Wednesday, May 29, 2019
Hacking Essay -- essays research papers fc
As the world becomes more and more reliant on ready reckoners the computer hacking industry is greatly rising. With people such as Kevin Mitnick, who is known as a "computer terrorist" (Kjochaiche 1), computerized information isnt safe any more. Kevin is known as "the most high-profiled computer criminal and responsible for more slaughter in the computer world today."(1) He considered this a fun and easy task. He got caught and thrown into prison, only once he got out nothing changed. Kevin express that as long as the technology is there it just calls to people to break into it. computing machine hackers usually start off young, thinking that it is nothing but a little harmless fun. But as they get older, they realize it has turned into an addiction. The definition of a hacker according to the Hackers Dictionary, "a person who enjoys exploring the details of broadcastmable systems and how to stretch their capabilities."(Hackers 1) "The Internet is j ust another playing field." (Kjochaiche 3) "Hackers regard hacking as a game in which their mind is up against that of the system designers." (Hackers 3) The Internet allows the hackers to turn back files, programs, newss, and other information from users that are using it. They use this as a tool to make it easier to beat "the system". There are three major types of hackers, one with good intentions but gets slapped in the face due to the bad reputation of others, there are the hackers with bad intentions, and there are the hackers that fit in between. The bad hacker category is the largest by far. "A bad hackers motives are to punish someone or retaliate against the owner of a computer system."(2) Computer terrorists fall under this category. Some bad hackers may also hack just to challenge the programmer. The hacker feels that if they can break into it then they are practically more superior than the person who actually wrote the software. They can feel so superior that they might enter a virus to eliminate a program that was not worthy of their abilities. One of the other many goals of a hacker is to steal passwords. Hackers can steal your password about four different ways. Intercepting your password through email is "not that difficult."(How are they getting my password? 1) This is by far the easiest method because all they have to do is take the email as ... ... out. More often than not the hackers are soloists.(Kjochaiche, 6) It is proven that when hackers work together they get caught more often. Hackers impart always do their work just exchangeable doctors will always treat patience. With the growth of technology comes new threats, and new problems. This will continue to be on the rise due to advances in the world.(Hackers, 3) Millions and millions of dollars will be put to end this but this will not work because new ways of hacking will always be made. Bibliography Works Cited Computer Hackers Online operat ional Http//www.mc2.nu. Dellert, Brian. Interview with a Hacker Online Available http//www.rabble.com/xpress/1997.03.01/hacker.com January 3,1997. Espy, Bob. Crime on the Intenet Online Available http//www.techforum. com/tsld009.htm. Hackers Online Available http//scitsc.wlv.ac.uk/cm5220/home.html. How are they getting my password? Online Available http//geocities.com/yosemite/2215/password.html. Kjochaiche, Ahmad. Kevin Mitnick Computer Terrorist Online Available http//www.rmit.edu.au/lectures/. Orman, Neil. Is your computer hacker-proof? Online Available http//www.amcity.com/austin/index.html Septemeber 1, 1997
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.