The World of Hacking

Posted: October 23, 2013 in Articles, Journalism
Tags: , , , ,

There are certain things that happen beyond our control. We may not be able to know, those things we managed are already taken over by someone who are strangers to us. We do not even know what their motives are, but they continue to ruin things that are under our control first. Only to find out, we caught ourselves on the ground, bleeding and dying.

Taking the power over things without permission is what we call hacking. The word hacking has two definitions. First, the first definition refers to the hobby/profession of working with computers. The second definition refers to breaking into computer systems. While the first definition is older and is still used by many computer enthusiasts (who refer to cyber-criminals as “crackers”), the second definition is much more commonly used. In particular, the web pages here refer to “hackers” simply because our web-server logs show that every one who reaches these pages are using the second definition as part of their search criteria.

According to MIT hacker Phil Agre,   hack has only one meaning, an extremely subtle and profound one which defies articulation. Which connotation is implied by a given use of the word depends in similarly profound ways on the context. Similar remarks apply to a couple of other hacker words, most notably random.

Hacking might be characterized as ‘an appropriate application of ingenuity’. Whether the result is a quick-and-dirty patchwork job or a carefully crafted work of art, you have to admire the cleverness that went into it.

An important secondary meaning of hack is ‘a creative practical joke’. This kind of hack is easier to explain to non-hackers than the programming kind. Of course, some hacks have both natures; see the lexicon entries for pseudo and kgbvax.

Because of technological advancement, here are some examples of hacking that happens all over the world. Even before the 20th Century, hacking already exists.

U.S. indicts hackers in biggest cyber fraud case in history. They also disclosed a new security breach against Nasdaq, though they provided few details about the attack.

Other companies targeted by the hackers include a Visa Inc licensee, J.C. Penney Co, JetBlue Airways Corp and French retailer Carrefour SA, according to an indictment unveiled in New Jersey.

Authorities have been pursuing the hackers for years. Many of the breaches were previously reported, though it appeared the one involving Nasdaq OMX Group Inc was being disclosed for the first time.

Prosecutors said they conservatively estimate that the group of five men from Russia and Ukraine helped steal at least 160 million payment card numbers, resulting in losses in excess of $300 million.

Authorities in New Jersey charged that each of the defendants had specialized tasks: Russians Vladimir Drinkman, 32, and Alexandr Kalinin, 26, hacked into networks, while Roman Kotov, 32, mined them for data. They allegedly hid their activities using anonymous web-hosting services provided by Mikhail Rytikov, 26, of Ukraine.

In the Philippines, hackers hacks and counter hacks on Philippines’ government website.               The group Anonymous Philippines defaced numerous local and government websites ahead of the ant-pork barrel protest set today.

At least 32 websites, most of which are of gov.ph names, have been hacked, according to a post by the Anonymous Philippine Cyber Army. The websites that have been hacked were http://intranet.mirdc.dost.gov.ph, http://www.philembassy-rome.net, http://minalin.gov.ph
http://noc.pnp.gov.ph, http://www.osist.dost.gov.ph, http://ntc.gov.ph,  http://mandaluyong.gov.ph, http://cityofsanfernando.gov.ph, http://www.cityofcabuyao.gov.ph
http://scinet.dost.gov.ph/union/Downloads/op.html, http://www.papt.org.ph, http://www.pnppf.org.ph, http://dpcr.pnp.gov.ph, http://pro5.pnp.gov.ph
http://www.socsksargen.da.gov.ph/webtmp, http://tarlacpnp.com/index.html
http://omb.gov.ph, http://braulioedujali.gov.ph/js,http://www.bps.dti.gov.ph/administrator1
http://pascn.pids.gov.ph/images, http://tabuk.gov.ph. http://www.braulioedujali.gov.ph/admin
http://www.nhcp.gov.ph, http://joserizal.nhcp.gov.ph, http://alayatlaya.nhcp.gov.ph, http://www.pikit.gov.ph, http://www.armm.gov.ph, http://www.kwf.gov.ph, http://www.sanjuancity.gov.ph, http://www.talibon-bohol.gov.ph, http://www.peza.gov.ph, and http://www.sra.gov.ph.

Until now, reasons are not definite as to why people are forcing power over things that they do not own. Through the years, experts are theorizing the reason behind hacking. To a hacker, breaking into someone’s computer is simply a challenge. They may not specifically intend to do damage to the computer. The thrill of simply gaining access is often enough. Hackers often try to show off their skills to the world by hacking into government computers, or as revenge against another user or agency. Hackers are indeed as the stereotype depicts them as; young males with a thirst for knowledge. Despite rumours, all hackers do not wear nerdy glasses.

To clearly understand the world of Hacking, there are 4 major types of hackers. They are most identified by their motives as what their intentions are.

First are the pranksters. These hackers are the mischief-makers of the bunch whose intention is merely to be a nuisance. They are the equivalent of individuals who pull fire alarms or make phony bomb threats. Copycat hackers would also fall into this category.

Second are the frame-seekers. This group hacks seeking attention or notoriety. Using a code name, these individuals target high-profile sites such as Yahoo!, eBay, or NASA to achieve bragging rights among their peers.

Third are the Educational hackers. Students justify hacking into systems by saying that they are honing their programming skills.

Lastly are the Criminals. When bank robber Willie Sutton was asked why he robbed banks, he replied: “That’s where the money is.” Stored data or “data at rest” is more profitable to steal than data moving over the Internet. Why steal one credit card number at a time when you can steal tens of thousands to millions with one break-in? This happened to CDUniverse and RealNames. Pacific Bell had to have more than 60,000 customers change their passwords after hackers stole them.

Hacking at the same time can be seen in many different ways. Here is the list and elaboration of the types of hacking to give you an idea. You might not know, you are already hacking.

The first type is the Website Hacking. Website hacking is a type of hacking which focuses in vulnerable loopholes. One of its major activity is to collapse the information in your computer. It also has the ability to make changes on the date you already encoded on your file.

The second type is the E-mail hacking. As we all know e-mail means electronic mail which we use in sending and receiving files through the internet. Yes, e-mails as well can be hacked. E-mails that store business data and private information can as well be taken over by the hacker. This is one kind of hacking that serious precautions are not taken.

The next type of hacking is the computer hacking. This type of hacking steals the information you have in your computer. This enables you to access other person’s file as well.

Online banking hacking is also one of the types. In this aspects, hackers create fake websites. They clone the website but the admins are the hackers which give them the access of every individual’s bank accounts.

Now, who said that hacking is not rampant? Hacking is just around the corner and it’s up to the person whether his/her conscience can afford of doing so. Yes, hacking can give you many advantages but lot of persons will be affected of such wrongdoing. At the end, producing your own work without hurting anyone is greater than to have a productive work leaving many people behind.

That’s what matters most.

References:

http://www.philstar.com/headlines/2013/08/26/1136651/govt-websites-hacked-ahead-anti-pork-protest

http://www.slideshare.net/SHERALI445/types-of-hacking

https://www.google.com.ph/?gws_rd=cr&ei=ADdnUuHYIYj8rAfB94H4CQ#q=hacking+news+in+the+philippines

http://ethics.csc.ncsu.edu/abuse/hacking/study.php

http://ethics.csc.ncsu.edu/abuse/hacking/study.php

http://www.thefreedictionary.com/Website+Hacking

http://www.iss.net/security_center/advice/Underground/Hacking/default.htm

http://www.reuters.com/article/2013/07/25/us-usa-hackers-creditcardsidUSBRE96O0RI20 130725

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s