Hacking


The Ultimate Beginner's Guide to defines as, simply, the act of penetrating computer systems to gain knowledge about the system and how it works (Ash, 4). The act of penetrating can range from harmless to malicious. Harmless could be into a college computer and copying some files in order brag to friends. Malicious is more planned. Usually when hackers are malicious, it is because they are taking revenge on someone or they need to cover their tracks. The most common type of is the harmless kind.
The tools of a hacker include a prefix scanner, a terminal, a password cracker, and a virii maker. A prefix scanner dials every telephone number with a specific prefix and area code ...

Want to read the rest of this paper?
Join Essayworld today to view this entire essay
and over 50,000 other term papers

First, the hacker runs the prefix scanner, usually at night, to get a list of dial-ups, phone numbers that contain carriers. Once he has dials-ups, he has places to explore. Next he uses his terminal to dial-up the carriers. When he connects to the network, he will need to gain entrance to it. The hacker uses his password cracker to find a suitable user name and password. The password cracker does not always work, so the hacker is forced to use a technique called "brute force" . This is where the hacker randomly tries different user names and passwords to gain access to the network. Once inside the network, the hacker "goes to work". He will search the network for anything useful. Before he leaves the system, he will leave a backdoor, or in other words, a glitch, so he can gain access again.
A hacker named Mentor says it the best in his writing called "Mentor's Last Words: A Hacker's Manifesto":
"This is our world now… the world of the electron and the switch, the ...

Get instant access to over 50,000 essays.
Write better papers. Get better grades.


Already a member? Login


CITE THIS PAGE:

Hacking. (2004, February 2). Retrieved July 25, 2017, from http://www.essayworld.com/essays/Hacking/2412
"Hacking." Essayworld.com. Essayworld.com, 2 Feb. 2004. Web. 25 Jul. 2017. <http://www.essayworld.com/essays/Hacking/2412>
"Hacking." Essayworld.com. February 2, 2004. Accessed July 25, 2017. http://www.essayworld.com/essays/Hacking/2412.
"Hacking." Essayworld.com. February 2, 2004. Accessed July 25, 2017. http://www.essayworld.com/essays/Hacking/2412.
JOIN NOW
Join today and get instant access to this and 50,000+ other essays


PAPER DETAILS
Added: 2/2/2004 10:37:34 AM
Category: Computers
Words: 999
Pages: 4

Save | Report

SHARE THIS PAPER

SAVED ESSAYS
Save and find your favorite essays easier

SIMILAR ESSAYS
» Hacking To Peaces
» Hacking
» An Overview Of Hacking
» Essay On Hacking
» Hacking
» Hacking Crime Or Craft
» Computer - Hacking
» Hacking
» Russia Hacking the Democratic N...
» Journalism On The Internet
Copyright | Cancel | Contact Us

Copyright © 2017 Essayworld. All rights reserved