Computer Hacking Essay

1065 words - 4 pages

Hacking is using your knowledge to gain more knowledge. This is one of the best definitions I could find on the net. Hacking is state of mind. Curiosity is the main point; a hacker always wants to know everything. It is the curiosities that which makes them learn more and more quickly than other person at same age. Traditionally hackers were regarded as ?geeks?, who knew everything about computers (hardware & software) & networks. They are very intelligent programmers.The term hacker was popularized by Steven Levy in his famous book ?Hackers: Heroes of Computer Revolution?. When he said hacker, he meant a brilliant, constructive programmer who led the way to the computer revolution. About's Net Security Portal announces the same verdict while explaining what a hacker is, "A person who is extremely proficient at programming and programming languages. A computer enthusiast. Someone who is obsessive about programming, programming languages or computer systems & networks." Computer hacking can be traced back to the late 1950? and early 1960?s. At that time companies and universities were using mainframe computers with dumb terminals. There was no such thing as the Internet. At this time a hack was ?shortcuts that would modify and improve the performance of a computer?s operating system or applications and allow more tasks to be completed in a shorter time.? as stated by Michael Devitt in A Brief History of Computer Hacking. The hackers in this period were mainly skilled workers who were proud of their work and found joy in doing so. The ?original hacker? at the beginning of computers was a person not looking to harm anyone or anything, but simply looking to apply his special skills to the improvement of the computer field. As they progressed into the 1970?s and 1980?s, the role and sense of computer technology began to change. Computer technology began to be viewed as a tool of power. Many people felt that this tool should be available to all people. In 1984, these individuals began to be referred to as ?second wave hackers.? Second wave hackers (although they did not refer to themselves by this name) were characterized as wanting computers and their computer systems to be designed to be useful and accessible to citizens. In the process, they pioneered public access terminals, computer conference, and personal computers.? As they continued into the mid to late 1980?s, the so-called ?computer underground? emerged. With the emergence of the underground, hacking once again took on another meaning. From that point in time to the present hacking means ?to break into or sabotage a computer system, and a ?hacker? is the perpetrator of such activities.? As time progressed, the definition and societal view of hacking changed from good to bad. The most recent societal view of hacking is very negative with no idea or thought as to how hacking evolved. Many people seem to have forgotten how it was created.Another form of hacking that has contributed...

Find Another Essay On Computer Hacking

Computer Hacking Essay

1594 words - 6 pages have available for all can be found under the Hacking Archives "Tools of the Trade" section. Enjoy this forst bit of fun and look out for some more interesting coming your way soon.It is with heartfealt sorrow that we bid farewell to Cliburn and and Sledge. The time factor eventually caught up with them and forced them to hand over the management of to someone who had more time to attend to it. During the next couple of months

Hacking as a Means of Identifying Weaknesses in Computer Security

1651 words - 7 pages The use of hacking can be very beneficial as a means of identifying weaknesses in computer security. Nowadays, numerous companies and governments use this technique to assess the level of security of their systems and determine if any valuable information is at risk of being accessed unlawfully. Ethical hackers are employed to identify potential threats on a single computer or a whole network of computers. The found potential exploits are later

The Use of Hacking to Identify Weaknesses in Computer Security

1740 words - 7 pages Introduction The use of hacking to identify weaknesses in computer security has become an increasingly controversial issue in recent years. Awareness of this issue is important, because our ever increasing reliance on technology means that breaches in computer security have the potential to have wide-ranging and devastating consequences to society, worldwide. This essay will begin by clearly defining the term ‘hacking’ and will examine the type

Is Ethical Hacking the Answer to Ensuring the Safety of Company’s Computer Systems?

