• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Computer Hacking

Extracts from this document...

Introduction

Keith Palacios Mr. Grageda January 14, 2002 ITGS Computer Hacking Criterion A: Describing the issue In this day and age, there are always people who try to get something for free. In the banking world there are bank robbers, in the malls or shopping districts there are shoplifters, but in the computer world there are people called hackers. Hackers are people who use their computer skills to gain unauthorized access to files via the internet. This process is also called "hacking". Hacking first became a problem in the 1990's, because that is when technology appeared to be getting more advanced, that is when the internet was introduced to the world. The internet is a way of communication between people and a way of accessing files in just mere minutes. Along with all these good things, there came some bad things. In the shadows of the internet lurked hackers, because the internet served as a hallway with doors, and each door would lead to different files, and they walked around with a lock pick, being able to access any door that they chose, and get the files. ...read more.

Middle

Largely initiated by hackers who had their beginnings at MIT, the mid 1960's saw centers of hacker culture develop at other universities such as Carnegie Mellon University, and Stanford University. The third wave of hackers activity was born in northern California without direct genealogy to the MIT hacker. It started with the Homebrew Computer Club in the San Francisco bay area. This was a group of electronic hobbyist with a common interest in the then radical idea of building their own computers. Because the size and cost of the early computers, early hackers were restricted to using a small number of machines built by large companies and installed at universities or industrial research centers. This third wave of hackers wanted their own machines that they could not only program at home, but also build and modify the computer hard ware at home. It was this group of hackers, which includes legendary figures such as Lee Felsenstein, Steve Dompier, Steve Wozniak, Steve Jobs, and Bill Gates, that formed the foundation for the entire personal computer industry of today. ...read more.

Conclusion

Another reason why people don't like hackers is because they are able to get into sites that require certain passwords that you legally can obtain by purchasing a membership. The people that own the site are being ripped off because someone is using their site and not paying for it, it is practically stealing. Criterion D: Solutions to the problem arising from the issue Ever since people realized that hackers are a threat to society, they have tried many different ways to try to stop them. Some software companies have developed new software and security systems to protect your computer and the files that are inside them. The software's are usually call firewalls. But for me the only way you can help protect the world from hackers, is to spread the word. You should tell people about the issue with hackers, so that when they find out about it, they will try to do what they can to stop them. Criterion E: Selection and using sources www.netsecurity.org/text/articles/history.html ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Information Systems and Communication essays

  1. Marked by a teacher

    Information Age

    3 star(s)

    Question 2: What are some examples of this type of service? Source Information * BBC bite size * http://en.wikipedia.org/wiki/Bitesize * This page was last modified on 20 September 2008, at 21:41. * Sam learning http://en.wikipedia.org/wiki/SAM_Learning * This page was last modified on 22 July 2008, at 00:14.

  2. The Impact of Mobile Phones on social Interaction

    The focus group showed that it is a combination of the cost factor and impersonal feature that is associated with SMS that has made it such a popular tool for interaction amongst peer groups. Some of these results were supported by the findings of Taylor and Harper of Surrey University

  1. IT and Society

    Act- this is due to the time limit in which data controllers must meet in making a response o For data such as CCTV images, which may have been overwritten, it may be impossible for a data subject to use their data access rights o If the data has been

  2. Individual in society

    This shows how yahoo search engine is good. I had used the normal ways of using the search engines to find the information I wanted about mobile phones. The majority of the hits I had used from the search engines are "mobile phone" AND tariff, "Nokia vs. Sony Ericsson" and "mobile phone" AND tariff NOT news.

  1. Cunha & Ribeiro Ltd: Stock Control & Invoice Database

    The desktop application that I propose to use is called Microsoft Access because I already have knowledge about the software; I am capable of creating a working system from this package and the software is available and recognised world-wide. By using this package I will combine the application with a relational database which has its obvious benefits.

  2. Performance Evaluation of an End-to-End Measurement Based Call Admission Control Method

    A DiffServ domain consists of boundary nodes and interior nodes that provide a common set of service provisioning policies and PHB definitions. Boundary nodes interconnect the DiffServ domain with other DiffServ or non-DiffServ domains. Ingress boundary nodes handle the flow as it enters the DiffServ domain; egress nodes are the ones where the flow leaves the domain.

  1. Computer Hacking is never acceptable. Discuss.

    An expert or enthusiast of any kind. One might be an astronomy hacker, for example. 6. One who enjoys the intellectual challenge of creatively overcoming or circumventing limitations. (Raymond, n.d.) Before we go on, it is important to distinguish two concepts; hacking and cracking.

  2. Artificial Intelligence.

    The main advantage of using expert systems is that they bring specialised knowledge straight to the fingertips and observation of a novice. An example of when an expert system would be used is as follows; In business when people retire or leave expert systems are used to detain the vital information that would otherwise leave with the humans.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work