<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://hackepedia.org/index.php?action=history&amp;feed=atom&amp;title=Cracker</id>
	<title>Cracker - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://hackepedia.org/index.php?action=history&amp;feed=atom&amp;title=Cracker"/>
	<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Cracker&amp;action=history"/>
	<updated>2026-05-08T18:07:07Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.45.3</generator>
	<entry>
		<id>https://hackepedia.org/index.php?title=Cracker&amp;diff=3653&amp;oldid=prev</id>
		<title>Pbug: eh yo cracker jack!</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Cracker&amp;diff=3653&amp;oldid=prev"/>
		<updated>2007-06-11T08:21:46Z</updated>

		<summary type="html">&lt;p&gt;eh yo cracker jack!&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 01:21, 11 June 2007&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l8&quot;&gt;Line 8:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 8:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;#Then there are the crackers who discover remote holes/weaknesses, and/or write the exploits for these vulnerabilites. Some like to publish these exploits, either for the fame from other crackers, or to watch the script kiddies wreak havoc with them.  (&amp;#039;&amp;#039;It should be noted that providing an exploit to a security advisory hastens the patch effort and scenarios where a bug is misunderstood or even ignored rarely happen.  Exploits are a ticket of guarantee that someone will address this security issue sooner rather than later&amp;#039;&amp;#039;).&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;#Then there are the crackers who discover remote holes/weaknesses, and/or write the exploits for these vulnerabilites. Some like to publish these exploits, either for the fame from other crackers, or to watch the script kiddies wreak havoc with them.  (&amp;#039;&amp;#039;It should be noted that providing an exploit to a security advisory hastens the patch effort and scenarios where a bug is misunderstood or even ignored rarely happen.  Exploits are a ticket of guarantee that someone will address this security issue sooner rather than later&amp;#039;&amp;#039;).&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;How much time one should wait between notifying the vendor of an issue and releasing an exploit is a hotly debated issues in the information security community. Some vendors are a lot faster and remediating issues &lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;then &lt;/del&gt;others.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;How much time one should wait between notifying the vendor of an issue and releasing an exploit is a hotly debated issues in the information security community. Some vendors are a lot faster and remediating issues &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;than &lt;/ins&gt;others.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Pbug</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=Cracker&amp;diff=1914&amp;oldid=prev</id>
		<title>Frankk at 15:48, 31 October 2005</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Cracker&amp;diff=1914&amp;oldid=prev"/>
		<updated>2005-10-31T15:48:03Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 08:48, 31 October 2005&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l7&quot;&gt;Line 7:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 7:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;#There are a few &amp;quot;good crackers&amp;quot; who will break into a remote host, patch the hole that they used to get in so others can&amp;#039;t do the same, and then leave undetected. (&amp;#039;&amp;#039;As romantic as it sounds one should not forget that cracking another persons system is illegal.  Even when your intentions are meant well, the law will have no mercy on you&amp;#039;&amp;#039;).&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;#There are a few &amp;quot;good crackers&amp;quot; who will break into a remote host, patch the hole that they used to get in so others can&amp;#039;t do the same, and then leave undetected. (&amp;#039;&amp;#039;As romantic as it sounds one should not forget that cracking another persons system is illegal.  Even when your intentions are meant well, the law will have no mercy on you&amp;#039;&amp;#039;).&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;#Then there are the crackers who discover remote holes/weaknesses, and/or write the exploits for these vulnerabilites. Some like to publish these exploits, either for the fame from other crackers, or to watch the script kiddies wreak havoc with them.  (&amp;#039;&amp;#039;It should be noted that providing an exploit to a security advisory hastens the patch effort and scenarios where a bug is misunderstood or even ignored rarely happen.  Exploits are a ticket of guarantee that someone will address this security issue sooner rather than later&amp;#039;&amp;#039;).&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;#Then there are the crackers who discover remote holes/weaknesses, and/or write the exploits for these vulnerabilites. Some like to publish these exploits, either for the fame from other crackers, or to watch the script kiddies wreak havoc with them.  (&amp;#039;&amp;#039;It should be noted that providing an exploit to a security advisory hastens the patch effort and scenarios where a bug is misunderstood or even ignored rarely happen.  Exploits are a ticket of guarantee that someone will address this security issue sooner rather than later&amp;#039;&amp;#039;).&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-side-deleted&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-side-deleted&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;How much time one should wait between notifying the vendor of an issue and releasing an exploit is a hotly debated issues in the information security community. Some vendors are a lot faster and remediating issues then others.&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Frankk</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=Cracker&amp;diff=517&amp;oldid=prev</id>
		<title>Pbug at 14:13, 31 October 2005</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Cracker&amp;diff=517&amp;oldid=prev"/>
