IWS - The Information Warfare Site
News Watch Make a  donation to IWS - The Information Warfare Site Use it for navigation in case java scripts are disabled


Hacker Terms

Hacker Ethics
Script Kiddie

Cracker - One who breaks security on a system. Coined ca. 1985 by hackers in defense against journalistic misuse of hacker (q.v., sense 8). An earlier attempt to establish `worm' in this sense around 1981-82 on Usenet was largely a failure. (Hacker's Jargon File)

Exploit - [originally cracker slang] 1. A vulnerability in software that can be used for breaking security or otherwise attacking an Internet host over the network. The Ping O' Death is a famous exploit. 2. More grammatically, a program that exploits an exploit in sense 1.(Hacker's Jargon File)

Hacker -
is anyone who enjoys the intellectual challenge of creatively overcoming or circumventing limitations, primarily in their fields of interest, namely programming or electrical engineering. (Wikipedia)

Unauthorized user who attempts to or gains access to an information system. (NSTISSI 4009)

Hacker ethics - The hackers' "jargon file," compiled collectively on the Net, defines them as people who "program enthusiastically" and who believe that "information-sharing is a powerful positive good, and that it is an ethical duty of hackers to share their expertise by writing free software and facilitating access to information and to computing resources wherever possible." This has been the hacker ethic ever since a group of MIT's passionate programmers started calling themselves hackers in the early sixties. (Pekka Himanen)

Hacktivism -is a policy of hacking, phreaking or creating technology to achieve a political or social goal. (The hacktivist)

Phracker - a person who combines phone phreaking with computer hacking.

Phreaker - Phreaking is a slang term for the action of making a telephone system do something that it normally should not allow. It is an illegal activity (the illegal act being the theft of telephone service), but one formerly pursued by a large number of computer and electronics hobbyists out of curiosity. A phreak or phreaker is a person who engages in the act of manipulating phones in this way. (Wikipedia)

Script Kiddie -
A person, normally someone who is not technologically sophisticated, who randomly seeks out a specific weakness over the Internet in order to gain root access to a system without really understanding what it is s/he is exploiting because the weakness was discovered by someone else. (Wikipedia)


'You might not see things yet on the surface, but underground, it's already on fire.'
Indonesian writer Y.B. Mangunwijaya, July 16, 1998 (taken from No Logo)


The information provided on these pages are for educational purposes only. The authors of this site are in no way responsible for any damage that is the result of the use of the information provided on this site. IWS does not host any hacking or cracking software. Our mission is to give an insight into the phenomena of hacking & cracking.


Essential Documents

The New Hacker's Dictionary - The Jargon File [as one huge html file: 2.4 MB] Version 4.3.1, 29 June 2001 [pdf version 3.5 MB]

The Hacker Crackdown Law and Disorder on the Electronic Frontier, Courtesy of Bruce Sterling

General Articles
Hacker Articles
Hacktivism, Cyberactions & Defacements
Hacker Magazines

General Articles

Availability and Accessibility of Hacker Information on the Internet by V Stagg1 and M Warren at the 1st Australian Information Security Management Conference, Australia, Nov 2000.

The Cookie Monster: The Risks of Internet Cookies and Aggregated Data by Peter

Improving the Security of Your Site by Breaking Into it

Hacker Articles

UNIX: A Hacking Tutorial

A List Of Some OF The Most Useful UNIX Hacking Commands, and Some Hints On Their Usage

An In-depth Guide in Hacking UNIX and the concept of Basic Networking Utility

UNIX Backdoors

Hacktivism, Cyberactions & Web Page Defacements 

Online Civil Rights After September 11th - The threat to the right to protest online from the war against terrorism prepared by the electrohippie collective, November 2001, for the ICA’s Being an Obstacle weekend

HAL 2001: How to set up a successful cyberaction
by Peter de Ruiter Saturday 11 August 2001, 11 AM Stage 3

Who does the Internet serve Written to accompany the electrohippies presentation to the London Institute of Contemporary Arts meeting, Hacktivists: Cyberwarriors Or Political Agoraphobics?, 8th March, 2001 PFD Version

Internet Europe: Hacktivism, Cyberterrorism Or Online Democracy? by Paola Di Maio published in March 2001 (courtesy of Content Wire)

Hacktivism Case Study Feb. 2001 Little Town – Big Problem: hacktivism comes to Llandeilo produced by the electrohippie collective, February 2001

Cyberlaw UK: Civil rights and protest on the Internet produced by the electrohippies collective, December 2000

"I've seen the future and it has a penguin on it" – how the 'open source' revolution will change IT Produced by the electrohippies collective, December 2000.

