Different types of Hackers?

Dennis Faas's picture

Commenting on yesterday's article concerning How to track down and report a Hacker, Infopackets Reader Robert M. writes:

" I read yesterday's article with great interest; however, I noticed that you did not really define the different types of Hackers that are out there. I'd like to briefly comment on that, with some definitions I've come across.

Hacker: While there are *many* different definitions of the term 'Hacker', Google's #1 answer reads, "[Hacker]: a slang term for a computer enthusiast. Among professional programmers, the term hacker implies an amateur or a programmer who lacks formal training. Depending on how it used, the term can be either complimentary or derogatory, although it is developing an increasingly derogatory connotation. The pejorative sense of hacker is becoming more prominent largely because the popular press has co-opted the term to refer to individuals who gain unauthorized access to computer systems for the purpose of stealing and corrupting data. Hackers, themselves, maintain that the proper term for such individuals is cracker." (Source: wmo.ch)

Ethical Hacker: "The goal of the ethical hacker is to help the organization take preemptive measures against malicious attacks by attacking the system himself; all the while staying within legal limits. This philosophy stems from the proven practice of trying to catch a thief, by thinking like a thief." (Source: eccouncil.org)

Lamer: 'Wannabe' hackers that try to gain access to anything and everything for the soul purpose of disrupting normal activity (typically in a malicious manner, such as sending virus, as with the example given in yesterday's newsletter). These guys are the reason that there are viruses in your computer. Lamer Hackers typically 'learn' how to 'hack' by using readily-made hacking tools (made by another Lamer) to send the virus's and any other malicious code to other (often randomly selected) PCs.

With that being said, a true-to-the-word Hacker won't take much interest in the 'average Joe' connected to the Internet, due to the fact that there are many more 'bigger and better' challenges out there that would derive greater satisfaction / gratification once the system has been 'hacked'. Besides that, a true hacker is virtually impossible to trace and can enter your system without you ever knowing that they ever were there. "

Short-but-sweet, and interesting comments. Thank you.

I also stumbled across a few more pages which highlight the psychology of a Hacker and "how to become a hacker" -- a very interesting article if you take the time to read it closely.

http://tlc.discovery.com/convergence/hackers/articles/psych.html

http://www.catb.org/~esr/faqs/hacker-howto.html

Rate this article: 
No votes yet