This website uses cookies to ensure you have the best experience. Learn more

A Snapshot Of Computer Hacking Essay

1272 words - 5 pages

A Snapshot of Computer Hacking

Computer hacking has been around for over fifty years. Anytime new technology comes to the fore front, there are individuals who want to expand upon it. Hacking in general terms, is simply taking a technology and trying to improve upon it without the permission of the owner.
I want to point out two terms that I will use throughout the paper, hacker and cracker. A hacker is a person who has extensive computer knowledge and enjoys tackling technical issues. The goal of hackers is not to cause damage to the computer system or network while infiltrating it. They are there to try and learn and improve upon the program. A hacker believes that information should be free, so they commonly share how they went about doing the infiltrating. A cracker is a person who uses his knowledge for personal gain against the law. EX: stealing account numbers, distributing viruses etc. It is safe to safe to say that all crackers are hackers, but not all hackers are crackers. This is an important distinction. Most people don’t realize the difference, largely impart by unawareness and the media. According to Tellis (2000) “The basic difference between hackers and crackers is: Hackers build things, crackers break things”.
Many times, companies will employ the hackers who break into their systems. Taking them from what may lead to a lifetime of crime, and changing them into ethical hackers. Ethical hackers also know as White Hats, are professionals that write codes to check the integrity of programs on behalf of the owners.
The first computer hackers surfaced from MIT. (Focus Editors). The term hacking was borrowed from members of a model train club, who reconfigured the switches and rails to make the trains go faster. A few of the club members decide to use their knowledge on a high speed computer in their lab. They used a slower computer to hack into the high speed one. This allowed them to use the computer without the administrators knowing.
In 1971, a computer hobbyist named John Draper discovered that the toy you get in a box of cereal made a whistle at 2600-hetrz. This is the same tone used by telephone companies. He was able to use it to make unlimited long distance phone calls. He took on the name Captain Crunch, after the cereal he found it in. He was consequently arrested numerous times over the next couple years for phone tampering.
In 1975, two people began making “blue boxes”, devices used to expand on the 2600-hertz whistle, which created more tones. This allowed others to hack into their phone system. Who where these to people? Their names are Steve Wozniak and Steve Jobs, who later founded Apple Computers in 1977.
In 1983, the movie Wargames releases into theaters. It is about a teenager who breaks into a super computer at NORAD and almost starts WWIII. The computer’s name is WPOR. This is a spoof on the old computer at NORAD, BURGR.
In 1984, Eric Corely founds an...

Find Another Essay On A Snapshot of Computer Hacking

Is Ethical Hacking the Answer to Ensuring the Safety of Company’s Computer Systems?

1445 words - 6 pages ), their skills to investigate criminal activity but perform it in an illegal manner. Who is affected by computer hacking? Anyone with a computer, including smart phones, can be a victim of hacking. Examples of those who have been affected are big name companies (Target, Twitter, and Facebook), heads of government, (Angela Merkel), and unsuspecting members of the public (Trojan viruses or worms). One approach to increasing computer security is by

Career of a Computer Programmer Essay

593 words - 2 pages Computer Programmers design and create programs that allow the computer to fulfill specific tasks. The programs they create can be from things to help businesses to video games. A computer programmer may spend an hour working on a simple program, but on a highly advanced program may take a year.Almost half of the computer programmers of 2002 had a bachelor's degree. And 1 out of 5 Programmers had a graduate degree. 7.7 percent of computer

A Review of Computer Abilities

1324 words - 5 pages devices, we find several options available. The hard disk of a computer is usually a storage device that can hold vast amounts of data. The lack of portability makes is cumbersome for transport but it’s easy access is ideal for information that will only be retrieved from that computer. For example, projects that are in process and must be left and returned to at a later time, such as a class paper, or information that is only required when

Life of a Computer Programmer

1275 words - 6 pages programmers write the detailed list of instructions the computer will follow in the software (Great Sample Resume). This is also called “coding.” Programmers test their software, or other peoples, to see if it works properly (Career Cruising). Programmers study the tasks that the program will need to complete while being used (Career Cruising). If programmers are working to make a program for a certain group of people, they may work closely with those

Specifications Of a Typical Computer

1393 words - 6 pages user’s touch commands which are simply created by your fingers. Many touchscreen displays provide multi-touch, which allows you to use specific gestures for unique commands. The HP Envy comes with a touchscreen display. Processor Type: The brand of processor (Central Processing Unit) installed in your system. It acts like the brain of your computer as it works with other devices installed on your computer to help manage tasks or even multi-task

