imported>Eternally Cursed One
mNo edit summary
imported>Eternally Cursed One
mNo edit summary
Line 1: Line 1:
{{Stub}}
{{stub}}


{{infobox
{{infobox
Line 8: Line 8:
|Row 1 info  = Cracker
|Row 1 info  = Cracker
|Row 2 title  = Alias
|Row 2 title  = Alias
|Row 2 info  =  
|Row 2 info  = -
|Row 3 title  = Occupation
|Row 3 title  = Occupation
|Row 3 info  =  
|Row 3 info  = -
|Row 4 title  = Skills
|Row 4 title  = Skills
|Row 4 info  = Cracking networks, writing malicious code
|Row 4 info  = Cracking networks, writing malicious code
|Row 5 title  = Hobby
|Row 5 title  = Hobby
|Row 5 info  =  
|Row 5 info  = -
|Row 6 title  = Goals
|Row 6 title  = Goals
|Row 6 info  =
|Row 6 info  = -
|Row 7 title  = Type of villain
|Row 7 title  = Type of villain
|Row 7 info  =  
|Row 7 info  = Internet criminal
}}
}}


'''Crackers''' are people who illegally access information on the internet which they usually would not have access to. Although almost all forms of hacking are highly legal, there is often a distinction made between hackers who perform such actions for what they view as good causes (such as testing security systems or combating cyber-terrorism) and crackers, those who use it for personal gain (such as stealing accounts, identity theft or in extreme cases trying to gain information on governments/military).
'''Crackers''' are people who illegally access information on the internet which they usually would not have access to. Although almost all forms of hacking are highly legal, there is often a distinction made between hackers who perform such actions for what they view as good causes (such as testing security systems or combatting cyber-terrorism) and crackers, those who use it for personal gain (such as stealing accounts, identity theft or in extreme cases trying to gain information on governments/military).
 
[[Category:Image Needed]]
[[Category:Image Needed]]
[[Category:List]]
[[Category:List]]

Revision as of 01:52, 7 February 2015


Crackers are people who illegally access information on the internet which they usually would not have access to. Although almost all forms of hacking are highly legal, there is often a distinction made between hackers who perform such actions for what they view as good causes (such as testing security systems or combatting cyber-terrorism) and crackers, those who use it for personal gain (such as stealing accounts, identity theft or in extreme cases trying to gain information on governments/military).