Download - Hackers and hacking in bangladesh
1 | P a g e
Bangladeshi Cyber , An Emblem of Hacking
Taibul Islam
2013-3-10-020
ENG 102
Section : 15
Ms. Israt Jahan
12th
August , 2014
2 | P a g e
Index :
1. Abstract page - 3
2. Introduction page -4
3. Hack and Hacking page - 5
4. Hackers page - 6
5. History of Hacking in Bangladesh page - 7
6. Main or Negative Uses page - 8
7. Positive Uses page - 9
8. Kill or Cure page - 10
9. Conclusion page - 11
10. References page – 12
11. People who gave the interview page – 13
12. Sample Question for solving term paper page - 14 – 16
3 | P a g e
Abstract:
Hackers and Hacking are two related terms which really means the abuse of some
kind of technology . Mainly these kinds of words are related with computer terms . In our
country Bangladesh , these terms are now so much well known that people think these
are some kind of negative matter . The title of this term paper is giving a overall
massage about the hacking sector also . So , this term paper will help one to come at a
point which is the real meaning of Hacking and hacking sector in our country
Bangladesh.
4 | P a g e
Introduction :
In our modern Bangladesh where the uses of technology is increasing day by day
, the abuses of those technology is also increasing . People are involved in technology for
their mutual benefit or profit but some people are also involved in abuses . The
honorable government have their law for the using of technology where the abuses rate
is increasing and people are now so much aware of that . The affected users always want
the law should be obeyed , as hacking create its huge face among the technology users .
5 | P a g e
Hack and Hacking:
Clearly, “hack” is the word of the moment ; its technological connotations
have proliferated in both scope and presence . It was at M.I.T. that “hack” first came to
mean fussing with machines . In the nineteen hundred sixty , the term seems to have
migrated from the M.I.T. context to computer enthusiasts in general and in time became
an essential part of their lexicon . ( source: www.newyorker.com/tech/elements/a-short-
history-of-hack )
Hacking may be done in many ways . Computer hacking , including some types of
activity, e.g. Hacker ( programmer subculture ) , activity within the computer programmer
subculture and Hacker ( computer security ) , to access computer networks , legally or
otherwise . Sometimes it may causes computer crimes .
Phone hacking , the practice of intercepting telephone calls or voicemail messages without
the consent of the phone's owner .
Illegal taxicab operation .
Pleasure riding , horseback riding for purely recreational purposes .
Shin-kicking The act of stealing jokes .
Hacking , an area within , Roof and tunnel hacking . This kind of hacking called offline-
hacking.
6 | P a g e
Hackers:
Hacker is a term that has been used to mean a variety of different things in
computing .
Currently , "hacker" is used in two main conflicting ways ,
1. as someone who is able to subvert computer security ; if doing so for malicious
purposes , the person can also be called a cracker .
2. an adherent of the technology and programming subculture .
In computer security , a hacker is someone who focuses on security mechanisms of
computer and network systems . While including those who endeavor to strengthen such
mechanisms , it is more often used by the mass media and popular culture to refer to
those who seek access despite these security measures . That is , the media portrays the
'hacker' as a villain .
In the programmer subculture of hackers , a hacker is a person who follows a spirit of
playful cleverness and loves programming . It is found in an originally academic
movement unrelated to computer security and most visibly associated with free software
and open source . It also has a hacker ethic , based on the idea that writing software and
sharing the result on a voluntary basis is a good idea , and that information should be
free , but that it's not up to the hacker to make it free by breaking into private
computer systems .
7 | P a g e
History of Hacking in Bangladesh :
Maybe the Hacking first started in 1947 by William Shockley who invented the
transistor and demonstrates its use for the first time . The first transistor consisted of a
messy collection of wires , insulators and germanium . According to a recent poll
on CNN's website , the transistor is believed to be the most important discovery in the
past 100 years .
The history of hacking in Bangladesh is actually unknown to all , on the other hand this
sector is an increasing or raising part in our country at present . Mostly the abuses of
internet means the main part of hacking in Bangladesh and it is increasing now a days .
