Computer Hackers: The Who's, What's, When's, Where's, Why's and How's.

Computer Hackers: The Who's, What's, When's, Where's, Why's and How's.

Length: 1200 words (3.4 double-spaced pages)

Rating: Excellent

Open Document

Essay Preview

More ↓
Computer Hackers: The Who's, What's, When's, Where's, Why's and How's.

After coming home from a long day at school, I turn on my computer and go to the Internet to see "What's New!" Then all of a sudden I hear, "You've Got Mail!" I check my e-mail and it's a message from my friend in Alabama. It is warning me about a computer virus that is being spread, and that I should watch out. Thank goodness someone warned me about this. I said to myself, "This kind of stuff must be the work of those hackers that I hear so much about." But what exactly is a hacker, and what are they out to do?

Hackers are people who are getting into our computer systems, destroying our personal property and stealing our information. Years ago, a hacker was a person who was capable of creating elegant and or unusual uses of technology. These days, a hacker refers to a person who attempts to penetrate security systems on remote computers (Hackers 2). Not only are computer hackers causing many problems for businesses, they are also causing many problems for the average person. Hackers get in personal information and get a hold of credit card numbers, various banking accounts and financial information, and just about anything else they want to know about you. They are going to get it whether you like it or not.

Hacking, with the intent to steal or deface, is so feared in the corporate world that companies have spent $1.8 billion this year alone on computer network security products and services (Home Hackers 1). Cracking of home computers has been rare, but it is always a growing concern. Any machine connected to the Internet is potentially vulnerable, but the best targets are those with high-speed, "always on" connectors, such as cable modems or digital subscriber lines. Systems with high-speed connections are typically targeted because they are the simplest to track down. People have to realize that hacking is not a prank or a game, especially when hackers are hitting such spots as the White House site, the FBI site and the Senate site. The fines and jail time for these hackers are not very funny either. Arrests are being made and punishments can be up to life in prison and thousands, and in some cases millions of dollars in fines.

When you think of hackers, you probably think of someone who is a little older, someone who's profession is working with computers.

How to Cite this Page

MLA Citation:
"Computer Hackers: The Who's, What's, When's, Where's, Why's and How's.." 24 Aug 2019

Need Writing Help?

Get feedback on grammar, clarity, concision and logic instantly.

Check your paper »

The Truth Behind Computer Hackers Essay

- It was the year of 1946, when the very first computer named ENIAC was created. Now, as of 2012, there are about 1.1 Billion Computer in the world. They are all connected by networks. In a way its like a large spider web, hence the name “World Wide Web”. Now you might ask “Well how are these Networks managed or controlled?” That is where our technology kings and queens come in. Many people consider them as “Hackers”, when the truth is people who consider these hackers as criminals are highly incorrect,as all hackers aren't criminals....   [tags: white hats, greay hats, world wide web]

Research Papers
951 words (2.7 pages)

Computer Hackers and Ethics Essay

-  What comes to mind when you hear the word ‘hacker’. For most it means stealing information through the Internet, gaining illegal access to another person’s PC, or simply - disruptive behavior using a computer. The subject of hacking is no secret to the general public. Many people have been exposed to it by a bad experience or through the news and media. The idea of hacking that is stuck in the minds of people is that of which they have seen in the movies. The movies portray hackers as young and devious criminals....   [tags: computers, ethics]

Research Papers
1583 words (4.5 pages)

Essay on Victims of Computer Hackers

- NNN MN an upscale retailer is one of the latest to reveal being a victim of hackers. Many Customers were affected, not just the store itself. Customers cards were being use to make unauthorized purchases. This situation put the retailer at risk of losing current or potential customers. Many individuals would question its security measures potentially bringing the company’s overall goodwill down. Neiman Marcus hack affected everyone involved, also questions the idea of how secured we are when it comes to making credit card purchases and how communication plays a major role overall in the problem....   [tags: fraudulent activity, retailers]

Research Papers
826 words (2.4 pages)

Essay on Computer Hackers

- What is the definition of the term “hacker?” Is it someone that terrorizes companies by shutting down computers and satellites otherwise rendering them helpless. Or is it merely someone that is curious as to how technology works. The United States Government doesn’t agree at all with the latter of the two. It is almost frightful that the Government of the United States, the most powerful force in the world, can be so discriminative. You think that they would be the ones with some sort of understanding....   [tags: essays research papers]

Free Essays
1548 words (4.4 pages)

Computer Hackers Essay

- Computer Hackers Hackers are popularly defined as computer experts who spend enormous amounts of time trying to breach the security of networks, web servers and email servers. Usually they use a selection of specialist software to identify any weaknesses, which they are then able to exploit. There are basically two main types of hackers, the first type is mainly consistent of intelligent adolescents who acquire their hacking knowledge by reading, by talking to people and by spending an excessive amount of time on their computer, learning the various programs, the source code and the commands....   [tags: Papers]

Research Papers
772 words (2.2 pages)

Essay about Computer Hackers

- Personal Narrative- Computer Hackers My perception of hackers was crafted long ago, by my brother, a hacker himself. He was involved with all manner of clandestine activites and tied up our phone line for hours. I, of course, never understood what he was involved with, but remember being excited when he broke into an army base, as the military was my passion at the time. I also never understood the constant calls from strange men our family would receive, nor did my parents. Now, my brother claims it was the FBI investigating him....   [tags: Personal Narrative Profile Essays]

Free Essays
732 words (2.1 pages)

