Hacker comes from the English verb hack, which means "chop, chop" and is extended to "do it beautifully". In the early campus slang of MIT, "hacker" means "prank", especially a clever and skillful prank. In Japan's new hacker dictionary, hackers are defined as "people who like to explore the mysteries of software programs and grow their personal talents from them." Unlike most computer users, they only know a small part of the knowledge specified by others. " From these definitions, we still can't see the meaning of being too derogatory. They usually have advanced hardware and software knowledge and the ability to analyze systems through innovative methods. Hackers can make more networks more perfect and secure. They aim to protect the network and find network vulnerabilities through improper intrusion.
Another type of intruder is someone who uses network vulnerabilities to destroy the network. They often do repetitive work (such as brute force cracking passwords), and they also have extensive computer knowledge, but unlike hackers, their purpose is to destroy. These groups become "hackers". Of course, there is also a class of people who are between hackers and intruders.
It is generally believed that hackers originated in the laboratory of Massachusetts Institute of Technology in 1950s. They are full of energy and keen to solve problems. In the sixties and seventies, the word "hacker" was very meaningful. It was used to refer to computer addicts who thought independently and obeyed the law. They are super intelligent and devoted to computer research. Hacking activity means exploring the maximum potential of computers intellectually freely, which has made great contributions to the development of computer technology. It is these hackers who initiated a personal computer revolution and the current open computer architecture, which broke the previous situation that computer technology was only in the hands of a few people, created personal computers, and put forward the view that "computers serve the people." They are heroes in the history of computer development. At present, the basic techniques used by hackers to invade computer systems, such as password cracking, trap door, back door and Trojan horse, were invented during this period. The experience of hacking has become an indispensable part of the resumes of many computer giants. For example, Steve Jobs, one of the founders of Apple, is a typical example.
In the 1960s, the use of computers was far from universal, and there were few databases for storing important information, not to mention hackers illegally copying data. In the 1980s and 1990s, computers became more and more important, and there were more and more large databases. At the same time, information is increasingly concentrated in the hands of a few people. This "enclosure movement" in the new era has aroused great resentment from hackers. Hackers believe that information should be shared and not monopolized by a few people, so they turn their attention to information databases involving all kinds of secrets. At this time, the computerized space has been privatized and has become a property owned by individuals. Society can no longer turn a blind eye to hacking, but must take action to control it by legal means. Hacking activities have been dealt an unprecedented blow.
However, the government and company managers are increasingly asking hackers to teach them computer security knowledge. Many companies and government agencies invite hackers to check the security of their systems, and even ask them to design new security programs. After two hackers discovered the flaws in the credit card shopping program designed by Netscape and made an announcement to the business community, Netscape corrected these flaws and announced that it would hold a contest called "Netscape Defect Grand Prix". Those hackers who discover and discover the security vulnerabilities of the company's products will receive a bonus of $65,438+$0,000. There is no doubt that hackers are making contributions to the development of computer protection technology.