Hacker is one of those terms that has a different meaning depending on who uses it. Among programmers, to be a hacker is to be a star. Hackers are programming code jockeys that can throw together bits of miraculous pieces of programming seemingly at will. They are gurus. People who modify computer and other pieces of electronic hardware are also sometimes called hackers.

Being a hacker can also be a bad thing. A hacker or hack can sometimes be someone that has no grace or elegance in his work and throws his projects together haphazardly. Among the general public (thanks to the media and perhaps Hollywood), a hacker is a person who gains illicit access to a computer and steals stuff or breaks into military networks and launches missiles for fun and with no conscience.

NOTE

You might hear the terms white-hat or black-hat in reference to a hacker or cracker. A black-hat is a bad person who gains unauthorized access to a computer or network for nonaltruistic reasons. A white-hat is a security expert who attempts to gain access to a computer or network to detect vulnerabilities so they can be patched. Pink-hats are just fashionable.

To complicate things even further, those that are hackers in the break-and-enter sense consider themselves crackers or black-hat hackers.

And among people who eat cheese, crackers are savory biscuits.

So you see the problem here. For simplicity’s sake, I am going to use the popular mass-media definition of hackers interchangeably with crackers. Both terms refer to bad people who divine access to your computer across the Internet by compromising its defenses or using electronic loopholes.

Explore More

You’ve Hired a Hacker (Section 4)

Section 4: Stimulus and response 4.1: My hacker did something good, and I want to reward him. Good! Here are some of the things most hackers would like to receive

Google Hacking

Using Google, and some finely crafted searches we can find a lot of interesting information.For Example we can find: Credit Card Numbers Passwords Software / MP3’s …… (and on and

Finding vulnerabilities in PHP scripts

Contents : * 1) About * 2) Some stuff * 3) Remote File Inclusion * 3.0 – Basic example * 3.1 – Simple example * 3.2 – How to fix