Client-side Distributed Denial-of-Service: Valid campaign tactic or terrorist act? by DJNZ and the action tool development group of the electrohippies collective1, February 2000

Attrition Defaced Commentary Mail List Archive 'This is a public LOW VOLUME mail list to circulate news, commentary, information or other opinions on web defacement. This may include commentary on trends, patterns, pointing out high profile defacements and more.'


Hacker Magazines 

Digital Rebel Magazine
| The Hacktivist | | Napalm | Oblivion

The Hacktivist is a text-based monthly publication covering and examining hacktivist and ECD related issues and events.

The Hacktivist Issue Vol. 2 February 2001

The Hacktivist Issue Vol. 1 January 2001

'is an e-zine devoted to computer security, with a healthy dose of music, news, and ethics' .

Napalm Issue 9 - February 2001 -
IPSEC Tunnels, Sun Cluster Holes

Napalm Issue 8 - November 2000 Millennium Phones, IPSEC, AT&T Assembly (Nov 28, 2000)

Napalm Issue 7 - October 2000 IPSEC & SAMBA, Resource Protection (Oct 6, 2000)

Napalm Issue 6 - July 2000 BBS List, CISSP, IPSec, ARP OS Detection (Jul 13, 2000)

Napalm Issue 5 - May 2000 Contemporary Telenet, Ethernet, Music (May 16, 2000)

Napalm Issue 4 - April 2000 Securing Solaris, Just Intonation, Music (Apr 5, 2000)

Napalm Issue 3 - January 2000 HERF Guns, AI Security, C++ (Jan 31, 2000)

Napalm Issue 2 - December 1999 Quantum Crypto, VPNs, more gh0st.net (Dec 3, 1999)

Napalm Issue 1 - September 1999 Onion Routing, gh0st.net, Introduction (Sep 29, 1999)


Download 0blivion (zip format)

Oblivion Issue 8 - 15/10/2000
( html)

Oblivion Issue 7 - 15/9/2000

Oblivion Issue 6 - 15/8/2000

Oblivion Issue 5 - 15/7/2000

Oblivion Issue 4 - 15/6/2000

Oblivion Issue 3 - 15/5/2000

Oblivion Issue 2 - 15/4/2000

Oblivion Issue 1 - 15/3/2000


Hacking & Cracking News

For more news please visit our IWS News Central

Hacking News


Hacking, Cracking & Phreaking Links

For more links visit our new link directory

Hacker Sites and Resources | Political Hacking & Hacktivism | Phreaking

How to Link to IWS


Hacker Sites and Resources

2600 The Hacker Quarterly 

Attrition collection of advisories and DoS attacks, poetry, web page hacks, and more

Cult of the Dead Cow

Safemode.org Defacement Mirror

Free Hacking Zone (FHZ) at Hackerslab.org 'You are free to hack our server by solving selected problems ranging in levels from 0 to 14. Don't worry, it's legal and free!'

WBG Links 'Link site for computer security and hacking. Exploits, cryptography, programming, anonymity, remailers, phreaking, links, news'

Political Hacking / Hacktivism / Online Activism

The Electrohippie Collective's Website 'In modern society the ability to communicate, organise and protest is enshrined through laws and constitutions. It is something, that at the national and international level, is considered to form the basis of a democratic society. Today, these rights do not exist in cyberspace for the peoples of many countries.'

The Hacktivist 'Introduction [thehacktivist.com] is dedicated to examining the theory and practice of hacktivism and electronic civil disobedience while contributing to the evolution of hacktivism by promoting constructive debate, effective direct action, and creative solutions to complex problems in order to facilitate positive change.'

Stand Home 'Campaiging for safe E-Commerce Legislation'

KHG [Kosova Hackers Group] A group which fights for Kosovo Albanians in Cyberspace. 'The KHG terminated the war! Our Hackers will no more attack! Our last attack was www.serbforce.org . Thats it for this Year!'

Ameriphreak: Phreaking Ameritech since the dawn of time 'Our mission is to pass on quality information regarding hacking and phreaking, especially involving Ameritech payphones. Here you can find info on boxing, charging, and general telephony information.'

Phreak Store 'Phreak Store dot come sells butt sets, can wrenches, teleco security keys and much, much more online, every day. Now phreaks have the tools they need, at low prices everyday.'

Google Ads

IWS Mailing Lists

Mailing Lists Overview

Affiliates & Supporters


IWS Awards & Reviews


More Awards & Reviews

IWS welcomes suggestions regarding site content and usability. Please use our contact form to submit your comments.

Last modified: 13 February, 2011 by Wanja Eric Naef

IWS Copyright 2000 - 2011