pub-7594223835742334 Sebuah blog diwaktu luang: 05/06/11

Friday, May 6, 2011

Free Symbian Application For E63, E72 and E72 Part 3 [by Hacker Blitar]

 Free Symbian Application For E63, E72 and E72 Part 3
 
 
Code:
http://www.4*shared.com/file/164445804/a10f1882/RomPatcherPlus_23_modded_molos.html
Code:
http://www.4*shared.com/file/164000907/600b37eb/ParagonTechnologieHandyShellv2.html
Code:
http://www.4*shared.com/file/107610712/1f5a0698/SuperScreenshot_s60_v105_unsig.html
Code:
http://www.4*shared.com/file/117419454/6c7936ef/TraffControl_v100_S60v3_Symbia.html
Code:
http://www.4*shared.com/file/111683341/4cf2f380/tenCubeWaveSecurev30143S60v3Sy.html
Code:
http://www.4*shared.com/file/213033207/cfa40666/CellTrack91_v1_0_9_signed-Mobi.html
Code:
http://www.4*shared.com/file/214746883/50dbefb5/Color_Editor_EN.html
Code:
http://www.4*shared.com/file/179613392/98c5f9e6/vHome_323g_unsign.html
Code:
http://www.4*shared.com/file/180953740/8c020d31/GestLogo.html
Code:
http://www.4*shared.com/file/183108296/145e8423/ExtraPowerModulePack_v400.html
Code:
http://www.4*shared.com/file/184536528/ec141711/UltraPyModulePack_302.html
Code:
http://www.4*shared.com/file/185930373/f6e2d27d/UltraPowerModulePack-E.html
Code:
http://www.4*shared.com/file/155100003/8b13178f/TTPod_v363_S60v3_EN_Translated.html
Code:
http://www.4*shared.com/file/111496198/c472998e/AimsMigitalSmartRecorderv40S60.html
Code:
http://www.4*shared.com/file/118701670/d2ae4702/SymbianGuruCallGuardv100S60v3S.html
Code:
http://www.4*shared.com/file/164000907/600b37eb/ParagonTechnologieHandyShellv2.html
Code:
http://www.4*shared.com/file/130848531/cb971e4c/BatteryLife_s60v3-5_v110_Signe.html
Code:
http://www.4*shared.com/file/178492905/b987d4c1/MelonMobileAdvancedBatterySave.html
Code:
http://www.4*shared.com/file/187135010/77e5f96e/Digitalfootmark_Lock_Screen_v0.html
Code:
http://www.4*shared.com/file/176378043/a6ee9a9f/skin_freeisms.html tergantung t4 instalasinya dimana c atao e
Code:
http://www.4*shared.com/file/176380892/2db03ac2/DivXPlayer093_S60_3rd.html
Code:
http://www.4*shared.com/file/114250718/6cdc1153/ping_for_s60.html
Code:
http://www.4*shared.com/file/108091109/3dc32db3/ALONSoftwareContactGuidev121S6.html
Code:
http://www.4*shared.com/file/175143744/d1445ffe/SPBSoftwareWeatherv20366S60v3v.html
Code:
http://www.4*shared.com/file/111393037/853bc628/TektronicStopwatchPlusv102290S60v3SymbianOS9xUnsignedkracked-CODePDA.html
Code:
http://www.4*shared.com/file/111365624/a69f126c/Talkonaut_v55672.html
Code:
http://www.4*shared.com/file/111576184/a0b38920/KillermobileTotalRecallv41S60v3v5SymbianOS9xUnsignedkracked-FoXPDA.html
Code:
http://www.4*shared.com/file/111393457/d468c972/_2__PlanTask_v102_S60v3_S60v5_EN.html
Code:
http://www.4*shared.com/file/108546649/696a9389/SBSHFExplorerProv201S60v3S60v5SymbianOS9xkracked-Symbian.html
Code:
http://www.4*shared.com/file/110389875/f5e0f1d8/Profile_Scheduler_110_0_3rdEd_unsigned.html
Code:
