Saturday 28 December 2013

The art of hacking

Hackers are not only deal with business profit or politic issues but they also take part in art and design and to see whether the hacker will use this creative field to help the society or not. In this post, the topic will more focus about the aesthetic part of hacking in form of art and design.According to (Charlie Gere 2008:197) who wrote the book Digital Culture, he claimed that hacking is the form of symbolic and aesthetic resistance found another kind of expression in the 90's when they begin to exploit computer networks as the locus of new form of avant-garde art practice.

VNS Matrix:
is group artists emerged from the cyberswamp where organized by four Australian (Francesca da Rimini, Virginia Barrette,Julieanne Pierce and Josie Starrs) and their purpose is redefined the role and image of women in technology and art as before that women are claimed that they are underrepresented on the maker and user of computer technology and yet the Internet are depicted as object as fetishistic stereotype of femininity. So, the term " Cyberfeminism" is brought out in early 1990's.
One of their project:

All New Gen
All New Gen by VNS Matrix
Female is able get into cyberspace and hack into the controls
and databanks of Big Daddy Frame. This is aimed to sow the
seed of New World Disorder and end the rule of phallic power.
[According to audio english.org, phallic is referred to male organ of
copulation as embodiment of generative power] Therefore, in this context
phallic power is meant male  power. Their well designed interface
already acknowledge the role of gender in technology as well as
made up the topic of Feminism.






Therefore, in that time VNS Matrix is much like hero for the female or women where the people in the society have stereotyped that women are not able to generate idea in computer technology or cyber world but the group of artists from the cyberswamp make use of art and design to build stronger and active reputation of feminity among the society. Their expression through out the feminism toward the society was given huge impact to people.

Art Hack Day
is an event dedicated to the process of art making towards the open source technologies. It is also an exploration the nature of technology and bring together the hackers whose medium is art and artist whose medium is technology. The visitors are also encouraged to interact with the project online throughout the hack.

This event has the ability to affect the social change for public good trough potential of the beauty combination of technology and art.Through this event,it is not only gather the hackers but also gather all their knowledge to brings out the new creations that benefit the society. They can use their knowledges and brilliant ideas in the right track.

                                                                  Art Hack Day
                                                  Video link:http://www.arthackday.net/events/hackers-as-artists
                                           

References link:
Gere,C.(2008) Digital Culture.London.Reaktion Books Ltd.

Media Art Net (1995) VNS Matrix: All New Gen. Available at: http://www.medienkunstnetz.de/works/all-new-gen/ [Accessed 28/12/2013]

AudioEnglish.org (2013) What does phallic mean? Available at: http://www.audioenglish.org/dictionary/phallic.htm [Accessed 28/12/2013]

Art Hack Day (2013) Hackers As Artists. Available at http://www.arthackday.net/events/hackers-as-artists 
[Accessed 28/12/2013]



Sunday 22 December 2013

Famous Hackers

There are many hackers in this world but who is the person who plays the roles of Hero which giving a helping hand and yet who is the hacker that harms to society.According to Jacob Silverman on Discovery Communication (2013), he has mentioned that the term of hacker now is defined where anyone who breaks into computer network and often carries out negative connotation. Some have broken the law but also some have gone on productive roles in computer industry which is legally.
Image of Kevin Mitnick
Image link:blogs.voxeo.com

Jacob Silverman has discovered some famous hackers:
Kevin Mitnick 
He is accused in break the law and become target of FBI manhunts during his hacking. He was jailed in 1998 and the second time was from 1995-2000. He was also not allowed to use internet for three years but only managed to send or received e-mail. He then has been subject to several books including 'Takedown' which became a movie and screen on cinema.
                                                                  
                                                                                     


Adrian Lamo
Image of Adrian Lamo
image link:www.huffingtonpost.co.uk
He is known as "The homeless hacker" as he sometimes works in abandoned building.Adrian Lamo has hack into famous organisations such as Google, Microsoft, Yahoo, and MCI WorldCom but he is not hack for personal benefit where he has contacted the companies and report about the problem of security holes and he also helps them to fix the problem without any compensation. He is one the example of White Hat Hacker. In recent years, he was in the news about report Bardley Manning to police. ( According to Julia Tate(1996-2013)  has stated in National Security that Pfc. Bradley Manning judged 35years in prison which he faces his most serious charges---aiding the enemy for leaking hundreds of thousands of classified document to the anti-secrecy group Wikileaks). Adrian Lamo also diagnosed Asperger in April 2010
What is Asperger?
According to The National Autistic Society, Asperger Syndrome is a form of autism which is a lifelong disabilities that affects how a person makes sense of the world, processes information and relates to other people.


