¿µ¾îÇнÀ»çÀü Home ¿µ¾îÇнÀ»çÀü Ä¿¹Â´ÏƼ
   

hacker

´Ù¸¥ °÷¿¡¼­ Ã£±â  ³×À̹ö»çÀü ´ÙÀ½»çÀü Cambridge M-W M-W Thesaurus OneLook Wordnet Google


hackerese £Û£è£à©¡£ë¡Ó£ò¢¥£é:£ú£Ý ÇØÄ¿¸»(hacker language)

hacker £Û£è¢¥©¡£ë¡Ó£ò£Ý ÄÄÇ»ÅÍ ¸Å´Ï¾î, ÄÄÇ»ÅÍ Ä§ÇØÀÚ

ÇØÄ¿ (Hacker)

[À§Å°] ÇØÄ¿ Hacker

[ÛÝ] ÇØÄ¿ hacker

[ÛÝ] ÇØÄ¿½ºÅ©¸®Å© Hackers Creek

[ÛÝ] ¾Æ¼­ ÇØÄ¿ Arthur Hacker

[ÛÝBr] ÇØÄ¿ [ hacker ]

The anti-censorship movement is very willing to fight for freedom of speech.
°Ë¿­Á¦µµ ¹Ý´ë ¿îµ¿(anti-censorship movement)Àº ±â²¨ÀÌ ¾ð·ÐÀÇ ÀÚÀ¯¸¦ À§ÇØ ½Î¿ì·Á°í ÇÑ´Ù.
But if it leaves children vulnerable to seeing sexual content on the Net, is that right?
±×·¯³ª, ¸¸ÀÏ ¿ì¸®ÀÇ ¾ÆÀ̵éÀÌ ÀÎÅͳݻ󿡼­ ¼ºÀûÀÎ À½¶õ¹°¿¡ ³ëÃâµÇµµ·Ï ÇÑ´Ù¸é, ÀÌ´Â ¿ÇÀº ÀÏÀΰ¡?
There are also hackers ready to break into networks and violate our privacy and security.
¶ÇÇÑ Àü»ê¸Á¿¡ ±â²¨ÀÌ Ä§ÅõÇØ ¿ì¸®ÀÇ »ç»ýȰÀ̳ª ¾ÈÀüÀ» ¹æÇØÇÏ´Â ÇØÄ¿µéµµ ÀÖ´Ù.
Are there no limits to freedom?
ÀÚÀ¯¿¡ ´ëÇÑ Á¦ÇÑÀº ¾ø´Ù´Â ¸»Àΰ¡?
Internet sites, hacking, and slander must be censored or controled, not only for children, but also for adults.
ÀÎÅÍ³Ý »çÀÌÆ®, ÇØÅ·, Áß»ó ¸ð·«°ú °°Àº °ÍµéÀº ¾ÆÀ̵é»Ó¸¸ÀÌ ¾Æ´Ï¶ó ¼ºÀεéÀ» À§Çؼ­µµ ¹Ýµå½Ã °Ë¿­µÇ°í ÅëÁ¦µÇ¾î¾ß ÇÑ´Ù.