http://www.4*shared.com/file/110331680/bae82d6c/CapreeiONBatteryTimerv104S60v3SymbianOS9xUnsignedkracked-FoXPDA.html
Code:
http://www.4*shared.com/file/117520689/5516068e/GoogleMaps.html
Code:
http://www.4*shared.com/file/107597062/7e67870c/ttpod_skins_v34_-_35x.html
Code:
http://www.4*shared.com/file/111575577/ab9ec367/mig33v420HandlerUI121.html
Code:
http://www.4*shared.com/file/115013416/85a8219c/python145.html
Code:
http://www.4*shared.com/file/107578460/7033e0cb/LCG_Jukebox242inclJ-Renew136byMTOiNishithSaNoX.html
Code:
http://www.4*shared.com/file/129003602/ec15448d/LCG_Jukebox_v244_S60v3_S60v5_Signed_kracked.html
Code:
http://www.4*shared.com/file/107606506/1aa351c2/ALONSoftwareMP3Dictaphonev2952S60v3S60v5SymbianOS9xkracked-Symbian.html
Code:
http://www.4*shared.com/file/112121045/858d73cf/mute-camerafor_nonhacked.html
Code:
http://www.4*shared.com/file/145868448/def52fc6/MelonMobileAdvancedBlockerv214242S60v3S60v5SymbianOS9xkracked-Symbian.html
Code:
http://www.4*shared.com/file/145869366/b68811a3/WeFi_01_01_01_81.html
Code:
http://www.4*shared.com/file/145869968/5ca7b972/SymbianGuruPhoneGuardianv30S60v3SymbianOS91UnsignedkrackedProperReadNFO-illusion.html
Code:
http://www.4*shared.com/file/141042783/eab51261/TrustMobiMobiMessagev2311S60v3SymbianOS9xUnsignedkracked-TgSPDA.html
Code:
http://www.4*shared.com/file/111693130/4a50a80f/Snaptuicongede.html
Code:
http://www.4*shared.com/file/143444333/272d6f95/UtaIrcIconGede.html
Code:
http://www.4*shared.com/file/143444921/ddafba2e/Condetsoft_Kamus_Lengkap_v401_Engllish-Indonesian_RegisterWithAnykey_PGTeam.html
Code:
http://www.4*shared.com/file/143445750/57cb5610/SHAPEServicesIMPlusv811S60v3SymbianOS9xkracked-TgSPDA.html
Code:
http://www.4*shared.com/file/145299860/7075efc0/WINRARPlugins60v3.html
Code:
http://www.4*shared.com/file/145400770/c473575a/GlobeSoftAl-Moazenv200S60v3SymbianOS9xUnsignedkracked-mEnPDA.html
Code:
http://www.4*shared.com/file/145854365/9a4be214/MediaSafev208DateCode072707S60v3S60v5SymbianOS9xUnsignedkracked.html
Code:
http://www.4*shared.com/file/126149347/59f15205/MobisophyInteractiveVoiceCallMasterv2521390S60v3S60v5Unsignedkracked-mEn.html
Code:
http://www.4*shared.com/file/111731639/1d2605a1/VerySoftNiceLightv100S60v3SymbianOS91Unsignedkracked-BiNPDA.html
Code:
http://www.4*shared.com/file/111705544/e652bc05/BTSwitch_v100_freeware_by_junnikokukiopdanetcn_unsigned.html
Code:
http://www.4*shared.com/file/111501776/e25f6cd8/EpocwareHandyCalendarv201S60v39xIconAddedUnsignedkracked-DiL.html
Code:
http://www.4*shared.com/file/111500925/b4038348/EnpronomicsSolutionSmartSOSv110S60v3SymbianOS9xUnsignedkracked-DiL.html
Code:
http://www.4*shared.com/file/111497875/932d9457/QuickoffPDFReadLEv25129GROckracked-illusion.html
Code:
http://www.4*shared.com/file/111495608/24a9bac/AbbyyBusinessCardReaderv100229S60v3SymbianOS91Unsignedkrackedillusion.html
Code:
http://www.4*shared.com/file/111401882/a2aa2096/MobiFunSoftAgendaSaverv10S60v3SymbianOS91UnsignedkrackedRepackReadNFO-illusion.html