Feminism and Postmodernism Used to Describe Female Characters: Adrienne Rich’s “Snapshot of a Daughter-in-law” and Don DeLillo’s “End Zone”

1267 words - 5 pages Adrienne Rich’s “Snapshot of a Daughter-in-law” and Don DeLillo’s “End Zone” use negative diction and imagery to relate their thoughts on feminism and postmodernism. Rich uses negative diction and imagery to describe a woman who has adapted to the world’s opinion of what a woman should be. DeLillo uses negative diction to describe Myna after she conforms to social expectations of beauty. Rich brings in ideas of how domestic chores create a

The Life Of A Network & Computer Specialist

1821 words - 8 pages Lee JohnstonConnie WongGen 300February 2, 2004The Life of a Network & Computer SpecialistInformation Technology is an exhilarating profession that requires commitment and hard work. A specialist may sit at a desk or out in the field correcting problems. The problems could consist of fixing programs, technical briefs, and an assortment of other assignments. In the beginning, a specialist starts below an analyst. In several years a specialist

Statment of Purpose for a Computer Technician

795 words - 4 pages I go to San Diego Job Corps going for a computer tech. My trade that am going for requires The work of a computer technician basically involves performing installations and maintenance functions on computer systems and networks. It also involves solving problems that users have with their computers and consultation with regards to the computer and its operations. The specific skills needed for computer tech are knowing computer hardware

Opinion on Case of a Computer Hack

687 words - 3 pages Introduction In Case study number one (Dhillon, 2007), Stellar University(SU), which is public education institution, had a system breach in its Information Systems(IS). The IS of SU contained many types of IT such as Mainframe, AS400, Linux, VAX, Unix, AIX, Windows(3.1 and up to 2003), Apple, RISC boxes Storage Area Networks(SAN), Network Attached Storage(NAS) and much more. Sadly, SU has had a security breach on some of its systems. Even

The Life and Work of a Computer Programmer

1296 words - 5 pages The purpose of a computer programmer is to design and develop applications to perform the needs of a consumer. This occupation is essential to modern day life due to all of the computers that are in use today. Computer programming is a fulfilling career goal because of the ability to be on the cutting edge of technology, design software for computers, and have a wide range of benefits. Computer programming consists of many duties. Duties of

The Components of a Computer and Information Processing System

975 words - 4 pages The Components of a Computer and Information Processing System In today’s world, computers are everywhere. People use them in a wide range of ways in every aspect of life whether it is interacting with friends, cooking a meal, or transferring funds from one account to another. However, many people do not think about the many aspects of computing and the various devices and software that are part of the information process. Basics of the

Similar Essays

Hacking As A Means Of Identifying Weaknesses In Computer Security

1651 words - 7 pages The use of hacking can be very beneficial as a means of identifying weaknesses in computer security. Nowadays, numerous companies and governments use this technique to assess the level of security of their systems and determine if any valuable information is at risk of being accessed unlawfully. Ethical hackers are employed to identify potential threats on a single computer or a whole network of computers. The found potential exploits are later

A Snapshot Of My Life Essay

950 words - 4 pages A snapshot of my little life begins like this. My full name is Agneta Cyntrece Harris and I am pretty sure that is all you know about me and would be interested in finding out more. I am definitely more than meets the eye. I come from a single parent background, where we live from paycheck to paycheck. I am actually pretty outgoing. I love being around people, even though I am quiet in a setting full of unfamiliar people. I always introduce

A History Of Hacking Essay

1697 words - 7 pages to help pay for protection and hackers of their own to help with developing viruses or finding where the hacker is located to bring down its attackers. Even today hacking is still seeing growth and according to, “Recent years have seen a substantial increase in both hacking industrial espionage conducted online, at tremendous cost to the victims and the nation economy.” So not only are hackers stealing files, but they majority affect the nation's

The Use Of Hacking To Identify Weaknesses In Computer Security

1740 words - 7 pages of people who hack and for what reasons. There will then follow a discussion of the moral argument on hacking before examining a few brief examples. The essay will then conclude by arguing against the use of hacking as a means of identifying weaknesses in computer security. What is it to ‘hack’? Hacking has two primary definitions; the first refers to the enthusiastic and skilful use of computers to solve problems (Techterms, 2013); the second