Computer Crime


It's the weekend, you have nothing to do so you decide to
lay around on your computer. You turn it on and then start up, you
start calling people with your modem, connecting to another world,
with people just like you at a button press away. This is all
fine but what happens when you start getting into other peoples
computer files. Then it becomes a crime, but what is a computer
crime really, obviously it involves the use of a computer but what
are these crimes. Well they are: Hacking, Phreaking, & Software
Piracy.
To begin I will start with Hacking, what is hacking. Hacking is
basically using your computer to "Hack" your way into another. They
use ...

Want to read the rest of this paper?
Join Essayworld today to view this entire essay
and over 50,000 other term papers

in computer crimes that take the form of trespassing,
invasion of privacy, or vandalism. Quite often they are mearly
out for a fun and games evening, and they get entangled in the
illegal use of their machines without realizing the full import of
what they are doing" , I have a hard time believing that so lets see
what a "hacker" has to say about what he does "Just as they were
enthraled with their pursuit of information, so are we. The thrill
of the hack is not in breaking the law, it's in the pursuit and
capture of knowledge." , as you can see the "hacker" doesn't go
out to do destroy things although some do. It's in the pursuit of
knowledge. Of course this is still against the law. But where did all
of this start, MIT is where hacking started the people there would
learn and explore computer systems all around the world. In the views
of professional hacking is like drugs or any other addictive
substance, it's an ...

Get instant access to over 50,000 essays.
Write better papers. Get better grades.


Already a member? Login

we turn to the what is
known as the "Official" Phreakers Manual "Phreak [fr'eek]


1. The action of using mischievous and mostly illegal ways in
order to not pay for some sort of telecommunications bill,
order, transfer, or other service. It often involves usage of
highly illegal boxes and machines in order to defeat the
security that is set up to avoid this sort of happening.
[fr'eaking]


v. 2. A person who uses the above methods of destruction and
chaos in order to make a better life for all. A true phreaker ...

Succeed in your coursework without stepping into a library.
Get access to a growing library of notes, book reports,
and research papers in 2 minutes or less.


CITE THIS PAGE:

Computer Crime. (2008, September 16). Retrieved November 21, 2017, from http://www.essayworld.com/essays/Computer-Crime/89985
"Computer Crime." Essayworld.com. Essayworld.com, 16 Sep. 2008. Web. 21 Nov. 2017. <http://www.essayworld.com/essays/Computer-Crime/89985>
"Computer Crime." Essayworld.com. September 16, 2008. Accessed November 21, 2017. http://www.essayworld.com/essays/Computer-Crime/89985.
"Computer Crime." Essayworld.com. September 16, 2008. Accessed November 21, 2017. http://www.essayworld.com/essays/Computer-Crime/89985.
JOIN NOW
Join today and get instant access to this and 50,000+ other essays


PAPER DETAILS
Added: 9/16/2008 05:22:07 AM
Category: Legal Issues
Type: Premium Paper
Words: 1512
Pages: 6

Save | Report

SHARE THIS PAPER

SAVED ESSAYS
Save and find your favorite essays easier

SIMILAR ESSAYS
Computer Crime Is Increasing
COMPUTER CRIME Hackers And Secu...
Computer Crime 3
Computer Crime 2
Computer Crime In The 90's
Computer Crime
Computer Crime
Computer Crime
Computer Crime: A Increasing Pr...
Computer Crime
Computer Crime
Copyright | Cancel | Contact Us

Copyright © 2017 Essayworld. All rights reserved