• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

What motivates hackers?

Extracts from this document...


Hacking is defined as unauthorised access to data held on a computer system. The extent of hacking is extremely difficult to establish as it is only discovered by accident, with only about two percent of security breaches discovered as a result of positive action on the part of security staff. What motivates hackers In the past, hackers mostly went after servers this is because historically servers tended to have the most interesting data and, of course, the best connectivity to the rest of the Net. Servers are also more vulnerable. A machine that isn't listening on any ports can't easily be infiltrated. Nowadays hacking is often perpetrated by employees of a company who have acquired inside knowledge knowledge of particular user ID's and passwords. ...read more.


The important thing is having two network cards or MAC addresses, forcing network traffic through the proxy software. Another solution is a stand alone firewall device between your computer, or network and the Internet. these devices have drastically dropped in price recently and can be purchased for under $200.00. What You Can Do For the moment, at least, home firewalls aren't the answer. There are already packages on the market that claim to shield your PC from attacks. Some ISPs are putting in filters of their own to guard the most vulnerable areas, notably Windows file system sharing. Special software can be installed on a computer system which will maintain an 'audit trail' for who has logged on, from which terminal and for how long. This will enable any unusaual activity to be spotted and investigations be made. Some common forms of hacking... ...read more.


Trojans horse programs are "back doors" into a computer system. A hacker may disguise a trojan as another program, video, or game, in order to trick a user into installing it on their system. Once a Trojan is installed, a hacker could have access to all the files on a hard drive, a system's email, or even to create messages that pop up on the screen. Trojans are often used to enable even more serious attacks. By hiding programs to be run later, hackers might gain access to other networks. The simplest Trojan horse replaces the messages shown when a login is requested. Users think they are logging into the system, so they provide their usernames and passwords to a program that records the information for use by the hacker. The most famous Trojan horse to date is probably Back Orifice, once installed, this program gives the user access and control over any computer running a Windows 95/98 operating system or later. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Peer reviewed

    Principles of Computer Networks

    3 star(s)

    the transmitting data station detects that another station is transmitting signal that the first station will transmit a jam signal. Jam signal is used to request other transmission station that it needs to stop transmitting it does this by carrying a 32 bit binary pattern.

  2. Smart Card System

    {Note: The directives Version and Fields are required and should precede all entries in the log. The Fields directive specifies the data recorded in the fields of each entry.} Analysis tools may generate log summaries. A log summary entry begins with a count specifying the number of times a particular even occurred.

  1. CP3 - Proposed Solution to a Realistic Problem - Apartment Administration software

    Fourth-generation programs A typical fourth-generation program would be Delphi which is available to use at college. Delphi is an object orientated program which makes it possible to create graphical interfaces with. Each object can have its own code which will be execute when used.

  2. Flexible Architectures in Communication Security Application

    A software only approach is the lowest-cost solution but with accordingly lower performance. An example of the hardware-only approach is the IDEA engine [23]. It is targeted specifically at the efficient execution of the IDEA cipher and renders excellent performance.

  1. Trojan horse

    Then when you open the zips a message will come up. Then the worm can go though all the files on your computer and delete or damage them whenever they want to. The worm can be deleted by.... Removal Instructions of the worm Symantec Security Response has provided a small

  2. Investigating Visual Programs

    * Need for comments and naming conventions. Recommended Techniques to Minimize "Bugs" * Setting "Option Explicit" to force explicit declaration of variables * Commenting the code * Using the syntax checker * Using the recommended naming conventions * Setting a tight scope on the variables and procedures * Perform range

  1. The Von Neumann Machine

    A typical layout shows the data paths. Main Memory [image001.gif] The fetch/execute cycle When the computer is turned on it starts performing what is known as the fetch/execute cycle. It is the job of the microprocessor which is controlling the computer to fetch a single program instruction from the memory, decide what to do (by decoding this

  2. Firewall Protection

    Personal firewalls can identify and block remote communication efforts to the more common RATs and by thus blocking the attacker, and identifying the RAT. Blocking/Identifying Other Types of Trojans and WQorms? There are many other types of Trojan horses which may try to communicate with the outside from your computer.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work