Wednesday 2 November 2011

Online Presence week 9 ( Reading - Hacker)

Civic hacking: a New agenda for e-democracy

Hacker is powerful as he can steal peoples things without permission of the creator.
http://www.cartoonstock.com/newscartoons/cartoonists/ksc/lowres/kscn868l.jpg
Hacker
Who is hacker? everyone can be hacker, as long as you need some IT based and you are patient enough, or else this JOB is not suitable for you.
Well, Hacker is a mystery stead thief, who can simply breaks into peoples's computer, the person who have been hacked by people will never know who are hacking them. The hackers usually hacks on computer, email, website to steal data and passwords without people knowing.   Somehow,Hacker is actually a proper job for protect the security by test the security, they need to study crypt analysis.

Definition of crypt·a·nal·y·sis : (Sources from: http://www.thefreedictionary.com/cryptanalysis)
1. The analysis and deciphering of cryptographic writings or systems.
2. The study of techniques for deciphering cryptographic writings or systems.

Hacking culture
Hacker spent a lot of time to discovery how to hack in to people's database. To hacked in mess user, they need to spend each time for each particular users. We are discussing hacking is legal or illegal issue, Hacking usually take as illegal action, as in hacking used to steal information or password from internet, they can make a free call to everywhere and free internet access, they might create some virus to shut your pc down, somehow hacking is legal in the sense of helping PC's User, because it use the hacking tool to test the security. There are two things needed for hacker, which is "PC + Modem" 1modem need to connect 2 computers, modem used to connect to internet access. Social capital based on reciprocity, one hacker help another hacker, they applied number to replace word.


Here, illegal hacker known as Black hacker, which More evil hacking the system for stealing people's information, steal people information for personal use or sell it; whereas legal hacker known as White hacker, they don't damage the data from the users, they are trying to help the user to repair or solve the problem.

Major point. why people do hacking?
They open an hour an hour to hack in people account, just because there are a lot of rule and regulation. Seem internet as www, original hacking, traditional hacking. Whereas people's curiosity, they curious to other people's privacy.


E-democracy

It's a combination of the words electronic and democracy, which mean refers to the use of information technologies and communication technologies and strategies in political and governance processes. e-democracy is concerned with the use of information and communication technologies to engage citizens, support the democratic decision- making processes and strengthen representative democracy. Source from   siteresources.worldbank.org/WBI/Resources/wbi37210Kingham.pdf

e-democracy is still useless when user is not active in internet or not interest with your activity.
This quote from the article state that, the e-democracy will not success if the less internet users, or the internet user are not interested in your online activity, there are useless if a particular websited have registered users or less users notice it. Here the article is about the people who have same interest and common idea can gather together and open up a discussion. Which it could be a  

example like "Bersih 2.0" in Malaysia, the coalition's objective of "Bersih 2.0" was to push for a thorough reform of the electoral process in Malaysia, "they use social networking-facebook as the promoting tool, there was a demonstration in Kuala Lumpur held on 9 July 2011, they use Facebook fan page to spread the news around, they gather the peoples around the world, demonstration at the same day with wearing a same yellow shirt. Can you imaging how powerful was social networking? Internet is a new space. free flow information, nodes with power equal some of them have specific advantages. People applied political issue on internet, people can voice out their opinion to against government. But the thing is, it's everyone online? It's everyone look at your webpage? there is a things...

Phone pheaking (phone hacking)
- Hack in to the person's phone, and steal the personal information of the users. Its an act of gaining illegal access to resources of telecom networks for fun. Some they hacked for understand how telecom infrastructure worked, other than that they wanted to make free long distance phone calls. Phone hack more dangerous threat as  phreakings can gain back door access to corporate network through unsecured modems and steal data, launch attacks. sources from : http://www.tech-faq.com/phone-phreaking.html 

Game Hacking 
People hacking game and create a new software, they can hack in people's account and play around with their character in the game. One of the examples, "The Sims", people can hack in to add credit for their sim city anytime as they want, as long as the "sims cheats codes". 


Hacktivism
Activism - flight for somethings.
It's a use of computers and computer networks as protest political ends. This can also defined as non violent use of illegal or legal ambiguous digital tools in pursuit of political ends.  Could be understood as the writing of code to promote political ideological . 

Wikileaks
A spyware, hardware the indented website. CIVIC Hacking is a type of contest, this people who hack to gov website, most of them have political minded. Government funding hacker, they work as intelligence. 

4 comments:

  1. Hi Siew Mun

    I believe hacking can be good and bad depending on the situation. Private and personal hackings are considered illegal. People usually hack for two purposes. Bad personal is when they steal information from others for the benefit of their own. Another type is the good where people hack into government or private sectors to expose private and hidden information that they have been hiding or keeping it away from the public. The dark dirty secrets.

    Different people hack for different reasons. Some do good things for the society and the public such as retrieving top secrets hidden files which expose ugly truth of something (This has to be nothing personal). However some people hack just for the fun of it by fooling around and doing things that entertain them. Also there are hackers out there who know how to hack, but they will not hack unless if it is necessary or when it is needed. They learned and have the knowledge of hacking purely for self-improvement on knowledge, hobby or self-interest purposes.

    ReplyDelete
  2. Hi,

    Phone pheaking is a very argument issue for some times. It is because journalists hack into politicians', celebrities' Blackberry phones and observe their phone activities especially phone call. Journalists hack into their phones and obtain sources for news, how unethical is it!

    Then, game hacking! Good examples for game hacking would be Facebook games such as Restaurant city, Grand Theft Auto PC version, and also The Sims for PC. Yes, you need a software to hack Grand Theft Auto for PC version and you can generate whatever you want such as money in the game. However, in my opinion, not 100% game hackers would feel guilty and If i were a game hacker neither I would because we hack just to complete the game, no harm.

    ReplyDelete
  3. Hi siew mun, i totallly agree with you that hacking dosent necessarily be a bad thing. it also could be used for good purposes such as what the goverment officials sometimes do. Its good to have extra knowledge, but it all end of the dya falls for what we are going to use it for later on which is either for good of everyone or the opposite of it.

    ReplyDelete
  4. Thanks for enlightening us with the list of various forms of hacking!

    Hacking remains a hot topic. Although I believe hacking is a bad thing, your article has made me see that maybe "some" good can be made out of this. For instance, hacking is useful and crucial to obtain information about certain things/plans, and to disturb the progress of illegal activities. Sometimes, drug mobs can be busted, human trafficking rings can be stopped and etc etc.

    But at the end of the day, we must be careful and know what can be hacked, and what should not be hacked. Because reputations can be ruined, relations can be broken and lies can be easily spread if not done in a proper and professional manner.

    ReplyDelete

First Lecturer 1/8/2011