A Snapshot Of Computer Hacking Essay

1272 words - 5 pages

A Snapshot of Computer Hacking

Computer hacking has been around for over fifty years. Anytime new technology comes to the fore front, there are individuals who want to expand upon it. Hacking in general terms, is simply taking a technology and trying to improve upon it without the permission of the owner.
I want to point out two terms that I will use throughout the paper, hacker and cracker. A hacker is a person who has extensive computer knowledge and enjoys tackling technical issues. The goal of hackers is not to cause damage to the computer system or network while infiltrating it. They are there to try and learn and improve upon the program. A hacker believes that information should be free, so they commonly share how they went about doing the infiltrating. A cracker is a person who uses his knowledge for personal gain against the law. EX: stealing account numbers, distributing viruses etc. It is safe to safe to say that all crackers are hackers, but not all hackers are crackers. This is an important distinction. Most people don’t realize the difference, largely impart by unawareness and the media. According to Tellis (2000) “The basic difference between hackers and crackers is: Hackers build things, crackers break things”.
Many times, companies will employ the hackers who break into their systems. Taking them from what may lead to a lifetime of crime, and changing them into ethical hackers. Ethical hackers also know as White Hats, are professionals that write codes to check the integrity of programs on behalf of the owners.
The first computer hackers surfaced from MIT. (Focus Editors). The term hacking was borrowed from members of a model train club, who reconfigured the switches and rails to make the trains go faster. A few of the club members decide to use their knowledge on a high speed computer in their lab. They used a slower computer to hack into the high speed one. This allowed them to use the computer without the administrators knowing.
In 1971, a computer hobbyist named John Draper discovered that the toy you get in a box of cereal made a whistle at 2600-hetrz. This is the same tone used by telephone companies. He was able to use it to make unlimited long distance phone calls. He took on the name Captain Crunch, after the cereal he found it in. He was consequently arrested numerous times over the next couple years for phone tampering.
In 1975, two people began making “blue boxes”, devices used to expand on the 2600-hertz whistle, which created more tones. This allowed others to hack into their phone system. Who where these to people? Their names are Steve Wozniak and Steve Jobs, who later founded Apple Computers in 1977.
In 1983, the movie Wargames releases into theaters. It is about a teenager who breaks into a super computer at NORAD and almost starts WWIII. The computer’s name is WPOR. This is a spoof on the old computer at NORAD, BURGR.
In 1984, Eric Corely founds an...

Find Another Essay On A Snapshot of Computer Hacking

A Review of Computer Abilities

1324 words - 5 pages devices, we find several options available. The hard disk of a computer is usually a storage device that can hold vast amounts of data. The lack of portability makes is cumbersome for transport but it’s easy access is ideal for information that will only be retrieved from that computer. For example, projects that are in process and must be left and returned to at a later time, such as a class paper, or information that is only required when

Feminism and Postmodernism Used to Describe Female Characters: Adrienne Rich’s “Snapshot of a Daughter-in-law” and Don DeLillo’s “End Zone”

1267 words - 5 pages Adrienne Rich’s “Snapshot of a Daughter-in-law” and Don DeLillo’s “End Zone” use negative diction and imagery to relate their thoughts on feminism and postmodernism. Rich uses negative diction and imagery to describe a woman who has adapted to the world’s opinion of what a woman should be. DeLillo uses negative diction to describe Myna after she conforms to social expectations of beauty. Rich brings in ideas of how domestic chores create a

Statment of Purpose for a Computer Technician

795 words - 4 pages I go to San Diego Job Corps going for a computer tech. My trade that am going for requires The work of a computer technician basically involves performing installations and maintenance functions on computer systems and networks. It also involves solving problems that users have with their computers and consultation with regards to the computer and its operations. The specific skills needed for computer tech are knowing computer hardware

The Life and Work of a Computer Programmer

1296 words - 5 pages The purpose of a computer programmer is to design and develop applications to perform the needs of a consumer. This occupation is essential to modern day life due to all of the computers that are in use today. Computer programming is a fulfilling career goal because of the ability to be on the cutting edge of technology, design software for computers, and have a wide range of benefits. Computer programming consists of many duties. Duties of

The Components of a Computer and Information Processing System

975 words - 4 pages The Components of a Computer and Information Processing System In today’s world, computers are everywhere. People use them in a wide range of ways in every aspect of life whether it is interacting with friends, cooking a meal, or transferring funds from one account to another. However, many people do not think about the many aspects of computing and the various devices and software that are part of the information process. Basics of the

