Page 1 of 3 123 LastLast
Results 1 to 10 of 24

Thread: What are real hackers?

  1. #1
    Junior Member
    Join Date
    Aug 2002

    What are real hackers?

    What are real hackers?
    What are real hackers suppose to do? Are they supposed to find errors in software for other people and then try to fix them or report them. That sounds like a beta tester or support tech to me. And if I want to be that then I would of just got a job doing that. And you would not get into trouble doing that.
    Are real hackers supposed to break into websites or computers defacing them or destroying them. That sounds like a computer terrorist or scrip kiddy to me. And that is not what I want to be.
    I think a real hacker is some one that looks at their situation and see how they can make it better. For example lets say you are at school and you wanted to save things to the hard drive so you could print it off later but the school has installed a program that wont let you save to the hard drive. What should you do? Should you let it pass and forget about it or should you try to get around it and hack the system and save any way.
    I would hack the system and do what you need to do because it is not going to hurt anything if you do. But if you are caught then you get expelled from school.
    Here is another example. What if you saved stuff on a schools computer or at work and you forgot to save it to disk. And when you got home you found out that to complete the assignment you need that thing you saved to the hard drive but forgot to save to the disk. What are you going to do know? Are you going to say forget about it and get a bad grade or get fired for not getting your stuff done. Or are you going to hack into the network and get it from the hard drive and finish your project. That is exactly what I would.
    There is a million more examples that I could give but I think you get the idea. Hackers should hack for personal gain and not hurt any one in the process. Unless some scrip kiddy just wont let off then you should just let them have it. Butt there is never a good reason to ever rune a computer.
    When I say personal gain I mean by improving your knowledge or help you get things done. Some people think that if we are out for personal gain maybe we should hack into banks and transfer funds. I personally think that is wrong because that is just stilling from people hard earned money. But if it was like Bill Gates you could always trick him in just doing it him self. That would be a true Hacker that really could get things done.
    Some people may not agree with every thing. But I am not here to please people. I am here to learn and achieve my goals. Like making my own OS, Games and Software.

  2. #2
    Token drunken Irish guy
    Join Date
    Sep 2001
    Sorry man but I hadnt any new or inspiring text to put up here, not even a damn debate. Anyway maybe just some light reading for others. Oh well.

    Types of Hackers

    In a new era of hacking it is vitally important for the older generation to keep a sense of ethics and values alive, or we may simple add to the media's 'negative' view of hackers.
    It is therefore the reason I have chosen to add an ethics section here.
    Hopefully by introducing the many types of hackers in the world you can choose the right type and understand what a true hacker is.
    I wont begin with the obvious dictionary defination of a hacker [seeker of knowledge etc.] but try to introduce the attitude of various stereotyped hackers.
    However in my opinion real hackers come under no defination and are just people interested in computers regardless of whether they spend years learning the finer points of programming or years gaining root on a lame admins system.

    There are many names for different classes of hackers.

    The Script Kiddie
    * Lamers
    * These 'hackers' or wannabes manipulate tools written by others to achieve respect. At the moment I would consider there presence as widespread. They give hackers a bad name and usually use trojans [RATS].
    How often have you been on IRC and felt their presence, SUB7 scans are their usual tactic as well as the infamous DoS attacks.
    * It is these Script Kiddies who have demised the respectful name of hackers into the anti-media tag it carries today.
    * In my humble opinion Virii users come under this category but not in the case of those who have personally written the virus.
    * Do not fall under this category if you want true respect.
    * Often use Windows and AOL and try to hack hotmail.

    * Next generation of hackers
    * These are the learners of the hacking world, their main aim is to gain knowledge.
    * They begin as script kiddies often indulging in such activities but quickly learn it is lame.
    * Most have the respect from elders as they want to learn and avoid the simplicity of simply becoming a script kiddie.
    * It is a joy to see such people grow as they install Linux and no longer get flamed on BBS boards, it is these people who are the future of hacking.

    The l33t
    * Average Hackers
    * The use of numbers and symbols in hacker culture is becoming lame but is the way for a small generation of hackers who are usually fairly good hackers who never become too serious but have a general understanding of computers. You know the type who write like this 5h1+ 1m l33t Ž0w m0+h3rfu<3r5.
    * May indulge in defacement for message purposes.
    * Are known to get involved in hacker wargames.
    * Usually have websites with good grafix.

    BBS and Warez d00ds
    * The current generation of hackers are BBS boys , they spend long amounts of time reading and posting on message boards learning and passing on knowledge.
    * There are numerous old boards with great history and new ones are appearing everyday.
    * Usually they are fairly large communities and at times get involved in long flame wars with newbies, script kiddies and lamers.
    * Helpful at times.
    * It is important that people realise many highly known boards are visited by FBI etc. to keep tabs on the latest exploits, defacements etc.

    * Also known as Black Hats
    * These guys come in two forms, Software crackers who get programs for free like warez d00ds and the evil BlackHat crackers.
    * True Crackers are intelligent guys, they can in essence hack and can easily bypass security.
    * They are not to be mistaken with script kiddies as true crackers know their stuff, they dont use other peoples tools and are usually as smart as an ethical WhiteHat hacker.
    * The old age debate of Hacker/Cracker has been well-reviewed and it is true that the media should technically use the word cracker when describing people who have stolen credit card numbers or so on.

