• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

What motivates hackers?

Extracts from this document...


Hacking is defined as unauthorised access to data held on a computer system. The extent of hacking is extremely difficult to establish as it is only discovered by accident, with only about two percent of security breaches discovered as a result of positive action on the part of security staff. What motivates hackers In the past, hackers mostly went after servers this is because historically servers tended to have the most interesting data and, of course, the best connectivity to the rest of the Net. Servers are also more vulnerable. A machine that isn't listening on any ports can't easily be infiltrated. Nowadays hacking is often perpetrated by employees of a company who have acquired inside knowledge knowledge of particular user ID's and passwords. ...read more.


The important thing is having two network cards or MAC addresses, forcing network traffic through the proxy software. Another solution is a stand alone firewall device between your computer, or network and the Internet. these devices have drastically dropped in price recently and can be purchased for under $200.00. What You Can Do For the moment, at least, home firewalls aren't the answer. There are already packages on the market that claim to shield your PC from attacks. Some ISPs are putting in filters of their own to guard the most vulnerable areas, notably Windows file system sharing. Special software can be installed on a computer system which will maintain an 'audit trail' for who has logged on, from which terminal and for how long. This will enable any unusaual activity to be spotted and investigations be made. Some common forms of hacking... ...read more.


Trojans horse programs are "back doors" into a computer system. A hacker may disguise a trojan as another program, video, or game, in order to trick a user into installing it on their system. Once a Trojan is installed, a hacker could have access to all the files on a hard drive, a system's email, or even to create messages that pop up on the screen. Trojans are often used to enable even more serious attacks. By hiding programs to be run later, hackers might gain access to other networks. The simplest Trojan horse replaces the messages shown when a login is requested. Users think they are logging into the system, so they provide their usernames and passwords to a program that records the information for use by the hacker. The most famous Trojan horse to date is probably Back Orifice, once installed, this program gives the user access and control over any computer running a Windows 95/98 operating system or later. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Peer reviewed

    Principles of Computer Networks

    3 star(s)

    * Maintenance of the network in long period may be high, and also long term running more computers are added to the network the performance will drop. Star Topology - Star topology is a central node with outlying nodes. In a star topology the messages are transmitted via a switch, hub or even a computer.

  2. Smart Card System

    There are two types of prototyping applied by the team, namely, feasibility prototyping and discovery prototyping. Feasibility prototyping is used to the feasibility of a specific technology. Discovery prototyping is used to discover the actual user's requirements by having them react to a quick-and-dirty implementation of the requirements.

  1. Firewall Protection

    you already have one, this is yet another possible use of it. Blocking or Limiting the NetBIOS Communication? (as well as other default services) The two common methods of intruders to break into home computers, are through a RAT (which was discussed in II.3a)

  2. Flexible Architectures in Communication Security Application

    To ensure that the ciphertext can be decrypted back to the plaintext, the cipher kernel must employ a series of key-parameterized reversible operations. The Twofish algorithm demonstrates a number of these: Rotates Rotates are easily reversible (simply rotate the same distance in the opposite direction).

  1. Investigating Visual Programs

    * Constants are memory locations that cannot change during the execution of a program. * Both variables and constants consist of various data types. Data Types * Text is stored as "strings" of characters. * Each text character has an associated code.

  2. CP3 - Proposed Solution to a Realistic Problem - Apartment Administration software

    The booking process is now completed. Where email and letters are applicable templates are used. Emails will usually include an attachment of a word processed letter. Disadvantages of current system Using a mainly paper based system has many downsides for my client.

  1. Trojan horse

    Then when you open the zips a message will come up. Then the worm can go though all the files on your computer and delete or damage them whenever they want to. The worm can be deleted by.... Removal Instructions of the worm Symantec Security Response has provided a small

  2. The Von Neumann Machine

    � Registers � Memory Management Unit (MMU) These are interconnected by an internal bus system. The control unit provides the necessary timing and control signals to all the operations in the microcomputer. It controls the flow of data between the microprocessor and memory and peripherals. The control unit controls the rest of the processor by generating appropriate control signals.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work