Preview

Unit 1 Assignment 1: Computer Memory (RAM)

Better Essays
Open Document
Open Document
838 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 1 Assignment 1: Computer Memory (RAM)
Assignment 1: Computer Memory Hacking
Student: Carrera, Adolfo D.
Professor: Weidman, Elizabeth
CIS 106 (Introduction to Information Technology)
5/17/15

Hacking of random access memory (RAM) is a very basic idea. Hacking itself is defined as using a computer to gain unauthorized access to data within a system. Another way of defining hacking is the crashing a computer system. Following below is some information of how hacking RAM is useful as well as commonly used programs used by so-called ethical hackers.
One such program is called metasploit. This program is used by cyber security personnel to help advise clients of possible vulnerabilities against their own systems. Metaslpoit is owned by Rapid7, who provides security data and analytic
…show more content…

Nmap now in version 4.0 is an open source scanner. It test can test your firewall and network applications whether hidden or not. Nmap also tests the intrusion detection system (IDS). Nmap is fairly easy to use and a simple scan just scratches the surface of the capabilities the program can do for you in a network vulnerability scan. There is also a website dedicated to the commands you can enter into nmap and usage scenarios that you may encounter. At the very core, nmap uses a system of 11 scan techniques, all with different customizations (Fellinge 2006). The newer version of nmap allows users now to run the make certain changes to the program without having to restart the application, this new feature sets a milestone in the online hacking …show more content…

Just never log on to your computer and never connect it to the internet. So while simple yes, you cannot do that as it would defeat the purpose of owning a PC or having a company with many of them. There are free programs out there that may help from your computer from being hacked. One program is the Microsoft baseline security analyzer (MBSA). Another program is Sysinternals, there are also some security programs build into the windows OS which are NetBIOS and TCP/UDP. A good practice to prevent hacking is to have multiple security programs working hand in hand with each other. Which in turn may make your computer possible harder to crack into and thus making a hacker possibly turn his attention elsewhere. Installing multiple firewalls around vulnerable programs also helps against being a soft target for hackers. Having to crack through or maneuver around them. You have to be continually testing your network and system to ensure that you have no cracks in your armor. Staying vigilante would be another good practice to partake in to help combat your computer being hacked into. You should always want to stay one step ahead of anyone trying to crack your

You May Also Find These Documents Helpful

  • Satisfactory Essays

    1) Describe a local land line phone system based on the following Landline Telephone Components:…

    • 663 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Which of the following answers are true about random-access memory (RAM) as it is normally used inside a personal computer? ( choose two answers)…

    • 957 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Sec 280 Week 1 Case Study

    • 408 Words
    • 2 Pages

    Port scans and Ping sweeps are something that everyone should know about and know what they do. These are something that every company should worry about. These are the most common ways that hackers will get information from other computers. One of the first things you can do in order to block unauthorized access to it, is to block unneeded ports on your computer, and disable applications that are not really needed and that can be risky for your computer. It is highly…

    • 408 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 204 Assignment 1

    • 322 Words
    • 2 Pages

    Complete a comparative analysis of the FIVE (5) theories, Systems Theory, Structural Functionalism, Conflict Theory, Ecosystems Theory, and the Feminist Perspective (Chapter 1 of van Wormer Text), utilizing the book, The Hunger Games, to provide examples of each theory. In this analysis, you will compare and contrast the theories as well as demonstrate your understanding of the theories by describing possible symbolism of the theories in the book, The Hunger Games. An “A” paper will demonstrate the student’s understanding of each theory as well as his/her ability to apply these theories to different settings, be grammatically correct, insightful,…

    • 322 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nmap ("Network Mapper") is a free and open source utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets to determine what hosts are available on the network, what services those hosts are offering, what operating systems they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. It was designed to rapidly scan large networks, and also works against single hosts. Nmap runs on all major computer operating systems, Linux, Windows, and Mac OS…

