The Ultimate Beginner's Guide to defines as, simply, the act of penetrating computer systems to gain knowledge about the system and how it works (Ash, 4). The act of penetrating can range from harmless to malicious. Harmless could be into a college computer and copying some files in order brag to friends. Malicious is more planned. Usually when hackers are malicious, it is because they are taking revenge on someone or they need to cover their tracks. The most common type of is the harmless kind.
The tools of a hacker include a prefix scanner, a terminal, a password cracker, and a virii maker. A prefix scanner dials every telephone number with a specific prefix and area code ...

Want to read the rest of this paper?
Join Essayworld today to view this entire essay
and over 50,000 other term papers

First, the hacker runs the prefix scanner, usually at night, to get a list of dial-ups, phone numbers that contain carriers. Once he has dials-ups, he has places to explore. Next he uses his terminal to dial-up the carriers. When he connects to the network, he will need to gain entrance to it. The hacker uses his password cracker to find a suitable user name and password. The password cracker does not always work, so the hacker is forced to use a technique called "brute force" . This is where the hacker randomly tries different user names and passwords to gain access to the network. Once inside the network, the hacker "goes to work". He will search the network for anything useful. Before he leaves the system, he will leave a backdoor, or in other words, a glitch, so he can gain access again.
A hacker named Mentor says it the best in his writing called "Mentor's Last Words: A Hacker's Manifesto":
"This is our world now… the world of the electron and the switch, the ...

Get instant access to over 50,000 essays.
Write better papers. Get better grades.

Already a member? Login


Hacking. (2004, February 2). Retrieved May 28, 2020, from http://www.essayworld.com/essays/Hacking/2412
"Hacking." Essayworld.com. Essayworld.com, 2 Feb. 2004. Web. 28 May. 2020. <http://www.essayworld.com/essays/Hacking/2412>
"Hacking." Essayworld.com. February 2, 2004. Accessed May 28, 2020. http://www.essayworld.com/essays/Hacking/2412.
"Hacking." Essayworld.com. February 2, 2004. Accessed May 28, 2020. http://www.essayworld.com/essays/Hacking/2412.
Join today and get instant access to this and 50,000+ other essays

Added: 2/2/2004 10:37:34 AM
Category: Computers
Type: Free Paper
Words: 999
Pages: 4

Save | Report


Save and find your favorite essays easier

» Hacking To Peaces
» Hacking
» An Overview Of Hacking
» Essay On Hacking
» Hacking
» Hacking Crime Or Craft
» Computer - Hacking
» Hacking
» Russia Hacking the Democratic N...
» Journalism On The Internet
Copyright | Cancel | Contact Us

Copyright © 2020 Essayworld. All rights reserved