		<updated>2005-10-31T14:13:39Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 07:13, 31 October 2005&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l5&quot;&gt;Line 5:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 5:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;#The most notorious is the least skilled, known commonly as a &amp;quot;script kiddie&amp;quot;. These are the people that will use a script or program written by someone else, and use it to compromise remote hosts. They often do not even know what is exactly happening, and don&amp;#039;t care, they just like breaking into other machines for whatever purpose.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;#The most notorious is the least skilled, known commonly as a &amp;quot;script kiddie&amp;quot;. These are the people that will use a script or program written by someone else, and use it to compromise remote hosts. They often do not even know what is exactly happening, and don&amp;#039;t care, they just like breaking into other machines for whatever purpose.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;#There are government and corporate crackers, who are hired to crack into remote hosts usually for information, specifically IP (Intellectual property) of a remote government/competitor.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;#There are government and corporate crackers, who are hired to crack into remote hosts usually for information, specifically IP (Intellectual property) of a remote government/competitor.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;#There are a few &quot;good crackers&quot; who will break into a remote host, patch the hole that they used to get in so others can&#039;t do the same, and then leave undetected. (&#039;&#039;As romantic as it sounds one should not forget that &lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;entering &lt;/del&gt;another persons system is illegal.  Even when your intentions are meant well, the law will have no mercy on you&#039;&#039;).&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;#There are a few &quot;good crackers&quot; who will break into a remote host, patch the hole that they used to get in so others can&#039;t do the same, and then leave undetected. (&#039;&#039;As romantic as it sounds one should not forget that &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;cracking &lt;/ins&gt;another persons system is illegal.  Even when your intentions are meant well, the law will have no mercy on you&#039;&#039;).&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;#Then there are the crackers who discover remote holes/weaknesses, and/or write the exploits for these vulnerabilites. Some like to publish these exploits, either for the fame from other crackers, or to watch the script kiddies wreak havoc with them.  (&amp;#039;&amp;#039;It should be noted that providing an exploit to a security advisory hastens the patch effort and scenarios where a bug is misunderstood or even ignored rarely happen.  Exploits are a ticket of guarantee that someone will address this security issue sooner rather than later&amp;#039;&amp;#039;).&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;#Then there are the crackers who discover remote holes/weaknesses, and/or write the exploits for these vulnerabilites. Some like to publish these exploits, either for the fame from other crackers, or to watch the script kiddies wreak havoc with them.  (&amp;#039;&amp;#039;It should be noted that providing an exploit to a security advisory hastens the patch effort and scenarios where a bug is misunderstood or even ignored rarely happen.  Exploits are a ticket of guarantee that someone will address this security issue sooner rather than later&amp;#039;&amp;#039;).&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Pbug</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=Cracker&amp;diff=516&amp;oldid=prev</id>
		<title>Pbug at 10:28, 31 October 2005</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Cracker&amp;diff=516&amp;oldid=prev"/>
		<updated>2005-10-31T10:28:37Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 03:28, 31 October 2005&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l5&quot;&gt;Line 5:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 5:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;#The most notorious is the least skilled, known commonly as a &amp;quot;script kiddie&amp;quot;. These are the people that will use a script or program written by someone else, and use it to compromise remote hosts. They often do not even know what is exactly happening, and don&amp;#039;t care, they just like breaking into other machines for whatever purpose.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;#The most notorious is the least skilled, known commonly as a &amp;quot;script kiddie&amp;quot;. These are the people that will use a script or program written by someone else, and use it to compromise remote hosts. They often do not even know what is exactly happening, and don&amp;#039;t care, they just like breaking into other machines for whatever purpose.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;#There are government and corporate crackers, who are hired to crack into remote hosts usually for information, specifically IP (Intellectual property) of a remote government/competitor.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;#There are government and corporate crackers, who are hired to crack into remote hosts usually for information, specifically IP (Intellectual property) of a remote government/competitor.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;#There are a few &quot;good crackers&quot; who will break into a remote host, patch the hole that they used to get in so others can&#039;t do the same, and then leave undetected.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;#There are a few &quot;good crackers&quot; who will break into a remote host, patch the hole that they used to get in so others can&#039;t do the same, and then leave undetected&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;. (&#039;&#039;As romantic as it sounds one should not forget that entering another persons system is illegal.  Even when your intentions are meant well, the law will have no mercy on you&#039;&#039;)&lt;/ins&gt;.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;#Then there are the crackers who discover remote holes/weaknesses, and/or write the exploits for these vulnerabilites. Some like to publish these exploits, either for the fame from other crackers, or to watch the script kiddies wreak havoc with them.  (&amp;#039;&amp;#039;It should be noted that providing an exploit to a security advisory hastens the patch effort and scenarios where a bug is misunderstood or even ignored rarely happen.  Exploits are a ticket of guarantee that someone will address this security issue sooner rather than later&amp;#039;&amp;#039;).&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;#Then there are the crackers who discover remote holes/weaknesses, and/or write the exploits for these vulnerabilites. Some like to publish these exploits, either for the fame from other crackers, or to watch the script kiddies wreak havoc with them.  (&amp;#039;&amp;#039;It should be noted that providing an exploit to a security advisory hastens the patch effort and scenarios where a bug is misunderstood or even ignored rarely happen.  Exploits are a ticket of guarantee that someone will address this security issue sooner rather than later&amp;#039;&amp;#039;).&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Pbug</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=Cracker&amp;diff=510&amp;oldid=prev</id>
