Computer Crime In The 90's


It's the weekend, you have nothing to do so you decide to play around on
your computer. You turn it on and then start up, you start calling people
with your modem, connecting to another world, with people just like you at
a button press away. This is all fine but what happens when you start
getting into other peoples computer files. Then it becomes a crime, but
what is a computer crime really, obviously it involves the use of a
computer but what are these crimes. Well they are: Hacking, Phreaking, &
Software Piracy.
To begin I will start with Hacking, what is hacking. Hacking is
basically using your computer to "Hack" your way into another. They use
programs called scanners which ...

Want to read the rest of this paper?
Join Essayworld today to view this entire essay
and over 50,000 other term papers

the form of trespassing, invasion of privacy, or
vandalism. Quite often they are mearly out for a fun and games evening,
and they get entangled in the illegal use of their machines without
realizing the full import of what they are doing" , I have a hard time
believing that so lets see what a "hacker" has to say about what he does
"Just as they were enthraled with their pursuit of information, so are we.
The thrill of the hack is not in breaking the law, it's in the pursuit and
capture of knowledge." , as you can see the "hacker" doesn't go out to do
destroy things although some do. It's in the pursuit of knowledge. Of
course this is still against the law. But where did all of this start, MIT
is where hacking started the people there would learn and explore
computer systems all around the world. In the views of professional
hacking is like drugs or any other addictive substance, it's an addiction
for the mind and once started it's difficult to stop. This could be true,
as hackers ...

Get instant access to over 50,000 essays.
Write better papers. Get better grades.


Already a member? Login

of highly illegal boxes and machines in order to defeat the
security that is set up to avoid this sort of happening.

[fr'eaking] v. 2. A person who uses the above methods of destruction and
chaos in order to make a better life for all. A true phreaker will not go
against his fellows or narc on people who have ragged on him or do
anything termed to be dishonourable to phreaks.

[fr'eek] n. 3. A certain code or dialup useful in the action of being a
phreak. (Example: "I hacked a new metro phreak last night.")

The latter 2 ideas of what a phreak is, is rather weird. A Phreak like the
hacker likes to explore and experiment, however his choice of exploring is
not other computer but the ...

Succeed in your coursework without stepping into a library.
Get access to a growing library of notes, book reports,
and research papers in 2 minutes or less.


CITE THIS PAGE:

Computer Crime In The 90's. (2006, February 9). Retrieved November 21, 2017, from http://www.essayworld.com/essays/Computer-Crime-In-The-90s/40953
"Computer Crime In The 90's." Essayworld.com. Essayworld.com, 9 Feb. 2006. Web. 21 Nov. 2017. <http://www.essayworld.com/essays/Computer-Crime-In-The-90s/40953>
"Computer Crime In The 90's." Essayworld.com. February 9, 2006. Accessed November 21, 2017. http://www.essayworld.com/essays/Computer-Crime-In-The-90s/40953.
"Computer Crime In The 90's." Essayworld.com. February 9, 2006. Accessed November 21, 2017. http://www.essayworld.com/essays/Computer-Crime-In-The-90s/40953.
JOIN NOW
Join today and get instant access to this and 50,000+ other essays


PAPER DETAILS
Added: 2/9/2006 11:15:45 AM
Category: Computers
Type: Free Paper
Words: 1554
Pages: 6

Save | Report

SHARE THIS PAPER

SAVED ESSAYS
Save and find your favorite essays easier

SIMILAR ESSAYS
Computer Crime In The 1990's
"Does The Military Continue To ...
Prohibition In The 1920's
Changes In The Earth's Environm...
Fashion In The 60's
Progression Of Music From The 1...
Computer Crime 2
Nixon's Program Of Detente Was ...
The Constitution In The 1850's:...
History Of The Computer Industr...
Copyright | Cancel | Contact Us

Copyright © 2017 Essayworld. All rights reserved