White House Hacker Faces Prison
¹é¾Ç°ü ħÀÔ ÇØÄ¿ ±³µµ¼Ò·Î

Hacker Eric Burns wandered on the Web where few had gone before him,
even making an illicit electronic visit inside the computers at the
White House earlier this spring.
Now, at age 19, the hacker known on the Internet as ``Zyklon'' is facing
15 months in prison and orders to repay his victims $36,240.
ÇØÄ¿ ¿¡¸¯ ¹ø½º°¡ Áö³­ 19ÀÏ ¾Ë·º»êµå¸®¾Æ ¿¬¹æ Áö¹æ¹ý¿øÀ¸·ÎºÎÅÍ 15°³¿ù
¡¿ªÇü°ú ÇÔ²² 36,240 ´Þ·¯ÀÇ ¼ÕÇØ¹è»óÀ» ¼±°í¹Þ¾Ò´Ù. ±×´Â À¥ÀÌ ³Î¸®
¾Ë·ÁÁöÁöµµ ¾Ê¾Ò´ø ¿Ã º½¿¡ ¹é¾Ç°ü ÄÄÇ»ÅÍ¿¡ ºñ¹Ð¸®¿¡ ħÀÔÇØ È­Á¦¸¦ ¸ð¾Ò´ø
ÀÎÅͳݸí 'Zyklon'ÀÎ ¿ÃÇØ 19»ìÀÇ Ã»³âÀÌ´Ù.
He also won't be allowed to touch a computer for three years after his
release.
±×´Â ÀÌ ±â°£À» º¹¿ªÇÏ°í ¼®¹æµÈ µÚ¿¡µµ 3³âµ¿¾È ÄÄÇ»ÅÍ¿¡ ¾ó¾Àµµ ÇÏÁö¸»¶ó´Â
ÄÄÇ»ÅÍ Á¢±Ù±ÝÁö ¸í·Éµµ ¹Þ¾Ò´Ù.

But federal prosecutors said Burns boasted of the White House attack
online even before it happened, and Burns admitted at his sentencing
Friday he was among three people who altered the site briefly to show a
black Web page with the names of hacker organizations, along with
messages, ``Your box was owned,'' and, ``Stop all the war.''
¿¬¹æ °Ë»çµéÀº ¹øÁî°¡ ¹é¾Ç°ü ħÀÔ»ç°ÇÀÌ ÀϾ±â ÀüºÎÅÍ ¿Â¶óÀÎÀ¸·Î ¹é¾Ç°ü
¿¡ ħÀÔÇß´Ù°í ÀÚ¶û»ï¾Æ ¸»Çß´Ù°í ÀüÇß´Ù. ¹øÁî´Â ¼±°í °øÆÇÀÌ ¿­¸° 19ÀÏ
ÀÚ½ÅÀÌ ¹é¾Ç°ü »çÀÌÆ®¿¡ ¹«´ÜħÀÔÇØ °ËÀº È­¸é¿¡ ÇØÄ¿Á¶Á÷ÀÇ À̸§°ú '³×
ÄÄÇ»ÅÍ´Â ³»²¨', '¸ðµç ÀüÀï ÁßÁö' µîÀÇ ±¸È£¸¦ Àû¾î³õÀº 3¸íÀÇ ÇØÄ¿ Áß ÇÑ
¸íÀ̾ú´Ù°í ½ÃÀÎÇß´Ù.

He said Monday in a telephone interview from his home in Shoreline,
Wash., that he refused to identify his two partners to the Secret
Service, partly because he believes the criminal penalties for hackers
are too steep. His punishment didn't fit his crime, he insisted.
¹øÁî´Â 22ÀÏ ¿ö½ÌÅÏÁÖ ¼î¾î¶óÀÎ(Shoreline) Áý¿¡¼­ ÀüÈ­ ÀÎÅͺ並 ÅëÇØ Á¤º¸
´ç±¹¿¡ µÎ¸íÀÇ µ¿·á ÇØÄ¿µéÀÇ À̸§À» ¹àÈ÷Áö ¾Ê¾Ò´Ù°í ¹àÇû´Ù. ±×´Â ÀÌ¿¡
´ëÇØ ÇØÄ¿¿¡ ´ëÇÑ Ã³¹úÀÌ ³Ê¹« ¹«°Å¿î Á¡ÀÌ ÀÌÀ¯ÀÇ Çϳª¶ó°í ¸»Çß´Ù.
``I'd rather not have what happened to me happen to anyone else,'' Burns
said. ``I don't really agree with the kind of sentencing range there is
for the crime.''
±×´Â Àڽſ¡ ´ëÇÑ Ã³¹úÀÌ ÀÚ½ÅÀÇ ÇàÀ§¿¡ ºñÇØ °¡È¤ÇÏ´Ù°í ÁÖÀåÇÏ¸ç ´Ù¸¥
µÎ¸íÀÇ ÇØÄ¿µéÀÌ ÀÚ½Åó·³ °¡È¤ÇÑ ¹úÀ» ¹Þ±â¸¦ ¿øÄ¡ ¾Ê´Â´Ù°í ¸»Çß´Ù.

