Current location - Education and Training Encyclopedia - Resume - What is a hacker and its origin?
What is a hacker and its origin?
Hacker is a Chinese word, and the corresponding Chinese word in Taiwan Province Province is hacker, both of which are derived from English hacker. Chinese usage habits in different regions have caused differences in translation, and similar situations include "blog" and "blog, blog". And the movie "Hacker" produced by the program center of movie channel 20 12 also began to use the word "hacker", which shows the convergence of China people's usage habits. In fact, the meanings of hacker, hacker, Cracker and other English original texts cannot be completely translated, which is the difference formed in the respective development of Chinese and English vocabulary. The word hacker originally refers to computer experts, especially programmers, who are enthusiastic about computer technology and have a high level. Gradually divided into white hat, gray hat and black hat, of which black hat is actually cracker. Today, the word "hacker" has been used to refer to those who use computer networks to sabotage or play pranks. The correct English name of these people is Cracker. In media reports, the word hacker often refers to those who crack software. The antonym of hacker is honker.

It is generally believed that hackers originated in the laboratory of Massachusetts Institute of Technology in 1950s. They are full of energy and keen to solve problems. In the sixties and seventies, the word "hacker" was very meaningful. It was used to refer to computer addicts who thought independently and obeyed the law. They are super intelligent and devoted to computer research. Hacking activity means exploring the maximum potential of computers intellectually freely, which has made great contributions to the development of computer technology. It is these hackers who initiated a personal computer revolution and the current open computer architecture, which broke the previous situation that computer technology was only in the hands of a few people, created personal computers, and put forward the view that "computers serve the people." They are heroes in the history of computer development. At present, the basic techniques used by hackers to invade computer systems, such as password cracking, trap door, back door and Trojan horse, were invented during this period. The experience of hacking has become an indispensable part of the resumes of many computer giants. For example, Steve Jobs, one of the founders of Apple, is a typical example.

In the 1960s, the use of computers was far from universal, and there were not many databases for storing important information, not to mention hackers illegally copying data. In the 1980s and 1990s, computers became more and more important, and there were more and more large databases. At the same time, information is increasingly concentrated in the hands of a few people. This "enclosure movement" in the new era has aroused great resentment from hackers. Hackers believe that information should be shared and cannot be monopolized by a few people, so they turn their attention to information databases involving various secrets. At this time, the computerized space has been privatized and has become a property owned by individuals. Society can no longer turn a blind eye to hacking, but must take action to control it by legal means. Hacking activities have been dealt an unprecedented blow.

However, the government and company managers are increasingly asking hackers to teach them computer security knowledge. Many companies and government agencies invite hackers to check the security of their systems, and even ask them to design new security programs. After two hackers discovered the flaws in the credit card shopping program designed by Netscape and made an announcement to the business community, Netscape corrected these flaws and announced that it would hold a contest called "Netscape Defect Grand Prix". Those hackers who discover and discover the security vulnerabilities of the company's products will receive a bonus of $65,438+$0,000. There is no doubt that hackers are making contributions to the development of computer protection technology.

I hope I can help you, thank you!