Understand about Hackers

3 August 2011 | In Tips | 3,2 thousand views | By

Click & share: 

hacker hackers hacked hacking h4ck0rz

The term "hacker" is being widely used, but after all, where does this term and what it really means?.

The term "hacker", Today synonymous with invaders of e-mail systems and websites – comes from the years 50 and 60, When a "hack" was just an inspired solution to any problem or elegant.

At the Massachusetts Institute of Technology (MIT), where the word would have arisen, the first "hacks" were hoaxes, jokes. Over time, o termo ficou associado a programadores de computer. For the pioneers, a "hack" was a feat of programming and the effects of these were much admired by combining specific knowledge and creative instinct.

The first generation of hackers was formed by boys who move in the network of phones, se infiltravam nos primeiros sistemas de computers e se gabavam de seus feitos em murais. As the sophistication of computer hackers was increasing, they began to enter the radar of police and of the judiciary.

Something curious about them (hackers) is that they are mainly young men and teenagers. The reason for this was explained in a book about the first groups of hackers, written by fiction records Bruce Sterling. According to him, young men often feel unable to, powerless. The thorough knowledge of a technical subject gives them power, even on machines.

Today the term "hacker" has been used, wrongly and offensive to the real "hackers", in order to designate ciberpiratas and malicious programmers that invade computers with intent to violate an illegal or unscrupulously cyber systems, that actually would be the "Cracker". There are several types of "hackers", as you can see at the end of this article, among them are the "White hat" (-English “white hat”),ethical hacker, and indicates a programmer interested in security, they usually work in securities companies, or as it is believed that in China and Russia many of these "hackers" probably working as government agents.

Caution, o aumento desta prática não deve ser atribuído à melhor qualidade das aulas de computação nas escolas ou ao maior empenho de jovens interessados em technology.

Types of Hackers (Source:

White hat

White hat (ethical hacker), comes from English “white hat” and indicates a hacker interested in security. Uses its expertise in exploration and design errors detection, within the law. The typical attitude of awhite hat Once you find security holes is to come into contact with those responsible for the system and inform about the error, to ensure that measures are taken. A white hat can be likened to a policeman or guard, looking for faults to fix them. Find hackers white hats ministering lectures (or classes at universities) about systems security, and even working within companies to ensure data security. Because of the pejorative sense that the term Media Associates “hacker”, normally the white hat hacker is not publicly known hacker but it specialist,system analyst or another position in the information technology area. However, really are hackers.

Gray hat

Gray hat – Have the skills and intentions of a white hat hacker in most cases, but sometimes uses his knowledge to less noble purposes. A grey Hat hacker can be described as a white hat hacker who sometimes wears a black hat to fulfill his own agenda. Grey Hat Hackers typically fall into another type of ethics, It claims to be acceptable since the systems penetrate hacker don't make theft, vandalism or violates the confidentiality. Some argue, However, that the Act of penetrating a system itself is unethical (hacker ethic).

Black hat

Black hat, (cracker ordark-side hacker), indicates a malicious or criminal hacker, comparable to a terrorist. In general they are abusive or rebellious profile, very well described by the term “hacker of the dark side” (an analogy to the Star Wars film series). Generally specialized in silent and malicious intrusions, are hackers that have no ethics.


Newbie or the symbol NB, comes from English “Newbie”. Indicates a person's apprentice in the area, even without a lot of skill, but has a remarkable thirst for knowledge. Very question, mas freqüentemente é ignorado ou ridicularizado por other novatos que já saibam mais do que ele (Unlike the lammers which are ridiculed by everyone). Experienced Hackers usually do not ridicule the newbies, out of respect for the desire to learn – However, can ignore them due to lack of time or patience.


The termLamer orLammer indicates a person who believes it is a hacker (Descrambler), shows great arrogance, However know little or very little and is generally malicious. Using tools created by Crackers to demonstrate its supposed ability or power, in order to compete for reputation, However are extremely inconvenient for social conviviality, same with other hackers. Some people believe that this is a natural phase of learning, especially when the knowledge comes before maturity. Lamer ’ s usually attack co-workers or classmates study, always with less learning, and they terrorize, increasing the arrogance of lamer.

Other terms


The termPhreaking, corruption of English “freak” that means “maluco”, essentially means the same thing as the original “hacker”, However is a Descrambler applied to telephony area(fixed or mobile). In current usage, It is understood that an attacker modifies computers, and a Phreaking modifies phones(experimente discar no seu telefone batendo sucessivas vezes no gancho ao invés de usar o keyboard do aparelho, and you're being a phreaking). The Phreakers also fit with the concept of White hat or Black hat.


The termCracker, -English “cracker”, originally meant someone who “Jigsaw” systems. Nowadays, can both mean someone who breaks security systems in order to obtain personal benefit (as for example modify a program so that it does not need to be paid), How can also be a generic term for a Black Hat.

Webdesigner, Técnico em Hardware, Técnico em Mecatrônica e estudante de Medicina.

A bit about us

    The Group generally appeared in Tips 2007 from innovative ideas on troubleshooting problems faced daily by those who use the technology and computer science, both ordinary users and technicians. But where did, why and what is the purpose of this site?

Click here to read!

Siga o Dicas em Geral no Google+

Video of the week