Friday, March 20, 2020
Free Essays on Hackers
. This is where the hacker takes guesses at the password or has a crack   program to crack the password protecting the system.     2) Finding back doors is another way in which the hacker may get access to the system. This is where the   hacker tries to find flaws in the system they are trying to enter.     3) One other way in which a hacker may try to get into a system is by using a program called a WORM.   This program is specially programmed to suit the need of the user. This programme continually tries to   connect to a machine at over 100 times a second until eventually the system lets in and the worm executes   its program. The program could be anything from getting password files to deleting files depending on   what it has been programmed to do.     Protection     The only way that you or a company can stop a Hacker is by not having your computer connected to the   net. This is the only sure fire way in which you can stop a hacker entering your system. This is mainly   because hackers use a phone line to access the system. If it is possible for one person to access the system   then it is possible for a hacker to gain access to the system. One of the main problems is that major   companies need to be networked and accessible over the net so that employees can do overdue work or so   that people can look up things on that c...  Free Essays on Hackers  Free Essays on Hackers    A large group of people often called ââ¬Å"hackersâ⬠ have been characterized as  unethical, irresponsible, and a serious danger to society for actions related to breaking  into computer systems. This essay brings to construction a picture of what is a computer  crime as well as a portray of hackers, their concerns and the way in which hacking takes  place. What I intend to argue is that, in their majority, hackers are learners and explorers  who want to help rather than cause damage.   	What is hacker? The term "hacker" of course has various meanings. Sometimes it  implies a computer programmer who spends a lot of hours working on a personal  computer, working on different types of coding, and creating technological ââ¬Å"fixesâ⬠ and  ââ¬Å"patchesâ⬠ for existing software. This kind of activity is not illegal and is encourage by the  employers. In a different sense, the term hacking is used to signify criminal activity, the  effort of the person to perpetrate through a personal computer for the purpose of unlawful  activities. In other words, hackers are anyone who brakes into a computer without  authorization. This type of hacking shows the necessity for new security systems and  legislation to protect people and enterprises from these activities.   	Hacking really came into existence after 1980s as a result of telecommunication  growth as well as high computer literacy. Hacking include a broad-range of  computer-helped activities. Some of them are legal other unlawful and a lot are  unethical. Some experts are saying: hacking is a phenomenon. One thing people get  confused about is that hacking is totally different from fraud. Fraud is a human activity  which one person tries to take advantage of others. Finally we can say that all hackers  cannot be characterized as nasty or a nuisance. We should all bear in mind that it is very  risky to connect a computer system to a network, especially the Internet, when there are  not protected by all ...  Free Essays on Hackers    The meaning of Hacker is one who accesses a computer which is supposably not able to be accessed to non   authorised people of the community. Hackers may use any type of system to access this information   depending on what they intend on doing in the system.     Methods     Hackers may use a variety of ways to hack into a system. First if the hacker is experienced and smart the   hacker will use telnet to access a shell on another machine so that the risk of getting caught is lower than   doing it using their own system.   Ways in which the hacker will break into the system are:     1) Guess/cracking passwords. This is where the hacker takes guesses at the password or has a crack   program to crack the password protecting the system.     2) Finding back doors is another way in which the hacker may get access to the system. This is where the   hacker tries to find flaws in the system they are trying to enter.     3) One other way in which a hacker may try to get into a system is by using a program called a WORM.   This program is specially programmed to suit the need of the user. This programme continually tries to   connect to a machine at over 100 times a second until eventually the system lets in and the worm executes   its program. The program could be anything from getting password files to deleting files depending on   what it has been programmed to do.     Protection     The only way that you or a company can stop a Hacker is by not having your computer connected to the   net. This is the only sure fire way in which you can stop a hacker entering your system. This is mainly   because hackers use a phone line to access the system. If it is possible for one person to access the system   then it is possible for a hacker to gain access to the system. One of the main problems is that major   companies need to be networked and accessible over the net so that employees can do overdue work or so   that people can look up things on that c...    
Subscribe to:
Post Comments (Atom)
 
 
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.