• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  9. 9
    9
  10. 10
    10
  • Level: GCSE
  • Subject: ICT
  • Word count: 1871

The Beginning of an Evil the Net Did Not Exist Yet.

Extracts from this document...

Introduction

The Beginning Of An Evil The net did not exist yet. Hackers were mainframe programmers, Commodore 64, and Apple users. Cracked software and hacker/cracker tools are traded between friends. Joe trades his "cracked" (copy protection removed) of a hot new game to Pete for Pete's home brew disk editor. There were ethical standards imposed upon these trades and hackers who demonstrated anti-social behaviour where soon ostracised and no longer traded with. This kept things under control to a great extent. Most hacked for the knowledge foremost with the challenge and the competition running close behind. Who can break the new game first? Who can write the best tool? Groups formed, combined their efforts, and tried to outdo each other. The IBM PC is released and computers and software become more plentiful, cheaper, and a lot more people get into hacking. The software companies begin to use more and more sophisticated security measures to prevent their software from being copied. The hackers became better and better and breaking them. It becomes the great game! The hackers are generally respected among other programmers; their skills admired. Being a hacker was a good thing. The BBS age - The modem came into wide spread use. Soon BBS's (Bulletin Board Systems) sprang up all over the place. These were computers with one or more modems attached to them. You could connect with other users of the BBS here. You could chat, download files, send mail, and post messages on these systems. ...read more.

Middle

The Web Age With the domain name system in place the World Wide Web is born. There is an explosion of computer users going on-line. The BBS's quickly move to the web, and now the tools and tricks get very widespread distribution. Windows and GUI interfaces take over, and we now have point and click hacking. This leads to a new kind of hacker, called "script kiddies". The script kiddies have very low skills, but they don't need skills with the new tools. This new web also makes everyone anonymous. This anonymity makes the kiddies bold, and they feel they can do anything with no repercussions. This sets off a wave of anti-social behaviour that rocks the net. Viruses, Trojan horses, DOS attacks. Malicious hacking becomes the norm and the old style curious hacker becomes a vanishing breed. Security becomes a major issue, but for every security hole plugged, two new ones open up. Shell accounts become even more important now, and hiding your tracks becomes both easier, and more important. Laws are passed and the FBI and SS get into the act. So far law enforcement has had little effect. They can only catch the real losers, those who are too ignorant or stupid to cover their tracks. The good ones, the informed ones, make their attacks with impunity, and even when detected the attacks mostly going unreported for fear of bad publicity. ...read more.

Conclusion

The reality of this is far more shocking and real. The way we could work around this new and on going problem would be to have a lot stricter censorship on films and on the media itself. Neutralise the poison at the bite. To stop the "professionals" tying to access your computer you could invest in a firewall. These are complicated things (why is it that people insist in complicating what could be very simple?) which sit in your Internet provider's computer. You have no control whatsoever over them. These firewalls are only as good as the people who maintain them. These also have holes in their workings which people can crawl through which makes them utterly useless. Anti virus software is a useful weapon in the war. A vaccination for nearly every virus is available but with new virus on the go everyday the pharmacy of anti virus software runs dry. Yes they can filter the Internet. They could close down one of the thousands of websites but for everyone they close down another five would pop up. The only way they could completely destroy the world of the Internet Terrorist would be removing his only source of life, the Internet itself. But why should the enjoyment of millions be sacrificed for the malicious use of the few. This is a war, which will go on for as long as time itself does. Man against man using computer against computer. This is the war of the Internet. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Communications section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Communications essays

  1. Peer reviewed

    The power of the NET

    3 star(s)

    A final illustration of my point is that on some sites shocking material can be found without the user knowing that these sites contain it, which can lead to adverse effects. 2) Albeit some may argue that people should be able to put anything they wish on the net, I do not agree.

  2. Computer viruses

    A worm program replicates itself and slithers through network connections to infect any machine on the network and replicate within it, eating up storage space and slowing down the computer. But worms don't alter or delete files. A Trojan horse doesn't replicate itself, but it is a malicious program disguised as something benign such as a screen saver.

  1. ICT Systems in Everyday Life: Your Local Community

    It has become an icon for security and - for politicians its promotion is guaranteed to create a feel-good response. When people are frightened of crime and criminals, critics of CCTV are often portrayed as enemies of the public interest.

  2. Free essay

    information age

    With graphic communication there are many ways to produce a piece of document for example you can use a sketch pencil to draw something up for a picture, you can also use a digital camera to take a photograph of something spectacular to make the document look effective or represent them.

  1. Free essay

    Impact of ICT in Community

    How does the Hal Screen Reading software work - EXPLAIN THE USE? Hal screen reading Software allows the blind, visually impaired and learning disabled computer user to access the graphical user interface. Not only does out spoken but it also gives audio feedback of screen text, it also allows the user to navigate without a mouse.

  2. SK-II has already established as a leading brand within its' skin-care industry. By empowering ...

    to tap into private e-mail to gather incriminating evidence (63% "very concerned"). * The proliferation of powerful information databases that allow access to the public records of ordinary Americans. These include telephone directories, property tax information and legal records (60% "very concerned" ).

  1. WHAT DO YOU GENERALLY LIKE DOING AT THE WEEKENDS?

    They are scared to live their flats because of the possibility of burglary. LIVING AND WORKING IN THE SMALL TOWN The charms of live in small or large locality can be different. In my opinion it depends on way of approach to life.

  2. Presentation about computers

    top of the range desktop and the bottom of the range desktop from Savastore. I won't use the Currys one because it wasn't really bottom of the range. I won't use the ones from the newspapers because it will be easier for me to copy the pictures from the web sites.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work