Preview

Hacking and Hacker

Better Essays
Open Document
Open Document
1666 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Hacking and Hacker
Table of content

1. Introduction ………………………………………………………………………….2

2. Purpose of Hacking…………………….…………………………………………...2

3. Types of Hacker and Hacking………………………………………..…………….3

4. Ethical Hacking………………………………………..……………………………..4

5. Effect of Hacking…………………….……………………………………………….5

6. Benefit of hacking……………………………………….…………………………...5 7. Conclusion…………………………………………………………………………….6

8. References…………………………………………………………………………….7

Hacking is to change computer hardware or software, in order to cause damage to important data on a computer or to simply steal personal information. Computer hackers take help of internet because internet connects the entire computer around the world. A person who attacks to another system with the intent to cause harm, without having any permission from the system owner is called as hacker. There are different types of hacker with different purpose of hacking. Hacking is illegal thing which have lots of effect but somehow hacking is good because it got some benefit. In the following paragraph I am going to discuss about types of hacker, purpose of hacking, effect of hacking, benefit of hacking and ethical hacking. (Beaver & McClure, 2007)
Few years ago only selected people know about computer but nowadays even 13 year old kids know how to hack computer. People hack computer and computer network for different purposes. The main reason of hacking computer is for money and to retrieve important information. Generally people hack someone bank detail and steal the money, some people hack database of some network and sell it example people hack expensive games for Xbox, ps3, lots of movies, exam question paper and other different things to earn money. Few people do hacking just for fun and curiosity just to judge how perfect they are in computer. Either to impress friends has fun and learns the basics of hacking or gain recognition in computer-enthusiast group. Some people just



References: 1. Beaver,k.& McClure, S. (2007). Hacking for Dummies. Hoboken, Canada: 111 River Street. 2. DR,k.& Day,P.(2002). Complete Hackers Handbook PB. New york 3

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Hacking: Hacking is using a modified minecraft version that gives you an extreme advantage over other players in the server. The punishment for hacking is a 48h tempban tell the proof is reviewed by other staff members then is changed to a permanent ban.…

    • 238 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Final Exam

    • 393 Words
    • 2 Pages

    The Motives Behind Hacking: Vandalism, Public Interest, Reveal Wrongdoing, Financial Gain, As a Protest, The Challenge (fun).…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Nt1310 Unit 3 Essay

    • 1872 Words
    • 8 Pages

    There are cybercriminals who commit crimes using the computers and networks. They spread malicious viruses through the networks such as worms and Trojan horses. They hack other people's computers to steal important data and identity or destroy data. A hacker uses a packet sniffer to intercept the unencrypted network traffic and capture the passwords or other important information which was communicated through the network. Botnet or a Zombie computer is a computer which a hacker uses to spread viruses and to commit cybercrimes while the owner of the computer is unaware of it.…

    • 1872 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    Hacking: What is hacking well Hacking is someone that uses any kind of client and gets an unfair advantage on a player. First off I would record the Hacker and once I get a lot of proof I would permanently ban the Hacker for 48Hours and upload it and then share it with the staff team.If I was a Helper I would record the hacker then once I get a lot of proof I would upload it and share it with a Moderator+.…

    • 481 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Hacking is when a highly technical skilled individual or a group pass their way into a computer network or program without permission. This ends up in important data being stolen by the hacker which is illegal.…

    • 769 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Crt 205 Final Project

    • 2361 Words
    • 10 Pages

    | |author. If none exist, explain how you |However, hacking is a process use be Information Technology (IT) |…

    • 2361 Words
    • 10 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Tim J. Watts goes more into the dark side of the “hacker” community by bringing up the constant back in forth between computer security officers and the so called hackers. This article, being written this year is able to reflect on the events of September 11, 2001 and new homeland security measures. He represents this viewpoint of a dangerous hacker in his definition: “While some hackers are harmless, others break into systems with the intent to steal information or to do destruction to the system. Hackers performing the latter pose a serious threat to the economic future of the United States” (Watts). Tim Watt outright blames the hacker community of accessing information that should be private. Only looking and reflecting on the serious threat…

    • 154 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Itc 101 Quiz

    • 2722 Words
    • 11 Pages

    An electronic storefront is a website on the Internet representing a single store. ( )…

    • 2722 Words
    • 11 Pages
    Good Essays
  • Powerful Essays

    ARTICLE SUMMARY

    • 1028 Words
    • 7 Pages

    An ethical hacker is a person who performs most of the same activities a cracker does, but with the owner or company’s permission.…

    • 1028 Words
    • 7 Pages
    Powerful Essays
  • Better Essays

    Hacker and Dreifus

    • 1537 Words
    • 7 Pages

    Bob Herbert, a New York Times columnist writes on the subject of the american dream in an article titled hiding from reality. He writes of the dreary state of our country filled with ignored public school systems, dangerously underfunded local and state governments, and a failing job economy. Herbert boldly claims “Wherever you choose to look-at the economy and jobs, the public schools, the budget deficits, the nonstop war overseas- you’ll see a country in sad shape. Standards of living are declining, and american parents increasingly believe that their children are going to inherit a very bad deal” (564). This is one of the first points Herbert makes in his essay. What it appears Herbert is doing is trying to make the situation look as important as possible, that things are heading downhill. Herbert does not specifically assess blame for his claims. Cal Thomas the author of the next article capitalizes on that aspect, which he views as a weakness in Herbert’s essay.…

    • 1537 Words
    • 7 Pages
    Better Essays
  • Good Essays

    Hacker: An individual who enjoys breaking systems or software without causing harm, presumably with the intent to better understand and improve security.…

    • 413 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Cybercrime is defined as a crime in which a computer is the object of a crime or is used as a tool to carry out a crime. Cybercriminals may use computer technology to access personal information, business trade secrets, or use the Internet for exploitive or malicious purposes. Offenders who perform these unlawful actions are often referred to as hackers (Janssen, 2010). There are several different types of cybercrimes, however four of the most common cybercrimes are: cyber fraud, cyber theft, stalking, and hacking.…

    • 853 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Hacking

    • 681 Words
    • 3 Pages

    3. What application and tools can be used to perform this initial reconnaissance and probing step?…

    • 681 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Hackers have different opinions and motivations. However, they all share the spirit of challenge and always trying to prove their capabilities of doing what all believe is impossible maybe because they were mistreated, or doubts surrounded their abilities and past achievements. Hackers believe that information should be shared and they fight against information owning. Effects that hacking caused and still causing to the society can’t be ignored. Hacking nowadays is taking new phases and the danger is increasing because we are now living in a society that runs by ICT, and any attack to the ICT especially in advanced countries will cause vital consequences. ICT still lacks a powerful security tools that are capable of tracking, catching hackers, and protecting computer systems from their attacks. My own view is that the best way to protect ICT from hackers is to study their psychology and try to understand their way of thinking, because hackers are human beings, who have two sides; evil and good, and they used to show their good side but suddenly they turned to be evil. The reasons which caused the transformation from good to evil individuals should be studied and given the highest priority in the war against hackers because since we put our…

    • 1291 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Computer Ethics

    • 897 Words
    • 4 Pages

    Another ethical problem with computers is hacking. Hacking is the computer equivalent of breaking and entering. A computer hacker uses his or her skills to gain unauthorized access to another computer or computer network and, once inside, can wreak havoc by altering important information, deleting essential files, or just crashing the whole system. Many hackers who break into commercial Web sites are looking for…

    • 897 Words
    • 4 Pages
    Good Essays