Code:
http://www.4*shared.com/file/111401748/e596c1b9/MobisophyPhoneAlonev2002200S60v3SymbianOS91Unsignedkracked-illusion.html
Code:
http://www.4*shared.com/file/111396868/513e8e76/Jbak_Reboot_v10.html
Code:
http://www.4*shared.com/file/111357692/41a1dcc9/Personality_Signed_by_drAdeLante.html
Code:
http://www.4*shared.com/file/111358168/7bc02fcb/Astrology_Signed_by_drAdeLante.html
Code:
http://www.4*shared.com/file/110784417/2d5554dd/EpocwareHandyShellv104S60v3SymbianOS91Regged-illusion.html
Code:
http://www.4*shared.com/file/110588418/baf457ff/bestcalculator_s60_3_v_1_05.html
Code:
http://www.4*shared.com/file/110588631/f29a59b7/bestcallnotes_s60_3_v_1_00_sw.html
Code:
http://www.4*shared.com/file/110395777/670441c1/Smartphoneware_Best_Full_Screen_Caller_v301S60v3_SymbianOS.html
Code:
http://www.4*shared.com/file/110333441/c8d74e13/RavensoftBatteryExtenderv108S60v3SymbianOS91UnsignedkrackedRepack-CODePDA.html
Code:
http://www.4*shared.com/file/110331120/4548d363/SBSHMobileSoftwareRemindersv110S60v3SymbianOS9xUnsignedkrackedProper-CODePDA.html
Code:
http://www.4*shared.com/file/108102427/3a7fbee7/Killer_Mobile_TotalRecall_v330_S60v3-5_SymbianOS9x_incl_Keygen-BiNPDA.html
Code:
http://www.4*shared.com/file/108092883/8abdac4/Hand_Reading_Signed_by_drAdeLante.html
Code:
http://www.4*shared.com/file/107613223/570e08c8/InTouchWirelessServicesFakeItv100S60v3SymbianOS91Unsignedkracked-illusion.html
Code:
http://www.4*shared.com/file/107610682/cf5ad7e6/FontRouterMan_V106_RC3_FP1.html
Code:
http://www.4*shared.com/file/107605139/b48d18a2/NokiaMapsv204503S60v3SymbianOS91Unsignedkracked-illusion.html
Code:
http://www.4*shared.com/file/107601671/5417d446/Joikuspotpremiumv250812Unsignedkracked-CODePDA.html
Code:
http://www.4*shared.com/file/132076896/7b776e91/SymbianGuruCuteKeysv11S60v3SymbianOS91UnsignedkrackedProperReadNFO-illusion.html
Code:
http://www.4*shared.com/file/111577075/e952a82b/SkyeStreamSkyeCallerProIIv202S60v3S60v5SymbianOS9xUnsignedkracked-DiL.html
Code:
http://www.4*shared.com/file/111403328/1ecc0668/FakeError_3rd_s60_by_drAdeLante.html
Code:
http://www.4*shared.com/file/111390826/f78139a9/NokiaFrenView_s60v31_v0911.html
Code:
http://www.4*shared.com/file/111405773/d60bdca5/SmartMovie_v410_full.html
Code:
http://www.4*shared.com/file/112129534/7eb43f9a/EpocwareHandyAlarmv105S60v3SymbianOS9HSpda.html
Code:
http://www.4*shared.com/file/117529981/2d99860b/Free-iSMSv103S60v3S60v5SymbianOS9xUnsignedFreeware-junnikokuki.html
Code:
http://www.4*shared.com/file/132335104/2acbf4fb/KMS8withPatch.html
Code:
http://www.4*shared.com/file/111366378/c620c707/Nokia_Search_v306.html
Code:
http://www.4*shared.com/file/111406479/262d240c/PsilocPhotoTaggerv205S60v3SymbianOS91Unsignedkracked-BiNPDA.html
Code:
http://www.4*shared.com/file/110390420/b18f6e4c/PsilocTotalForwarderv10S60v3SymbianOS91UnsignedkrackedReadNFO-illusion.html
Code:
http://www.4*shared.com/file/107578320/1110334a/AnimSpriteLite_234_s60v3x_selfsigned.html

