ReviewEssays.com - Term Papers, Book Reports, Research Papers and College Essays
Search

Computer Resarch Paper

Essay by   •  December 25, 2010  •  Essay  •  1,383 Words (6 Pages)  •  930 Views

Essay Preview: Computer Resarch Paper

Report this essay
Page 1 of 6

Computer hackers could arguably be the next epidemic in America and as the world becomes more and more reliant on computers the computer hacking industry is greatly rising to dangerous levels. With such hackers as Kevin Mitnick, who is known as a computer terrorist, computerized information isn't safe any more. Kevin is known as the most high-profiled computer criminal and responsible for reaping the most havoc in the computer world today. He considered this an easy and fun task. He finally got caught and was thrown into prison, but once he got out nothing changed. Kevin stated that as long as the technology is there it just calls to people to break into it.

Computer hackers usually start off young, thinking that it is nothing but a little harmless fun. But as they get older, they realize it has turned into an addiction. The definition of a hacker according to the "Hacker's Dictionary", is a person who enjoys exploring the details of program and how to stretch their capabilities. The Internet is just another playing field. Hackers regard hacking as a game in which their mind is up against that of the system designers. The Internet allows the hackers to take files, programs, passwords, and other information from users that are surf the web. They use this as a tool to make it easier to beat the system. There are three types of hackers, one with good intentions, also known as an ethical hacker, but gets slapped in the face due to the bad reputation of others, there are the hackers with bad intentions, and there are the hackers that fit in between. The bad hacker category is the largest by far. A bad hacker's motives are to punish someone or retaliate against the owner of a computer system. Computer terrorists fall under this category. Some bad hackers may also hack just to challenge the programmer. The hacker feels that if they can break into a program then they are much more superior to the person who actually wrote the code. They can feel so superior that they might enter a virus to eliminate a program that was not worthy of their abilities. One of the other many goals of a hacker is to steal passwords. Hackers can steal your password in about four different ways. Intercepting your password through email is not that difficult. This is by far the easiest method because all they have to do is take the email as it is being sent to you. Hackers can also use a program called a password cracker to actually learn you password. There are two types of theses but both have their own flaws. The first checks every password possible from the entry site. The second uses a program that goes in and reads the passwords off one by one. The problem with both is that you have to get the cracker into the site, undetected, you must also cover you trail. Some prefer the manual method first. There are actually lists of a 100 or more most-used passwords. Hackers have reported that, a simple password that appears in the English dictionary will take about an hour or less for a hacker to crack. This is not considered a long time to a hacker. Third, they use what is called web spoofing. This is the most dangerous because they see what ever you are doing. They can get you passwords plus any other information you might have. This web spoofing is caused by a middle man who can redirect information from your page, to his page, to the page you were sending the information to. The middle man sees all. This is above all the easiest way to get any information that they might want or need. The last method is through Java. Through a program they can hack into a computers hard drive through your Java program. That is why if you can avoid keeping your passwords on your hard drive do it. Some people keep their passwords on three by five cards and store them which is much safer. The best method to securing yourself is always backing up files; that way if a virus or hacker crashes you computer you will be safe. Another very safe method is to change your password often and don't use the same password for everything. If they already know another one of your passwords, they will try them first. Consider rotating your passwords, just make sure they are not available on you hard drive. In the long run it will be safer to go through the trouble then risk your password being seen.

They use web spoofing to look at a person's credit card numbers while they type them in. Rule #1, nothing on the internet is secure, even if it says it is. This is considered to be the golden rule of safety on the Internet. Many

...

...

Download as:   txt (7.4 Kb)   pdf (94.1 Kb)   docx (11.4 Kb)  
Continue for 5 more pages »
Only available on ReviewEssays.com