Computer Memory Hacking
Professor Patricia Riley
November 20, 2014
Technology continues to evolve exponentially. However these technological advancements continue to pose a threat to both individuals and information resources of companies and governments. There is therefore the need to protect one’s data and information due to the emerging threats and risks. Hacking is where third parties create a backdoor version of a hardware and software so as to manipulate or unlock hidden functionalities on a machine. Most of these hacks are open source and free soft wares. These hacks manipulate the firmware update option on many devices to run and install themselves. Many researchers have found out that breaking into a computer’s encrypted hard drive is very easy with the help of the right tools. A research by Princeton University revealed how low tech hackers access even the most well protected computers (Jordan Robertson 2008).
This paper details how encryption was coveted for a long time as a vital shield against hackers, but can be manipulated by altering the operations of the memory chips. This paper outlines just how vulnerable the data we store on our computers and laptops is to possible hacking. Through freezing the Dynamic Random Access Memory (DRAM) chip, which is the most frequently used memory chip in personal gadgets. Freezing DRAM makes it retain data for many hours way after the machine loses its power. This data includes the keys used to unlock encryptions. If the memory chip is not frozen the chip can lose its contents in a matter of milliseconds. Hackers can use this vulnerability to steal information which is stored in the memory through rebooting of the compromised mach...
... middle of paper ...
...lso the endorsement of the Convention on Cybercrime by over 40 countries has brought about joint effort in combating some of these challenges.
In conclusion Hackers started off as experts in programming and curious intellectuals advancing the limits of technology, but have evolved into a diverse world view. Additionally the shift from hardware onto software to the internet have boosted the increase in number of malicious hackers. With the emergence of new technologies so is the renewed efforts to combat the loopholes and help protect the public.
FBI Computer Crime Survey Report 2005
Gollmann John Wiley and Sons, Dieter1999 . Computer Security.
Jordan Robertson 2008 computer memory vulnerable to hacking
Levy, Steven 1984 Hackers : heroes of the computer revolution. Press/Doubleday, .
Yeo, Vivian. ZDNet Asia 2006 Do former black hats make good hires?
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- a “calculator-sized Computer Memory Hacking Computer memory hacking is the exercise of improved computer hardware and software. To achieve goal outside of the maker’s normal purpose person who participate in computer hacking deeds are usually called hackers. Although some hackers aren’t concerned about the emanation of their action there is some dispute about the truth that hacking has different negative effects. Business and governments pay a huge amount of money to avoid damage from hacking. Hacking on large scale can affect massive website damage, a long lasting inconvenience computer hacking is largely common between teenagers and young adult.... [tags: Computer, Computer security, Hacker, Computing]
1184 words (3.4 pages)
- Introduction Computer memory refers to any physical device that has the ability of storing information either permanently or temporarily. For instance, the Random Access Memory (RAM) is a volatile memory that has the ability of storing information on various integrated circuits that are used by not only the operating system, but also by the hardware and software. In essence, there are two major types of computer memory namely Read Only Memory (ROM) and the Random Access Memory (RAM). ROM refers to smallest parts of a computer system’s silicon or solid state memory which is not only fixed in size, but also permanently stores or keeps the instructions of the manufacturer upon switching on a c... [tags: Computer data storage, Computer, Computer memory]
1057 words (3 pages)
- Abstract Society relies heavily on technology for many things, but our use of technology opens us up to become victims of cybercrimes, like computer hacking. Hackers can be divided into three main categories: novice, intermediate, and elite. Hacking has been in the information technology (IT) field for a while. The first hackers appeared in the nineteen sixties and hackers have continued to make progress since then. People hack for a variety of reasons including ego, fun, knowledge, and profit. The first major hacking program, SATAN, caused controversy in 1995, and numerous hacking programs exist today.... [tags: Computer Network Security hacking]
1857 words (5.3 pages)
- Hackers: Control and Property The ethical issues surrounding hacking, stem from several sources mainly dealing with order and control, and information ownership. What is difficult to decipher from all the media hoopla surrounding the terms, "hacker" and "hacking" is both the simultaneous sensationalism and the condemnation of said activities. Of course just recently, even a movie was made and was appropriately called Hackers. The term and all that it implies has truly entered our popular consciousness when Hollywood has made a box office movie on it.... [tags: Hacker Hacking Computer Technology Internet]
857 words (2.4 pages)
- Have you ever been a victim of a cyber crime. Something as simple as a weird pop up that won't go away. Or maybe something a little bit more serious like your personal web page gets hi-jacked. All this "malicious" damage that causes you much grief isn't so much the work of a hacker, per se, but more the work of a "cracker" or a "script kiddie". Now you're confused right. Well let's just say everyone who knows how manipulate a computer isn't doing it on bad and evil terms, like writing a virus to deploy on a certain date to permanently delete certain file extensions.... [tags: Hacking Computer Security]
980 words (2.8 pages)
- The Escalation of Computer Hacking Crimes The advancement of computer technology makes the world easier place to live by facilitating the fields of science, medicine, and education. Although computers benefit us from many aspects, they also have negative implications. Many criminals use the computer to take or alter data, and to gain unlawful access of computers, by using computer worms, viruses, and Trojans. Which has posed new challenges for the government and the society. Due to the versatility of the computer, drawing lines between criminal and non-criminal behavior regarding its use can be difficult.... [tags: Computer, Personal computer, Malware]
1504 words (4.3 pages)
- Abstract: UNIX has a technique called Virtual Memory to accommodate for the shortage of memory space. Virtual memory increases the available memory the computer has by enlarging the "address space," or places in memory where data can be stored. This paper describes concepts like swapping, demand paging, page fault, page replacement algorithm, thrashing, some virtual memory allocation algorithms and the Memory Management Unit (MMU). Introduction: Each program running on the machine is called a process and each process has its own address space that the process uses to store its data and code segments.... [tags: Virtual memory, Memory management, Page fault]
2610 words (7.5 pages)
- “In HYPERLINK "https://en.wikipedia.org/wiki/Computer_security" computer security, a vulnerability is a weakness which allows an HYPERLINK "https://en.wikipedia.org/wiki/Hacker_(computer_security)" attacker to reduce a system 's HYPERLINK "https://en.wikipedia.org/wiki/Information_assurance" information assurance”. In other words some entity you may or may not have done direct business with has a flaw in their data flow or storage that allows an attacker access and the ability to move forward a secure level without invitation or permission.... [tags: Computer security, Internet, Attack]
843 words (2.4 pages)
- Computer hackers could arguably be the next epidemic in America and as the world becomes more and more reliant on computers the computer hacking industry is greatly rising to dangerous levels. With such hackers as Kevin Mitnick, who is known as a computer terrorist, computerized information isn't safe any more. Kevin is known as the most high-profiled computer criminal and responsible for reaping the most havoc in the computer world today. He considered this an easy and fun task. He finally got caught and was thrown into prison, but once he got out nothing changed.... [tags: Technology Computer Hackers]
1383 words (4 pages)
- Hacking Truths Manual Welcome to another Hacking Truths Manual. This time I have a collection of Tips and Tricks which no body normally knows, the secrets which Microsoft is afraid to tell the people, the information which you will seldom find all gathered up and arranged in a single file. To fully reap this Manual you need to have a basic understanding of the Windows Registry, as almost all the Tricks and Tips involve this file. Important Note: **************** Before you read on, you need to keep one thing in mind.... [tags: Hacking Hackers Computers Software Essays]
5247 words (15 pages)