Warning: Use of undefined constant referer - assumed 'referer' (this will throw an Error in a future version of PHP) in /usr/home/essaywo/public_html/essays on line 102

Warning: Use of undefined constant host - assumed 'host' (this will throw an Error in a future version of PHP) in /usr/home/essaywo/public_html/essays on line 105

Warning: Cannot modify header information - headers already sent by (output started at /usr/home/essaywo/public_html/essays:102) in /usr/home/essaywo/public_html/essays on line 106

Warning: Cannot modify header information - headers already sent by (output started at /usr/home/essaywo/public_html/essays:102) in /usr/home/essaywo/public_html/essays on line 109
Hacking - College Essay

Hacking


The Ultimate Beginner's Guide to defines as, simply, the act of penetrating computer systems to gain knowledge about the system and how it works (Ash, 4). The act of penetrating can range from harmless to malicious. Harmless could be into a college computer and copying some files in order brag to friends. Malicious is more planned. Usually when hackers are malicious, it is because they are taking revenge on someone or they need to cover their tracks. The most common type of is the harmless kind.
The tools of a hacker include a prefix scanner, a terminal, a password cracker, and a virii maker. A prefix scanner dials every telephone number with a specific prefix and area code ...

Want to read the rest of this paper?
Join Essayworld today to view this entire essay
and over 50,000 other term papers

First, the hacker runs the prefix scanner, usually at night, to get a list of dial-ups, phone numbers that contain carriers. Once he has dials-ups, he has places to explore. Next he uses his terminal to dial-up the carriers. When he connects to the network, he will need to gain entrance to it. The hacker uses his password cracker to find a suitable user name and password. The password cracker does not always work, so the hacker is forced to use a technique called "brute force" . This is where the hacker randomly tries different user names and passwords to gain access to the network. Once inside the network, the hacker "goes to work". He will search the network for anything useful. Before he leaves the system, he will leave a backdoor, or in other words, a glitch, so he can gain access again.
A hacker named Mentor says it the best in his writing called "Mentor's Last Words: A Hacker's Manifesto":
"This is our world now… the world of the electron and the switch, the ...

Get instant access to over 50,000 essays.
Write better papers. Get better grades.


Already a member? Login


CITE THIS PAGE:

Hacking. (2004, February 2). Retrieved December 23, 2024, from http://www.essayworld.com/essays/Hacking/2412
"Hacking." Essayworld.com. Essayworld.com, 2 Feb. 2004. Web. 23 Dec. 2024. <http://www.essayworld.com/essays/Hacking/2412>
"Hacking." Essayworld.com. February 2, 2004. Accessed December 23, 2024. http://www.essayworld.com/essays/Hacking/2412.
"Hacking." Essayworld.com. February 2, 2004. Accessed December 23, 2024. http://www.essayworld.com/essays/Hacking/2412.
JOIN NOW
Join today and get instant access to this and 50,000+ other essays


PAPER DETAILS
Added: 2/2/2004 10:37:34 AM
Category: Computers
Type: Free Paper
Words: 999
Pages: 4

Save | Report

SHARE THIS PAPER

SAVED ESSAYS
Save and find your favorite essays easier

SIMILAR ESSAYS
» Hacking Crime Or Craft
» Hacking To Peaces
» Computer - Hacking
» Hacking
» An Overview Of Hacking
» Essay On Hacking
» Hacking
» Hacking
» Russia Hacking the Democratic N...
» Beginners Guide To Hack
Copyright | Cancel | Contact Us

Copyright © 2024 Essayworld. All rights reserved