User:Sacha12345678910/sandbox

The hack is a manipulation of a system, from English to hack, cut, cut something with the help of a tool. By analogy, separate logical blocks, remove from the study all that is not necessary, and group dispersed data allows to find a consistency, while allowing to be better understood in its operation.

The legality of this "level" of the hack is subject to debate, in particular by the indefinite status of the legality of certain methods of reading data (in particular Packet sniffers). The term hack is widely used by Internet users and news media, but in meanings that tend towards an abuse of language. This is why it is essential to differentiate the etymology of the hack method from the possible applications, which can then form more specific domains. The term most used to refer to someone using this method is hacker, however, and to avoid any debate around the use of the term, the hack actor expression (someone using the hack method to different purposes) will be used in this article. In programming, the hack is a quick and handy solution to work around any problem. It may be a limitation of the programming language itself, or an imperfect design on the part of the programmer. In this case, rather than rewrite a large section of the source code, the hacker can choose to crack it, faster to implement but less clean and may lead to later problems. Cracking software also serves to remove the protection of some who request a paid activation key. The crackers, having "analyzed" the software in question, create another software called Keygen meaning key generator, which generates activation keys and / or serial numbers, allowing to use the software without paying. This method is illegal and prohibited in France and in many other countries.

The most used meaning of the hack method application is the arbitrary and visible modification of the content of a website - the homepage most of the time, because it is the most visited on a site. The motivations of the actors of the hack (hacker) are various, one distinguishes the white hats and the black hats, but there are mainly three:

Evidence of the weakness (or effectiveness) of the security of the website. Preferred targets are the most visited or symbolic sites. The three main motivations are the challenge of the difficulty encountered during the action, a message to convey (ironic, most of the time), and the search for a reputation (although the most talented hack actors are always very modest [ref. necessary]). Intent to harm website owners, and optionally, their community and readers. The reasons for such a desire to harm are mainly revenge or the need for fame, pejorative or not. The intention to serve the Fa through actions against unlawful sites and communities. These actions are the least cited media, and yet, morally, they are the most appreciated and supported. But be careful in acting against a malicious site without being coordinated by the police, it may be a whole spinning, a whole police investigation that we slow down (even scuttles) and the effect is then exactly opposite to that desired at the beginning. This application of the hack actor has for equivalent term hacker who also brings a lot of debate.

The term hack is then defined as the action to enter without authorization in a network, wired or not. It is mainly thanks to the democratization of wireless networks that the term hack resurfaces in all its splendor. The principle is the same as for an attack of an Internet site: to access a private domain without authorization, and to be able or not to modify any content behind this barrier. The big difference of the hack of a wireless network is the popularization of the tools allowing a fast break and without necessary knowledge of the security of the network. The author of such practices is then considered to be a kiddie script.

The application of the hack in software analysis has led to the creation and development of the world of cracking. This application is to analyze the operation of a protection to circumvent or lure it. The differentiation between hack and crack is much clearer among Internet users than a few years ago, where hack was THE word boilerplate. The Crack is a quasi-compliant copy of the original executable file (provided by the software developer), except that an attacker has removed some components (to avoid an original disk detection, for example). The principle for violators is simple, just replace the original executable file with the pirated one, and the software can then start without asking for activation key or check the presence of the disc in the drive. This workaround has been gaining ground for many years, especially in video games, and for proprietary operating systems.

The application of the hack method is double-edged: it is at the same time the proof of a weakness, a fault but also the locator of this weakness to fill and to protect more. The place left to the computer systems is that according to its importance, any weakness would allow a potential exploitation, and can lead to the destruction of the data, which would be catastrophic on certain scales of importance. This is why more and more product owners (websites, software, etc.) invite hack actors to find weaknesses that may exist, and to ensure that the creator of the product can correct them1.