Posted 9 years ago
Sapphire wrote:Woolve wrote:Don Von Free Credits wrote:So many people do not understand the difference between a h4(k3r, cracker, phisher, scammer, bot user, and system abuser...the problem is i am one of those persons :Ois there any thread? i fnot someone should make one h4(k3r - A programmer for whom computing is its own reward; may enjoy the challenge of breaking into other computers but does no harm; "true #@©ɮ£Я§ subscribe to a code of ethics and look down upon crackers"Cracker - a programmer who cracks (gains unauthorized access to) computers, typically to do malicious things; "crackers are often mistakenly called #@©ɮ£Я§"Phisher - In the field of computer security, phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication.System abuse - Evil or corrupt usage; abuse; wrong; reproach; deception; cheat. <---- Well, that's not clear enough but it makes up the point.Scammer - A person who swindles you by means of deception or fraudBots - Internet bots, also known as web robots, WWW robots or simply bots, are software applications that run automated tasks over the Internet. Typically, bots perform tasks that are both simple and structurally repetitive, at a much higher rate than would be possible for a human alone. The largest use of bots is in web spidering, in which an automated script fetches, analyzes and files information from web servers at many times the speed of a human. Each server can have a file called robots.txt, containing rules for the spidering of that server that the bot is supposed to obey.• There are malicious bots (and botnets) of the following types:1. Spambots that harvest email addresses from internet forums, contact forms or guestbook pages2. Downloader programs that suck bandwidth by downloading entire web sites3. Web site scrapers that grab the content of web sites and re-use it without permission on automatically generated doorway pages4. Viruses and worms5. DDoS attacks6. Botnets / zombie computers; etc.7. File-name modifiers on peer-to-peer file-sharing networks. These change the names of files (often containing malware) to match user search queries.8. Automating the entry of internet sweepstakes or instant win games to get an advantage9. Automating tasks on promotional web sites to win prizes10. votebots which automatically cast votes for or againsts certain forms of user-contributed content such as videos on youtube or reader comments on blog pages.I hope that enlightened you. ^~^
Thank you so much! Very well said....thanks for finding time to enlighten us with this topic...