Free Symbian Application For E63, E72 and E72 Part 2 [by Hacker Blitar]

 Direct Link To Symbian Application, By Hacker Blitar ..

English.ChineseTalkingDictionary with pinyin&voice
PhotoRite photoeditor..reg code 0
SmartSetting v3.03 free shortcut
WinXPrestart restart n shutdown
RingtoneMaker
FreeUnRAR unpack rar di hp
Bluetooth guard
MP3Dictaphone perekam voice
kamus ke Hongkong with voice
Photofun+Template
HandyAlarmPRO reminder
HandyCalculator1.02 htg sampe 99.999.999.999
FullScreenWallpaper
PhoNetInfo2.50 detail E71
BestSafev3.0 save password
Anti Nyamuk bwt ngusir nyamuk
Mcleaner1.41 bwt blacklist n block sms
EasyBusy1.0 bwt blacklist
SafeDepositBoxV1.02 hide semua file
Japan2Go jalan2 ke Japan
Korea2Go jj ke Korea
Downloader bwt donlod rapid,mega,4*shared dr hp
HandyBlacklist3.03
BestProfiles2.1 set profile
Phone RemoteControlngontrol pc dgn hp pake blutut n WIFI
Shazam ID track jdl lagu ..never expired
SPB Walletv2.111962 bwt yang pro
SMS diary backup sms jadiin format HTML
MagicMessageManager hide sms
ActiveSMSLock lock SMS
Phone Guardian tracking simcard, support GPS
Handy Safe Pro safe password di hp
HandyWeather7 update cuaca
IRremote1.04 jadiin remote pake infrared
MumSMSv5.091 hide SMS
RemindMe v354 pengingat SMS,email dan misscall
AdvancedDeviceLocksProv202 lock device
MenuEditor rename aplikasi
SMSmonitor ngintip sms yayank, hrs diinstall di hp dia
Smartmovie4.15 full version
GuardianPlatinum1.05 protect hp
KamusEng-Indov5
NoCameraSound
ThemeDIYbwt themes sndri
BaterrySaverhemat batere
SMSpreview1.20sms otomatis nongol
Smartguardv4.0 hide app,message,galery
RemoteS60Prongontrol hp dgn pc
MessageInTime sms scheduler
HandyPhoneGuard protect file..
LightControl1.36 led eji bisa jd senter
Xplore1.40
AdvancedCallManagerv2.77
OperatorLogoChanger support .png
iONbatteryTimer1.04 liad sisa batere
UltimateSMSv3.2.3
Gravityv1.30.6350
GreenCharging otomatis warning klo hp udh full charge
SymVPNv10080konek vpn
RescoPhotoViewerv6 view image
BlackBallerV3.0 blacklist
PowerBootv3 autostart
RAMbooster
BestMenu
AdvanceSMSv105
UVR6.1.2 call recorder no beep
MessageMirror3.0
BestCrypto enkripsi file
SallingClicker ngontrol pc via hp
HandyWeather7
KMS9.0.49
Joikuspotv2.6.09hp jd hotspot
SMSanimatedv1.2
EmozePro email client


#Hilangkan tanda * pada LINK DOWNLOAD

Free Symbian Application For E63, E72 and E72 [by Hacker Blitar]

 Kumpulan Aplikasi Symbian..
[sorry REPOST hehe.. ]

