Paper Details  
 
   

Has Bibliography
6 Pages
1511 Words

 
   
   
    Filter Topics  
 
     
   
 

Hacking1

Computer Crime It's the weekend, you have nothing to do so you decide to play around You turn it on and then start up, you start callingpeople with your modem, connecting to another world, with people just likeyou at a button press away. This is all fine but what happens when youstart getting into other peoples computer files. Then it becomes a crime,but what is a computer crime really, obviously it involves the use of acomputer but what are these crimes. Well they are: Hacking, Phreaking, &Software Piracy. To begin I will start with Hacking, what is hacking. Hacking isbasically using your computer to "Hack" your way into another. They useprograms called scanners which randomly dials numbers any generating tonesor carriers are recorded. These numbers are looked at by hackers and thenused again, when the hacker calls up the number and gets on he's presentedwith a logon prompt, this is where the hacking really begins, the hackertries to bypass this anyway he knows how to and tries to gain access to thesystem. Why do they do it, well lets go to a book and see "Avid youngcomputer hackers in their preteens and teens are frequently involved incomputer crimes that take the form of trespassing, invasion of privacy, orvandalism. Quite often they are mearly out for a fun and games evening, andthey get entangled in the illegal use of their machines without realizingthe full import of what they are doing", I have a hard time believing thatso lets see what a "hacker" has to say about what he does "Just as theywere enthraled with their pursuit of information, so are we. The thrill ofthe hack is not in breaking the law, it's in the pursuit and capture ofknowledge.", as you can see the "hacker" doesn't go out to do destroythings although some do. It's in the pursuit of knowledge. Of course thisis still against the law. But where did all of this start, MIT is wherehacking started the people there would lea...

Page 1 of 6 Next >

    More on Hacking1...

    Loading...
 
Copyright © 1999 - 2024 CollegeTermPapers.com. All Rights Reserved. DMCA