Computer Hackers Essay

1155 words - 5 pages

Computer Hackers

Hackers are popularly defined as computer experts who spend enormous
amounts of time trying to breach the security of networks, web servers
and email servers. Usually they use a selection of specialist software
to identify any weaknesses, which they are then able to exploit. There
are basically two main types of hackers, the first type is mainly
consistent of intelligent adolescents who acquire their hacking
knowledge by reading, by talking to people and by spending an
excessive amount of time on their computer, learning the various
programs, the source code and the commands. They are then able to
solve puzzles that people with computer engineering backgrounds can't
solve. vast majority of hackers do it for their own personal enjoyment
as they find it to be intellectual, mind stimulating, a challenge, and
it also grants them immense amounts of power and control. Hackers
generally seem to be primarily interested in the hacking of large
corporations and authority’s security networks rather than attacking
private individuals. It's intellectual. It stimulates my mind. It's a
challenge. But these ‘juvenile’ hackers eventually get caught, and the
reason they get caught is due to the fact that they're not
professionals. The second type of hackers are however the
professionals, they’re the ex-KGB agents, the ex-CIA agents, the
person from German intelligence, or the Israeli intelligence and
they're not going to get caught.

A computer virus is a program (a block of executable code) which
attaches itself to, overwrites, or otherwise replaces another program
in order to reproduce itself without the knowledge of the user. A vast
array of viruses are comparatively harmless and may be present for
years with no noticeable effect. Some, however, may cause random
damage to data files (sometimes insidiously, over a long period) or
attempt to destroy files and disks. Others cause unintended
damage. Even benign viruses (apparently non-destructive viruses) cause
significant damage by occupying disk space and/or main memory, by
using up CPU processing time, and by the time and expense wasted in
detecting and removing them.

There are several main types of viruses out there that hackers may

v File Viruses - A file virus is a virus that attaches itself to a
file, usually an executable application like a word-processing program
and in general file viruses don't infect data files. However, data
files can contain embedded executable code such as macros, which may
be used by hackers, as a file virus infects other files when the
program to which it is attached is run, it can spread across a network
(often very quickly).

v Boot-sector Viruses - Boot sector viruses alter the program that is
in the first sector of every disk. This is the space in the computer

Find Another Essay On Computer Hackers

Computer Crime, on the increase in many areas: hackers, hardware theft, software piracy and the information highway

1334 words - 5 pages following information will provide you with evidence that without reasonable doubt, computer crime is on the increase in the following areas: hackers, hardware theft, software piracy and the information highway. This information is gathered from expert sources such as researchers, journalists, and others involved in the field.Computer crimes are often heard a lot about in the news. When you ask someone why he/she robbed banks, they world replied

Hackers vs. Crackers Essay

3212 words - 13 pages Hackers vs. Crackers Introduction When you hear the word hacker, you probably think of a nerdy, teen-aged boy sitting behind a computer with sinister plans for his attack flowing through the keystrokes of his fingers. You probably think of a techno-criminal defacing websites, shutting down computer systems, stealing money or confidential information-basically a threat to society. But these descriptions may describe someone else enterely

Hackers hacking the net

1321 words - 5 pages access money. Criminals who break into computer systems electronically are commonly called 'Hackers'. In today's highly technological computer world, the computer hacker is digging their way through our nation's computer systems to embezzle money, create chaos, manipulate figures, and to seek enjoyment. However, hackers are even used for finding security breeches.The birth of hackers in the Sixties, shortly came after the advent of elite

Debating the Motivating Factors for Hackers

1473 words - 6 pages hackers versus virus writers and the various roles of hackers will be discussed. Lu, Polgar, Luo, & Cao (2010) hypothesized that computer security is not as much about the aspect of technology, instead it is more concerned with the mental and social science activities of the individuals who utilize computer technology. The authors supported this point of view by stating that computers only channel the transgressions of the individuals who exploit

A Snapshot of Computer Hacking

1272 words - 5 pages extensive computer knowledge and enjoys tackling technical issues. The goal of hackers is not to cause damage to the computer system or network while infiltrating it. They are there to try and learn and improve upon the program. A hacker believes that information should be free, so they commonly share how they went about doing the infiltrating. A cracker is a person who uses his knowledge for personal gain against the law. EX: stealing

