AskEssays.com - Discover essay samples

Computer Hackers

4.9 of 5.0 (8 reviews)

Contains
501 words
Category
Science

Computer Hackers Page 1
Computer Hackers Page 2
Computer Hackers Page 3
Computer Hackers Page 4
The above thumbnails are of reduced quality. To view the work in full quality, click download.

Computer Hackers




The meaning of Hacker is one who accesses a computer which is supposably not able to be accessed to non
authorised people of the community. Hackers may use any type of system to access this information
depending on what they intend on doing in the system.


Methods


Hackers may use a variety of ways to hack into a system. First if the hacker is experienced and smart the
hacker will use telnet to access a shell on another machine so that the risk of getting caught is lower than
doing it using their own system.
Ways in which the hacker will break into the system are:


1) Guess/cracking passwords. This is where the hacker takes guesses at the password or has a crack
program to crack the password protecting the system.


2) Finding back doors is another way in which the hacker may get access to the system. This is where the
hacker tries to find flaws in the system they are trying to enter.


3) One other way in which a hacker may try to get into a system is by using a program called a WORM.
This program is specially programmed to suit the need of the user. This programme continually tries to
connect to a machine at over 100 times a second until eventually the system lets in and the worm executes
its program. The program could be anything from getting password files to deleting files depending on
what it has been programmed to do.


Protection


The only way that you or a company can stop a Hacker is by not having your computer connected to the
net. This is the only sure fire way in which you can stop a hacker entering your system. This is mainly
because hackers use a phone line to access the system. If it is possible for one person to access the system
then it is possible for a hacker to gain access to the system. One of the main problems is that major
companies need to be networked and accessible over the net so that employees can do overdue work or so
that people can look up things on that company. Also major companies network their offices so that they
can access data from different positions.


One way which is used to try to prevent hackers gaining access is a program used by companies called a
Firewall. A Firewall is a program which stops other connections from different servers to the firewall
server. This is very effective in stopping hackers entering the system. Tho this is not a fool proof way of
stopping hackers as it can be broken and hackers can get in. Tho this is a very good way of protecting ...

You are currently seeing 50% of this paper.

You're seeing 501 words of 1001.

Keywords: computer hackers movie, computer hackers meaning, computer hackers in india, computer hackers anonymous, computer hackers and the cybercrime law, computer hackers risk, computer hackers examples, computer hackers news

Similar essays


An investigation into electrical resistance

Background Knowledge Resistance, in electricity, is a property of any object or substance to resist the flow of an electrical current. The quantity of resistance in an electric circuit determines the amount of current flowing in the circuit for any given voltage applied to the circuit. The resistance of an object is determined by the nat...

159 reviews
Download
Creatine 3

INTRODUCTION Today in society there is a lot of pressure on the perfect image. Image is the way that everything is judged in the world. So with that perspective in mind, the search for the "perfect body" is what everyone is looking for. But with all of the commotion that is happening, very few people want to put in a solid effort in ord...

200 reviews
Download
Breast cancer 2

Scientists have finally found out why MPA medroxyprogesterone, otherwise known as Provera performs just as well in low doses in small children who are dealing with early sex traits, as it does for women in high doses with breast cancer. You may have heard of Provera before as the drug that delivers hormone replacement therapy for women who are...

91 reviews
Download
Canadian black bear

Canadian Black Bear The Canadian Black Bear There are 8 kinds of bears (Ursus) in the world but I chose the North American Black bear (Ursus americanus). I will be covering general information about the bear such as their size, weight, color, food, etc., but I will concentrate mainly on the hibernating cycle of the black bear. There are from...

192 reviews
Download
Dreams rem

Dreams are a form of cognitive activity that occur during sleep. Like vivid memories and daytime fantasies, dreams involve visual images in the absence of external visual stimulation. Some dreams are so realistic and well organized that we feel as though they must be real-- that we simply cannot be dreaming this time. Dreaming has always bee...

191 reviews
Download
Mass And Science

Mass is the amount of matter in an object. When you record mass the unit you use is grams. A medium sized leaf is about 1 gram, a potato chip 2 grams. A larger unit of mass is a kilogram. A kilogram is about the mass of a medium sized textbook. You need a balance to find mass. There are many kinds of balances. The gram is the unit used to...

111 reviews
Download
Bioethics

, which is the study of value judgments pertaining to human conduct in the area of biology and includes those related to the practice of medicine, has been an important aspect of all areas in the scientific field (Bernstein, Maurice, M.D.). It is one of the factors that says whether or not certain scientific research can go on,...

48 reviews
Download
Millennium bug

What Effect will the Millennium Bug have on Society? People talk about the Millennium Bug, but few actually know what it is and how big an effect is could have. Virtually everything is our society is vulnerable, from water and electricity to our phone bills and savings accounts. The Millennium Bug is a design fault dating back to the early...

193 reviews
Download
How Cells Harvest Chemical Energy

Respiration: 1. A cell must work just to maintain its complex structure, for order is intrinsically unstable. Because of entropy (the second law of thermodynamics), which states that any enclosed system tends toward disorganization, cells must constantly use energy to keep themselves in order. If the cell was to stop using en...

193 reviews
Download
Global Warming a serious threa

Is global warming a serious threat? As human technology has been developed by scientists and researchers, we not only get a comfort in living throughout our life but it also helps people to find more jobs and less popery. However, on the other hand, there are some increasing problems on our planet earth due to human activities. They inc...

188 reviews
Download
AIDS Is it a Modern Plague

AIDS: Is it a Modern Plague? AIDS: Is it a Modern Plague? In some parts of the world there are still wars being fought and dictators in power. There are societies which consider themselves at the peak of evolution and progress. They are able to create state of the art automobiles, luxurious homes, efficient and organized industries, co...

158 reviews
Download
Environmentalists

Bill McKibben and Edward Abbey are both modern environmental writers who have had a noticeable impact on the environmental movement. One of Abbey?s novels, The Monkey Wrench Gang, was an inspirational piece for some of the founders of Earthfirst!, a far-left environmentalist group. McKibben?s most famous novel, The End of Nature (1989), is mo...

174 reviews
Download
Environmental isuues

Did you ever think that something meant to aid in the advance of humans could be potentially fatal at the same time? What about a disease that was considered ?dead?, resurfacing and killing unsuspecting people? What about the fact that we as human beings are ruining the only place for us to live, the earth? These questions sound outrageous,...

78 reviews
Download
Alternative energy sources

Alternative Energy Sources In the not-too-distant future -- with regard to history's timeline -- there will come a point when fossil fuels will have been depleted and humans will be forced to find alternative sources with which to power automobiles, household heating units and myriad other machinery that utilizes fuel. However, waiting until...

19 reviews
Download
Atsisiųsti šį darbą