Crackers – Wikipedia

 

  1. ultimate-cracking-softwareCrackers software : Term used to designate programmers and decoders that make reverse engineering of a particular program, or alter the contents of a particular program to run correctly, many hackers alter the expiry dates of a particular program to make it work more than 30 days, or modify the trial mode to use as if it were a legitimate copy, or make an inner shift in the registration routine of the program so that it passes to accept any devices, such sofwares changed are known aswarez .
  2. Developers viruses , worms , trojans and other malware : software developers that create small to cause damage to the user.

Crackers are not considered people as distributors of warez and crackz , webmasters who provide on its pages, software without authorization from copyright owners or people who copy software pirates. The cracabiker is essentially a qualified professional in reengineering or reverse engineering of software or hardware. A hacker takes advantage of caractísticas systems in order to modify them. The hackers are self-taught (and hackers) and without any knowledge of the system revert hacks necessary to understand the systems back and forth a few times. Your changes are also made ​​because they are hacks upon hacks in general.

Crackers are confused with:

Digital graffiti: they act primarily for the purpose of being recognized. Want to become famous in the universe for both cyberpunk and alter web pages, a behavior very similar to the graffiti wall, leaving always signed his pseudonyms. Some leave messages of political content which should not be confused with cyber-terrorism.

Revanchist: employee or former employee of a company that for whatever reason decides to sabotage it clear goal of revenge. Usually worked in the computer industry company which greatly facilitates their work since they are well informed of system vulnerabilities.

Vandals: they act for the sake of causing harm to the victim. This damage may consist of simple server crash (leaving the machine briefly disconnected from the Internet) or even the total destruction of stored data.

Spies: they act to acquire sensitive information stored on the victim's computer. The data may have commercial content (a chemical formula a) or political (e-mails between consulates) or military (military programs).

Cyber-terrorists: terrorists are digital. Their motivations are often policies and their weapons are many, from the theft of confidential information to the local phone system crash or other actions of its kind.

Thieves: they have clear financial goals and usually attack banks in order to divert money to their accounts.

Robbers, also with financial goals, in general, seek to acquire credit card numbers stored in large commercial sites. Generally use a technique called "Phishing Scam", by sending an e-mail program that is run by a user, having access to your information.

Cracking

The act of breaking the security of a system often requires brilliance and ability to perform to explore ( exploiter ) known vulnerabilities of the target system with creativity.However some, 'mistakenly' defined as crackers, make use of known solutions to recurring problems in vulnerable systems, thereby copying or exploiting flaws discovered by others without any effort.

No comments:

Post a Comment

Translate Website

ShareThis