Preview

Essay Example on Hacking

Good Essays
Open Document
Open Document
603 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Essay Example on Hacking
Essay On Hacking

by Philip Smith

A topic that i know very well is computers and computer hacking.
Computers seem very complicated and very hard to learn, but, if given time a computer can be very useful and very fun. Have you ever heard all of that weird computer terminology? for and example, Javascript. Javascript is basically a computer language used when programming internet web pages. Have you ever been on the internet and seen words go across the screen or moving images? This is all done by the Java language. If you don not see moving images then its because your web browser cannot read javascript. If you don't know what a web browser is then I will tell you, a web browser is simply a tool used to view the various websites on the internet. All web browsers are different, some only interpret html language, which is another programming language used to design web page and then there are some browsers that can play videos and sounds. Have you ever wondered why when you want to go to a website you have to type http://name of site.com? well I have been wondering for ages but still can't figure out, but sometimes you type ftp:// before the name of the site.
This simply means File transfer protocol. You use this when download image files or any other files. Now, onto hacking. Most people stereotype people simply as "HACKERS," but what they don't know is that there are three different types of computer whizzes. First, there are hackers. Hackers simply make viruses and fool around on the internet and try to bug people. They make viruses so simple. The get a program called a virus creation kit. This program simply makes the virus of beholders choice. It can make viruses that simply put a constant beep in you computer speakers or it can be disastrous and ruin your computers hard-drive.
Hackers also go onto chat rooms and cause trouble. Chat rooms are simply a service given by internet providers to allow people all over the world

You May Also Find These Documents Helpful

  • Better Essays

    Epic Hacking Research Paper

    • 3326 Words
    • 14 Pages

    On Friday Aug.3.2012 Mat Honan’s personal Computer (PC) system was invaded by hackers. In the space of one hour, Mat’s entire digital life was destroyed. First his google account was taken over, then deleted. Next his twitter account was compromised, and used as a platform to broadcast racist and homophobic messages. And worst of all, Honan’s Apple ID account was broken into, and his hackers used it to remotely erase all of the data on his IPhone, IPad, and MacBook.…

    • 3326 Words
    • 14 Pages
    Better Essays
  • Powerful Essays

    Assignment 1 - Unit 8

    • 1028 Words
    • 4 Pages

    A browser is a piece of software on the internet that is used for retrieving…

    • 1028 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    Browser- Browser is the type of internet source in which you use. There are many kinds of browsers; the mainly used browsers are Safari and Google chrome. New browsers are being made all the time; there are hundreds to choose from. Different browsers work differently on different computers for example Safari will work best on Apple Mac as it is macs own created browser.…

    • 1306 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    In April 2011, hackers obtained person information from over 100 million PlayStation Network users and Sony Online Entertainment users including credit, debit, and bank account information. This breach cost Sony and credit card issuers up to a total of $2 billion dollars (Laudon, 2013). During the time of the breach, security and control were not top priority. According to this case study Sony was using an older version of Apache Web Server software that was known for its security issues and compromised the security of Sony’s firewall, allowing hacker easy access. As for control, Sony obviously did not have appropriate policies or organizational procedures…

    • 328 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    NT1210 Unit 2

    • 443 Words
    • 2 Pages

    8. Web Browser - software controlled directly by a user that requests web pages from a web server, and after receiving a page, displays the web page in a window.…

    • 443 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Web browser-is software that allows a user to get and display a copy of a web page from a web server.…

    • 483 Words
    • 2 Pages
    Powerful Essays
  • Good Essays

    study guide

    • 1202 Words
    • 5 Pages

    Browser – is an application software that allows users to access and view web pages or access web 2.0 programs.…

    • 1202 Words
    • 5 Pages
    Good Essays
  • Good Essays

    If you're like me, you like to spend your free time on the internet. Youtube videos, to learn…

    • 471 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Html Test123

    • 1972 Words
    • 9 Pages

    The purpose of a web browser (Chrome, IE, Firefox, Safari) is to read HTML documents and display them. The browser does not display the HTML tags, but uses them to determine how to display the document:…

    • 1972 Words
    • 9 Pages
    Good Essays
  • Better Essays

    Hacking Research Paper

    • 1378 Words
    • 6 Pages

    Throughout my path to obtaining a degree in Cybersecurity I have learned quit a bit. It has enabled me to acquire the CompTIA Network + certification, as well as the CompTIA Security +. In taking this course, I just knew I would learn some new and fascinating things about how to defend my network. What better way to do so, than to think like a criminal? Though I have learned some interesting techniques, such as the use of sniffers like Wireshark or NIDS software like Tripwire, it seems that the basic fundamentals are always the same. Through the plethora of tools available for hacking a system and preventing attack, you are mostly safeguarding three main vectors of information security. The enemy is solely concerned with attacking the confidentiality, availability and integrity (CIA) of your information and information systems. So, I felt it was best to stick to the basics. There is no way to prevent all of the ways of hacking a system, but you must understand the attackers aim. As I have gone through this class, I have asked myself the same question continuously, what are they after? When you can begin to understand whether they are there to steal information, modify or delete, or merely disrupt the information process, you can begin to defend your network against these attacks. The array of software and hardware tools out there to hack a system or protect the network will change with the sophistication of systems in the future, but the fundamentals will remain. Reconnaissance; know what vector your enemy may be interested in, confidentiality, integrity or availability are their targets. Are you protected?…

    • 1378 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Espionage is the secret gathering of information on rival countries for military purposes. Espionage can be used in business, military, economic or political decisions however; it is commonly employed government for defensive tactics. Espionage or spying is illegal in many nations however, it gains profits from agencies to protect the secrecy of information that is desired.…

    • 1313 Words
    • 6 Pages
    Good Essays
  • Best Essays

    up-down, zooming in-out, and animated like a video. This becomes new media beside text, images, graphic, sound,…

    • 3987 Words
    • 16 Pages
    Best Essays
  • Good Essays

    Visual Communication

    • 2718 Words
    • 11 Pages

    * A larger image not only takes up more hard-drive space, but it will also show up larger on your monitor and when you print it out. For example, a 5-megapixel image contains more horizontal and vertical pixels than a 3-megapixel image, so it will take up more space on your monitor when viewed at its full size.…

    • 2718 Words
    • 11 Pages
    Good Essays
  • Good Essays

    Web Page Design

    • 785 Words
    • 4 Pages

    A large collection of computers all over the world connected to one another by networks…

    • 785 Words
    • 4 Pages
    Good Essays
  • Good Essays

    The World Is Technology

    • 1053 Words
    • 5 Pages

    Today’s society is addicted to a world of online blogging and Web browsing. We are dependent on the Internet to think for us, whether it’s for an assignment or for social sites. Everything is so quick and easy for us, it changes the way we think. Dennis Baron and Nicholas Carr both show how Internet technology allows us to access different portals of information.…

    • 1053 Words
    • 5 Pages
    Good Essays