Monday, February 25, 2019
Computer Hackers Essay
The sub tillage grouping of jades has been well-nigh since the 1960s. The underground sub culture of hacking has evolved into a mainstream open community. Some famous taxis desire Eric Corlery, Gordon Lyon, Gary McKinnon, and Kevin Mitnick have done their fair sh ar of infiltrating network bases each over the United States. These hatful have a unique brain t chapeau allows them to crack these codes set up by authorities officials. Eric Raymond tries to classify this group of people as crackers because they crack codes of computers but the community cherished to keep the name hackers.Regardless of the name the community of people is promising and can break down your computer at anytime. A hacker is a person who finds a weakness in a carcass and exploits it. Some motivation for hackers can be money, challenge, or pure epinephrin rush. at t wear place is a difference between a cracker and a hacker. Crackers be normally considered when people atomic number 18 involved w ith computers. There are several types of hackers all over the world. White hat hackers go bad credentials for no reason at all.The term white hat means ethical hacker. A black hat hacker breaks into secure networks to destroy data or to make the networks non useable for those who are allowed to use it. Black hat hackers have a process called pre hacking to assistant them determine which network to hack. The hacker first looks for an open mien to master access to. After that is done the hacker result find ways to get vital information about the network to get into the system. Hackers will even go above and beyond to engage activities like dumpster come down.Dumpster diving is when people actually dive into a dumpster to get information like documents that can help them breakdown the network. A grey hat hacker is a combination of white hat hacker and black hat hacker. A grey hat hacker will surf the earnings just to crack the network and charge the executive director to s et up a firewall. Basically the hacker sets up the administrator without letting them pick out that they broke into their system. A social status among hackers is the elite hacker.These hackers are the almost skilled in their field. Script kiddie hacker is the hacker that attempts to hack with pre case software. A neophyte is a non experienced hacker who really does not know what they are doing. They are new to the whole sub culture of hacking. A blue hat hacker is one who is outside of the security consulting firm who looks for places that have been exploited to patch up the weakness. Some attacks a hacker use are network enumeration, photo analysis, and exploitation.There are techniques like vulnerability scanners, password cracking, and packet sniffer, spoofing attack, and rooting attack. A vulnerability scanner is a tool used to quickly check computers on a network for known weaknesses. Hackers also commonly use port scanners. These check to see which ports on a specified com puter are open or available to access the computer, and some generation will observe what program or service is listening on that port, and its version number. tidings cracking is in essence guessing what the password could be to the administrator server.A packet sniffer uses data packets to catch the store data in the computer. Also hackers used techniques like intimidation, helpfulness, and name dropping to get people within a company to give out information regarding the servers so they may be able to attain the network information. At times these hackers come out successful. With so many worms and viruses like the Trojan horse a hacker can infiltrate your server and get all your information. There have been programs like Norton and MacAfee to help cut down on hacking.This sub culture like the thrill of breaking down walls and sightedness what they are not suppose to see. Between people not be smart about certain things they do online and the hacker for setting them up, this tax return of hacking can be a big problem. Not everything that is hacked is bad because government plans have risen to show what bad things they have created to ruin America. At the end of the day make sure you log out your name and get antivirus software to keep your account, youraccount.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment