.

Saturday, March 16, 2019

Hackers- Who Are They? And What Do They Do? Essay -- essays research pa

Computer HackersOutlineThesis Contrary to habitual belief, non only do you not contrive to be shining to be a cyber-terrorist, you do not even need to fill in lots ab forbidden computers.I. Hacking todayA. More like exploration in the 60s and 70sB. Cannot entreat themselves hackersII. Different Types of hackers A. A hacker delineateB. A cracker definedC. A phreaker defined III. You do not have to be profound A. Not like you have imposen on televisionB. Programs used atomic number 18 highly accessible on the InternetC. Some start out with trial and errorVIII. Online LegalitiesA.     Unauthorized access to, or use of a computerB.     Alteration or closing of data without authorizationC.      theft of computer servicesD.     Computer fraud (using a computer to drill other crimes)E. Denial of access to a computerF. Unauthorized stubbornness of passwords__________________________________Hacker sMany of the people in our society today often commemorate that computer hackers are very reinvigorated individuals, who have special talents and abilities enabling them to crack passwords, enter mainframes, send viruses, and crash computer systems. Contrary to popular belief, not only do you not have to be smart to be a hacker, you do not even need to know much about computers. Modern day hacking usually ends in destruction of other peoples property, or changing important private information. Also, as say by a 42-year-old security agent in San Francisco, Hacking in the mid-sixties and 1970s was a little more like gentlemanly exploring than it was fetching topics from people (Weise). These days hackers supportnot call themselves hackers without the threat of being called a hacker wanna-be or a script kiddie. A hacker wanna-be is the same thing as script kiddie, but is another slang term for a person who uses guess-work and programs that he did not write (Weise).Although, mos t people deliberate of a hacker as someone who breaks into computers and sends viruses, there are some(prenominal) different tokens of hackers, broken up into three different groups. The first token of hacker is the hacker himself. The defination of a hacker is hack$dr (hk=dr) One who enjoys the skilful challenge of creatively overcoming or circumventing limitations (Dict... ...ere are actually very morose guidelines on the Internet of what you can and cannot do.The Book of Online Law states that it is illegal for you to have "unauthorized access to, or use of a computer, alteration or destruction of data without authorization, theft of computer services, computer fraud (using a computer to commit other crimes), denial of an others access to a computer " (Smedinghoff).Hacking is starting a program that grants you access to things you normally would not be able to do, or access. You do not have to be smart to be a hacker. Anyone can get hacker tools and programs just by looking for them, downloading them, and then putting them to use. Modern day hacking is not how you see it on television. It is a simple process which any one can do using one of many programs that are available online. on that point are several different types of hackers. They each depend on what type of hacking is being done. There is one last thing for you to be awake(predicate) of, now that you know how easy it is to be a hacker. You have to be careful of all the many Internet legalities. You can get in serious trouble and not know you were doing anything wrong until it is too late.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.