Hacking


Contents ~~~~~~~~
This file will be divided into four parts:
Part 1: What is , A Hacker's Code of Ethics, Basic Safety
Part 2: Packet Switching Networks: Telenet- How it Works, How to Use it,
Outdials, Network Servers, Private PADs
Part 3: Identifying a Computer, How to Hack In, Operating System
Defaults
Part 4: Conclusion- Final Thoughts, Books to Read, Boards to Call,
Acknowledgements

Part One: The Basics ~~~~~~~~~~~~~~~~~~~~
As long as there have been computers, there have been hackers. In the 50's
at the Massachusets Institute of Technology (MIT), students devoted much time
and energy to ingenious exploration of the ...

Want to read the rest of this paper?
Join Essayworld today to view this entire essay
and over 50,000 other term papers

damage *any* system. II. Do not alter any system
files other than ones needed to ensure your
escape from detection and your future access (Trojan Horses, Altering
Logs, and the like are all necessary to your survival for as long as
possible.) III. Do not leave your (or anyone else's) real name, real
handle, or real
phone number on any system that you access illegally. They *can* and
will track you down from your handle! IV. Be careful who you share
information with. Feds are getting trickier.
Generally, if you don't know their voice phone number, name, and
occupation or haven't spoken with them voice on non-info trading
conversations, be wary. V. Do not leave your real phone number to
anyone you don't know. This
includes logging on boards, no matter how k-rad they seem. If you
don't know the sysop, leave a note telling some trustworthy people
that will validate you. VI. Do not hack government computers. ...

Get instant access to over 50,000 essays.
Write better papers. Get better grades.


Already a member? Login

for. Don't expect *everything* you ask to be answered, though.
There are some things (LMOS, for instance) that a begining hacker
shouldn't mess with. You'll either get caught, or screw it up for
others, or both. XI. Finally, you have to actually hack. You can hang
out on boards all you
want, and you can read all the text files in the world, but until you
actually start doing it, you'll never know what it's all about. There's
no thrill quite the same as getting into your first system (well, ok,
I can think of a couple of bigger thrills, but you get the picture.)

One of the safest places to start your hacking career is on a computer ...

Succeed in your coursework without stepping into a library.
Get access to a growing library of notes, book reports,
and research papers in 2 minutes or less.


CITE THIS PAGE:

Hacking. (2004, December 8). Retrieved September 25, 2017, from http://www.essayworld.com/essays/Hacking/18675
"Hacking." Essayworld.com. Essayworld.com, 8 Dec. 2004. Web. 25 Sep. 2017. <http://www.essayworld.com/essays/Hacking/18675>
"Hacking." Essayworld.com. December 8, 2004. Accessed September 25, 2017. http://www.essayworld.com/essays/Hacking/18675.
"Hacking." Essayworld.com. December 8, 2004. Accessed September 25, 2017. http://www.essayworld.com/essays/Hacking/18675.
JOIN NOW
Join today and get instant access to this and 50,000+ other essays


PAPER DETAILS
Added: 12/8/2004 08:06:21 AM
Category: Computers
Type: Premium Paper
Words: 3551
Pages: 13

Save | Report

SHARE THIS PAPER

SAVED ESSAYS
Save and find your favorite essays easier

SIMILAR ESSAYS
Hacking
Hacking To Peaces
An Overview Of Hacking
Essay On Hacking
Hacking
Hacking Crime Or Craft
Computer - Hacking
Hacking
Russia Hacking the Democratic N...
Journalism On The Internet
Copyright | Cancel | Contact Us

Copyright © 2017 Essayworld. All rights reserved