
| - |
(3) What is a port?
Port means port, but it is called port in computer. However, the port is not concrete but abstract. There are many ports (65,535) on a computer, but most of them are not open. Every network connection needs a port, just like connecting two computers with a wire. A socket is a port. Some ports have specific purposes, such as opening 80 ports on the web server and opening 265,440 ports on the FTP server.
Common port
2 1-FTP download
23-telnet remote login, open the back door for yourself after the invasion.
25-smtp is important, but it seems useless.
53 domain ditto
79 means knowing user information, which is very rare now.
80 - .net:8080/down/syslog.zip
The feature of this software is that it can record all programs and window names that have been run in the background, with specific time periods and login user names. It's terrible! Let's set a trap!
1. record
Double-click the main program in the compressed package, click "Software Trial" to enter the main interface, click "Browse" in "Log File Save Path" to select and name the save path, and save it here at c: \ winnt \ log.txt, and then check "Computer automatically starts logging".
note:
A. In order to prevent hackers from finding the log file, you can use the above-mentioned command: Attrib+S+HC: \ winnt \ log.txt to hide it.
B It's better not to put this record file in the same directory as the above 3389.txt, so if one of them is found, the other will not be found together.
C. The software displays the name "syslog" in the task manager process, and the unregistered version will automatically stop recording after 20 minutes. It can only be used to deal with novice hackers! And you have to spend some money first, haha!
Next, enter a complicated password in "Program Password Protection" and click "Start Log". At this time, the software will remind you that the hidden hotkey is "Ctrl+Q". Please remember this hotkey, and you will rely on it when calling the software in the future.
Check action
Want to know what the recorded things are like after this setting? Then come and have a look. How's it going? Are you satisfied with this record?
Hacker code:
1。 Don't maliciously destroy any system, it will only bring you trouble. Malicious destruction of other people's software can lead to
Legal responsibility, if you just use the computer, it's just illegal use! ! Note: Never break it.
Bad other people's software or data! ! ,
2。 Do not modify any system files. If you modify it in order to enter the system, please set the.
It went back to its original state.
3。 Don't tell friends you don't trust that you want a black platform.
4。 Don't talk about anything about you being hacked on bbs.
5。 Don't use your real name in posts and articles.
6。 Don't leave the computer at will when invading.
7。 Don't invade or destroy the mainframe of government agencies.
8。 Not on the phone
- Related articles
- How many days will it take to find out the violation of Guizhou Expressway?
- How does Mini World get a private account?
- Parents' short sentences about school
- What should I do if I receive a text message saying that I have run out of traffic?
- Why don't you send back holiday wishes?
- Violent texting, will the police station blacklist the mobile phone number?
- How to log on to Sichuan government affairs network as a short message legal person
- How to apply for Tianyi Campus Package (e-Home Plus) by sending a text message?
- Several simple methods for testing network speed
- Where can Nanchang Construction Bank exchange credit card points for gasoline?