Japanese digital video disc (DVDs) manufacturers were forced to postpone
the launch of long-awaited new audio equipment after a European hacker
broke open the copyright protection of DVDs and raised new piracy fears.
ÀϺ» µðÁöÅкñµð¿Àµð½ºÅ©(DVDs) Á¦Á¶¾÷üµéÀÌ DVD ºñµð¿À/¿Àµð¿À ±â±â
½ÅÁ¦Ç°µéÀ» Ãâ½ÃÇÏ·Á´Ù ÀÌ Á¦Ç°ÀÇ ÄÄÇ»ÅÍ¿Í DVD-ROM µå¶óÀ̺긦 ¿¬°áÇÏ´Â ¼Ò
ÇÁÆ®¿þ¾î¿¡ À¯·´ ÇØÄ¿ÀÇ Ä§ÀÔ »ç°ÇÀÌ ¹ß»ý, Ãâ½Ã°èȹÀÌ ¹«»êµÆ´Ù.

A Matsushita spokesman said the setback emerged after a Norwegian hacker
posted instructions on a Web site last month detailing how to override
the copy-protection function installed in software for connecting
computers with DVD-ROM drives.
¸¶¾²½ÃŸ ´ëº¯ÀÎÀº ³ë¸£¿þÀÌÀÇ ÇÑ ÇØÄ¿°¡ ÄÄÇ»ÅÍ¿Í VD-ROMµå¶óÀ̺긦 ÀÕ´Â ¼Ò
ÇÁÆ®¿þ¾îÀÇ DVD ºÒ¹ýº¹Á¦ ¹æÁö ±â´ÉÀ» ¹«¿ëÁö¹°·Î ¸¸µå´Â ¹æ¹ýÀ» Áö³­ ´Þ
À¥»çÀÌÆ®¿¡ °ø°³ÇÏ´Â ¹Ù¶÷¿¡ Á¦Ç°¹ßÇ¥°¡ ¿¬±âµÆ´Ù°í ¹àÇû´Ù.

The hacker cracked software sold by a U.S. company, Xing Technology Corp,
that allowed computers to read DVDs. Xing has since been suspended from
DVD format licensing.
À̹ø¿¡ ÇØÄ¿°¡ °ø°ÝÇÑ ¼ÒÇÁÆ®¿þ¾î´Â ¹Ì±¹±â¾÷ÀÎ ½Ì Å×Å©³î¸®Áö(Xing
Technology)»ç Á¦Ç°À¸·Î ÄÄÇ»ÅͰ¡ DVD¸¦ Àеµ·Ï ÇÏ´Â ±â´ÉÀ» °¡Áø´Ù. ÀÌ »ç°Ç
µÚ ÀÌ È¸»çÀÇ DVD Æ÷¸Ë ¶óÀ̼¾½º´Â ÁßÁöµÆ´Ù.

Hiroshi Takada, senior analyst at ABN Amro Securities in Tokyo, said the
incident raised concerns over future copyright piracy in the DVD market.
``The hacker incident could cast a long shadow over the DVD market as it
indicates that DVD makers may fall into a vicious circle with hackers
over the copy-protection problem,'' he said.
µµÄì ABN ¾Ï·Î Áõ±Ç(ABN Amro Securities)ÀÇ ´ÙÄ«´Ù È÷·Î½Ã ¼ö¼®ºÐ¼®°¡´Â À̹ø
ÇØÅ·»ç°ÇÀ¸·Î ¾ÕÀ¸·Î DVD ½ÃÀåÀÇ ÀúÀÛ±Ç ÇØÀûÇàÀ§¿¡ ´ëÇÑ ¿ì·Á°¡ ÁõÆøµÇ°í
ÀÖ´Ù°í ¸»Çß´Ù. ±×´Â "ÇØÄ¿»ç°ÇÀÌ DVD ½ÃÀå¿¡ °ËÀº ±×¸²ÀÚ¸¦ µå¸®¿ì°í ÀÖ´Ù"¸é
¼­ "DVD ¸ÞÀÌÄ¿µé°ú ÇØÄ¿µé°£¿¡ ÀúÀ۱Ǻ¸È£¸¦ µÑ·¯½Ñ ¾Ç¼øÈ¯ÀÌ °è¼ÓµÉ Áö
¸ð¸¥´Ù"°í °æ°íÇß´Ù.