		<title>Pbug at 10:15, 31 October 2005</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Cracker&amp;diff=510&amp;oldid=prev"/>
		<updated>2005-10-31T10:15:53Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 03:15, 31 October 2005&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l6&quot;&gt;Line 6:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 6:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;#There are government and corporate crackers, who are hired to crack into remote hosts usually for information, specifically IP (Intellectual property) of a remote government/competitor.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;#There are government and corporate crackers, who are hired to crack into remote hosts usually for information, specifically IP (Intellectual property) of a remote government/competitor.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;#There are a few &amp;quot;good crackers&amp;quot; who will break into a remote host, patch the hole that they used to get in so others can&amp;#039;t do the same, and then leave undetected.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;#There are a few &amp;quot;good crackers&amp;quot; who will break into a remote host, patch the hole that they used to get in so others can&amp;#039;t do the same, and then leave undetected.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;#Then there are the crackers who discover remote holes/weaknesses, and/or write the exploits for these vulnerabilites. Some like to publish these exploits, either for the fame from other crackers, or to watch the script kiddies wreak havoc with them.  (It should be noted that providing an exploit to a security advisory hastens the patch effort and scenarios where a bug is misunderstood or even ignored rarely happen.  Exploits are a ticket of guarantee that someone will address this security issue sooner rather than later).&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;#Then there are the crackers who discover remote holes/weaknesses, and/or write the exploits for these vulnerabilites. Some like to publish these exploits, either for the fame from other crackers, or to watch the script kiddies wreak havoc with them.  (&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&#039;&#039;&lt;/ins&gt;It should be noted that providing an exploit to a security advisory hastens the patch effort and scenarios where a bug is misunderstood or even ignored rarely happen.  Exploits are a ticket of guarantee that someone will address this security issue sooner rather than later&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&#039;&#039;&lt;/ins&gt;).&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Pbug</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=Cracker&amp;diff=509&amp;oldid=prev</id>
		<title>Pbug at 10:15, 31 October 2005</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Cracker&amp;diff=509&amp;oldid=prev"/>
		<updated>2005-10-31T10:15:33Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 03:15, 31 October 2005&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l6&quot;&gt;Line 6:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 6:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;#There are government and corporate crackers, who are hired to crack into remote hosts usually for information, specifically IP (Intellectual property) of a remote government/competitor.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;#There are government and corporate crackers, who are hired to crack into remote hosts usually for information, specifically IP (Intellectual property) of a remote government/competitor.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;#There are a few &amp;quot;good crackers&amp;quot; who will break into a remote host, patch the hole that they used to get in so others can&amp;#039;t do the same, and then leave undetected.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;#There are a few &amp;quot;good crackers&amp;quot; who will break into a remote host, patch the hole that they used to get in so others can&amp;#039;t do the same, and then leave undetected.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;#Then there are the crackers who discover remote holes/weaknesses, and/or write the exploits for these vulnerabilites. Some like to publish these exploits, either for the fame from other crackers, or to watch the script kiddies wreak havoc with them.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;#Then there are the crackers who discover remote holes/weaknesses, and/or write the exploits for these vulnerabilites. Some like to publish these exploits, either for the fame from other crackers, or to watch the script kiddies wreak havoc with them&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;.  (It should be noted that providing an exploit to a security advisory hastens the patch effort and scenarios where a bug is misunderstood or even ignored rarely happen.  Exploits are a ticket of guarantee that someone will address this security issue sooner rather than later)&lt;/ins&gt;.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Pbug</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=Cracker&amp;diff=508&amp;oldid=prev</id>
		<title>Frankk at 22:42, 30 October 2005</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Cracker&amp;diff=508&amp;oldid=prev"/>
		<updated>2005-10-30T22:42:55Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;Most commonly referred to by the media as a [[hacker]], a cracker is the person who malciously compromises hosts that are not his/her own. &lt;br /&gt;
&lt;br /&gt;
There are several levels of cracker. &lt;br /&gt;
&lt;br /&gt;
#The most notorious is the least skilled, known commonly as a &amp;quot;script kiddie&amp;quot;. These are the people that will use a script or program written by someone else, and use it to compromise remote hosts. They often do not even know what is exactly happening, and don&amp;#039;t care, they just like breaking into other machines for whatever purpose.&lt;br /&gt;
#There are government and corporate crackers, who are hired to crack into remote hosts usually for information, specifically IP (Intellectual property) of a remote government/competitor.&lt;br /&gt;
#There are a few &amp;quot;good crackers&amp;quot; who will break into a remote host, patch the hole that they used to get in so others can&amp;#039;t do the same, and then leave undetected.&lt;br /&gt;
#Then there are the crackers who discover remote holes/weaknesses, and/or write the exploits for these vulnerabilites. Some like to publish these exploits, either for the fame from other crackers, or to watch the script kiddies wreak havoc with them.&lt;/div&gt;</summary>
		<author><name>Frankk</name></author>
	</entry>
</feed>