JbakTaskMan_v099_Full_R15 [task manager kek di windoz]
Stopwatch_Plus_v102_S60
AbbyyBusinessCardReaderv100229S60v3SymbianOS91 [moto kartu nama jadi contact name .... keren gan]
ActiveFile_140186_S60_3_2 [bisa tau file apa aja yg aktif, sekaligus bisa buad backup sms]
AnimSpriteLite_233_s60v3x [nampilin animasi di tampilan depan eji lu]
ASGATechIslamicadzan
best_crypto_s60_3rd [nge-crypt file apapun]
BetepSwitchOffV20S60v3Unsignedbikin_hp_off_otomati s_dgn_setting_waktu
Blacberry_Font_Shablon
CPUMonitor_110_S60_3rd
devicestatus_1195

EMobiStudioMemoryUpProfessionalMobileRAMBoosterv27 0S60
eqshutdown_3rdunsigned
Facebook_Mobile
Flash_Lite_3_Developer_Edition
JoikusoftJoikuSpotPremiumv240657S60v3S60v5SymbianO S9 [eji jadi akses point, wifi]
kamus-indonesia
logo_operator [nge hide operator logo, atopun ganti sesuka hati]
MicroWeather_S60_3rd_V200 [prakiraan cuaca]
MP3_Talking_Clock_Alarm_Files
multiscanner [camera eji jadi scaner]
Nokia_Search_v306
Nokia_Mobile_Dictionary_indonesia [bukan kamus ya....]
oMyPhonev202s60v3SymbianOS9xRetail-gkataria_menu_like_IPONE
opera_s60_865_EMEA_70s_30
OTStudioNTorchLitev100S60v3SymbianOS91 [flash light jadi senter, buad cari kodok ....... Reg.Kode: 25600]
PocketQuranv0962bS60v3
PocketTorchAquaCalendarv505S60v3SymbianOS91
PsilocirRemotev100S60v3SymbianOS91 [remot tipi dan perlengkapan yg lain yg pake remod]
Psiloc_FontMagnifier_v130_S603
Purring_Kitty [hape lu bisa getar kek vibrator, getaran bisa di atur semau lu .................. ]
putty_s60v3_15beta2 [buad koneksi SSH, ke web server ato pun yg lainnya yg mendukung SSH]
PythonForS60_1_4_5_3rdEd [Installer Phyton, buad ngejalanin file *.py]
Re-start
Handy_Alarm_S60_3edition_v101_Full [setting alarm se-enak jidat lu , simple gak pake repod]
EMobiStudioMemoryUpProfessionalMobileRAMBoosterv27 0S60 [bisa buad deprak jugak, test by Me]
RavensoftBatteryExtenderv108S60v3 [penghemat batre jd tahan lama Test by Me]
CrystalArabic [ bikin hape bisa nulis arab .... Test By ME ]


#Hilangkan tanda * pada LINK DOWNLOAD

Worm Virus [By Hacker Blitar]

W O R M

A computer worm is a self-replicating malware computer program, which uses a computer network to send copies of itself to other nodes (computers on the network) and it may do so without any user intervention. This is due to security shortcomings on the target computer. Unlike a computer virus, it does not need to attach itself to an existing program. Worms almost always cause at least some harm to the network, even if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer.


Payloads

Many worms that have been created are only designed to spread, and don't attempt to alter the systems they pass through. However, as the Morris worm and Mydoom showed, even these "payload free" worms can cause major disruption by increasing network traffic and other unintended effects. A "payload" is code in the worm designed to do more than spread the worm–it might delete files on a host system (e.g., the ExploreZip worm), encrypt files in a cryptoviral extortion attack, or send documents via e-mail. A very common payload for worms is to install a backdoor in the infected computer to allow the creation of a "zombie" computer under control of the worm author. Networks of such machines are often referred to as botnets and are very commonly used by spam senders for sending junk email or to cloak their website's address. Spammers are therefore thought to be a source of funding for the creation of such worms, and the worm writers have been caught selling lists of IP addresses of infected machines. Others try to blackmail companies with threatened DoS attacks.

