Warning: Use of undefined constant referer - assumed 'referer' (this will throw an Error in a future version of PHP) in /usr/home/essaywo/public_html/essays on line 102

Warning: Use of undefined constant host - assumed 'host' (this will throw an Error in a future version of PHP) in /usr/home/essaywo/public_html/essays on line 105

Warning: Cannot modify header information - headers already sent by (output started at /usr/home/essaywo/public_html/essays:102) in /usr/home/essaywo/public_html/essays on line 106

Warning: Cannot modify header information - headers already sent by (output started at /usr/home/essaywo/public_html/essays:102) in /usr/home/essaywo/public_html/essays on line 109
Viruses - Essays

Viruses


It's the weekend, you have nothing to do so you decide to play around on your computer. You turn it on and then start up, you start calling people with your modem, connecting to another world, with people just like you at a button press away. This is all fine but what happens when you start getting into other peoples computer files. Then it becomes a crime, but what is a computer crime really, obviously it involves the use of a computer but what are these crimes. Well they are: Hacking, Phreaking, & Software Piracy.
To begin I will start with Hacking, what is hacking. Hacking is basically using your computer to "Hack" your way into another. They use programs called scanners which randomly ...

Want to read the rest of this paper?
Join Essayworld today to view this entire essay
and over 50,000 other term papers

the form of trespassing, invasion of privacy, or vandalism. Quite often they are mearly out for a fun and games evening, and they get entangled in the illegal use of their machines without realizing the full import of what they are doing", I have a hard time believing that so lets see what a "hacker" has to say about what he does "Just as they were enthraled with their pursuit of information, so are we. The thrill of the hack is not in breaking the law, it's in the pursuit and capture of knowledge.", as you can see the "hacker" doesn't go out to do destroy things although some do. It's in the pursuit of knowledge. Of course this is still against the law. But where did all of this start, MIT is where hacking started the people there would learn and explore computer systems all around the world. In the views of professional hacking is like drugs or any other addictive substance, it's an addiction for the mind and once started it's difficult to stop. This could be true, as hackers know ...

Get instant access to over 50,000 essays.
Write better papers. Get better grades.


Already a member? Login

highly illegal boxes and machines in order to defeat the security that is set up to avoid this sort of happening. [fr'eaking] v. 2. A person who uses the above methods of destruction and chaos in order to make a better life for all. A true phreaker will not go against his fellows or narc on people who have ragged on him or do anything termed to be dishonourable to phreaks. [fr'eek] n. 3. A certain code or dialup useful in the action of being a phreak. (Example: "I hacked a new metro phreak last night.")" The latter 2 ideas of what a phreak is, is rather weird. A Phreak like the hacker likes to explore and experiment, however his choice of exploring is not other computer but the phone ...

Succeed in your coursework without stepping into a library.
Get access to a growing library of notes, book reports,
and research papers in 2 minutes or less.


CITE THIS PAGE:

Viruses. (2007, June 4). Retrieved December 23, 2024, from http://www.essayworld.com/essays/Viruses/65925
"Viruses." Essayworld.com. Essayworld.com, 4 Jun. 2007. Web. 23 Dec. 2024. <http://www.essayworld.com/essays/Viruses/65925>
"Viruses." Essayworld.com. June 4, 2007. Accessed December 23, 2024. http://www.essayworld.com/essays/Viruses/65925.
"Viruses." Essayworld.com. June 4, 2007. Accessed December 23, 2024. http://www.essayworld.com/essays/Viruses/65925.
JOIN NOW
Join today and get instant access to this and 50,000+ other essays


PAPER DETAILS
Added: 6/4/2007 06:12:58 PM
Category: Technology
Type: Premium Paper
Words: 3001
Pages: 11

Save | Report

SHARE THIS PAPER

SAVED ESSAYS
Save and find your favorite essays easier

SIMILAR ESSAYS
» Computer Viruses: Past, Present...
» Are "Good" Computer Viruses Sti...
» Computer Viruses
» Polymorphic & Cloning Computer ...
» Computer Viruses
» Computer Viruses
» Viruses: Complex Molecules Or S...
» Computer Viruses And Their Effe...
» Computer Viruses
» Information About Viruses
Copyright | Cancel | Contact Us

Copyright © 2024 Essayworld. All rights reserved