• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  • Level: GCSE
  • Subject: ICT
  • Word count: 1871

The Beginning of an Evil the Net Did Not Exist Yet.

Extracts from this document...


The Beginning Of An Evil The net did not exist yet. Hackers were mainframe programmers, Commodore 64, and Apple users. Cracked software and hacker/cracker tools are traded between friends. Joe trades his "cracked" (copy protection removed) of a hot new game to Pete for Pete's home brew disk editor. There were ethical standards imposed upon these trades and hackers who demonstrated anti-social behaviour where soon ostracised and no longer traded with. This kept things under control to a great extent. Most hacked for the knowledge foremost with the challenge and the competition running close behind. Who can break the new game first? Who can write the best tool? Groups formed, combined their efforts, and tried to outdo each other. The IBM PC is released and computers and software become more plentiful, cheaper, and a lot more people get into hacking. The software companies begin to use more and more sophisticated security measures to prevent their software from being copied. The hackers became better and better and breaking them. It becomes the great game! The hackers are generally respected among other programmers; their skills admired. Being a hacker was a good thing. The BBS age - The modem came into wide spread use. Soon BBS's (Bulletin Board Systems) sprang up all over the place. These were computers with one or more modems attached to them. You could connect with other users of the BBS here. You could chat, download files, send mail, and post messages on these systems. ...read more.


The Web Age With the domain name system in place the World Wide Web is born. There is an explosion of computer users going on-line. The BBS's quickly move to the web, and now the tools and tricks get very widespread distribution. Windows and GUI interfaces take over, and we now have point and click hacking. This leads to a new kind of hacker, called "script kiddies". The script kiddies have very low skills, but they don't need skills with the new tools. This new web also makes everyone anonymous. This anonymity makes the kiddies bold, and they feel they can do anything with no repercussions. This sets off a wave of anti-social behaviour that rocks the net. Viruses, Trojan horses, DOS attacks. Malicious hacking becomes the norm and the old style curious hacker becomes a vanishing breed. Security becomes a major issue, but for every security hole plugged, two new ones open up. Shell accounts become even more important now, and hiding your tracks becomes both easier, and more important. Laws are passed and the FBI and SS get into the act. So far law enforcement has had little effect. They can only catch the real losers, those who are too ignorant or stupid to cover their tracks. The good ones, the informed ones, make their attacks with impunity, and even when detected the attacks mostly going unreported for fear of bad publicity. ...read more.


The reality of this is far more shocking and real. The way we could work around this new and on going problem would be to have a lot stricter censorship on films and on the media itself. Neutralise the poison at the bite. To stop the "professionals" tying to access your computer you could invest in a firewall. These are complicated things (why is it that people insist in complicating what could be very simple?) which sit in your Internet provider's computer. You have no control whatsoever over them. These firewalls are only as good as the people who maintain them. These also have holes in their workings which people can crawl through which makes them utterly useless. Anti virus software is a useful weapon in the war. A vaccination for nearly every virus is available but with new virus on the go everyday the pharmacy of anti virus software runs dry. Yes they can filter the Internet. They could close down one of the thousands of websites but for everyone they close down another five would pop up. The only way they could completely destroy the world of the Internet Terrorist would be removing his only source of life, the Internet itself. But why should the enjoyment of millions be sacrificed for the malicious use of the few. This is a war, which will go on for as long as time itself does. Man against man using computer against computer. This is the war of the Internet. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Communications section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Communications essays

  1. Peer reviewed

    The power of the NET

    3 star(s)

    A final illustration of my point is that on some sites shocking material can be found without the user knowing that these sites contain it, which can lead to adverse effects. 2) Albeit some may argue that people should be able to put anything they wish on the net, I do not agree.

  2. Computer viruses

    A worm program replicates itself and slithers through network connections to infect any machine on the network and replicate within it, eating up storage space and slowing down the computer. But worms don't alter or delete files. A Trojan horse doesn't replicate itself, but it is a malicious program disguised as something benign such as a screen saver.

  1. Free essay

    information age

    which is trying to say something, the good thing about this is that it looks very attractive and you don't have look at the writing all the time. The disadvantage for this kind of communication is that people will get the wrong kind of image, the audience will also have

  2. OCR GCSE Business & Communication Task 7 Report

    This act also means I have to disable information from client's data being published upon my website, including data from my client database or associated organisations. This can then further help to support customers needs and satisfaction. Another law which complies with my website includes the Trade Description Act (1968).

  1. ICT Systems in Everyday Life: Your Local Community

    The investment in a simple or hi-tech system is justified on the basis of the following benefits of a CCTV system that: * Helps surveillance of areas that require security round the clock * Helps observe and control traffic * Prevents theft/ shoplifting, robbery and other crimes * Helps identify


    They are scared to live their flats because of the possibility of burglary. LIVING AND WORKING IN THE SMALL TOWN The charms of live in small or large locality can be different. In my opinion it depends on way of approach to life.

  1. Presentation about computers

    and select a price range: The cheapest option was: I have now found for my presentation: * A top of the range desktop computer * A laptop computer * A bottom of the range desktop computer These are all from the Internet.

  2. Information Security.

    The need to hide the content of a written message must therefore have been realized very soon, and there is evidence that codes and ciphers appeared almost with the beginning of writing. Such varied data security problems a from the more resent advances in information technology - large stores and microprocessors which give us processing wherever we need it.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work