Types of Crackers

We continue to know more about him dark side of computing. We refer to crackers.

One of the types of nefarious users, that we find are the phreakers Unlike the Lamers, they are in charge of damaging telephone systems and networks, either to get information or to make free calls.

cracker2

Within the cracker category are also the well-known Hackers, who are responsible for making illegal copies of all types of programs without even respecting the copyright and protection systems that the product has. This serves to later market, distribute and reproduce dubious copies both online and physically. This is why they are now known as a new breed of terrorist, and it is no wonder that security experts like the FBI are searching the world for them.

Some of the most prestigious companies that have suffered this type of attack are, for example, Adobe and Facebook. It is worth mentioning that the latter has been attacked in recent days by various hackers.

Among the most dangerous are thrashers, which searches the trash can of ATMs for the way to find credit card codes to be able to access customers' bank accounts over the Internet.

Finally there is the Insider, people unhappy in their corporate work or
ex-employees who try to attack your workplace creating chaos.

It is worth mentioning that the Internet abounds with websites that offer tutorials and programs for crackers whose objective is to know the email account passwords and others. However, we indicate that carrying out this type of activity is a crime, so it is better to avoid it so as not to have problems with the law.


Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: Miguel Ángel Gatón
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.

  1.   fiorela said

    let it be more faxil to find x please ... ok 🙁

  2.   The Peruvian of the six paths said

    Peruvian who is respected?