The document provides an overview of computer hacking including its history, types of hackers and their motivations, common hacking tools, and ways to prevent hacking. It discusses how hacking involves illegally accessing private information from computer systems and networks with malicious intent. Hacking is considered a serious crime under federal and international law. The document also explores debates around the definition of "hacker" and whether all forms of hacking should be considered unethical.
introduction Hacking isthe process of illegally corrupting or extracting private information from a computer system or network. They are generally of malicious intent, wishing to render networks unable to function by overloading their systems with traffic and causing them to crash, or steal data such as credit card details and security numbers. As such, Hacking is considered a very serious crime. Computer hacking involves some degree of infringment on privacy of others to damage the computer based properties such as files, software, etc.
3.
Hacking history 1971- Cap ân Crunch phone exploit discovered 1988 - Morris Internet worm crashes 6,000 servers 1994 - $10 million transferred from CitiBank accounts 1995 - Kevin Mitnick sentenced to 5 years in jail 1969 - Unix âhackedâ together 2000 - Major websites succumb to DDoS 2000 - 15,700 credit and debit card numbers stolen from Western Union (hacked while web database was undergoing maintenance) 2001 Code Red exploited bug in MS IIS to penetrate & spread probes random IPs for systems running IIS had trigger time for denial-of-service attack 2nd wave infected 360000 servers in 14 hours Code Red 2 - had backdoor installed to allow remote control
4.
HACKER ?A person who enjoys exploring the details of programmable systems and how to stretch their capabilities, as opposed to most users, who prefer to learn only the minimum necessary. One who programs enthusiastically or who enjoys programming rather than simply theorizing about programming.
5.
Types of hackersProfessional hackers Black Hats â the Bad Guys White Hats â Professional Security Experts Underemployed Adult Hackers Former Script Kiddies Canât get employment in the field Want recognition in hacker community Ideological Hackers hack as a mechanism to promote some political or ideological purpose Usually coincide with political events Criminal Hackers Real criminals, are in it for whatever they can get no matter who it hurts Disgruntled Employees Most dangerous to an enterprise as they are âinsidersâ Since many companies subcontract their network services a disgruntled vendor could be very dangerous to the host enterprise
Basic needs ofhackers Everyone has heard of one individual or another that was caught while hacking computers that belonged to this or that organization. Because hacking into computers is highly illegal, it should be mentioned that this article will not mention any real specifics about the subject, and this author would rather gladly encourage you to become a real hacker â professionally. A hacker who want to hack any information from any computer or from any data source, he want some very important information which might cause any incidence.
8.
Types of AttacksInternal â like Technical attacks External â like Social Engineering
9.
Hackers motivation Desireto embarrass Experimentation Self Gratification Problem Solving Exposing System Weakness Fun Profit Extortion Technical Reputation Scorekeeping Revenge/maliciousness Intellectual
10.
Computer hacking toolsTweak Manager 2.12 Â Panda Security Demo 3.0.2.0 PC Activity Monitor Standard 7.7.1Â Word Extractor - a binary to text convertor 2.1Â Arctor File Repository Free 3.5.1.3Â Invisible Secrets Encryption Software 4.6Â Geek Superhero 1.3Â FolderAccess 2.0Â DataSafe PS Net 3.0 PC Activity Monitor Pro 6.5.1 NetPeeker 2.83 MailMonitor 1.6.3 SpyRemover Pro 3.05Â Spam Nullifier 3.4.0.1 BestCrypt Corporate 1.12
11.
Is computer hackingis a crime? Computer hacking is broadly defined as any action that results in unauthorized interference with a computer, computer system or network. Computer hacking includes breaking into a computer with the intent to steal, damage, modify or monitor data or settings within the system. Significance Computer hacking is considered a crime in all 50 states; it is also a crime under federal and international law. Because a computer may be accessed from anywhere, a person may be charged with computer hacking on the state, federal and international level. Types Hacking often involves more than just unauthorized access to a computer. Computer hackers may access a computer in order to: steal financial information such as credit card access numbers; steal personal information (identity theft); harass (swatting); vandalize; gain access to other computers; launch computer attacks; or place malicious software (malware).
12.
Considerations Hacktivism iswhen computer hacking is used to promote a political, religious or cultural cause or agenda. When an individual or group uses computer hacking to make a politically motivated attack it is called cyberterrorism. When one country uses computer hacking to disrupt, destroy or damage another country's computers, it is called cyberwarfare. Famous Ties On January 12, 2010, Google announced that it would no longer censor its search results in China. One of the reasons for Google's decision was that it found evidence that Chinese hackers had broken into its email servers in an effort to get information from the email accounts of Chinese human rights advocates.
13.
Ways to preventhacking 1- implement a Frewall. 2- Develope corporate security policy 3- Install antivirus software 4- Keep operating systems up to date. 5- Do not give out any information to unreliable sources. 6- do not open spam emails. 7- Do not give out personal information
14.
conclusion The word"hacker" carries weight. People strongly disagree as to what a hacker is. Hacking may be defined as legal or illegal, ethical or unethical. The mediaâs portrayal of hacking has boosted one version of discourse. The conflict between discourses is important for our understanding of computer hacking subculture. Also, the outcome of the conflict may prove critical in deciding whether or not our society and institutions remain in the control of a small elite or we move towards a radical democracy It is my hope that the hackers of the future will move beyond their limitations and become hacktivists. They need to work with non-technologically based and technology-borrowing social movements in the struggle for global justice.