Introducing Blogger Theme

Groups Of 414s

1 comments

The 414s gained notoriety in the early 1980s as a group of friends and computer hackers who broke into dozens of high-profile computer systems, including ones at Los Alamos National Laboratory, Sloan-Kettering Cancer Center, and Security Pacific Bank.[1] They were eventually identified as six teenagers, taking their name after the area code of their hometown of Milwaukee, Wisconsin. Ranging in age from 16 to 22, they met as members of a local Explorer Scout troop.[2] The 414s were investigated...

Examples Genesis Hacking

0 comments

1. In 1983, the first time the FBI arrested a group of computer criminals 414s (414 is their local area code) based in the U.S. Milwaukee. The group that came to be called hackers do piercing 60 computers, from computers owned by Cancer Center Memorial Sloan-Kettering's computer to the Los Alamos National Laboratory. One of the perpetrators enjoy immunity as testimonials, while five other players get probation.   2. Digigumi (Digital Group) is a specialized group that is engaged in computer...

2 Types Of Hacker Activities

0 comments

1. Social Hacking, who need to know: what information about the system used by the server, who owns the server, who are administrators who manage the server, what type of connection used and how the server is connected to the Internet, who use the connection and any information provided by the server , whether the server is also connected to the LAN in an organization and other information more ngetrennya now under the name Social Enginering Engineering.   2. Technical Hacking, the technical...

6 Hackers And Its Types

0 comments

Here are 6 types of hackers (based on the patterns of thought):A. White Hat Hacker2. Red Hat Hacker3. Yellow Hat Hacker4. Black Hat Hacker5. Green Hat Hacker6. Blue Hat Hacker7. Others) Grey Hat HackerWhite Hat HackerWhite hat hacker, also known as ethical hackers, was the origin of information technology, an ethically against attacks on computer systems. They are aware that the Internet now represents the voice of humanity. A White Hat will focus himself to build a network security (security...

Cracker

0 comments

Cracker is a term for those who go into other people's systems and more destructive cracker, usually on a computer network, bypassing passwords or licenses computer programs, computer security against deliberate, deface the (changing the face of web pages) of others even up to delete the data of others, stealing data and generally do their own cracking for profit, malice, or for other reasons as there are challenges. Some of the burglary carried out to demonstrate the security weaknesses of the...

Hacker

0 comments

Hacker is a term for those who provide a useful contribution to the network computers, create a small program and share with the people on the Internet. For example: digigumi (Digital Group) is a group specializing in the field of mobile and computer gaming. Digigumi uses hexadecimal techniques to change the text contained in the game. For example, the English game Chrono Trigger can be converted into the Indonesian language. Therefore, the status Digigumi are hackers, but not as a destroyer. Hacker...

History Hacker And Cracker

0 comments

Hackers appear at the beginning of the 1960s among the members of student organizations, Tech Model Railroad Club at the Artificial Intelligence Laboratory Massachusetts Institute of Technology (MIT). The student group is one of the pioneering developments in computer technology and they operate with a number of mainframe computers. Hacker word first appeared in a positive sense to describe a member who has expertise in the field of computers and able to make a better computer program that...