[lug] Hacker story in the Denver Post
Patty Laushman
patty at theuptimegroup.com
Thu Dec 9 15:45:55 MST 2004
> Lori Reed wrote:
>
>> ... Have you ever seen a journalist for a major non-technical publication
>> use the term "cracker" correctly?
>
> The article defined "cracker" thusly:
>
> "...a "cracker," or a hacker with criminal motives,..."
>
> That's long been my basic understanding of the word.
>
> Or are you referring to good old southern white boys? :)
LOL! No, I mean he really used it correctly. The definition, from
www.dictionary.com, which I know all of you wil enjoy, is thus:
cracker
<jargon> An individual who attempts to gain unauthorised access to a
computer system. These individuals are often malicious and have many means
at their disposal for breaking into a system. The term was coined ca. 1985
by hackers in defence against journalistic misuse of "hacker". An earlier
attempt to establish "worm" in this sense around 1981--82 on Usenet was
largely a failure.
Use of both these neologisms reflects a strong revulsion against the theft
and vandalism perpetrated by cracking rings. The neologism "cracker" in this
sense may have been influenced not so much by the term "safe-cracker" as by
the non-jargon term "cracker", which in Middle English meant an obnoxious
person (e.g., "What cracker is this same that deafs our ears / With this
abundance of superfluous breath?" -- Shakespeare's King John, Act II, Scene
I) and in modern colloquial American English survives as a barely gentler
synonym for "white trash".
While it is expected that any real hacker will have done some playful
cracking and knows many of the basic techniques, anyone past larval stage is
expected to have outgrown the desire to do so except for immediate practical
reasons (for example, if it's necessary to get around some security in order
to get some work done).
Contrary to widespread myth, cracking does not usually involve some
mysterious leap of hackerly brilliance, but rather persistence and the
dogged repetition of a handful of fairly well-known tricks that exploit
common weaknesses in the security of target systems. Accordingly, most
crackers are only mediocre hackers.
Thus, there is far less overlap between hackerdom and crackerdom than the
mundane reader misled by sensationalistic journalism might expect. Crackers
tend to
gather in small, tight-knit, very secretive groups that have little overlap
with the huge, open hacker poly-culture; though crackers often like to
describe *themselves* as hackers, most true hackers consider them a separate
and lower form of life, little better than virus writers. Ethical
considerations aside, hackers figure that anyone who can't imagine a more
interesting way to play with their computers than breaking into someone
else's has to be pretty losing.
See also Computer Emergency Response Team, dark-side, hacker, hacker ethic,
phreaking, samurai, Trojan Horse.
---------------------------------------
Patty Laushman
President
(303) 757-4611, Ext. 404
---------------------------------------
The Uptime Group, Inc.
"Integrating the best of traditional and open source technology"
More information about the LUG
mailing list