Statement of Purpose for a Computer Science Degree

724 words - 3 pages Computer Science was a logical culmination of my fascination for computers. Having done four year course in computer science and engineering, I would like to fortify my skills with the help of a master’s degree, which will equip me with the up-to-date tools and knowledge that are the need of the hour. My long term aim of securing a challenging position where I can effectively contribute my skills as software professionals, possessing competent

Using Electroencephalography as a Method of Computer Input

1365 words - 5 pages Abstract — There are a number of people in the world who suffer from disabilities which prevent them from being able to use traditional means to control a computer. For these people, alternate forms of input are required. One potential input device is an Electroencephalography machine which can be used to detect patterns of brain activity and use these patterns to trigger events on a computer such as mouse clicks or keyboard presses. This allows

Dell Computer: Organization of a Global Production Network

6388 words - 26 pages Taiwanese computer and componentsmakers. This provided Dell with a base of suppliers and other support services. Having a plantin China was necessary to sell in the main land China market. With China's tariffs and taxes,importing is not a viable strategy, and if Dell hopes to sell to government agencies and stateenterprises, it needs to have production in China. In 2001, Dell announced it would beginproducing desktop PCs for the Japanese market in

An operating system is a program that acts an intermediary betweena user of a computer and the computer hardware.

663 words - 3 pages The Operating System With Advantages and Disadvantages Nowadays,most of the computers are using the Window as their operating system.Microsoft-designed computer operating system, a program that controlsthe basic functions of personal computers. Windows started life asMicrosoft?s take on a graphical user interface (GUI). Windows 3.0,Window 3.1, and Window 3.11 were the three earliest versions ofMicrosoft?s Windows operating system. Windows 95 is

The Challenge of a Computer Representation of Sign Language: Capturing a “Visual-Spatial” Language Electronically

1598 words - 6 pages The Challenge of a Computer Representation of Sign Language: Capturing a “Visual-Spatial” Language Electronically Signed languages are not simply another means of communicating a spoken language. Individual signed languages are linguistically unique forms of communication, with their own grammatical constructs, word order, sensibility, and rules. American Sign Language, used in the United States and parts of Canada, is not the same as

How a work of art appears in person rather then as a computer reproduction.

1083 words - 4 pages As I began this assignment of investigating how a work of art appears in person rather then as a computer reproduction, I ran across a fairly large problem. As I got to the museum and opened my notes, I discovered that I was missing the information on which specific artwork I had chosen. Rather than leave the museum and return home to find the information, I decided that I would stay there and find something that really interested me. As I

Similar Essays

Hacking As A Means Of Identifying Weaknesses In Computer Security

1651 words - 7 pages The use of hacking can be very beneficial as a means of identifying weaknesses in computer security. Nowadays, numerous companies and governments use this technique to assess the level of security of their systems and determine if any valuable information is at risk of being accessed unlawfully. Ethical hackers are employed to identify potential threats on a single computer or a whole network of computers. The found potential exploits are later

The Use Of Hacking To Identify Weaknesses In Computer Security

1740 words - 7 pages of people who hack and for what reasons. There will then follow a discussion of the moral argument on hacking before examining a few brief examples. The essay will then conclude by arguing against the use of hacking as a means of identifying weaknesses in computer security. What is it to ‘hack’? Hacking has two primary definitions; the first refers to the enthusiastic and skilful use of computers to solve problems (Techterms, 2013); the second

Is Ethical Hacking The Answer To Ensuring The Safety Of Company’s Computer Systems?

1445 words - 6 pages ), their skills to investigate criminal activity but perform it in an illegal manner. Who is affected by computer hacking? Anyone with a computer, including smart phones, can be a victim of hacking. Examples of those who have been affected are big name companies (Target, Twitter, and Facebook), heads of government, (Angela Merkel), and unsuspecting members of the public (Trojan viruses or worms). One approach to increasing computer security is by

Career Of A Computer Programmer. Essay

593 words - 2 pages Computer Programmers design and create programs that allow the computer to fulfill specific tasks. The programs they create can be from things to help businesses to video games. A computer programmer may spend an hour working on a simple program, but on a highly advanced program may take a year.Almost half of the computer programmers of 2002 had a bachelor's degree. And 1 out of 5 Programmers had a graduate degree. 7.7 percent of computer