Hackers Essay

3835 words - 15 pages


It is the weekend you have nothing to do so you decide to play around on your computer .

You turn it and than start up , calling people with your modem , conneciting to another world

with people. This is all fine but what happens when you start getting into other people’s

computer files , then it becomes a crime and who are the criminals. To begin i will start

with hacking and hackers.

Hacking is the act of breaking into computers and network of other poeple’s with out

any permission . Hacking is like drugs or any other substance , its an addiction for the mind

and once started it is diffucult to stop . Hacker is a person who enjoy learning details of a

programming language or system , who tries to break into computer systems .There is two

types of hackers. On is the benign hackers , who likes get into his or her own computer and

understand how it works . The malicious hackers is the person who likes getting into other

people’s system . Black hat is used to discribe a hacker who break into a computer system

or network with malicious intent . Unlike white hat , the black hat takes advantage of the

break in perhaps destroying files or stealing data for some future purpose. White hat hackers

describes a hacker who identifies a security weakness in a computer system or network but

instead of taking malicious advantage of it . They will allow the system‘s owners to fix it

before can be taken advantage by others . But U.S law does not see differences between black

hat hacker and white hat hacker.

Many of the poeple in our society today often think that computer hackers are very smart

individuals who have special talents and abilities and enabiling them to crack passwords ,

send viruses , cancel your cable tv , raid your social security and crash computer systems.

Most people in our society do not spend the time to break into computer systems but all

studies indicate that hackers are genarlly young and not haave full time jobs or own property

They have so much time and energy to break into computers. Hackers learn hacking from

reading different kind of computer books , they find many available tools on the internet ,

they spend so much time on the computer to learn the techniques of hacking . Some of the

hackers hack for to gain highest prestige within the comunity. Some of them hack just for fun,

more they hack more fun they have . Hacking is just another way to recieve a build up of

adranaline in the body. They also gain great deal of power from learning confidential

information. Hacking involves accumulation of knowledge which is accompanied by the

greater status and power . Some of the hackers say that they only punish people an companies

that they do not like and to show weakness of companies which have poor security. Some feel

that if they put others down they will elevate to higher level. Most of...

Find Another Essay On Hackers

Hackers hacking the net Essay

1321 words - 5 pages access money. Criminals who break into computer systems electronically are commonly called 'Hackers'. In today's highly technological computer world, the computer hacker is digging their way through our nation's computer systems to embezzle money, create chaos, manipulate figures, and to seek enjoyment. However, hackers are even used for finding security breeches.The birth of hackers in the Sixties, shortly came after the advent of elite

Computer Hackers and Ethics Essay

1639 words - 7 pages the movies. The movies portray hackers as young and devious criminals. However, in reality these individuals are, talented people who use their abilities to find new and challenging ways to change how computers work. According to the Cult of the Dead Cow (weird name), a hacking organization, true hackers do not get into the system to erase everything or to sell the information to someone else. They get in there to satisfy their curiosity to see

Hackers: Technological Wizards

2170 words - 9 pages Hackers come in all shapes and sizes. In the world of hackers shapes and sizes don't matter. Technological knowledge and computer skills are the only traits that matter in the hierarchy of the hacker society. The hackers with the most skills are respected most. There are two main types of hackers that invade on the privacy of law-abiding citizens. These hackers are known as phone phreaks and system hackers and he will stop at nothing to aquire

Hackers Are Criminals

1299 words - 5 pages Hacking is the practice of changing the features of a system, in order to accomplish a goal outside of the maker’s inventive purpose. These actions may result in someone finding information that does not belong to them and using it to access personal accounts. There are three categories of hackers; black hats, white hats, and gray hats. With regard to this, it depends on the job of the hacker. For instance, black hat hackers are well-known for

Types of hackers

988 words - 4 pages All 3 types of hackers may have detailed knowledge of system security and programming, but how they use their knowledge is what makes them very different.1. Black-hat hackers (also known as crackers) are the ones who write virii, destroy data, and deface websites along with other illegal activity. This type of hacker will not end up at a very good job due to a bad reputation, and usually ends up in jail for a long period of time. This kind of

