9
Comments
  • 3
    Technically still hacking.
    *Hacking is unauthorized access to device
  • 2
    @IllSlapU So, you're telling me if somehow I got access to a web server, I can go through their database, download it's copy and do whatever the fuck I want, unless I don't change it's actual data, it cannot be called hacking????
  • 2
    @IllSlapU So, what did I say wrong?? Unauthorized access to device, What if I don't need to change anything to get access.

    I mean what if they don't have security measures in mind and I don't have to change its initial form, I'm just letting myself in because I know how to access those server.
  • 0
    @IllSlapU but then again, I'm not authorized. The phrase says "unauthorized"!! So, in order to get unauthorized there must exist an authorization mechanism. Which means if I'm not authorized and accessing the device, that implies I've made modification in code. Hence, Hacking!!
  • 1
    @Aitkotw what you are describing is cracking, not hacking. Almost all "hacking" you see in movies and so on is actually cracking.

    Look at the website hackaday for example, those are hacks. Upgrading 30 year old washing machines with arduinos and that stuff.
  • 1
    @Aitkotw
    For the record, I still think your definition of hacking is the valid way of explaining.
  • 0
    @paranoidAndroid I don't agree with your statement, crackers are often called software hackers, they are script kiddies who uses a third part software to break into system.

    Crackers are also hackers but they use third party app to execute their plan.
  • 1
    @IllSlapU I have 2 different statement for two different situation. One for security based and one without security.

    I am getting tired of this and I think I've already explained my point.

    In your earlier comment you said changing behavior of system or manipulation can be called hacking, whereas I've provided you with avoidance that simply accessing the insecure server can be called hacking. Since, "they don't have any thing to secure" is their biggest security issue.
  • 0
    @IllSlapU the op modified the projector in a very basic way.
  • 0
    @Aitkotw what? You cannot use your personal perception to define language? Script kiddies are script kiddies and also crackers, but vice versa is not true.

    Look: http://faqs.org/rfcs/rfc1392.html/

    Read cracker and hacker. One is about unauthorized access, the other about figuring out how stuff works and "hacking" it.
  • 0
    @paranoidAndroid come on man are we still doing this??
    We'll go nowhere arguing like this. They're people still aging about the term. So, better let them sort it out for us. What do you say??
  • 0
    @Aitkotw woah... Third party software to break software?

    No, try dissembling everything into ASM and going through placing breakpoints, watching actions, looking to change that JNZ short to a JMP short...

    Thats just for a simple nocd, try breaking something more complex with scripts bro
  • 0
    @Aitkotw hm ok, you are right. Let's not over-egg the pudding here.
Add Comment