Saturday, March 16, 2019
Hackers- Who Are They? And What Do They Do? Essay -- essays research pa
 Computer HackersOutlineThesis  Contrary to  habitual belief,  non only do you not  contrive to be  shining to be a  cyber-terrorist, you do not even need to  fill in lots ab forbidden  computers.I. Hacking todayA. More like exploration in the 60s and 70sB. Cannot  entreat themselves hackersII. Different Types of hackers A. A hacker  delineateB. A cracker definedC. A phreaker defined III. You do not have to be  profound A. Not like you have  imposen on televisionB. Programs used  atomic number 18 highly accessible on the InternetC. Some start out with trial and errorVIII. Online LegalitiesA.     Unauthorized access to, or use of a computerB.     Alteration or  closing of data without authorizationC.      theft of computer servicesD.     Computer fraud (using a computer to  drill other crimes)E. Denial of access to a computerF. Unauthorized  stubbornness of passwords__________________________________Hacker   sMany of the people in our society today often  commemorate that computer hackers are very  reinvigorated individuals, who have special talents and abilities  enabling them to crack passwords, enter mainframes, send viruses, and crash computer systems. Contrary to popular belief, not only do you not have to be smart to be a hacker, you do not even need to know much about computers. Modern day hacking usually ends in destruction of other peoples property, or changing important private information. Also, as  say by a 42-year-old security agent in San Francisco,  Hacking in the mid-sixties and 1970s was a little more like gentlemanly exploring than it was  fetching  topics from people (Weise). These days hackers  supportnot call themselves hackers without the threat of being called a hacker wanna-be or a script kiddie. A hacker wanna-be is the same thing as script kiddie, but is another slang term for a person who uses guess-work and programs that he did not write (Weise).Although, mos   t people  deliberate of a hacker as someone who breaks into computers and sends viruses, there are  some(prenominal) different  tokens of hackers, broken up into three different groups. The first  token of hacker is the hacker himself. The defination of a hacker is  hack$dr (hk=dr) One who enjoys the  skilful challenge of creatively overcoming or circumventing limitations (Dict...  ...ere are actually very  morose guidelines on the Internet of what you can and cannot do.The Book of Online Law states that it is illegal for you to have "unauthorized access to, or use of a computer, alteration or destruction of data without authorization, theft of computer services, computer fraud (using a computer to commit other crimes), denial of an others access to a computer " (Smedinghoff).Hacking is starting a program that grants you access to things you normally would not be able to do, or access. You do not have to be smart to be a hacker. Anyone can get hacker tools and programs just    by looking for them, downloading them, and then putting them to use. Modern day hacking is not how you see it on television. It is a simple process which any one can do using one of many programs that are available online.  on that point are several different types of hackers. They each depend on what type of hacking is being done. There is one last thing for you to be  awake(predicate) of, now that you know how easy it is to be a hacker. You have to be careful of all the many Internet legalities. You can get in serious trouble and not know you were doing anything wrong until it is too late.                   
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.