hacker : ÇØÄ¿

ÇØÄ¿ hacker

hacker : ÇØÄ¿

ÄÄÇ»ÅÍ ÇØÄ¿(computer hacker)

ÇØÄ¿(hacker)

1999/08/30
Personal e-mail accounts hosted at Microsoft's Hotmail.com have been compromised,
allowing virtually anyone to access a Hotmail account without a password.
¸¶ÀÌÅ©·Î¼ÒÇÁÆ®ÀÇ ÇÖ¸ÞÀÏÀ» ÀÌ¿ëÇÏ´Â °³ÀÎ À̸ÞÀϰèÁ¤µéÀÌ À§Çè¿¡ ³ëÃâµÇ¾ú¾ú´Ù.
´©±¸³ª ÇÖ¸ÞÀϰèÁ¤À» ¾ÏÈ£¾øÀÌ Á¢±ÙÇÒ ¼ö ÀÖ¾ú´ø °ÍÀÌ´Ù.
Thanks to the work of a computer hacker, viewers visiting at least three Web sites,
and possibly more, were able to see personal e-mail accounts simply by entering a
Hotmail user name.
ÄÄÇ»ÅÍÇØÄ¿ÀÇ Á¶ÀÛÀ¸·Î Àû¾îµµ ¼¼±ºµ¥ ÀÌ»óÀÇ À¥»çÀÌÆ®¸¦ ÀÌ¿ëÇÏ´Â »ç¿ëÀÚµéÀº
ÇÖ¸ÞÀÏ ÀÌ¿ëÀÚ¸í¸¸ ÀÔ·ÂÇÏ¸é °£´ÜÇÏ°Ô ´Ù¸¥ »ç¶÷ÀÇ À̸ÞÀϰèÁ¤À¸·Î µé¾î°¡ º¼ ¼ö ÀÖ¾ú´Ù.
Microsoft says it has fixed the flaw, but Hotmail users are left wondering
who might have read their e-mail.
¸¶ÀÌÅ©·Î¼ÒÇÁÆ®´Â ¾àÁ¡À» ¼öÁ¤Çß´Ù°í ¸»ÇßÁö¸¸ ÇÖ¸ÞÀÏ »ç¿ëÀÚµéÀº ´©°¡ ÀÚ±â À̸ÞÀÏÀ»
ÀÐÁö³ª ¾Ê¾ÒÀ»±îÇÏ´Â ÀDZ¸½ÉÀ» °®°Ô µÇ¾ú´Ù.
JUST HOW LONG Hotmail's 40 million e-mail accounts may have been compromised
was not immediately known.
ÇÖ¸ÞÀÏÀÇ 4õ¸¸ À̸ÞÀϰèÁ¤ÀÌ ¾ó¸¶³ª ¿À·§µ¿¾È À§Çè¿¡ ³ëÃâµÇ¾ú´Â Áö´Â ¾ÆÁ÷ ¾Ë·ÁÁöÁö
¾Ê°í ÀÖ´Ù.
Jon Thompson, administrator of one of the sites that hosted the Hotmail exploit,
said associates of his have known about the vulnerability - and had access
to Hotmail accounts - for about eight weeks.
ÇÖ¸ÞÀÏ ÀͽºÇ÷ÎÀÌÆ®(ÇÖ¸ÞÀÏÀÇ º¸¾È»ó ÇãÁ¡À» ÀÌ¿ëÇÏ´Â »çÀÌÆ®)¼­ºñ½º¸¦ ¿î¿µÇϰí ÀÖ´Â
»çÀÌÆ® Áß ÇϳªÀÇ °ü¸®ÀÚÀÎ Á¸ Åè½¼Àº ±×ÀÇ µ¿·áµéÀÌ ¾à 8ÁÖµ¿¾È ±× ÇÔÁ¤À»
¾Ë°í ÀÖ¾ú°í ÇÖ¸ÞÀϰèÁ¤¿¡ ´ëÇØ Á¢±ÙÇÒ ¼ö ÀÖ¾ú´Ù°í ¸»Çß´Ù.
He said the culprit was MSN's new Passport service,