Backdoors can be exploited by other malware, including worms. Examples include Doomjuice, which spreads better using the backdoor opened by Mydoom, and at least one instance of malware taking advantage of the rootkit and backdoor installed by the Sony/BMG DRM software utilized by millions of music CDs prior to late 2005.[dubious – discuss]
Worms with good intent

Beginning with the very first research into worms at Xerox PARC, there have been attempts to create useful worms. The Nachi family of worms, for example, tried to download and install patches from Microsoft's website to fix vulnerabilities in the host system–by exploiting those same vulnerabilities. In practice, although this may have made these systems more secure, it generated considerable network traffic, rebooted the machine in the course of patching it, and did its work without the consent of the computer's owner or user.

Some worms, such as XSS worms, have been written for research to determine the factors of how worms spread, such as social activity and change in user behavior, while other worms are little more than a prank, such as one that sends the popular image macro of an owl with the phrase "O RLY?" to a print queue in the infected computer. Another research proposed what seems to be the first computer worm that operates on the second layer of the OSI model (Data link Layer), it utilizes topology information such as Content-addressable memory (CAM) tables and Spanning Tree information stored in switches to propagate and probe for vulnerable nodes until the enterprise network is covered.[6]

Most security experts regard all worms as malware, whatever their payload or their writers' intentions.
Protecting against dangerous computer worms

Worms spread by exploiting vulnerabilities in operating systems. Vendors with security problems supply regular security updates (see "Patch Tuesday"), and if these are installed to a machine then the majority of worms are unable to spread to it. If a vulnerability is disclosed before the security patch released by the vendor, a Zero-day attack is possible.

Users need to be wary of opening unexpected email, and should not run attached files or programs, or visit web sites that are linked to such emails. However, as with the ILOVEYOU worm, and with the increased growth and efficiency of phishing attacks, it remains possible to trick the end-user into running a malicious code.

Anti-virus and anti-spyware software are helpful, but must be kept up-to-date with new pattern files at least every few days. The use of a firewall is also recommended.

In the April–June, 2008, issue of IEEE Transactions on Dependable and Secure Computing, computer scientists describe a potential new way to combat internet worms. The researchers discovered how to contain the kind of worm that scans the Internet randomly, looking for vulnerable hosts to infect. They found that the key is for software to monitor the number of scans that machines on a network sends out. When a machine starts sending out too many scans, it is a sign that it has been infected, allowing administrators to take it off line and check it for viruses.

Cara Hacking para Hacker [By Hacker Blitar]

Cara melakukan hacker

1. Hacktivist ; hacktivis adalah hacker yang menggunakan teknologi untuk mengumumkan pandangan sosial, ideologi, agama, atau pesan politik.Dalam kasus yang lebih ekstrem, hacktivism digunakan sebagai alat untuk Cyberterrorism.
2. Meretas komputer ; meretas komputer merupakan Sebuah contoh umum dari eksploitasi keamanan adengan cara injeksi SQL,melalui lubang keamanan yang mungkin disebabkan dari praktik pemrograman bawah standar. Eksploitasi lain akan dapat digunakan melalui FTP, HTTP, PHP, SSH, Telnet dan beberapa halaman web.
3. Vulnerability scanner ; Sebuah Vulnerability scanner adalah alat yang digunakan untuk dengan cepat mengecek komputer pada jaringan untuk diketahui kelemahan.Hacker juga biasanya menggunakan port scanner.port scanner ini adalah alat untuk melihat port pada komputer tertentu untuk mengakses komputer, dan kadang-kadang akan mendeteksi program nomor versinya.firewall melindungi komputer dari penyusup dengan membatasi akses ke port
4. Password cracking ; Password cracking adalah sebuah aplikasi yang menangkap paket data, yang dapat digunakan untuk mencuri password dan data lain dalam transit melalui beberapa jaringan.
5. Trojan horse ; Trojan horse adalah program yang tampaknya akan melakukan satu hal, tetapi sebenarnya melakukan hal lain.Sebuah Trojan horse dapat digunakan untuk mendirikan sebuah pintu belakang dalam sebuah sistem komputer sedemikian rupa sehingga penyusup dapat memperoleh akses upa seckemudian. (Nama trojan horse merujuk pada kuda dari Perang Troya, dengan fungsi secara konseptual menipu para prajurit untuk membawa seorang penyusup masuk.)
6. Virus ; Virus adalah sebuah program replikasi diri yang menyebar dengan menyisipkan salinan dirinya ke dalam kode executable lain atau dokumen.Dengan demikian, virus komputer berperilaku mirip dengan virus biologis yang menyebar dengan memasukkan dirinya ke dalam sel-sel hidup.
7. Worm ; Seperti virus, worm juga merupakan program replikasi diri.Sebuah worm berbeda dari virus itu menyebar melalui jaringan komputer tanpa campur tangan pengguna.Banyak orang bingung bingung membedakan istilah "virus" dan "worm".

