The hacker face through the alphabet

The hacker face through the alphabet

Hackers and viruses, intrusion and cracking, are no longer a mystery to many. However, there are still many cornerstands in the world of "electronic bugs". less mentioned. Let's shine some light on those events and terms associated with hacker history, listed in alphabetical order.

Anti-virus
Viruses: It is estimated that only US businesses lose $ 550 million each year due to computer-damaging programs. As well, antivirus software has become a lucrative industry. Once the virus has been analyzed and its code is identified, the scanning software will prevent it from further spreading. In order to control new viruses, security software is typically developed using the & quot; experience & quot; It's a fairly inexpensive way to hunt for suspicious files, and so it's also possible to exclude files from & quot; clean & quot; while leaving out infected files.

Bart Simpson : This mischievous cartoon character was used by the author of the Melissa virus to irritate the computer user, causing them to open infected files. Melissa is the first virus to infiltrate the home system. Its base power can make every computer emit 50 to 100 e-mails, leaving the network of many large companies in the United States paralyzed.

Cracker The media are still considered the most dangerous hackers. These are the experts who sabotage the system. They are very mischievous and act either for financial or revenge purposes.

Daemons Short for disk and execution monitor. At first glance this may be the name of a major ISP in the UK. In fact, daemons are a secret program hidden in the system and often do useful things, such as supporting access to websites. However, on the Yahoo service network today, daemons are sometimes used to install settings to create false information.

Hacker can cause widespread power outages


Electrabel This is the name of a Belgian power company, attacked by a cracker and threatened to disrupt their entire power supply for two hours. After the company tried to convince that if that happens, there will be huge losses, even the lives of the people, hackers claiming the "Red Attack" does not take any extreme action but still trying to "level" by sending Electrabel a copy of her computer code as a warning.

Chernobyl Factory - inspired & quot; composed & quot; of hackers


Fallout (Radioactive Dust): Although warned earlier, Asia and the Middle East are still suffering the 1999 Chernobyl virus outbreak, right on the 13th anniversary of the tragic event at the power plant. in the former Soviet Union. The important files in the system in many places are wiped clean and some computers even "dead", can not be turned on again.

Girlies : This is the name of a hacker group that has invaded and uploaded pornographic images to the New York Times website because a reporter for this newspaper wrote a book about hacker Kevin Mitnick. This action is considered to prove that they are the most "super".

Hacker Be careful you can team up with the cracker and treat all of them as hackers alike. Hackers are always considered high class, more educated, educated about computer science and use their programming skills to show people the vulnerabilities of the system. The motivation of mainstream hackers (as some claim) is a passion for discovery, learning, not for money or for sabotage. Many hackers have been recruited into companies to rectify system and software defects.

Internet ethics Internet Ethics: In the face of the increasing number and extent of cyberattacks, US Attorney General Eric Holder has issued a call for an Internet ethics campaign. "For teens. "The kids know that entering another's home is a crime, but they do not understand that intruding on someone's computer is wrong," he said.

Kevin Mitnick This name has become a legend among hackers and the Internet community. At the top of the FBI's wanted list, Mitnick was forced to list all crimes listed in the US criminal record. Two seasons: 1989 and 1995. Released after five years in jail, this guy is banned from using computers and is even banned from working in any agency with a networked PC.

Losing face Losers, losers: Experts estimate that two-thirds of hacker companies have not reported cases to authorities for fear of acknowledging system security flaws. It also means losing customers, especially those who are allergic to e-commerce.

Maxus This 19-year-old Russian cracker is best known for one of the biggest Internet thefts. In January 2000, information on thousands of credit cards was stolen from a record store online database. The perpetrator Maxus immediately requested that the store pay $ 100,000 or otherwise disclose all this information.

NATO In the war in Kosovo, the heavily-trafficked propaganda network of the North Atlantic military bloc was interrupted when the organization's website was hacked by some hackers for " go to hospital ". The expert identified the group of Serb abusers living in Belgrade.

Ping This term simply sends a simple message to another computer and sends it to the sender. Used as a tool to check whether two computers can communicate with each other, dangerous ping programs can cause system malfunction. In the case of the NATO announcement, the attack was ping-like.

Quack The image of a duck lying in Western culture is used to denote frail subjects who can not defend themselves against their enemies, just lying idle waiting to die. The duck here is a series of addresses of Yahoo, Amazon, CNN, eBay and many other sites. In January 2000, denial-of-service attacks (the term technical termination of the blockage caused by bogus data) caused these sites to cripple and the cracker may have exploited a lot of sensitive information. .

Routers Also known as guideways, computers are responsible for putting numbers 1 and 0 in binary to know how to get where they need to be in cyberspace. Hackers have used hacked attacks using zombie computers to trick routers that send false information to many sites in the Yahoo network.

Smurf These are the programs used to bombard websites with a large number of requests. Smurf has the function of hiding origin and duplicating the requirements to create a huge "mountain" of information.

Track Trace: By switching between computers and carefully removing any traces that can be used for tracing, the cracker can hide the activity that has been done. mine. However, no matter how the hunting tools of the security agencies today have progressed non-stop and still be able to clue.

United Loan Gunmen : The name of a hacker group that attacked the ABC television website, replacing the front page with a paintball picture.

Virus Types like Melissa can have terrible effects, but there are also many kinds of harmless, depending on the attitude and purpose of the writer. At present, the problem of the origin and the motives of the virus is still the subject of controversy in many forums and Internet chat rooms. Some people even claim that they can not blame the ineffectiveness of their jobs, sit at home and spread the virus. On the contrary, it should be criticized for state management and the negligence of software vendors.

Wobbler : Is one of the earliest e-mail virus scams. Computer users are wasting hours protecting their computers from names like & quot; e-flu & quot ;, & quot; Irina & quot; and & quot; Hitler & quot; In fact, no such virus existed.

X-Force : Curry and Pepper. Hackers have quick response forces. Internet Security Systems (USA) says its fast-paced X-Force team, including many excellent programmers, decoded Back Orifice 2000 in less than a day.

Yahoo Although there are powerful servers, the popular network has drowned in a denial-of-service attack at 1 gigabyte per second in late 1999. This is even greater than the amount of data that most normal web sites receive over the course of a year.

Zombie The term comes from the denial-of-service attack on Yahoo. All compromised and remotely controlled computers are used by the cracker to "shoot" data mountains to the target. These "live" computers are not "themselves" so called zombies (the name of a spell in Africa makes the dead resurrect). It is important to distinguish "zombie PC" and "zombie website". These are sites that have over time, but are maintained for some purpose.