which allows users to click between MSN Web sites without logging in each time,
and said the vulnerability has existed since MSN launched Passport in beta form.
±×´Â ÁÖ¹üÀÌ MSNÀÇ »õ·Î¿î ÆÐ½ºÆ÷Æ®¼­ºñ½º - MSN À¥»çÀÌÆ® »çÀÌ¿¡ ¿Ô´Ù°¬´Ù ÇÏ´Â
°æ¿ì¿¡´Â ±×¶§¸¶´Ù ·Î±×ÀÎÀ» ¾ÈÇØµµ µÇ°Ô µÇ¾î ÀÖ¾ú´Ù - ¿´°í ±× Ãë¾àÁ¡Àº
MSNÀÌ º£Å¸ÆûÀ» ¹ßÇ¥ÇßÀ» ¶§ºÎÅÍ¿´´Ù°í ¸»Çß´Ù.
Christian Carrwik, the reporter who broke the story for the Swedish tabloid expressen,
½º¿þµ§ÀÇ Å¸ºí·ÎÀ̵åÆÇ ¿¢½ºÇÁ·¹¼¾¿¡ ÀÌ À̾߱⸦ ÅͶ߸° ±âÀÚ Å©¸®½ºÃ® Ä«À¨Àº
said he was tipped off to the vulnerability by a hacker during the weekend.
ÁÖ¸» µ¿¾È¿¡ ÇÑ ÇØÄ¿°¡ Á¦º¸ÇØÁá´Ù°í ¸»Çß´Ù.
That hacker told Carrwik members of the computer underground discovered the hole
late last week.
±× ÇØÄ¿´Â ÄÄÇ»ÅÍ ÁöÇÏ´ÜüÀÇ ¸â¹öµéÀÌ Áö³­ ÁÖ ´Ê°Ô ±× ±¸¸ÛÀ» ¹ß°ßÇß´Ù°í ¾ê±âÇØÁá´Ù.
Deanna Sanford, lead project manager for MSN, said the flaw was not related to Passport but added she did not know how long the vulnerability was in place.
MSNÀÇ ¼±ÀÓ ÇÁ·ÎÁ§Æ®°ü¸®ÀÚÀÎ µð³ª »÷Æ÷µå´Â ±× °áÁ¡Àº ÆÐ½ºÆ÷Æ®¿Í °ü°è°¡ ¾ø¾úÀ¸¸ç
±× Ãë¾àÁ¡ÀÌ ¾ðÁ¦ ¹ß»ýÇß´ÂÁö´Â ¸ð¸¥´Ù°í ¸»Çß´Ù.
She said the company had no way of knowing how many illicit logins of Hotmail
accounts there may have been.
±×³à´Â MSNÀÌ ÇÖ¸ÞÀÏ¿¡ ÆÐ½º¿öµå ¾øÀÌ ·Î±×ÀÎµÈ °æ¿ì°¡ ¾ó¸¶³ª ¸¹¾Ò´Â Áö ¾Ë ¼ö ¾ø´Ù°í
¸»Çß´Ù.
Thompson provided a hint - his Web page set up to perform the exploit received
over 6,000 hits before Microsoft closed the security hole.
Åè½¼ÀÌ ÈùÆ®¸¦ Á¦°øÇߴµ¥ - ÇãÁ¡À» ÀÌ¿ëÇϱâ À§ÇØ ¸¸µç À¥ÆäÀÌÁö°¡ ¸¶ÀÌÅ©·Î¼ÒÇÁÆ®°¡
º¸¾È±¸¸ÛÀ» ¸Þ¿ì±â Àü±îÁö 6000¹øÀÌ ³Ñ´Â ÈýÆ®¼ö¸¦ ±â·ÏÇß´Ù´Â °ÍÀÌ´Ù.