Internet Security: Hackers

645 words - 3 pages The internet has brought pleasures and benefits to our lives since it was invented. Although this fact is true, Internet permits strangers “called hackers” to spy, hack and enter our private world in networks. According to Network world, one website was hacked every five seconds. Hacking is a taboo operation by stealthily accessing. During hacking, the hackers steal user’s data and their money. Also, they may destroy their computer or their

Les Pirates Modernes (Hackers)

1577 words - 6 pages fonctions à fond , mais, qui l'exploitent de façon malhonette. On les appelle les pirates d'informatique (computer hackers). Ils sont perçus par le public selon des stéréotypes établis par les medias. Pour mieux comprendre ces passionnés d'ordinateurs, on doit construire leur profil descriptif afin de mieux les connaître, savoir comment ils opèrent, et comprendre pourquoi la soci

Hackers and Artists

5459 words - 22 pages have a lot in common. In fact, of all the different types of people I've known, hackers and painters are among the most alike.What hackers and painters have in common is that they're both makers. Along with composers, architects, and writers, what hackers and painters are trying to do is make good things. They're not doing research per se, though if in the course of trying to make good things they discover some new technique, so much the better.I've

Victims of Computer Hackers

965 words - 4 pages Neiman Marcus an upscale retailer is one of the latest to reveal being a victim of hackers. Many Customers were affected, not just the store itself. Customers cards were being use to make unauthorized purchases. This situation put the retailer at risk of losing current or potential customers. Many individuals would question its security measures potentially bringing the company’s overall goodwill down. Neiman Marcus hack affected everyone

The War Against Hackers

2006 words - 8 pages does and then move on. The hacker, the true hacker, will see the box, stop, examine it, wonder about it, and spend mental time trying to figure it out. Given the proper circumstances, he might come back later to look closely at the wiring, or even be so bold as to open the box. Not maliciously, just out of curiosity. The hacker wants to know how things work.(8) Hackers truly are "America's Most Valuable Resource,"(4:264) as ex-CIA Robert Steele has

Viruses: Nature’s Hackers

1644 words - 7 pages Levi Promislow Mrs. Ross Lit/Comp 10 23 May 2014 Viruses: Nature’s Hackers Over a billion years of evolution has gifted us with DNA that is very well adapted to the environment. Each strand of DNA is like a bit of computer code, and surprisingly, they are open source code. The easiest way to modify the code is through viruses, which have evolved specifically to splice new genes into the host’s DNA. The question is: does mankind have the right to

Similar Essays

Hackers Essay

1201 words - 5 pages The meaning of Hacker is one who accesses a computer, which cannot supposedly be accessed by non-authorized people of the community. Hackers may use any type of system to access this information depending on what they intend on doing in the system. Computer hackers usually start off young, thinking that it is nothing but a little harmless fun. But as they get older, they realize it has turned into an addiction. Methods, protection and major

Hackers Essay

1310 words - 5 pages This paper is about the hacker subculture. The paper breaks the misused term 'hacker' in to its sub categories provides descriptions of the categories and a psychological profile of the most common type.-------------------------------Hackers cannot be defined by skin color, religion, or race, nor can they properly be generalized as one group. Hackers are not a homogeneous group, they have a variety of values, beliefs and experience that can

Computer Hackers Essay

1155 words - 5 pages Computer Hackers Hackers are popularly defined as computer experts who spend enormous amounts of time trying to breach the security of networks, web servers and email servers. Usually they use a selection of specialist software to identify any weaknesses, which they are then able to exploit. There are basically two main types of hackers, the first type is mainly consistent of intelligent adolescents who acquire their

Hackers Vs. Crackers Essay

3212 words - 13 pages Hackers vs. Crackers Introduction When you hear the word hacker, you probably think of a nerdy, teen-aged boy sitting behind a computer with sinister plans for his attack flowing through the keystrokes of his fingers. You probably think of a techno-criminal defacing websites, shutting down computer systems, stealing money or confidential information-basically a threat to society. But these descriptions may describe someone else enterely