Cyber Hacking and Types of Hackers

984 words - 4 pages could have taken anything. No one quite knows. So after that incident, the FED should and will take great measures to protect itself from cyber attacks. Let’s get an overview of what the Federal Reserve has to deal with: The history of cyber hacking and the many different types of hacking. A hacker is a person who looks to reveal problems in a computer system or network. Hackers might be motivated to do what they do because they could make a

Cyber Criminals

669 words - 3 pages computer or the manipulation of digital data. There are different classifications of cybercriminals such as: hackers, identity thieves, and high-tech criminals. People that use a computer for discovery or devious intent are considered hackers. Though many cybercrimes revolve around hacking, there are a lot that do not. There are different kinds of hackers. Hackers can be grouped based on the hacker’s personality and lifestyle, and can be

Ethical Hacking

812 words - 4 pages related to computer systems. Today, however, hacking and hackers are most commonly associated with malicious programming attacks on the Internet and other networks." It's true that hacking is mostly associated with undesired activities and intrusion. However, not all hackers are bad. There are, in fact, several types of hackers that exist; white hat hackers, black hat hackers, grey hat, elite, neophyte, blue hat, and hacktivist. Black hat hacker are


3835 words - 15 pages Hackers It is the weekend you have nothing to do so you decide to play around on your computer . You turn it and than start up , calling people with your modem , conneciting to another world with people. This is all fine but what happens when you start getting into other people’s computer files , then it becomes a crime and who are the criminals. To begin i will start with hacking and hackers. Hacking is the act of

The Art of Hacking

1237 words - 5 pages computer enthusiast or a microcomputer user who attempts to gain unauthorized access to proprietary computer systems ( Another definition found Criminal Hacking Criminal Hackers terrorize the world using their computer skills to make viruses that can damage a computer. They also hack companies, security systems, people’s computers for their own pure desire to do evil etc. Absolutely anyone can be a victim to these kinds of hackers

The Internet

724 words - 3 pages can make thousands or millions of dollars is the supreme goal for most hackers on the Internet. Usually only the hackers with enough experience and knowledge attempt this. People can easily be caught at this if they leave signs of their 'breaking and entering' in the bank's computer(s). If they are caught, they can be prosecuted be the bank and the federal government and spend many years in jail for this serious offense. Hacking into a bank

Similar Essays

Computer Hackers And Ethics Essay

1639 words - 7 pages if getting into the system can be done, to search around inside of a place they have never been, and to explore the little nooks and crannies of cyberspace. Of course there are those who erase files from other people’s computers, steal information from cyberspace, and vandalize web pages. These people are not hackers, as the media calls them, they are known as crackers. Hackers use their vast knowledge to better the computer industry. Hacking

The Truth Behind Computer Hackers Essay

1179 words - 5 pages It was the year of 1946, when the very first computer named ENIAC was created. Now, as of 2012, there are about 1.1 Billion Computer in the world. They are all connected by networks. In a way its like a large spider web, hence the name “World Wide Web”. Now you might ask “Well how are these Networks managed or controlled?” That is where our technology kings and queens come in. Many people consider them as “Hackers”, when the truth is people who

Victims Of Computer Hackers Essay

965 words - 4 pages Neiman Marcus an upscale retailer is one of the latest to reveal being a victim of hackers. Many Customers were affected, not just the store itself. Customers cards were being use to make unauthorized purchases. This situation put the retailer at risk of losing current or potential customers. Many individuals would question its security measures potentially bringing the company’s overall goodwill down. Neiman Marcus hack affected everyone

Are 'computer Hackers' Technological Innovators Who Push The Boundaries Of Development Or Reckless Criminals Who Endanger Companies And Individuals?

1074 words - 4 pages Sweden was defaced in 1996 as a result of growing discontent with the monopoly and pricing for Internet Services. Also an internationally well-known group PHAIT (Portuguese Hackers Against Indonesian Tyranny) attacked Indonesian authorities many times in 1997, motivated by the situation in East Timor.Beside these another reason for hacking is revenge. Police officers investigating computer crime received credit cards and phone bills in huge amounts