crack Å©·¢
(1) ÄÄÇ»ÅͽýºÅÛ¿¡ ħÅõÇÏ´Â °Í. ÀÌ ¿ë¾î´Â 80³â´ë Áß¹Ý ÇØÄ¿µéÀÌ º¸¾Èü°è¿¡
¸ô·¡ µé¾î°¡´Â °Í¸¸À» ¸ñÀûÀ¸·Î ÇÏ´Â »ç¶÷µé°ú ÀڽŵéÀ» ±¸º°Çϱâ À§ÇØ ¸¸µé¾î³½
¿ë¾îÀÌ´Ù. Å©·¡Ä¿´Â º¸¾Èü°è ħÅõ¸¸ ¸ñÀûÀ¸·Î ÇÏ´Â ¹Ý¸é ÇØÄ¿µéÀº ÄÄÇ»ÅͽýºÅÛ
¿¡ ´ëÇÑ Áö½ÄÀ» ¾ò°Å³ª Àç¹ÌÀÖ´Â Àå³­À» Ä¡´Âµ¥ ÀڽŵéÀÇ Áö½ÄÀ» ÀÌ¿ëÇϴµ¥ ´õ
°ü½ÉÀÌ ÀÖ´Ù. ÇØÄ¿µéÀº ¾ÆÁ÷µµ ÀڽŵéÀÌ Å©·¡Ä¿¿Í ±¸º°µÈ´Ù°í ÁÖÀåÇÏÁö¸¸ ¾ð·Ð¿¡¼­´Â
±¸º°¿¡ ½ÇÆÐÇß°í µû¶ó¼­ ÇØÅ©¿Í Å©·¢Àº ÈçÈ÷ ±¸ºÐ¾øÀÌ ¾²ÀÌ´Â ¸»ÀÌ µÆ´Ù.
(2)º¹»ç¹æÁö³ª µî·Ï±â¼úÀ» ¹«·ÂÈ­½ÃÅ´À¸·Î½á ºÒ¹ýÀ¸·Î ¼ÒÇÁÆ®¿þ¾î¸¦ º¹Á¦Çϱâ.
(1) To break into a computer system. The term was coined in the mid-80s
by hackers who wanted to differentiate themselves from individuals whose
sole purpose is to sneak through security systems. Whereas crackers sole
aim is to break into secure systems, hackers are more interested in gaining
knowledge about computer systems and possibly using this knowledge for
playful pranks. Although hackers still argue that there's a big difference
between what they do and what crackers do, the mass media has failed to
understand the distinction, so the two terms -- hack and crack -- are
often used interchangeably.
(2) To copy commercial software illegally by breaking (cracking) the various
copy-protection and registration techniques being used.

US Government experts say they have received reports that hackers are looking for ways to take advantage of a critical flaw in Microsoft's Windows.
* critical flaw: Ä¡¸íÀûÀÎ °áÇÔ


°Ë»ö°á°ú´Â 25 °ÇÀ̰í ÃÑ 158 ¶óÀÎÀÇ ÀÚ·á°¡ Ãâ·ÂµÇ¾ú½À´Ï´Ù.    ¸ÇÀ§·Î
(È­¸é ¾îµð¼­³ª Alt+Z : ´Ü¾î ÀçÀÔ·Â.)
(³»¿ë Áß °Ë»öÇÏ°í ½ÍÀº ´Ü¾î°¡ ÀÖÀ¸¸é ±× ´Ü¾î¸¦ ´õºíŬ¸¯Çϼ¼¿ä.)
    

hit counter