Groups Of 414s

1 comments

The 414s gained notoriety in the early 1980s as a group of friends and computer hackers who broke into dozens of high-profile computer systems, including ones at Los Alamos National Laboratory, Sloan-Kettering Cancer Center, and Security Pacific Bank.[1]
They were eventually identified as six teenagers, taking their name after the area code of their hometown of Milwaukee, Wisconsin. Ranging in age from 16 to 22, they met as members of a local Explorer Scout troop.[2] The 414s were investigated and identified by the FBI in 1983. There was widespread media coverage of them at the time,[3][4] and 17-year-old Neal Patrick, a student at Rufus King High School, emerged as spokesman and "instant celebrity" during the brief frenzy of interest, which included Patrick appearing on the September 5, 1983 cover of Newsweek.[5][6]
Patrick and the 414s were described as meeting the profile of computer hackers at the time: "Young, male, intelligent, highly motivated and energetic." Patrick claimed his only motivation was the challenge of getting into places he wasn't supposed to, and remaining there undetected. The systems they broke into usually were running Digital Equipment Corporation's VMS operating system.[2]
Many saw them as harmless pranksters, sort of a real life WarGames—a film that was released earlier that year. The 414s themselves were not entirely harmless, doing $1,500 worth of damage at Sloan-Kettering during their June 3, 1983[7] break-in by deleting billing records[8] (ostensibly to cover their tracks). Patrick and the 414s did cause real concern, as experts realized that others could duplicate their techniques and do real damage.[6] They used inexpensive personal computers and simple hacking techniques, such as using common or default passwords and exploiting well-known, but unpatched, security holes.
Chen Chui, an administrator who discovered the electronic break-in, left a message for the intruders and contacted the FBI, who placed wiretaps and eventually traced the calls back to Milwaukee. Gerald Wondra, 22 at the time, was the first visited by the FBI. Wondra lived with his mother in West Allis, a Milwaukee suburb. Wondra said he was "curious, he was just having fun".[2]
Most of the members of the 414s were not prosecuted, in various agreements to stop their activities and pay restitutions.[9] Wondra and another defendant each plead guilty on two counts of "making harassing telephone calls."[10]
As a result of news coverage, congressman Dan Glickman called for an investigation and new laws about computer hacking.[11] Neal Patrick testified before the U.S. House of Representatives on September 26, 1983 about the dangers of computer hacking, and six bills concerning computer crime were introduced in the House that year.[12]

Examples Genesis Hacking

0 comments

1. In 1983, the first time the FBI arrested a group of computer criminals 414s (414 is their local area code) based in the U.S. Milwaukee. The group that came to be called hackers do piercing 60 computers, from computers owned by Cancer Center Memorial Sloan-Kettering's computer to the Los Alamos National Laboratory. One of the perpetrators enjoy immunity as testimonials, while five other players get probation.
 

2. Digigumi (Digital Group) is a specialized group that is engaged in computer games and using hexadecimal techniques to change the text contained in the game. For example: Chrono Trigger game can be changed to English-speaking Indonesian. Therefore, the status Digigumi are hackers, but not as a destroyer.

2 Types Of Hacker Activities

0 comments

1. Social Hacking, who need to know: what information about the system used by the server, who owns the server, who are administrators who manage the server, what type of connection used and how the server is connected to the Internet, who use the connection and any information provided by the server , whether the server is also connected to the LAN in an organization and other information more ngetrennya now under the name Social Enginering Engineering.
 

2. Technical Hacking, the technical measures to make incursions into the system, either with the tool (tool) or with the facility's own system that is used to attack the weaknesses (security holes) are present in the system or service. The core of this activity is to gain full access to the system in any way and no matter what.

6 Hackers And Its Types

0 comments

Here are 6 types of hackers (based on the patterns of thought):
A. White Hat Hacker2. Red Hat Hacker3. Yellow Hat Hacker4. Black Hat Hacker5. Green Hat Hacker6. Blue Hat Hacker7. Others) Grey Hat Hacker


White Hat Hacker
White hat hacker, also known as ethical hackers, was the origin of information technology, an ethically against attacks on computer systems. They are aware that the Internet now represents the voice of humanity. A White Hat will focus himself to build a network security (security system), where the Black Hat (opponents) will try to destroy it.
White Hat also often described as a network through a network to help the owner find a flaw in its security system. Many of them are employed by computer security company, they called sneakers. A bunch of these people are called tiger teams.
The fundamental difference between White and Black Hat White Hat Hackers are claiming they were observed with the Hacker Ethic. Such as Black Hat, White Hat is usually very detailed understanding of the internal security system, and can create code to solve the existing problems.
Red Hat Hacker
Simply put, Red Hat Hacker thinks with:
* Hat (Fire)* Intuition* Opinion* Emotion (subjective)


