• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Computer Hackers and Viruses

Extracts from this document...

Introduction

Reece Ryan 12LJK Computer Hackers Hackers are popularly defined as computer experts who spend enormous amounts of time trying to breach the security of networks, web servers and email servers. Usually they use a selection of specialist software to identify any weaknesses, which they are then able to exploit. There are basically two main types of hackers, the first type is mainly consistent of intelligent adolescents who acquire their hacking knowledge by reading, by talking to people and by spending an excessive amount of time on their computer, learning the various programs, the source code and the commands. They are then able to solve puzzles that people with computer engineering backgrounds can't solve. vast majority of hackers do it for their own personal enjoyment as they find it to be intellectual, mind stimulating, a challenge, and it also grants them immense amounts of power and control. Hackers generally seem to be primarily interested in the hacking of large corporations and authority's security networks rather than attacking private individuals. It's intellectual. It stimulates my mind. ...read more.

Middle

However, data files can contain embedded executable code such as macros, which may be used by hackers, as a file virus infects other files when the program to which it is attached is run, it can spread across a network (often very quickly). * Boot-sector Viruses - Boot sector viruses alter the program that is in the first sector of every disk. This is the space in the computer that automatically runs each time the machine is turned on. Generally, a boot-sector infector executes its own code (which usually infects the boot sector or partition sector of the hard disk), then continues the PC start-up process. In most cases, all write-enabled floppies used on that PC from then on will become infected. A PC is infected with a boot-sector virus if it is booted from an infected floppy disk in the A: drive. Boot-sector infectors are some of the most commonly found viruses, and they cannot normally spread across a network. They normally spread by accident via floppy disks which may come from virtually any source. ...read more.

Conclusion

and thankfully people who are working for things like organized crime, or in terrorist groups, don't posses that type of skill set at this point. The major vulnerabilities are in the Microsoft products. Microsoft has a web server out that has 15 or 20 fairly large security problems with it. There have been three or four really major ones over the last couple of years. This is because there are a lot of programs available that one could just download, run, and it'll re-write a web page for you. One such program gives you full access to a remote web server in about four seconds. There's another one that will completely shut down the web servers in a second. There are all kinds of tools out there that these people can download and they don't have to understand how they work. In order to help prevent hackers and viruses destroying data the following measures should be taken: 1. Hard Drive & System Privacy- e.g. Windows Washer 2. Internet Access Control (Software and Hardware Firewalls) e.g. Zone Alarm 3. Spyware' Protection & Prevention e.g. SpyBot S&D, Ad-aware 4. Virus Protection & Prevention e.g. Norton AntiVirus ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Peer reviewed

    Principles of Computer Networks

    3 star(s)

    This all relates to FDDI standard which stands for Fibre Distributed Data Interface. It is a backbone of a wide area network. It uses fibre optic cable to transmit data up to supported rate of 100 Mbps. An advantage of a WAN it allows secure and fast transmission between two computers.

  2. Coursework 1 (c)Install Apache Web Server on Unix ...

    { int pipe1[2], pipe2[2]; pid_t childpid; /* create pipes */ if ((pipe(pipe1) == -1) || (pipe(pipe2) == -1)) { perror(argv[0]); exit(1); } /* create child process */ if ((childpid = fork()) == 0) { /* child */ close(pipe1[1]); close(pipe2[0]); server(pipe1[0], pipe2[1]); } else { /* parent */ close(pipe1[0]); close(pipe2[1]); client(pipe2[0],

  1. Introduction to Viruses

    These categorizations often overlap the previous categories mentioned, and may be included in the description (e.g., polymorphic file virus).These categories include: > Polymorphic Viruses Viruses that change their characteristics as they infect. > Stealth Viruses Viruses that try to actively hide themselves from anti-virus or system software.

  2. White Soul System Designs - creating a computer system.

    Myself: Do you have any ideas about security and access? Mr. Williams: Well, yes. Even though there is only two of us in the shop some times the store is left so we can go to the stock room, at this point the customer would be able to access the files if they were not protected.

  1. Analysis of Johnson Music

    There are two types of observation: an overt observation and a covert observation. In an overt observation the observer would go into the shop and observe while the staff and people being observed in the situation are aware that they are being watched.

  2. Investigating Visual Programs

    * The project is made up of modules. * Each module is made up of Procedures. * 4 type of Procedures: o Event Procedures (e.g., button click) o VB Procedures and Functions (e.g., IsNumeric) o User Defined Sub Programs o User Defined Functions Objects make programming much easier * Instead of having to do everything through statements, Objects make programming much easier.

  1. Creating a computer system for Wooten Basset Rugby Club

    identify each record, these are marked by these symbols, < and >. PLAYERS deals with data relating to players such as membership and contact details: <Membership Number> - A unique code used to identify each player. Each Membership code is made up of three numbers and a letter.

  2. Smart Card System

    The software also supports secure streams and sealed objects. JCE 1.2.1 is designed so that other qualified cryptography libraries can be plugged in as service providers, and new algorithms can be added seamlessly. (Qualified providers include those approved for export and those certified for domestic use only. Qualified providers are signed by a trusted entity.)

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work