8 | P a g e
Main or Negative Uses :
Hacking is mainly known for its negative uses . People think the hacking is only
for bad or harm someone or some group who or which is related with technology .
Actually , the hacking is mainly for that . Hackers through their terms for hacking
technologies . From the beginning the Hackers think that they always do the right thing
which should be done who are Hacked by them . These kind of Hackers are known as
The black hat hackers , who hacked the technology only for some kind of jealousy or for
their personal benefit . In our country Bangladesh these kind of Hacking is increasing
more and more among the new users of technology , and the people called these kind of
term as the Cyber War. They always target mostly Financial data , Intellectual property ,
personal data , System asses etc .
9 | P a g e
Positive Uses:
The uses of Hacking can be positive by hackers . These Kind of hack or hackers
are often known as the White hat Hackers . These kind of Hacking mainly done only to
save Hacked technology or secure the technology from hacking . Most of the Hackers
first starts their Hacking life by using this type of Hacking , sometimes they also work
as a middle group for hack and hacking terms or technology . People mostly think that
these term should be increased only for its positive side . These kind of uses can be
increased if people want this kind of uses .
10 | P a g e
Kill or Cure :
There are a law to stop the Hacking , and it says that if a person intentionally
causes loss or damage to any other person or organization by any act which destroys ,
deletes or alters any information residing in a computer resource or diminishes its value
or utility or affects it by any means , would be considered to have engaged in hacking.
So for the cyber crime this law can be applied in everywhere . And the main thing is
awareness of the users and people .
11 | P a g e
Conclusion :
It is clear to everyone that there are mainly two kind of hackers , White hat and
Red hat hackers. There have another hackers who try to call them as Gray or Brown hat
hackers . Hackers identity can be defined in many ways but these should be stopped or
in some case these should be cured not only from Bangladesh but also from the whole
world . So , the reader of this term paper , I think , a real technology user and always uses
his / her technology only for using not for abusing .
12 | P a g e
References :
a) Hacking
b) Hacker
c) Hacking Term
d) History of hacking
## These following terms are collecting from –
1) Wikipedia
2) Wikimedia
3) Google
## The terms of Hacking sectors of Bangladesh from -
A) TeachtuneBD.com
13 | P a g e
People who gave the interview :
1. Md. Ismail Hossain , CSE department , IUB
2. Rafaetul Kabir Adeab , CSE department , IUB
3. Code – A , EWU ( Hacker )
4. Sabbir Ahmed , CSE department, AIUB
5. Md. Tanvir Hossain Tuhin , CSE department , AIUB
6. Al Masum Fahim , CSE department , AUST
There are another two people who didn’t like to give their identity .
These people are giving their valuable time and ideas to complete this term
paper.
14 | P a g e
Bangladeshi Cyber , A Emblem of Hacking
Interviews for the term paper of ENG – 102
Questionnaires
(If you are a “Hacker” your name and detail must be hidden)
Student name :
University name :
Department :
1. What do you mean by Hack or Hacking ?
a) It is full of logic
b) It is nothing but hell
c) It should be stopped
d) It should be done in an increasing rate
2. Are you a Hacker ? (This answer will be hidden)
a) No
b) Yes
c) Want to be
d) Don’t want to be
3. What kind of Hacking should be done ?
a) White Hat
b) Red Hat
c) None of them
d) Both of them
15 | P a g e
4. Is it so much helpful ?
a) Yes
b) No
c) Can be
d) Must be
5. Hacking increases ideas – Do you agree with that ?
a) Yes
b) Obviously
c) Only for sometime
d) No
6. Hackers are so much genius – Is it true ?
a) Yes
b) Not always
c) No
d) May be
7. Will Hacking make our country developed ?
a) Yes
b) No
c) Can be
d) Must be
8. How many technologies you Hacked ? (This answer will be hidden)
a) Less than 100
b) More than 100
c) Didn’t do
d) Can’t count
16 | P a g e
9. How many technologies that you use is Hacked ? (This answer will be hidden)
a) Mostly all
b) Not any
c) Half of them
d) I Hacked others
10. Your idea or philosophy about Hacking in Bangladesh -------------------------
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
Your signature :
Date :