Sejarah Hacker [By Hacker Blitar]

Peretas (Inggris: hacker) adalah orang yang mempelajari, menganalisa, memodifikasi, menerobos masuk ke dalam komputer dan jaringan komputer, baik untuk keuntungan atau dimotivasi oleh tantangan.
[sunting] Sejarah

Terminologi peretas muncul pada awal tahun 1960-an di antara para anggota organisasi mahasiswa Tech Model Railroad Club di Laboratorium Kecerdasan Artifisial Massachusetts Institute of Technology (MIT). Kelompok mahasiswa tersebut merupakan salah satu perintis perkembangan teknologi komputer dan mereka berkutat dengan sejumlah komputer mainframe. Kata bahasa Inggris "hacker" pertama kalinya muncul dengan arti positif untuk menyebut seorang anggota yang memiliki keahlian dalam bidang komputer dan mampu membuat program komputer yang lebih baik daripada yang telah dirancang bersama.

Kemudian pada tahun 1983, istilah hacker mulai berkonotasi negatif. Pasalnya, pada tahun tersebut untuk pertama kalinya FBI menangkap kelompok kriminal komputer The 414s yang berbasis di Milwaukee, Amerika Serikat. 414 merupakan kode area lokal mereka. Kelompok yang kemudian disebut hacker tersebut dinyatakan bersalah atas pembobolan 60 buah komputer, dari komputer milik Pusat Kanker Memorial Sloan-Kettering hingga komputer milik Laboratorium Nasional Los Alamos. Satu dari pelaku tersebut mendapatkan kekebalan karena testimonialnya, sedangkan 5 pelaku lainnya mendapatkan hukuman masa percobaan.

Kemudian pada perkembangan selanjutnya muncul kelompok lain yang menyebut-nyebut diri sebagai peretas, padahal bukan. Mereka ini (terutama para pria dewasa) yang mendapat kepuasan lewat membobol komputer dan mengakali telepon (phreaking). Peretas sejati menyebut orang-orang ini cracker dan tidak suka bergaul dengan mereka. Peretas sejati memandang cracker sebagai orang malas, tidak bertanggung jawab, dan tidak terlalu cerdas. Peretas sejati tidak setuju jika dikatakan bahwa dengan menerobos keamanan seseorang telah menjadi peretas.

Para peretas mengadakan pertemuan tahunan, yaitu setiap pertengahan bulan Juli di Las Vegas. Ajang pertemuan peretas terbesar di dunia tersebut dinamakan Def Con. Acara Def Con tersebut lebih kepada ajang pertukaran informasi dan teknologi yang berkaitan dengan aktivitas peretasan.

Peretas memiliki konotasi negatif karena kesalahpahaman masyarakat akan perbedaan istilah tentang hacker dan cracker. Banyak orang memahami bahwa peretaslah yang mengakibatkan kerugian pihak tertentu seperti mengubah tampilan suatu situs web (defacing), menyisipkan kode-kode virus, dan lain-lain, padahal mereka adalah cracker. Cracker-lah menggunakan celah-celah keamanan yang belum diperbaiki oleh pembuat perangkat lunak (bug) untuk menyusup dan merusak suatu sistem. Atas alasan ini biasanya para peretas dipahami dibagi menjadi dua golongan: White Hat Hackers, yakni hacker yang sebenarnya dan cracker yang sering disebut dengan istilah Black Hat Hackers.