1445 words - 6 pages to cause harm, commonly called hackers. Hackers are people who gain unauthorized access to someone else’s computer. Hacking is wrong when financial or personal gain is achieved (Jamil and Khan 2011), but there are three types of hackers. ‘White Hats’ are hackers who use their computer skills for ethical reasons, ‘Black Hats’ use their skills in unethical or illegal ways and ‘Gray Hats’, also known as vigilantes or hacktivisits (Hackers 2009

How to write a legal report

1002 words - 5 pages Since the dawn of the first programmable computer, computers have been have been one of the most helpful inventions in the world. The Offence that is being investigated is computer hacking in both home and government environments. Hacking is a global problem which affects normal citizens, businesses and the government. Hacking can take many forms from hacking a social media account to hacking a government facility. The social construct of

Ethical Hacking

812 words - 4 pages Who is a hacker? Most people see a hacker as someone who exploits vulnerabilities of electronic devices and system, network, and computer to use in malicious activity. wrote "Hacking is any technical effort to manipulate the normal behavior of network connections and connected systems. A hacker is any person engaged in hacking. The term "hacking" historically referred to constructive, clever technical work that was not necessarily

Hacking Controversey

1780 words - 7 pages stop” to hacking. In 1986, “Congress [passed] the Computer Fraud and Abuse Act, which [criminalized] many hacking activities” (“Key Events” 1). This act criminalized hacking. Now let’s fast return to the present. Nowadays, hacking is very common. Every day or so, there is new issue/case related to hacking. As time progresses, so does our technology. During the 1960s computers were very rare. Nowadays everyone has a computer. As computers are

From Hacking to Cyber Terrorism

4086 words - 16 pages we are also observing explosive growth in the darker side of the IT - regarding hacking and cyber crimes. Activities like unauthorized computer intrusion, denial of service (DOS), stealing computer passwords and secure data; causing damage to computer systems and databases and causing damage to individuals/society are not very rare these days. As we go further on this paper, we will see different aspects of hacking, from harmless (simply

Ethical Hacking: The Different Types of Hacking

1061 words - 4 pages checks to become certified and maintain their status, effectively use methods of hacking that is recognized by the industry, and provide awareness of current security issues within a network. To become an Ethical Hacker, one must pass a series of exams designed to test the candidates’ knowledge of computer network protocols. “The International Council of Electronic Commerce Consultants (EC-Council) has developed a certification designation called

Computer Hackers and Ethics

1639 words - 7 pages  What comes to mind when you hear the word ‘hacker’? For most it means stealing information through the Internet, gaining illegal access to another person’s PC, or simply - disruptive behavior using a computer. The subject of hacking is no secret to the general public. Many people have been exposed to it by a bad experience or through the news and media. The idea of hacking that is stuck in the minds of people is that of which they have seen in

Hacking and Hackers persuasive essay - English - Essay

845 words - 4 pages intentions of the students thus the debate over why ethical hacking should be used arises. The availability of the course to students is a chance to curb cyber crime and should the information lead to more crimes by the same individuals, the society cannot place blame on the course leaders who offered it in the first place (Graves 237) In an education sense, teaching students how to hack gives them the ability to hack into computer systems aided

Similar Essays

Computer Hacking Essay

2087 words - 8 pages even realize they have been corrupted. Hacking is very much out of control. Denning'' article indirectly showed how easily sensitive information could be extrapolated from a system. All articles show those hackers with strong social skills and graces can charm the information out of a beguiled or proud computer owner/manager.Lastly, all the articles discussed the important overall theme of security measures. Roush and Behar point out that the most

Computer Hacking Essay

1929 words - 8 pages Precis of 'Who's reading your E-mail"The article exposes the vulnerability of computer data and ofcorporations with the popularity of the Internet. The Internet canallow hackers access to any computer in the world, with understatedease. Break-ins can go virtually undetected.Major corporations and government security departments haveacknowledged that hacker break-ins are out of control. Some companiesare too fearful to join networks because of

A Snapshot Of Computer Hacking Essay

1272 words - 5 pages A Snapshot of Computer Hacking Computer hacking has been around for over fifty years. Anytime new technology comes to the fore front, there are individuals who want to expand upon it. Hacking in general terms, is simply taking a technology and trying to improve upon it without the permission of the owner. I want to point out two terms that I will use throughout the paper, hacker and cracker. A hacker is a person who has

Computer Crime, Hacking, Phreaking And Software Piracy

1399 words - 6 pages these crimes. Well they are: Hacking, Phreaking, &Software Piracy.To begin I will start with Hacking, what is hacking. Hacking isbasically using your computer to 'Hack' your way into another. They useprograms called scanners which randomly dials numbers any generating tonesor carriers are recorded. These numbers are looked at by hackers and thenused again, when the hacker calls up the number and gets on he's presentedwith a logon prompt, this