Friday, 18 October 2013

5 Depth Hacker


Here are the levels quoted in the hacker world beritaunik.net


5 . LamerThey are people with no experience and knowledge who wants to be a Hacker ( Hacker wanna-be ) . They usually read or heard about Hacker & want to like it . Use their computers mainly to play games , IRC, exchange prirate software , steal credit card . Usually done using software hacking trojan , nuke & DoS . Usually brag via IRC channels etc. . Because many shortcomings to achieve elite , in their development will only be up to the level of developed or script kiddie kiddie .


4 . script KiddieSuch developed kiddie , Script Kiddie usually perform these activities . As well Lamers , they only have the technical knowledge networking is very minimal . Usually can not be separated from the GUI . Hacking is done using horses to frighten and distress of life most Internet users .


3 . developed KiddieThe term is mainly due to the young age group ( ABG ) & still in school . They read about the methods of hacking and how on various occasions . They tried a variety of systems to ultimately succeed and proclaiming victory to another . Generally they are still using the Graph UserInterface ( GUI ) and just learn the basic of UNIX , without being able to find new weaknesses hole in the operating system .


2 . semi EliteHackers are usually younger than the Elite . They also have the ability and extensive knowledge of computers . They understand the operating system ( including holes ) . Usually equipped with a small number of programs sufficient to alter the program exploits . Many of the attacks carried out by hackers who published this caliber , unfortunately by the Elite they are often categorized Lamer .


1 . eliteAlso known as 3l33t , 3l337 , 31337 or a combination of it is the spearhead of the network security industry . They get out in the operating system , able to configure and connect a global network . Capable of programming each day . A very natural grace , they are usually efficient and skilled , using knowledge to the right . They like stealth to enter the system without in the know , although they will not destroy the data . Because they always follow the rules .

0 comments:

Post a Comment