ReviewEssays.com - Term Papers, Book Reports, Research Papers and College Essays
Search

The World of Computer Hacking

Essay by   •  January 23, 2011  •  Essay  •  768 Words (4 Pages)  •  1,094 Views

Essay Preview: The World of Computer Hacking

Report this essay
Page 1 of 4

The World of Computer Hacking

Computer hacking isn't something you here about everyday on the news. Really people don't have any knowledge about computer hacking. Everyday our identities go through about eight hundred computers a day. Every time we swipe a card, make a telephone call or connect to the internet our digital identities are recorded to keep track of who is doing what. Now the records are kept by different companies. The government also takes part in this game. These company computers are supposedly protected by anti-hacking programs. Well, unfortunately hacker can still get through. And when they get through your identity is up for grabs. This is what happening everyday and no one knows but the hacker and you. Until a hacker get control of a major corporate company, and then everybody in the world is talking about Enron's bank account being hacked into and sucked dry of all its money. Most people say hackers are greedy creatures that only want money. That is not always the case some hackers do it for fun, some do it for power, others do it because they don't won't to be ruled by the government. So, really and truly what are hacking programs? Where do they come from and what are the type's hackers?

What are hacking programs?

Most people think hacking programs are a hard a long process which it is, but most of it is nothing but 1's and 0's in a pattern. The 1's and 0's create a program that you can control to destroy or create whatever you want. Hacking programs are just the same as any other anti- anything. The differences between them are that the hacking program takes everything or just specific system tasks and deletes them, while anti-virus programs target viruses. Once you have mastered that you can insert the program into any internet connection and it will run it operation and carry out any orders you programmed. There are a lot of different programs out in cyber space some are prewritten and some are custom made. A lot of time when a person is just beginning to learn to hack they typically uses prewritten programs such as a Trojan horse or a virus. If you want to make up your own hacking program, you have to have some programming training and some know how about what breaks down a computer. After that you must test your program. Most beginners don't test their program before they try it and end up getting caught.

So, exactly what are the different types of hackers?

Well, the newbie's are called "script kiddies" because you are just beginning the long journey of hacking. More mature hackers

...

...

Download as:   txt (4.2 Kb)   pdf (71.1 Kb)   docx (10.3 Kb)  
Continue for 3 more pages »
Only available on ReviewEssays.com