Hacker

بِسْــــــــــــــــمِ اﷲِالرَّحْمَنِ اارَّحِيم

Hacker (UK: hackers) are people who study, analyze, modify, breaks into computers and computer networks, either for profit or motivated by the challenge.
History
Terminology hackers emerged in the early 1960s among the members of student organizations Tech Model Railroad Club at the Artificial Intelligence Laboratory of the Massachusetts Institute of Technology (MIT). The student group is one of the pioneering developments in computer technology and they are struggling with a mainframe computer. The English word "hacker" first appeared with a positive sense to refer to a member who has expertise in the field of computers and be able to make computer programs better than I had designed together.


Then in 1983, the term hacker began a negative connotation. Because, in that year for the first time the FBI caught 414s computer criminal group based in Milwaukee, USA. 414 is their local area code. The group that came to be called hackers are convicted of burglary 60 computers, from computers owned by Cancer Center Memorial Sloan-Kettering's computer to Los Alamos National Laboratory. One of the perpetrators enjoy immunity because TESTIMONIALS, while five other players get probation.
Then on the next development comes another group that mention themselves as hackers, but it is not. They are (especially the men) who got the satisfaction of breaking through a computer and telephone outsmart (phreaking). Real hackers call these people crackers and do not like to hang out with them. True hackers crackers as lazy, irresponsible, and not very smart. Real hackers do not agree to say that the security breach has become hackers.
The hackers annual meeting, that every mid-July in Las Vegas. Arena of the world's largest hacker gathering is called Def Con. Def Con event to event is more exchange of information and technology related to hacking activities.
Hacker has a negative connotation because people will be differences in terms of hackers and crackers. Many people understand that peretaslah resulting loss of certain parties such as changing the look of a web site (defacing), insert the virus code, etc., but they are a cracker. Cracker is using the vulnerabilities that have not been repaired by the manufacturer software (bug) to infiltrate and damage a system. For this reason the hackers usually understood divided into two categories: White Hat Hackers, the true hackers and crackers are often referred to as Black Hat Hackers.