Essay, Research Paper: Hackers

Computers

Free Computers research papers were donated by our members/visitors and are presented free of charge for informational use only. The essay or term paper you are seeing on this page was not produced by our company and should not be considered a sample of our research/writing service. We are neither affiliated with the author of this essay nor responsible for its content. If you need high quality, fresh and competent research / writing done on the subject of Computers, use the professional writing service offered by our company.

The meaning of a hacker is one who accesses a computer that can supposably not
be accessed to non authorized people of the community. Hackers may use any type
of system to access this information depending on what they intend on doing in
the system. Methods hackers may use a variety of ways to hack into a system.
First, if the hacker is experienced and smart the hacker will use telnet to
access a shell on another machine so that the risk of getting caught is lower
than doing it using their own system. Ways in which the hacker will break into
the system are 1) Guess/cracking passwords. This is where the hacker takes
guesses at the password or has a crack program to crack the password protecting
the system. 2) Finding back doors is another way in which the hacker may get
access to the system. This is where the hacker tries to find flaws in the system
they are trying to enter. 3) One other way in which a hacker may try to get into
a system is by using a program called a WORM. This program is specially
programmed to suit the need of the user. This programmer continually tries to
connect to a machine at over 100 times a second until eventually the system lets
in and the worm executes its program. The program could be anything from getting
password files to deleting files depending on what it has been programmed to do.
The only way that you or a company can stop a hacker is by not having your
computer connected to the net. This is the only sure-fire way in which you can
stop a hacker entering your system. This is mainly because hackers use a phone
line to access the system. If it is possible for one person to access the system
then it is possible for a hacker to gain access to the system. One of the main
problems is that major companies need to be networked and accessible over the
net so that employees can do overdue work or so that people can look up things
on that company. Also, major companies network their offices so that they can
access data from different positions. One way which is used to try to prevent
hackers gaining access is a program used by companies called a firewall. A
firewall is a program that stops other connections from different servers to the
firewall server. This is very effective in stopping hackers entering the system.
Although this is not a fool proof way of stopping hackers as it can be broken
and hackers can get in. This is a very good way of protecting your system on the
Internet. Some of the major hacks that have been committed have been done by
young teens aged between 14 and 18. These computer geniuses as they are known
have expert knowledge on what they are doing and also know the consequences.
This hack occurred on February 10, 1997, and again on February 14, 1997
Portuguese hackers launched a political attack on the web page of the Indonesian
government, focusing on that country's continued oppression of East Timor. The
attack was online for about 3 hours from 7.00 PM to 10.00 PM (Portuguese Time)
at the web site of the Department of Foreign Affairs, Republic of Indonesia. The
hackers did not delete or change anything. The said “We just hack pages”.
Another major hack that occurred was on April 1st, 1981 by a single user. This
hacker who was situated in an East Coast brokage house was interested in the
stock market. He purchased $100,000 worth of shares in the stock market. Then he
hacked into the stock markets main computer and stole $80 million dollars. The
hacker was eventually caught although $53 million dollars were never recovered.
On Wednesday, March 5th, 1997, the home page of the National Aeronautics and
Space Administration's or NASA was recently hacked and the contents changed. The
group known as H4G1S. This group of hackers managed to change the contents of
the webpage The hacking group changed the webpage and left a little message for
all. It said “ Gr33t1ngs fr0m th3 m3mb3rs 0f H4G1S. Our mission is to continue
where our colleagues the ILF left off. During the next month, we the members of
H4G1S will be launching an attack on corporate America. All who profit from the
misuse of the InterNet will fall victim to our upcoming reign of digital
terrorism. Our privileged and highly skilled members will stop at nothing until
our presence is felt nationwide. Even your most sophisticated firewalls are
useless. We will demonstrate this in the upcoming weeks”. Also, the homepage
of the United States Air Force was recently hacked and the contents had been
changed. The webpage had been changed completely as the hackers had inserted
pornographic pictures saying “this is what we are doing to you” and had
under the image “screwing you”. The hackers have changed it and shown their
views on the political system. One other major hack that was committed was by a
16-year-old boy in Europe. This boy hacked into the British Airforce and
downloaded confidential information on Ballistic missiles. The boy hacked into
the site and down loaded this information because he was interested and wanted
to know more about them. This boy was fined a very hefty sum of money for his
deeds. In conclusion, it can be said that hackers are sophisticated and very
talented when it comes to the use of a computer. Hacking is a process of
learning not following any manual. Hackers learn as they go and use a method of
trial and error. Most people who say they are hackers most of the time are not.
Real hackers do not delete or destroy any information on the system that they
hack. Hackers hack because they love the thrill of getting into a system that is
supposably unable to be entered. Overall, hackers are smart and cause little
damage to the system they enter. Hackers are not really terrorists in a way,
they can help companies find out flaws in their system and maybe protect them
from people that would damage their systems.

0
0
Good or bad? How would you rate this essay?
Help other users to find the good and worthy free term papers and trash the bad ones.
Like this term paper? Vote & Promote so that others can find it

Get a Custom Paper on Computers:

Free papers will not meet the guidelines of your specific project. If you need a custom essay on Computers: , we can write you a high quality authentic essay. While free essays can be traced by Turnitin (plagiarism detection program), our custom written papers will pass any plagiarism test, guaranteed. Our writing service will save you time and grade.




Related essays:

0
0
Computers / Hacking For Money
Many of the products we buy today are no more than large collections of zeroes and ones. High-priced software, high-quality music, and valuable reference material such as computerized databases or CD-...
3742 views
0 comments
0
0
Computers / Hacking
Imagine this, you are driving along the road and suddenly you see something spectacular. Now imagine that you are not allowed to deviate from your course to check it out. This is what a so-called “hac...
4076 views
0 comments
0
0
Computers / Hard Drives 
Hard Drives In this day and age of faster computers and high-speed processors, it should only stand to reason that hard drives meet the same requirements as the rest of the computer technology world. ...
5081 views
0 comments
0
0
Computers / Hewlett Packard
Hewlett Packard started in 1939 in a garage by two people, Bill Hewlett and David Packard with just $538 of working capital. After a string of failures, their company’s first successful product, an au...
6846 views
0 comments
0
0
Only once in a lifetime will a new invention come about to touch every aspect of our lives. Such devices changed the way we manage, work, and live. A machine that has done all this and more now exists...
4133 views
0 comments