                                          
                                                                               
                                                               
Robert Tappan Morris
He is professor at MIT Computer Science and Artificial Intelligence Laboratory but before that he is claimed   
as the computer world's most renowned hacker. He released first computer 'worm', or known as virus to 6000 computer and caused a serious damage on them. He is not done it purposely so convicted under act as he not intend to cause the damage.

Image of Robert Tappan MorrisImage link: pdos.csail.mit.edu
Kevin Poulsen
He was hunted by FBI but eventually he went straight and giving up hacking but he has working as journalist and has positioned as senior editor at Wired Magazine. He often writes the stuff about hacker.He is also in charge with Kingpin where he wrote his unmatched access and expertise in the book form and gripping cat and mouse narrative and also unprecedented view into 21st century signature of organised cybercrime. It also traces of this new generation of for-profit hacker wreaking havoc on internet today- a breed of professional computer outlaws far remove from the teenager who come with the word "hacker".  




Image of Kevin Pouls
Image Linkwww.wired.com
Image of Kingpin
Image link:http://kingpin.cc/
DEF CON
Is organised in 1993 which a party for member of Platinum Net, a Fido protocol based hacking network out of Canada.It has been one of the world's largest gathering of hackers. The event featured lectures, hacking contest and etc.There are also many well known hackers and computer security specialist attended this event. 

                                                                                     Official page of DEF CON 
                                                                                     link: www.pearltrees.com 
                                                           Video:The story of DEF CON
                                            link:http://www.youtube.com/watch?v=lg6bQMTjHCE

References link:
Silverman,J.(2013) 10 Famous Hackers and Hack.Discovery Communication, LLC. Available at:http://dsc.discovery.com/tv-shows/curiosity/topics/10-famous-hackers-hacks.htm [Accessed 22 December 2013]

DEF CON Communication, Inc. (1996-2013) What is DEC FON? Available at:http://www.defcon.org/html/links/dc-about.html [Accessed 22 December 2013]

Sterling, B. (2011) Wired: Kingpin by Kevin Poulsen. Available at: http://www.wired.com/beyond_the_beyond/2011/02/kingpin-by-kevin-poulsen/ 
[Accessed 22 December 2013]

The National Autistic Society (2013) What is Asperger Syndrome? Available at:http://www.autism.org.uk/about-autism/autism-and-asperger-syndrome-an-introduction/what-is-asperger-syndrome.aspx [Accessed 22 December 2013]

Tate, J. (2013) National Security: Judge sentences Bradley Manning to 35 years. Available at:http://www.washingtonpost.com/world/national-security/judge-to-sentence-bradley-manning-today/2013/08/20/85bee184-09d0-11e3-b87c-476db8ac34cd_story.html [Accessed 22 December 2013]

The story of DEC FON (2007) Directed by help net security. Available at: http://www.youtube.com/watch?v=lg6bQMTjHCE [Accessed 22 December 2013]


                                         



Friday 13 December 2013

Types of Hackers

In Hackers' world, they can be defined in different type of colors hat hacker. Usually, what we know about hackers is white hat hacker or black hat hacker. According to Urban Dictionary (1999-2013), there are definitions about different types of hackers.

Green Hat Hacker
-is for new hacker who just started to join in hacking where they show their desire to learn about hacking.
 The word ' Green' is meant fresh, new and inexperienced.

Blue Hat Hacker
-is hacker who hack for fun or to get revenge to certain people where they make the hacker angry.
 They are not care about hacking so much.

Red Hat Hacker
-person who more aggressive under Government Agency who hack into other Computer Mainframes of
 other Government to disabling or crippling them.

Gray Hat Hacker
-is hacker who hybrid in between black hat hacker and white hat hacker.They might be helpful but also
 will bring harm to society.

so, who are the two main important roles of hackers? what are the roles?

White Hat Hacker
According to PC magazine's Encyclopedia, people who break into a computer system and inform the company that they have done so is known as white hat hacker.They are more concerned about either employees or security professionals who are paid to check anything go wrong the system.They are doing their work in proper way

Black Hat Hacker
According to PC magazine's Encyclopedia, a guy who breaks into computer system with purpose
of inflicting damage or stealing the private and important data of a person or company is known as black hat hacker.Their act is illegal and against the law.

Based on the The New Yorker,(2012) David Kushner has mentioned that the number of black hat hacker is rising where the Department of Homeland Security, US has reported a spike which the number of black hat hacker has reached fifty thousand between October and March. It already up ten thousand same from the period of last year. This sure not a good sign where the world now is attacked by them and causing the chaos.

