• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  • Level: GCSE
  • Subject: ICT
  • Word count: 1871

The Beginning of an Evil the Net Did Not Exist Yet.

Extracts from this document...


The Beginning Of An Evil The net did not exist yet. Hackers were mainframe programmers, Commodore 64, and Apple users. Cracked software and hacker/cracker tools are traded between friends. Joe trades his "cracked" (copy protection removed) of a hot new game to Pete for Pete's home brew disk editor. There were ethical standards imposed upon these trades and hackers who demonstrated anti-social behaviour where soon ostracised and no longer traded with. This kept things under control to a great extent. Most hacked for the knowledge foremost with the challenge and the competition running close behind. Who can break the new game first? Who can write the best tool? Groups formed, combined their efforts, and tried to outdo each other. The IBM PC is released and computers and software become more plentiful, cheaper, and a lot more people get into hacking. The software companies begin to use more and more sophisticated security measures to prevent their software from being copied. The hackers became better and better and breaking them. It becomes the great game! The hackers are generally respected among other programmers; their skills admired. Being a hacker was a good thing. The BBS age - The modem came into wide spread use. Soon BBS's (Bulletin Board Systems) sprang up all over the place. These were computers with one or more modems attached to them. You could connect with other users of the BBS here. You could chat, download files, send mail, and post messages on these systems. ...read more.


The Web Age With the domain name system in place the World Wide Web is born. There is an explosion of computer users going on-line. The BBS's quickly move to the web, and now the tools and tricks get very widespread distribution. Windows and GUI interfaces take over, and we now have point and click hacking. This leads to a new kind of hacker, called "script kiddies". The script kiddies have very low skills, but they don't need skills with the new tools. This new web also makes everyone anonymous. This anonymity makes the kiddies bold, and they feel they can do anything with no repercussions. This sets off a wave of anti-social behaviour that rocks the net. Viruses, Trojan horses, DOS attacks. Malicious hacking becomes the norm and the old style curious hacker becomes a vanishing breed. Security becomes a major issue, but for every security hole plugged, two new ones open up. Shell accounts become even more important now, and hiding your tracks becomes both easier, and more important. Laws are passed and the FBI and SS get into the act. So far law enforcement has had little effect. They can only catch the real losers, those who are too ignorant or stupid to cover their tracks. The good ones, the informed ones, make their attacks with impunity, and even when detected the attacks mostly going unreported for fear of bad publicity. ...read more.


The reality of this is far more shocking and real. The way we could work around this new and on going problem would be to have a lot stricter censorship on films and on the media itself. Neutralise the poison at the bite. To stop the "professionals" tying to access your computer you could invest in a firewall. These are complicated things (why is it that people insist in complicating what could be very simple?) which sit in your Internet provider's computer. You have no control whatsoever over them. These firewalls are only as good as the people who maintain them. These also have holes in their workings which people can crawl through which makes them utterly useless. Anti virus software is a useful weapon in the war. A vaccination for nearly every virus is available but with new virus on the go everyday the pharmacy of anti virus software runs dry. Yes they can filter the Internet. They could close down one of the thousands of websites but for everyone they close down another five would pop up. The only way they could completely destroy the world of the Internet Terrorist would be removing his only source of life, the Internet itself. But why should the enjoyment of millions be sacrificed for the malicious use of the few. This is a war, which will go on for as long as time itself does. Man against man using computer against computer. This is the war of the Internet. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Communications section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Communications essays

  1. Peer reviewed

    The power of the NET

    3 star(s)

    A final illustration of my point is that on some sites shocking material can be found without the user knowing that these sites contain it, which can lead to adverse effects. 2) Albeit some may argue that people should be able to put anything they wish on the net, I do not agree.

  2. Computer viruses

    A worm program replicates itself and slithers through network connections to infect any machine on the network and replicate within it, eating up storage space and slowing down the computer. But worms don't alter or delete files. A Trojan horse doesn't replicate itself, but it is a malicious program disguised as something benign such as a screen saver.

  1. ICT Systems in Everyday Life: Your Local Community

    The technology is already being used in hospitals to support covert surveillance of parents suspected of abusing their children. CCTV is very quickly becoming an integral part of crime control policy, social control theory and 'Community consciousness'. It is promoted by police and politicians as primary solution for urban dysfunction.

  2. Information Security.

    With good design, the security then depends on the people who operate the system and carry out its security -related procedures. In a well-designed system it should be clear who is being trusted and to what extent, but there is no way to make the system proof against, unlimited deceit.

  1. OCR GCSE Business & Communication Task 7 Report

    Legal Issues: When complying my mail merge I must ensure I am remaining satisfactory towards the rules from the Sex Discrimination Act 1975. When following this act I am ensuring I am treating all clients with the correct respect and information, meaning male and female clients are treated as one.


    I think that in small city people have smaller possibility of education and development, smaller life perspectives connected with job. Culture and sport as a general are more faintly developed in small locality, and man is less anonymous. Man who lives in small city can't go to the cinema, and

  1. Is the Internet A Useful or Evil Tool?

    For example I went to a search page and typed in how to make a bomb. It came back with hundreds of pages telling me how to build any type of bomb, by using household materials! From this you can see that the Internet is not the sort of tool that you would like your children and family members having.

  2. Presentation about computers

    top of the range desktop and the bottom of the range desktop from Savastore. I won't use the Currys one because it wasn't really bottom of the range. I won't use the ones from the newspapers because it will be easier for me to copy the pictures from the web sites.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work