كراكر
هذاالموضوع هوجزء من سلسلة عن: قرصنة الحاسوب | |
---|---|
Hobbyist hacker Technology hacker Hacker programmer | |
Hacking in computer security | |
أمن الحاسب Computer insecurity أمن الشبكات | |
التاريخ | |
Phreaking | |
Hacker ethic | |
قبعة سوداء, رمادية, بيضاء Hacker Manifesto | |
Cybercrime | |
جريمة حاسب List of convicted computer criminals Script kiddie | |
Hacking tools | |
Vulnerability Exploit Payload | |
برامج أمن الحاسب | |
تطلق حدثة كراكر Cracker على من يملك مهارات الهاكر ويستخدم مهارته في الامور غير القانونية, مثل كسر حماية البرامج واختراق الانظمة والشبكات.
Hacking and the media
Hacker magazines
The most notable hacker-oriented print publications are Phrack, Hakin9 and 2600: The Hacker Quarterly. While the information contained in hacker magazines and ezines was often outdated by the time they were published, they enhanced their contributors' reputations by documenting their successes.
Hackers in fiction
Hackers often show an interest in fictional cyberpunk and cyberculture literature and movies. The adoption of fictional pseudonyms, symbols, values and metaphors from these works is very common.
Books
- The cyberpunk novels of William Gibson—especially the Sprawl trilogy—are very popular with hackers.
- Helba from the .hack manga and anime series
- Merlin of Amber, the protagonist of the second series in The Chronicles of Amber by Roger Zelazny, is a young immortal hacker-mage prince who has the ability to traverse shadow dimensions.
- Lisbeth Salander in The Girl with the Dragon Tattoo by Stieg Larsson
- Alice from Heaven's Memo Pad
- Ender's Game by Orson Scott Card
- Evil Genius by Catherine Jinks
- (anthology) by Jack Dann and Gardner Dozois
- Little Brother by Cory Doctorow
- Neuromancer by William Gibson
- Snow Crash by Neal Stephenson
Films
- Antitrust
- Blackhat
- Cypher
- Eagle Eye
- Enemy of the State
- Firewall
- Girl With The Dragon Tattoo
- Hackers
- Live Free or Die Hard
- series
- The Net
- The Net 2.0
- Pirates of Silicon Valley
- Skyfall
- Sneakers
- Swordfish
- Take Down
- Tron
- Tron: Legacy
- Untraceable
- WarGames
- Weird Science
- The Fifth Estate
- Who Am I – No System Is Safe (film)
Non-fiction books
- The Art of Deception by Kevin Mitnick
- The Art of Intrusion by Kevin Mitnick
- The Cuckoo's Egg by Clifford Stoll
- Ghost in the Wires: My Adventures as the World's Most Wanted Hacker by Kevin Mitnick
- The Hacker Crackdown by Bruce Sterling
- The Hacker's Handbook by Hugo Cornwall (Peter Sommer)
- Hacking: The Art of Exploitation Second Edition by Jon Erickson
- Out of the Inner Circle by Bill Landreth and Howard Rheingold
- Underground by Suelette Dreyfus
See also
- Cracking of wireless networks
- Cyber spying
- Cyber Storm Exercise
- Cybercrime
- Hacker culture
- Hacker (expert)
- Hacker Manifesto
- IT risk
- Mathematical beauty
- Metasploit Project
- Penetration test
- Technology assessment
- Vulnerability (computing)
الهامش
- ^ Thomas, Douglas (2003). Hacker Culture. University of Minnesota Press. p. 90. ISBN .
- ^ Swabey, Pete (27 February 2013). "Data leaked by Anonymous appears to reveal Bank of America's hacker profiling operation". Information Age. Retrieved 21 February 2014.
- ^ "Hackers and Viruses: Questions and Answers". Scienzagiovane. University of Bologna. 12 November 2012. Retrieved 21 February 2014.
-
^ Staples, Brent (May 11, 2003). "A Prince of Cyberpunk Fiction Moves Into the Mainstream". The New York Times.
Mr. Gibson's novels and short stories are worshiped by hackers
للاستزادة
- Apro, Bill; Hammond, Graeme (2005). Hackers: The Hunt for Australia's Most Infamous Computer Cracker. Rowville, Vic: Five Mile Press. ISBN .
- Beaver, Kevin (2010). . Hoboken, NJ: Wiley Pub. ISBN .
- Conway, Richard; Cordingley, Julian (2004). Code Hacking: A Developer's Guide to Network Security. Hingham, Mass: Charles River Media. ISBN .
- Freeman, David H.; Mann, Charles C. (1997). At Large: The Strange Case of the World's Biggest Internet Invasion. New York: Simon & Schuster. ISBN .
- Granville, Johanna (Winter 2003). "Dot.Con: The Dangers of Cyber Crime and a Call for Proactive Solutions". Australian Journal of Politics and History. 49 (1): 102–109. doi:10.1111/1467-8497.00284. Retrieved 20 February 2014.
- Gregg, Michael (2006). Certified Ethical Hacker. Indianapolis, Ind: Que Certification. ISBN .
- Hafner, Katie; Markoff, John (1991). Cyberpunk: Outlaws and Hackers on the Computer Frontier. New York: Simon & Schuster. ISBN .
- Harper, Allen; Harris, Shon; Ness, Jonathan (2011). (3rd ed.). New York: McGraw-Hill. ISBN .
- McClure, Stuart; Scambray, Joel; Kurtz, George (1999). Hacking Exposed: Network Security Secrets and Solutions. Berkeley, Calif: Mcgraw-Hill. ISBN .
- Russell, Ryan (2004). Stealing the Network: How to Own a Continent. Rockland, Mass: Syngress Media. ISBN .
- Taylor, Paul A. (1999). Hackers: Crime in the Digital Sublime. London: Routledge. ISBN .
وصلات خارجية
- CNN Tech PCWorld Staff (November 2001). Timeline: A 40-year history of hacking from 1960 to 2001
- Can Hackers Be Heroes? Video produced by Off Book (web series)