Crackers: Difference between revisions
imported>Eternally Cursed One mNo edit summary |
imported>Eternally Cursed One mNo edit summary |
||
Line 1: | Line 1: | ||
{{ | {{stub}} | ||
{{infobox | {{infobox | ||
Line 8: | Line 8: | ||
|Row 1 info = Cracker | |Row 1 info = Cracker | ||
|Row 2 title = Alias | |Row 2 title = Alias | ||
|Row 2 info = | |Row 2 info = - | ||
|Row 3 title = Occupation | |Row 3 title = Occupation | ||
|Row 3 info = | |Row 3 info = - | ||
|Row 4 title = Skills | |Row 4 title = Skills | ||
|Row 4 info = Cracking networks, writing malicious code | |Row 4 info = Cracking networks, writing malicious code | ||
|Row 5 title = Hobby | |Row 5 title = Hobby | ||
|Row 5 info = | |Row 5 info = - | ||
|Row 6 title = Goals | |Row 6 title = Goals | ||
|Row 6 info = | |Row 6 info = - | ||
|Row 7 title = Type of villain | |Row 7 title = Type of villain | ||
|Row 7 info = | |Row 7 info = Internet criminal | ||
}} | }} | ||
'''Crackers''' are people who illegally access information on the internet which they usually would not have access to. Although almost all forms of hacking are highly legal, there is often a distinction made between hackers who perform such actions for what they view as good causes (such as testing security systems or | '''Crackers''' are people who illegally access information on the internet which they usually would not have access to. Although almost all forms of hacking are highly legal, there is often a distinction made between hackers who perform such actions for what they view as good causes (such as testing security systems or combatting cyber-terrorism) and crackers, those who use it for personal gain (such as stealing accounts, identity theft or in extreme cases trying to gain information on governments/military). | ||
[[Category:Image Needed]] | [[Category:Image Needed]] | ||
[[Category:List]] | [[Category:List]] |
Revision as of 01:52, 7 February 2015
Crackers are people who illegally access information on the internet which they usually would not have access to. Although almost all forms of hacking are highly legal, there is often a distinction made between hackers who perform such actions for what they view as good causes (such as testing security systems or combatting cyber-terrorism) and crackers, those who use it for personal gain (such as stealing accounts, identity theft or in extreme cases trying to gain information on governments/military).