Yellow Hat Hacker
Simply put, the Yellow Hat Hacker thinks:
* Hat (Sun)* Praise* Positive aspects (objective)


Black Hat Hacker
Black hat (also known as the Darkside hacker) is a hacker-oriented nature of the criminal with the destroyer. Usually they are outside the security industry and by modern programmers. Black hat is usually a person who has knowledge of the disability system and exploit it for personal gain. Many Black Hat priority to individual liberty than the accessibility of the privacy and security. Black Hats will find a way to create an open hole in the system becomes more broadly, they will perform in ways to make someone have control over the system. Black hat will work to produce damage and / or to threaten and extort someone.
Black-hat hacking is an action that is not approved to break into the system without the permission of the authorities, usually done on a computer connected to the network.
Green Hat Hacker
Simply put, a Green Hat Hacker thinks:
* Hat (Plant)* Alternatives* New approaches* Everything goes (speculatif)


Blue Hat Hacker
Simply put, Blue Hat Hacker berpkir with:
* Hat (Sky)* Big Picture* Conductor hat* Thinking about thinking* Overall process (overview)* Referring to a computer security consulting company that used to bug test run before the system starts up.


(Other) Gray Hat Hacker
Grey hat in the computer security community, is a hacker with a skill that is sometimes a legal act in good faith, but sometimes not. He is a mix of white and black hat hackers. They hack for personal gain but did not have a destructive purpose. For example, an attack on the company's business with unethical practices can be considered as Black Hat action. However, a Gray Hat is not going to do something evil, though he had broken the law. So instead said to be a Black Hat, he is said to be a Grey Hat Hack. That enters a computer system just to meninggalakna trail, and do not perform acts of vandalism, this is called Grey Hat.

Cracker

0 comments

Cracker is a term for those who go into other people's systems and more destructive cracker, usually on a computer network, bypassing passwords or licenses computer programs, computer security against deliberate, deface the (changing the face of web pages) of others even up to delete the data of others, stealing data and generally do their own cracking for profit, malice, or for other reasons as there are challenges. Some of the burglary carried out to demonstrate the security weaknesses of the system.

Hacker

0 comments

Hacker is a term for those who provide a useful contribution to the network computers, create a small program and share with the people on the Internet. For example: digigumi (Digital Group) is a group specializing in the field of mobile and computer gaming. Digigumi uses hexadecimal techniques to change the text contained in the game. For example, the English game Chrono Trigger can be converted into the Indonesian language. Therefore, the status Digigumi are hackers, but not as a destroyer. Hacker here mean, look, learn and change things for the hobby and to follow the development of legality set by the game developer. The hackers usually do infiltration-infiltration with the intention of satisfying the knowledge and techniques. Average - average company in the world of global networks (the Internet) also has a hacker. His job is to keep the network from possible destruction of an outside party "crackers", test the network from the possibility of a hole that the chances of the cracker tear - tear apart the network, for example, insurance companies and auditing "Price Waterhouse". He has a team of hackers called the Tiger Team. They work for their client to test security systems.

History Hacker And Cracker

0 comments

Hackers appear at the beginning of the 1960s among the members of student organizations, Tech Model Railroad Club at the Artificial Intelligence Laboratory Massachusetts Institute of Technology (MIT). The student group is one of the pioneering developments in computer technology and they operate with a number of mainframe computers. Hacker word first appeared in a positive sense to describe a member who has expertise in the field of computers and able to make a better computer program that has been designed from bersama.Kemudian in 1983, growing hacker analogy to refer to someone who has an obsession for understanding and master computer system. Because, in that year for the first time the FBI arrested a group of computer criminals 414s based in the U.S. Milwaukee. 414 is their local area code. The group that came to be called hackers are convicted of burglary 60 computer, the computer's Cancer Center Memorial Sloan-Kettering's computer to the Los Alamos National Laboratory. One of the perpetrators enjoy immunity as testimonials, while five other players get probation.

Then in the next development comes another group mention themselves hackers, but it's not. They are (especially men) who get the satisfaction of breaking through to outsmart the computer and telephone (phreaking). True hackers call these people 'crackers' and do not like hanging out with them. True hackers crackers as the lazy, do notresponsible, and not too smart. Real hackers do not agree to say that through the security has become a hacker.The hackers hold a meeting once every year which is held every mid-July in Las Vegas. The session's biggest hacker in the world is called Def Con. Def Con event to event is more exchange of information and technology related to hacking activities.