Archive for April, 2015


Monday, April 27th, 2015

One could think that this word is closely related to the repetitive nature of access attempts. In addition, once access has been achieved, sometimes illicit accounts shared with other partners, calling it "fresh." Here is the stereotypical vision of the media of a young hackers less than twenty years, with knowledge of computer, glued to the keyboard of your computer, always looking for an account is not used or a weak point in security system . Although this vision is not very accurate, fairly representative of the appearance of the term. The second dimension of that term is concerned with what happens once they have gained access to the system when it has achieved a password. As the system is being used without authorization, the hacker does not usually have the general terms, access to operating manuals and other resources available to legitimate users of the system. Therefore, the user experiences with command structures and explore files for the use that is given to the system. In opposition to the first aspect of the term, is not just here to access the system (although some may be looking for more restricted access levels), but to learn more about the general operation of the system.

Contrary to what the media think, most hackers do not intentionally destroy and not damage the data. Doing so would go against his intention to mix with normal user and draw attention to their presence, making the account used to be erased. After spending a substantial time in getting the account, the hacker places a high priority for their use is not found.