5 Levels of the World Hacker

Bookmark and Share
1. Lamer:
They are people without experience and knowledge who want to be a Hacker (Hacker wanna-be). They usually read or heard of Hacker & wanted to like it. Use of their computers mainly to play games, IRC, exchange prirate software, steal credit card. Usually done using a software hacking trojan, DoS nuke. Usually brag on IRC channel etc.. Because many shortcomings to achieve the elite, in their development will only be up to the level of developed or script kiddie kiddie course.
2. Script Kiddie:
As developed kiddie, Script Kiddie usually do the activity above. As well as Lamers, they only have technical knowledge of networking is very minimal. Usually can not be separated from the GUI. Hacking carried out using a trojan to scare and lived most troublesome Internet users.

3. Developed Kiddie:
The term is mainly due to young age group (ABG) and still in school. They read about the method of hacking and how on various occasions. They tried a variety of systems to ultimately succeed and proclaiming victory to another. Generally, they are still using the Graph UserInterface (GUI) and just learn the basic of Unix, without being able to find a new hole in the operating system weaknesses.
4. Semi Elite
Hackers are usually younger than the Elite. They also have the ability and extensive knowledge of computers. They understand the operating system (including holes). Usually equipped with a small amount is enough to change the program exploits program. Many published attacks by hackers this caliber, the Elite unfortunately they are often categorized Lamer.
5. Elite
Also known as 3l33t, 3l337, 31 337, or a combination of it; is spearheading the network security industry. They understood outside of the operating system, able to configure and connect a global network. Capable of programming each day. A very natural gift, they are usually efficient and skilled, to use his knowledge to the right. They're like stealth to enter the system without the know, although they will not destroy data. Because they always follow the rules.
Source : Taken from any sources

{ 0 comments... Views All / Send Comment! }

Post a Comment