- Discover essay samples

Computer Hackers

4.9 of 5.0 (8 reviews)

501 words

Computer Hackers Page 1
Computer Hackers Page 2
Computer Hackers Page 3
Computer Hackers Page 4
The above thumbnails are of reduced quality. To view the work in full quality, click download.

Computer Hackers

The meaning of Hacker is one who accesses a computer which is supposably not able to be accessed to non
authorised people of the community. Hackers may use any type of system to access this information
depending on what they intend on doing in the system.


Hackers may use a variety of ways to hack into a system. First if the hacker is experienced and smart the
hacker will use telnet to access a shell on another machine so that the risk of getting caught is lower than
doing it using their own system.
Ways in which the hacker will break into the system are:

1) Guess/cracking passwords. This is where the hacker takes guesses at the password or has a crack
program to crack the password protecting the system.

2) Finding back doors is another way in which the hacker may get access to the system. This is where the
hacker tries to find flaws in the system they are trying to enter.

3) One other way in which a hacker may try to get into a system is by using a program called a WORM.
This program is specially programmed to suit the need of the user. This programme continually tries to
connect to a machine at over 100 times a second until eventually the system lets in and the worm executes
its program. The program could be anything from getting password files to deleting files depending on
what it has been programmed to do.


The only way that you or a company can stop a Hacker is by not having your computer connected to the
net. This is the only sure fire way in which you can stop a hacker entering your system. This is mainly
because hackers use a phone line to access the system. If it is possible for one person to access the system
then it is possible for a hacker to gain access to the system. One of the main problems is that major
companies need to be networked and accessible over the net so that employees can do overdue work or so
that people can look up things on that company. Also major companies network their offices so that they
can access data from different positions.

One way which is used to try to prevent hackers gaining access is a program used by companies called a
Firewall. A Firewall is a program which stops other connections from different servers to the firewall
server. This is very effective in stopping hackers entering the system. Tho this is not a fool proof way of
stopping hackers as it can be broken and hackers can get in. Tho this is a very good way of protecting ...

You are currently seeing 50% of this paper.

You're seeing 501 words of 1001.

Keywords: computer hackers movie, computer hackers meaning, computer hackers in india, computer hackers anonymous, computer hackers and the cybercrime law, computer hackers risk, computer hackers examples, computer hackers news

Similar essays

Salmonella Typhi (Typhoid Fever)

Salmonella Typhi is a very contagious infection in the intestines that affects the whole body. It is called by a bacteria called Salmonella Typhi that is found in the stools of an infected person. Most people in the United States get typhoid as a result of visiting another country. Typhoid is spread when a person eats food or water contamina...

194 reviews
Atmospheric Circulation and More

The global energy balance and atmospheric motion mainly determine the circulation of the earth's atmosphere. There is a hierarchy of motion in atmospheric circulation. Each control can be broken down into smaller controlling factors. The global energy balance is an equal balance of short-wave radiation coming into...

12 reviews
Corrosion and Rusting

Introduction Some people may be annoyed by their car ?wearing out?. Kids may have trouble with rust forming on their bicycles. One may think how to prevent rusting, but do one knows what is happening when a metal corrode? ?Corrosion is defined as the involuntary destruction of substances such as metals and mineral building...

145 reviews
Compatisome of upper and lower rock shores pools

Comparisons of Upper and Lower Shore Rock Pools In the following study, rock pools from the upper and lower shore of Bracelet Bay, were examined and the organisms within noted. The contents of the two pools were compared. The abiotic variations of the pools were recorded and examined in an attempt to understand why the contents of the p...

177 reviews
Cloning 7

Genetic Engineering / Cloning Genetic engineering, altering the inherited characteristics of an organism in a predetermined way, by introducing into it a piece of the genetic material of another organism. Genetic engineering offers the hope of cures for many inherited diseases, once the problem of low efficiencies of effe...

29 reviews
Atsisiųsti šį darbą