Warning: Use of undefined constant referer - assumed 'referer' (this will throw an Error in a future version of PHP) in /usr/home/essaywo/public_html/essays on line 102

Warning: Use of undefined constant host - assumed 'host' (this will throw an Error in a future version of PHP) in /usr/home/essaywo/public_html/essays on line 105

Warning: Cannot modify header information - headers already sent by (output started at /usr/home/essaywo/public_html/essays:102) in /usr/home/essaywo/public_html/essays on line 106

Warning: Cannot modify header information - headers already sent by (output started at /usr/home/essaywo/public_html/essays:102) in /usr/home/essaywo/public_html/essays on line 109
Computer Crimes - School Essays

Computer Crimes


It's the weekend, you have nothing to do so you decide to play around on
your computer. You turn it on and then start up, you start calling people with
your modem, connecting to another world, with people just like you at a button
press away. This is all fine but what happens when you start getting into other
peoples computer files. Then it becomes a crime, but what is a computer crime
really, obviously it involves the use of a computer but what are these crimes.
Well they are: Hacking, Phreaking, & Software Piracy.

To begin I will start with Hacking, what is hacking. Hacking is basically
using your computer to "Hack" your way into another. They use programs called
scanners which ...

Want to read the rest of this paper?
Join Essayworld today to view this entire essay
and over 50,000 other term papers

that take the form of
trespassing, invasion of privacy, or vandalism. Quite often they are mearly out
for a fun and games evening, and they get entangled in the illegal use of their
machines without realizing the full import of what they are doing", I have a
hard time believing that so lets see what a "hacker" has to say about what he
does "Just as they were enthraled with their pursuit of information, so are we.
The thrill of the hack is not in breaking the law, it's in the pursuit and
capture of knowledge.", as you can see the "hacker" doesn't go out to do destroy
things although some do. It's in the pursuit of knowledge. Of course this is
still against the law. But where did all of this start, MIT is where hacking
started the people there would learn and explore computer systems all around the
world. In the views of professional hacking is like drugs or any other addictive
substance, it's an addiction for the mind and once started it's difficult to
stop. This could be true, as ...

Get instant access to over 50,000 essays.
Write better papers. Get better grades.


Already a member? Login

involves usage of highly illegal boxes and
machines in order to defeat the security that is set up to avoid this sort of
happening. [fr'eaking] v. 2. A person who uses the above methods of destruction
and chaos in order to make a better life for all. A true phreaker will not go
against his fellows or narc on people who have ragged on him or do anything
termed to be dishonourable to phreaks. [fr'eek] n. 3. A certain code or dialup
useful in the action of being a phreak. (Example: "I hacked a new metro phreak
last night.")" The latter 2 ideas of what a phreak is, is rather weird. A
Phreak like the hacker likes to explore and experiment, however his choice of
exploring is not other ...

Succeed in your coursework without stepping into a library.
Get access to a growing library of notes, book reports,
and research papers in 2 minutes or less.


CITE THIS PAGE:

Computer Crimes. (2006, December 4). Retrieved March 19, 2024, from http://www.essayworld.com/essays/Computer-Crimes/56592
"Computer Crimes." Essayworld.com. Essayworld.com, 4 Dec. 2006. Web. 19 Mar. 2024. <http://www.essayworld.com/essays/Computer-Crimes/56592>
"Computer Crimes." Essayworld.com. December 4, 2006. Accessed March 19, 2024. http://www.essayworld.com/essays/Computer-Crimes/56592.
"Computer Crimes." Essayworld.com. December 4, 2006. Accessed March 19, 2024. http://www.essayworld.com/essays/Computer-Crimes/56592.
JOIN NOW
Join today and get instant access to this and 50,000+ other essays


PAPER DETAILS
Added: 12/4/2006 07:20:59 PM
Category: Computers
Type: Premium Paper
Words: 1512
Pages: 6

Save | Report

SHARE THIS PAPER

SAVED ESSAYS
Save and find your favorite essays easier

SIMILAR ESSAYS
» Computer Crimes: Laws Must Be P...
» Laws Must Be Passed To Address ...
» Computer Crimes
» Computer Crimes
» COMPUTER CRIME Hackers And Secu...
» Computer Crime
» Computer Crime Is Increasing
» Computer Crime
» Computer Security And The Law
» Computer Crime 2
Copyright | Cancel | Contact Us

Copyright © 2024 Essayworld. All rights reserved