Essay on Defend Your Computer From Hackers

- Defend Your Computer From Hackers How to Shield Your Computer from Internet Crime When you connect to the Internet, you are allowing you computer to communicate with millions of people who are also on the Internet. Suddenly, your hard drive is fair game. Some people called by various names: hackers, whackers, crackers, and some other more colorful names if your data is being destroyed. These people make it their business to find and make use of exposed hard drives. Sometimes, they just take an innocent look around; sometimes they delete files or even deposit a virus of nature....   [tags: Essays Papers]

Free Essays
1459 words (4.2 pages)

Essay on Computer Software called Shadow Defender

- Every problem encountered by the firm has an equivalent solution, with the exception of power outage which cannot be controlled by the firm or its owner. In order to address the problem with poor internet connection the owner first identifies what causes the problem with the connection, this can be various things, as previously stated, such as faulty wiring, loose cable connections and modem errors. If the problem seems easy to handle then the owner find ways to fix it himself, if not, the internet provider is called, similar to if there are regular occurrences of a certain problem and if the problem arises with the internet connection itself....   [tags: Computer Software, Hackers, Computer Virus]

Research Papers
1923 words (5.5 pages)

Computer Hackers: The Who's, What's, When's, Where's, Why's and How's.

- Computer Hackers: The Who's, What's, When's, Where's, Why's and How's. After coming home from a long day at school, I turn on my computer and go to the Internet to see "What's New!" Then all of a sudden I hear, "You've Got Mail!" I check my e-mail and it's a message from my friend in Alabama. It is warning me about a computer virus that is being spread, and that I should watch out. Thank goodness someone warned me about this. I said to myself, "This kind of stuff must be the work of those hackers that I hear so much about." But what exactly is a hacker, and what are they out to do....   [tags: Essays Papers]

Free Essays
1200 words (3.4 pages)

Computer Hacking Epidemic Essay

- Computer hackers could arguably be the next epidemic in America and as the world becomes more and more reliant on computers the computer hacking industry is greatly rising to dangerous levels. With such hackers as Kevin Mitnick, who is known as a computer terrorist, computerized information isn't safe any more. Kevin is known as the most high-profiled computer criminal and responsible for reaping the most havoc in the computer world today. He considered this an easy and fun task. He finally got caught and was thrown into prison, but once he got out nothing changed....   [tags: Technology Computer Hackers]

Free Essays
1383 words (4 pages)

Related Searches

But the majority of hackers are under the age of 25. Chad Davis, a known computer hacker is a 19 year old who was recently arrested on charges of breaking into a Pentagon computer. He is the co-founder of Global Hell, a group of teenagers suspected in fraud, including pilfering credit card numbers from computer databases, misusing identification numbers and passwords and defacing a number of government Web sites, including the White House web site. This sparked the FBI to conduct a search, going through 11 different cities and 18 different homes. The investigation sparked retaliation with other hackers, who later disabled the FBI's web site and defaced the Senate's site. Three weeks after the FBI raided his home, Davis hacked into the Pentagon computer, which prevented the use of the of the system by army personnel.

Another case of computer hacking involved two former employee's of Interactive Connections, now known as Screaming Media, who were arrested recently on charges of breaking into the companies computer system and stealing business plans. If convicted, they both face up to five years in prison. They are accused of entering Interactive's computer system from their home after their employment ended and copying proprietary files and software, then transferring the information to various computers that the two controlled.

Even inexperienced hackers find it very easy to break into home systems. To crack into a system, you need an IP address. The IP, or Internet protocol address changes every time you go on-line, only when you have a dial-up modem. But again, when you have an always-on modem, your IP number doesn't change. The longer you are on the Internet, the better the chance that a hacker can find you and the IP address that you are using. The tools that make it possible to detect IP addresses are what's called "vunerability scanners". People who use these tools are called "script kiddies" in hacker's terms. "They are not respected by hackers", quotes Michael Hudnack, a 16 year old former hacker (Home Hackers 52). Hudnack says that script kiddies are usually young hackers that try to get into your system to steal personal information or to deface a Web site. He also says that if there any good they will use your machine as a jumping off point to hop into at least 12 more to cover their tracks before they hack an important government or corporate system.

A hacker will try to gain control of your system by installing completely legit remote-control software, which is used in office networks to install, delete, and manage software on workers' computers. They hook up a program to your computer as well as theirs and can get into and use your computer as if it were their own. The most popular of these programs is one called Back Orifice. This one is most popular because it allows them to log into a system undetected. It is unlikely that an average consumer would install Back Orifice into their system, but they may do it without even knowing it. A hacker might set a trap by sending you an E-mail urging you to download what they say is a software update, when it is Black Orifice in disguise. When you download it, you've let your guard down.

The best thing for consumers to do is install consumer firewall software, which detects and prevents attacks. The best one on the market one is Ice's BlackICE defender (Home Hackers 54). This is a $40 download from the companies Web site.

Just to name a few "top hacks", there is the Remote access Trojan horse probe, or RAT. This is when hackers check here to see if you have installed remote-control software. If so, they can take over your PC like it were their own.

Another top hack is Nuke (AKA Blue Bomb or Blue Death). As a prank, hackers will send out data that crashes Windows 95. This usually has no long term damage.

The file-and-print-sharing hack lets everyone in your home network share files, drivers and printers, including hackers. If you have this program, then it is best to turn it off.

Here is a brief explanation of hackers. As you can see, hackers destroy property and ruin programs and systems. Businesses and individuals wish that there was something more they can do to protect themselves, but it seems that when protection or a remedy is found for these hacks, then more are invented. The hacker culture is almost working faster than the people inventing protection from hackers. So, besides getting as much protection as you can, for instance firewall software, there is really nothing else you can do but hope that it doesn't happen to you.
Return to