References link:
Urban Dictionary (1999-2013) Types of Hackers. Available at: http://www.urbandictionary.com/define.php?term=Types%20of%20Hackers  
[Accessed: 13th December 2013]

The Computer Language Company Inc (1981-2013) White Hat Hacker. Encyclopedia.Available at http://www.pcmag.com/encyclopedia/term/54434/white-hat-hacker [Accessed: 13th December 2013]

The Computer Language Company Inc (1981-2013) Black Hat Hacker.Encyclopedia.Available at  http://www.pcmag.com/encyclopedia/term/38735/black-hat-hacker [ Accessed: 13th December 2013]

Kushner, D.(2012) Annals of Technology,Machine Politics: The New Yorker. Available at http://www.newyorker.com/reporting/2012/05/07/120507fa_fact_kushner 
[Accessed: 13th December 2013]

Saturday 7 December 2013

Introduction

According to Oxford Dictionaries (2013), the definition of Hacker is a person who uses computers to gain unauthorized access to date or can be defined in other way as they are informal an enthusiastic and skillful computer programmer or user.

There are other terms that related to Hacker which can categorize to different aspect such as entertainment, social and education. According to Techopedia ( 2010-2013), below is the definition of terms that relate to Hacker.

Entertainment :
Hacking Game
(Slave Hack)
According to the Slave Hack (a game by "this guy" and "this great people")official page (2013), it states that this game is a virtual hack simulation game.The players have to defend their own virtual-pc against intruders while at the same time they have to act the role as hackers who hack others player and web server as much as  they can.
                       
                                                              Slave Hack Official Page (2013)
                                                            References link: www.pearltrees.com 

Social :
Hacktivism
the act of hacking website or computer network in an effort to convey social or political message. This people is known as Hacktivist. They are more concentrated on disruptive activities such as political or social causes compare to malicious hacker who steal private information and cause other harm.

Hacker Ethic
is a phenomena where the hacker share their knowledge, expertise, access to information to other peers. This protocol is a belief or practice among the hacker community which give convenient in their job.Cory Janssen has mentioned that hacker defines that ethical responsibility in their own community. It was coined by American Journalist, Steven Levy in his books "Hackers": Heroes of Revolution.

Cyber Criminal
an individual who commit cyber crime by using computer a
 1. target ( attack other people by sending virus or stealing data)
 2.weapon ( carry out conventional crime such as spam, fraud or gambling)
 3.accessory ( to save stolen or illegal data)

Hackerazzi  
the slang term to use to refer cyber-criminal who hack into celebrity email account to get the celebrity's personal or private information.



Education :
Hacking Tool 
a program that designed to help hacker in hacking but also can protect a network or computer proactively from hackers.
 - example: spyware
                       
                                                                   example of spyware
                                                       References link: www.howstuffworks.com

Cyberforensic
a discovery electronic technique determined and show the evidence of technical criminal and also involve data storage extraction for legal purpose.


Above are the terms that related to the hacker where to get into the hacker's world or their own community in one step further where can understand more deeper about the hacker.


References citation:
Oxford Dictionaries (2013) Definition of Hacker. [Online] Available at: http://www.oxforddictionaries.com/definition/english/hacker [Accessed 7th December 2013]

Technopedia (2010-2013) Hacker Ethic. Available at: http://www.techopedia.com/definition/19706/hacker-ethic [Accessed 7th December 2013]

Technopedia (2010-2013) Hackerazzi.Available at: http://www.techopedia.com/definition/27744/hackerazzi
[Accessed 7th Dcember 2013]

Technopedia (2010-2013) Hacktivism. Available at: http://www.techopedia.com/definition/2410/hacktivism [Accessed 7th December 2013]

Technopedia (2010-2013) Cyber Criminal. Available at: http://www.techopedia.com/definition/27435/cybercriminal [Accessed 7th December 2013]


Technopedia (2010-2013) Hacking Tool. Available at: http://www.techopedia.com/definition/60/hacking-tool [ Accessed 7th December 2013]

Technopedia (2010-2013) Cyberforensic. Available at: http://www.techopedia.com/definition/2388/cyberforensics [Accessed 7th December 2013]


                                                          
               












Saturday 30 November 2013

Topic Choosing

Among the seven questions that are given in a list, I would choose the question which the topic is hackers are heroes of 21st century.Argue for and against this statement.

The reason that I chose this question is hoped to understand more deeper about the roles and the world of hackers of their own rules and regulations.Next, I also hope can find out which aspects will the hacker's job encounter with. Not only that,I also wish to investigate the relationship between the hacker and Internet cultures.

In this question, there will be a statement that gonna argue whether the hackers are helpful to the society or they will be prompted into big and serious issues which endanger the society. If the hackers are heroes, what are the reasons to support this statement if the fact is true. In other hand, what are the reasons to against this statement.

Due to the reasons and analysis above, I am interested in hacker's topic where can find out the fact behind it.