1,092
26
Essay, 4 pages (950 words)

Computer password protecting the system. 2) finding back

Computer Hacker The meaning of Hacker is one who accesses a computer which issupposably not able to be accessed to non authorised people of the community. Hackersmay use any type of system to access this information depending on what they intend ondoing in the system. Methods Hackers may use a variety of ways to hack into a system.

First if the hacker is experienced and smart the hacker will use telnet to access a shell onanother machine so that the risk of getting caught is lower than doing it using their ownsystem. Ways in which the hacker will break into the system are: 1) Guess/crackingpasswords. This is where the hacker takes guesses at the password or has a crackprogram to crack the password protecting the system. 2) Finding back doors is anotherway in which the hacker may get access to the system. This is where the hacker tries tofind flaws in the system they are trying to enter. 3) One other way in which a hacker maytry to get into a system is by using a program called a WORM.

This program is speciallyprogrammed to suit the need of the user. This programme continually tries to connect toa machine at over 100 times a second until eventually the system lets in and the wormexecutes its program. The program could be anything from getting password files todeleting files depending on what it has been programmed to do. Protection The only waythat you or a company can stop a Hacker is by not having your computer connected tothe net. This is the only sure fire way in which you can stop a hacker entering yoursystem. This is mainly because hackers use a phone line to access the system. If it ispossible for one person to access the system then it is possible for a hacker to gainaccess to the system. One of the main problems is that major companies need to benetworked and accessible over the net so that employees can do overdue work or sothat people can look up things on that company.

Also major companies network theiroffices so that they can access data from different positions. One way which is used totry to prevent hackers gaining access is a program used by companies called a Firewall. A Firewall is a program which stops other connections from different servers to thefirewall server. This is very effective in stopping hackers entering the system. Tho this isnot a fool proof way of stopping hackers as it can be broken and hackers can get in. Thothis is a very good way of protecting your system on the InterNet. Major Hacks Some ofthe major hacks that have been committed have been done by young teens agedbetween 14 and 18. These computer geniuses as they are known have expert knowledgeon what they are doing and also know the consequences.

Tho the consequences do notreally enter there mind when they are doing it. This hack occurred on February 10, 1997, and again on February 14, 1997 Portuguese hackers launched a political attackon the web page of the Indonesian government, focusing on that country’s continuedoppression of East Timor. The attack was online for about 3 hours from 7. 00 PM to10. 00 PM (Portuguese Time) at the web site of the Department of Foreign Affairs, Republic of Indonesia.

The hackers did not delete or change anything. The said We justhack pages. Another major hack that occurred was on April 1 1981 by a single user. This hacker who was situated in an east coast brokage house was interested in the stockmarket. SO he purchased $100, 000 worth of shares in the stock market. Then hehacked into the stock markets main computers and stole $80 million dollars. The hackerwas eventually caught although $53 million dollars was not recovered. On Wednesday, March 5 1997 The home page of the National Aeronautics and Space Administration’swas recently hacked and the contents changed.

The group known as H4G1S. This groupof hackers managed to change the contents of the webpage The hacking group changedthe webpage and left a little message for all. It said Gr33t1ngs fr0m th3 m3mb3rs 0fH4G1S. Our mission is to continue where our colleagues the ILF left off. During the nextmonth, we the members of H4G1S, will be launching an attack on corporate America.

All who profit from the misuse of the InterNet will fall victim to our upcoming reign ofdigital terrorism. Our privileged and highly skilled members will stop at nothing until ourpresence is felt nationwide. Even your most sophisticated firewalls are useless. We willdemonstrate this in the upcoming weeks. The homepage of the United States Air Forcewas recently hacked and the contents had been changed. The webpage had beenchanged completely as the hackers had inserted pornographic pictures saying this iswhat we are doing to you and had under the image screwing you. The hackers havechanged it and shown their views on the political system. One other major hack whichwas committed was by a 16 year old boy in Europe.

This boy hacked into the BritishAirforce and downloaded confidential information on Ballistic missiles. The boy hackedinto the site and down loaded this information because he was interested and wanted toknow more about them. This boy was fined a sum of money. In conclusion it can be saidthat hackers are sophisticated and very talented when it comes to the use of a computer. Hacking is a process of learning not following any manual. Hackers learn as they go anduse a method of trial and error. Most people who say they are hackers most of the timeare not.

Real hackers do not delete or destroy any information on the system they hack. Hackers hack because they love the thrill of getting into a system that is supposablyunable to be entered. Overall hackers are smart and cause little damage to the systemthey enter. So hackers are not really terrorists in a way they help companies find outBibliography:

Thank's for Your Vote!
Computer password protecting the system. 2) finding back. Page 1
Computer password protecting the system. 2) finding back. Page 2
Computer password protecting the system. 2) finding back. Page 3
Computer password protecting the system. 2) finding back. Page 4
Computer password protecting the system. 2) finding back. Page 5

This work, titled "Computer password protecting the system. 2) finding back" was written and willingly shared by a fellow student. This sample can be utilized as a research and reference resource to aid in the writing of your own work. Any use of the work that does not include an appropriate citation is banned.

If you are the owner of this work and don’t want it to be published on AssignBuster, request its removal.

Request Removal
Cite this Essay

References

AssignBuster. (2022) 'Computer password protecting the system. 2) finding back'. 18 January.

Reference

AssignBuster. (2022, January 18). Computer password protecting the system. 2) finding back. Retrieved from https://assignbuster.com/computer-password-protecting-the-system-2-finding-back/

References

AssignBuster. 2022. "Computer password protecting the system. 2) finding back." January 18, 2022. https://assignbuster.com/computer-password-protecting-the-system-2-finding-back/.

1. AssignBuster. "Computer password protecting the system. 2) finding back." January 18, 2022. https://assignbuster.com/computer-password-protecting-the-system-2-finding-back/.


Bibliography


AssignBuster. "Computer password protecting the system. 2) finding back." January 18, 2022. https://assignbuster.com/computer-password-protecting-the-system-2-finding-back/.

Work Cited

"Computer password protecting the system. 2) finding back." AssignBuster, 18 Jan. 2022, assignbuster.com/computer-password-protecting-the-system-2-finding-back/.

Get in Touch

Please, let us know if you have any ideas on improving Computer password protecting the system. 2) finding back, or our service. We will be happy to hear what you think: [email protected]