Computer Hacking

Authors Avatar

Keith Palacios

Mr. Grageda

January 14, 2002

ITGS

Computer Hacking

Criterion A: Describing the issue

In this day and age, there are always people who try to get something for free. In the banking world there are bank robbers, in the malls or shopping districts there are shoplifters, but in the computer world there are people called hackers. Hackers are people who use their computer skills to gain unauthorized access to files via the internet. This process is also called “hacking”. Hacking first became a problem in the 1990’s, because that is when technology appeared to be getting more advanced, that is when the internet was introduced to the world. The internet is a way of communication between people and a way of accessing files in just mere minutes. Along with all these good things, there came some bad things. In the shadows of the internet lurked hackers, because the internet served as a hallway with doors, and each door would lead to different files, and they walked around with a lock pick, being able to access any door that they chose, and get the files. This caused a big problem to the people whose files they were “hacking” into, because it is a violation of the people’s rights, the right to privacy. Now people all over the world are trying to discover new technology to protect themselves from hackers, but all efforts, so far, have been in vain, because there are still hackers and they still are able to access files.

Join now!

Criterion B: IT Background on the issue

The early history of hackers is centered on MIT in the 1950’s and 1960’s. Naturally curious and intelligent MIT students who had been exploring the phone switching network and the control systems of the Tech Model Railroad Club were drawn to the computers of the MIT Artificial Intelligence Lab (MIT AI Lab). This was the “Golden Age” of the computer hacker. The machines were large, slow, cumbersome to use, and it took an extraordinary effort to make the do even the simplest computation. As computers spread to other parts of the ...

This is a preview of the whole essay