Crackers: Difference between revisions
imported>Superpan21 Undo revision 121034 by Superpan21 (talk) |
imported>Mariogoods m "Misanthropes"? |
||
Line 1: | Line 1: | ||
{{stub}}[[File:Images_(4)aaa.jpg|thumb|278px|Crackers unlike hackers, hack into computer systems in order to steal, corrupt, or illegitimately view data.]] | {{stub}} | ||
[[File:Images_(4)aaa.jpg|thumb|278px|Crackers unlike hackers, hack into computer systems in order to steal, corrupt, or illegitimately view data.]] | |||
'''Crackers''' are people who illegally access information on the internet which they usually would not have access to. Although almost all forms of hacking are highly illegal, there is often a distinction made between hackers who perform such actions for what they view as good causes (such as testing security systems or combatting cyber-terrorism) and crackers, those who use it for personal gain (such as stealing accounts, identity theft or in extreme cases trying to gain information on governments/military). | '''Crackers''' are people who illegally access information on the internet which they usually would not have access to. Although almost all forms of hacking are highly illegal, there is often a distinction made between hackers who perform such actions for what they view as good causes (such as testing security systems or combatting cyber-terrorism) and crackers, those who use it for personal gain (such as stealing accounts, identity theft or in extreme cases trying to gain information on governments/military). | ||
Line 6: | Line 7: | ||
[[Category:Internet Related Pages]] | [[Category:Internet Related Pages]] | ||
[[Category:Anarchist]] | [[Category:Anarchist]] | ||
[[Category:Internet Related Page]] | [[Category:Internet Related Page]] |
Revision as of 23:24, 7 June 2020
Crackers are people who illegally access information on the internet which they usually would not have access to. Although almost all forms of hacking are highly illegal, there is often a distinction made between hackers who perform such actions for what they view as good causes (such as testing security systems or combatting cyber-terrorism) and crackers, those who use it for personal gain (such as stealing accounts, identity theft or in extreme cases trying to gain information on governments/military).