    The Ethical/True Hacker/WhiteHat
    * The real elite [not l33t].
    * Well these guys are the people who arent really around any more, they are the people who once hacked but probably stopped due to the upsurge of lame script kiddies of today. They are not in large numbers these days so if you know one keep with him or her and you will learn
    * Programmers with many languages
    * Unix or Linux experts.
    * Respected members of the hacking community.
    * Helpful and non-destructive.

    Here is the list of White Hat rules taken from a tutorial by

    with info by Carolyn MyAnal
    Ascii Work by -IceCanibus
    who are apart of the r00t-access crew.
    -Thou shalt respect knowledge and freedom of information above all else in cyberlife. Thou shalt respect all systems and treat them as you would treat your own.
    -Thou shalt develop an addiction to knowledge, gaining it all the time and taking pride in new knowledge you have gained and can shre with others in your own name.
    -Thou shalt only take credit for things you have discovered yourself and give FULL credit to all revisions.
    -Thou shalt not hack systems to profit from any information contained within.
    -Thou shalt not damage or modify or make copies
    of any system whatsoever With exception to log
    files which are advisable to prevent detection
    -Thou shalt not make use of other peoples programs more than you make use of raw methods and invent your own.
    -Thou shalt e-mail every sysadmin from an anonymous account to inform him/her of the flaws in the system and where he/she can download a patch, do not fix the system yourself.
    -Thou shalt not intentionally harm a systems bandwidth and thou shalt not crash a system intentionally [including DoS]
    -Thou shalt share thine knowledge freely, not profit from any knowledge and assist all people who require knowledge.
    -Thou shalt not take stupid risks of yourself [or anybody else for that matter] on any system. This thine duty to keep all hackers out of prison.

    " end of piece.

    OK, back to me.

    The Phreakers
    * The trend of phreaking is nearly as old as hacking itself and is hacking in the sense that it involves love of technology, the want to learn how to understand communications.
    * Many phreakers are legends in the world of hacking.
    * Phreaking is fun and well respected if done correctly.

    The Legends
    * Famous crackers such as Kevin Mitnick whose jail term is a long webpage defacement issue. More recently Rapheal Gray and of course the infamous MOD group with such legends as Phiber Optik and the LOD group.
    * There is another text on famous crackers so lets not go into this now.

    The Lost
    * These guys are like myths and are known as GreyHats, they are excellent hackers with the ability to hack many of the worlds greatest systems but dont and are said to be the old hackers who no longer speak.
    * If they exist they are good as although Great Hackers get the feds at their door or go to jail Truly Great Hackers are never caught....

  3. #3
    Nice post ennis. Very informative too for both the senior and newbie alike. Good job

  4. #4
    Junior Member
    Join Date
    Aug 2002
    I'm not sure the term 'hacker' should be considered a compliment anymore, because all you read about in newspapers are that 'hackers' recked a page or flamed some company's network. The media has given the term a bad image. I would come up with some witty politically correct term to define the people out there that intend no *permanent harm* but I guess I just can't be bothered right now.
    [glowpurple]It all works out in the end.[/glowpurple]

    But that\'s just my opinion, I could be wrong.
    Dennis Miller

  5. #5
    Welp.. If someone called me a hacker, it wouldn't affend me and I'd take it as a compliment. Generally, when I tell someone that, I explain to them the white-hat system and that I am a white-hat hacker. So, I wouldn't be in shame of saying that.

  6. #6
    Purveyor of Lather Syini666's Avatar
    Join Date
    Aug 2001
    I think once you hit a certain point, terms like Hacker or 1337 loose all meaning, because you grow out of the need to have a label, you simply are what you are, no words or labels required. I know who I am, what I can do, what I want to learn and do, and pretty much could care less about ever being known by any of the trems listed in Ennis' post, though I must applaud him on the info.
    You're not your post count, You're not your avatar or sig, You're not how fast your internet connection is, You are not your processor, hard drive, or graphics card. You're the all-singing, all-dancing crap of AO
    09 F9 11 02 9D 74 E3 5B D8 41 56 C5 63 56 88 C0

  7. #7
    Junior Member
    Join Date
    Jun 2002
    Good content ennis.

    At the heart of the Internet culture is the force that want to know everything about you.

  8. #8
    Join Date
    Aug 2002
    Hmmm... It sorta gives you something to strive for! I hope one day to contribute to something great in the hacking... I just havenīt found it yet!

    BTW Hackers is beyond definition! It is when your passion for something grows so deep, that it devours your soul, and you are not able to leave for anything else but this one thing which truely has your interest! And it could be anything, stamps, cars, airplanes, computers, anything at all! And you know you are a hacker once you know all there is to know about the subject!
    I breathe, therefore I am!
    I type, therefore I live!
    [shadow]I love, therfore I die![/shadow]

  9. #9
    Join Date
    Aug 2002
    nice Ennis long time since I have seen everything said that well
    Makes me miss my few days as a The Script Kiddie trying to fig everything out
    I should send a copy of this out to a bunch of news networks maybe get them to use a another term other then hacker. Even thought I have grown to no even care what is said about me and what I do hacker is too broad to tell about everything in comp peeps do not like. I had friends in high school who made one change on a school comp like change the backgroud of something and were labeled and had problems because if it. I could go on and on but I think im getting off topic.
    Ill THink of one when i get time.

  10. #10
    Join Date
    Aug 2001
    Great post Enris.

    TYrue, most of the stuff most of us know, but its always always good to see such a bundled up package of very well-written information.

    As ashbourn says, this post needs to be sent to a few media and security newsgroups, just to let them know too.

    Again, a very well-written piece.

    I blame you cos my mind is not my own, so don't blame me if I trespass in your zone!

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts