Hackers Essay

1201 words - 5 pages

The meaning of Hacker is one who accesses a computer, which cannot supposedly be accessed by non-authorized people of the community. Hackers may use any type of system to access this information depending on what they intend on doing in the system. Computer hackers usually start off young, thinking that it is nothing but a little harmless fun. But as they get older, they realize it has turned into an addiction. Methods, protection and major hacks will be discussed in this paper.Hackers may use a variety of ways to hack into a system. First if the hacker is experienced and smart the hacker will use telnet to access a shell on another machine so that the risk of getting caught is lower than doing it using their own system. Ways in which the hacker will break into the system are: 1) Guess/cracking passwords. This is where the hacker takes guesses at the password or has a crack program to crack the password protecting the system.2) Finding back doors is another way in which the hacker may get access to the system. This is where the hacker tries to find flaws in the system they are trying to enter. 3) One other way in which a hacker may try to get into a system is by using a program called a WORM. This program is specially programmed to suit the need of the user. This program continually tries to connect to a machine at over 100 times a second until eventually the system lets in and the worm executes its program. The program could be anything from getting password files to deleting files depending on what it has been programmed to do.The only way that you or a company can stop a Hacker is by not having your computer connected to the net. This is the only sure fire way in which you can stop a hacker entering your system. This is mainly because hackers use a phone line to access the system. If it is possible for one person to access the system then it is possible for a hacker to gain access to the system. One of the main problems is that major companies need to be networked and accessible over the net so that employees can do overdue work or so that people can look up things on that company. Also major companies network their offices so that they can access data from different positions. Another way of securing yourself is always backing up files. That way if a virus or hacker crashes you computer you will be safe. Another very safe method is to change your password often and don't use the same password for everything. 2)Consider rotating your passwords, just make sure they are not available on you hard drive. In the long run it will be safer to go throughout the trouble than find out that someone is using your passwords to get into things. This can be dangerous in that Hackers supply their work with people's money by buying stuff with other peoples credit cards. They can do this by using the same technique as getting a password.One way that is used to try to prevent hackers gaining access is a program used by companies called a Firewall. A Firewall is...

Find Another Essay On Hackers

Hackers hacking the net Essay

1321 words - 5 pages access money. Criminals who break into computer systems electronically are commonly called 'Hackers'. In today's highly technological computer world, the computer hacker is digging their way through our nation's computer systems to embezzle money, create chaos, manipulate figures, and to seek enjoyment. However, hackers are even used for finding security breeches.The birth of hackers in the Sixties, shortly came after the advent of elite

Computer Hackers and Ethics Essay

1639 words - 7 pages the movies. The movies portray hackers as young and devious criminals. However, in reality these individuals are, talented people who use their abilities to find new and challenging ways to change how computers work. According to the Cult of the Dead Cow (weird name), a hacking organization, true hackers do not get into the system to erase everything or to sell the information to someone else. They get in there to satisfy their curiosity to see

Hackers: Technological Wizards

2170 words - 9 pages Hackers come in all shapes and sizes. In the world of hackers shapes and sizes don't matter. Technological knowledge and computer skills are the only traits that matter in the hierarchy of the hacker society. The hackers with the most skills are respected most. There are two main types of hackers that invade on the privacy of law-abiding citizens. These hackers are known as phone phreaks and system hackers and he will stop at nothing to aquire

Hackers Are Criminals

1299 words - 5 pages Hacking is the practice of changing the features of a system, in order to accomplish a goal outside of the maker’s inventive purpose. These actions may result in someone finding information that does not belong to them and using it to access personal accounts. There are three categories of hackers; black hats, white hats, and gray hats. With regard to this, it depends on the job of the hacker. For instance, black hat hackers are well-known for

Types of hackers

988 words - 4 pages All 3 types of hackers may have detailed knowledge of system security and programming, but how they use their knowledge is what makes them very different.1. Black-hat hackers (also known as crackers) are the ones who write virii, destroy data, and deface websites along with other illegal activity. This type of hacker will not end up at a very good job due to a bad reputation, and usually ends up in jail for a long period of time. This kind of

Internet Security: Hackers

645 words - 3 pages The internet has brought pleasures and benefits to our lives since it was invented. Although this fact is true, Internet permits strangers “called hackers” to spy, hack and enter our private world in networks. According to Network world, one website was hacked every five seconds. Hacking is a taboo operation by stealthily accessing. During hacking, the hackers steal user’s data and their money. Also, they may destroy their computer or their

Les Pirates Modernes (Hackers)

1577 words - 6 pages fonctions à fond , mais, qui l'exploitent de façon malhonette. On les appelle les pirates d'informatique (computer hackers). Ils sont perçus par le public selon des stéréotypes établis par les medias. Pour mieux comprendre ces passionnés d'ordinateurs, on doit construire leur profil descriptif afin de mieux les connaître, savoir comment ils opèrent, et comprendre pourquoi la soci

Hackers and Artists

5459 words - 22 pages have a lot in common. In fact, of all the different types of people I've known, hackers and painters are among the most alike.What hackers and painters have in common is that they're both makers. Along with composers, architects, and writers, what hackers and painters are trying to do is make good things. They're not doing research per se, though if in the course of trying to make good things they discover some new technique, so much the better.I've

Victims of Computer Hackers

965 words - 4 pages Neiman Marcus an upscale retailer is one of the latest to reveal being a victim of hackers. Many Customers were affected, not just the store itself. Customers cards were being use to make unauthorized purchases. This situation put the retailer at risk of losing current or potential customers. Many individuals would question its security measures potentially bringing the company’s overall goodwill down. Neiman Marcus hack affected everyone

The War Against Hackers

2006 words - 8 pages does and then move on. The hacker, the true hacker, will see the box, stop, examine it, wonder about it, and spend mental time trying to figure it out. Given the proper circumstances, he might come back later to look closely at the wiring, or even be so bold as to open the box. Not maliciously, just out of curiosity. The hacker wants to know how things work.(8) Hackers truly are "America's Most Valuable Resource,"(4:264) as ex-CIA Robert Steele has

Viruses: Nature’s Hackers

1644 words - 7 pages Levi Promislow Mrs. Ross Lit/Comp 10 23 May 2014 Viruses: Nature’s Hackers Over a billion years of evolution has gifted us with DNA that is very well adapted to the environment. Each strand of DNA is like a bit of computer code, and surprisingly, they are open source code. The easiest way to modify the code is through viruses, which have evolved specifically to splice new genes into the host’s DNA. The question is: does mankind have the right to

Similar Essays

Hackers Essay

3835 words - 15 pages Hackers It is the weekend you have nothing to do so you decide to play around on your computer . You turn it and than start up , calling people with your modem , conneciting to another world with people. This is all fine but what happens when you start getting into other people’s computer files , then it becomes a crime and who are the criminals. To begin i will start with hacking and hackers. Hacking is the act of

Hackers Essay

1310 words - 5 pages This paper is about the hacker subculture. The paper breaks the misused term 'hacker' in to its sub categories provides descriptions of the categories and a psychological profile of the most common type.-------------------------------Hackers cannot be defined by skin color, religion, or race, nor can they properly be generalized as one group. Hackers are not a homogeneous group, they have a variety of values, beliefs and experience that can

Computer Hackers Essay

1155 words - 5 pages Computer Hackers Hackers are popularly defined as computer experts who spend enormous amounts of time trying to breach the security of networks, web servers and email servers. Usually they use a selection of specialist software to identify any weaknesses, which they are then able to exploit. There are basically two main types of hackers, the first type is mainly consistent of intelligent adolescents who acquire their

Hackers Vs. Crackers Essay

3212 words - 13 pages Hackers vs. Crackers Introduction When you hear the word hacker, you probably think of a nerdy, teen-aged boy sitting behind a computer with sinister plans for his attack flowing through the keystrokes of his fingers. You probably think of a techno-criminal defacing websites, shutting down computer systems, stealing money or confidential information-basically a threat to society. But these descriptions may describe someone else enterely