    • 414 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 2 Assignment 2

    • 299 Words
    • 1 Page

    The evolution of the Ethernet standards will have a large effect on data storage requirements. As the speeds of these connections continue to increase, users and businesses will be able to transfer larger files faster and will required larger data storage to accommodate the increased demand of resources. Thirty years ago, when the standard was only 10MB, there was nowhere near the need for the data storage capacity as there is today, with the current standard being 100 Gbit, with 1 Tbit on the way. Data storage wasn’t as high in demand before because it would take an extremely long amount of time to transfer large files, but as the speed increases, so will the demand.…

    • 299 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    The two main nano-sized particles that may be applied to construction materials in the future are titanium dioxide (TiO2) and carbon nanotubes (CNTs) (Smith, 2012)…

    • 2077 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 1 Assignment 1

    • 266 Words
    • 1 Page

    The Johnson Company can do several things to reach out to new customers. Even though many companies still use them, the yellow pages are all but obsolete and viewed by a low number of people. Most companies utilize websites and social media to attract customers. The Johnson Company can create these to get their name out on the internet. In conjunction with these websites, they could utilize web advertising services such as Google advertisements or banner ads. Additionally, they could contact their local cable providers to film commercials to air on television.…

    • 266 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Throughout the years prices of computers have dropped and the memory in the computers has gotten substantially higher. Moore’s Law tells us that the number of processors doubles every two years. Well this is causing technology or computers in this case to basically double as well. In 1957 a 0.00098 KB RAM cost $392. This is unbelievable to me considering today my phone has two-billion times the RAM. In 1955 the amount of ROM on an IBM hard-drive was 12 MB and cost a whopping $74800 or the price of a decent house today. This price was at $6233 per MB. In today’s world we forget sometimes that there were even computers with MB hard drives.…

    • 420 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Zenmap is a graphical interface for Nmap, a port scanning tool that can quickly identify hosts…

    • 652 Words
    • 4 Pages
    Good Essays
  • Good Essays

    unit 2 assignment 2

    • 506 Words
    • 3 Pages

    Active Directory integrated zones must be hosted by Domain Controllers (DCs), and all Active Directory integrated zones are primary zones. Given this, we’re really talking about where to place Domain Controllers servicing the additional role of DNS server.…

    • 506 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Unit 1 assignment 1

    • 405 Words
    • 2 Pages

    1. Briefly, what does the process of installing an operating system such as Fedora/RHEL involve?…

    • 405 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 2 Assignment 1

    • 352 Words
    • 2 Pages

    My name is Destiny Knott, my family and I have recently moved into a house overlooking the park in the neighborhood of Park Hall. I would like to draw your attention to some of the lewd and lascivious acts that take place daily in Park Hall. On many separate occasions up to several times a day, I have noticed from my window or front porch a crowd of undesirable individuals sitting on the benches. Numerous times these individuals have been seen drinking alcohol and carrying on very loudly, using the foulest kind of language. On another occasion my family and I have witnessed a violent fight occur right in front of the park where all of our children play. It is an outrage that our young innocent children should have to listen to and witness such inappropriate displays of behavior.…

    • 352 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Powerful central processing units (CPUs) demand large amounts of data, and they need that data fast. Otherwise, CPU performance is hindered by the lack of data storage support; therefore, computers have been designed to supply data through tiering memory and caches, which use the hard drive in combination with random access memory (RAM) to deliver massive amounts of data to the CPU. The speed of the RAM is crucial to the performance of data delivery; you want the most RAM at the fastest speed possible so the CPU is not waiting for information.…

    • 396 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Step by Step Hacking Tutorials

    • 25890 Words
    • 104 Pages

    Welcome to the world of hacking. You are probably asking why you want to be a hacker right now. Well, first let me say that if you saw the movie,"Hackers" don't think that that is hacking. It would be great if they had terminals that automatically put you in a system and gave out all those cool colors and welcome screens, but it's not that way. In fact, hacking is like using DOS and C commands. So if you want to be a hacker, realize that. Don't worry, it's still really cool. But before you start, let's identify things, first off a terminal. This is what you will use to hack. Click on ,"find" on the start menu of win95. Then type in ,"Terminal". It will either give you a hyper terminal or a terminal. Both…

    • 25890 Words
    • 104 Pages
    Better Essays