24-07-2014, 02:24 PM
HACKING
HACKING.DOC (Size: 53.5 KB / Downloads: 14)
Introduction to Hacking
The Internet, like any other new media historically, provides new methods of engaging in illegal activities. That is not to say that the Internet is intrinsically 'bad', as many tabloid journalists would have us to believe, it is simply a means for human beings to express themselves and share common interests. Unfortunately, many of these common interests include pornography, trading Warez (pirated software), trading illegal MP3 files, and engaging in all kinds of fraud such as credit card fraud.
Hacking on the other hand is a greatly misrepresented activity as portrayed by the wider media and Hollywood movies. Although many hackers go on from being computer enthusiasts to Warez pirates, many also become system administrators, security consultants or website managers.
2 Why Do Hackers Attack?
There are many reasons why a hacker might attack a system. Some possibilities may include:
•Obtain a company’s secrets or insider information
• Use the system’s hard drive for storage, often for pornography or stolen software
•Steal credit card numbers
•Steal passwords to other systems
•Use the computer in an attack on another computer or system
•To steal programs or files
•Read others’ email
•Stalking
•A challenge, or "to see if I can"
•To impress other hackers
How Can I Determine If My Computer Has Been Hacked
Clues and Signs
Some signs that your computer or user account may have been hacked include:
• Files disappear or are modified unexpectedly
• Strange files appear or grow in size unexpectedly
• Hard disk space shrinks without reason
• The computer slows considerably, or problems appear suddenly
• Strange messages or dialog boxes appear on the screen
• The computer starts crashing frequently
• Programs stop working as expected
• Your internet connection slows dramatically for an extended period
• You notice your internet connection is in use, but you are not using it
• You get a phone call, letter, or email from your Internet service provider or administrator noting strange activity.
. Conclusion
The main appeal of the Internet to me is the ability to communicate complex ideas in a fast, cheap and creative way. This may include e-mail, web design or even chat rooms and message boards. No other media in the history of the industrialized world provides such a level playing field, where the individual like you or I may compete with the giant corporations to have our voices heard online.
I am certainly not saying that the threat does not exist, which would be irresponsible, but what I am saying is that a level-headed approach should be taken by all Internet users to protect their privacy and security online, and to ensure that they educate and inform themselves of the more serious risks involved in maintaining any kind of Internet presence.
The history of Internet hacking is an on going affair, one that will eventually show the true meaning of hacking to be to explore and understand, not to destroy and corrupt. When this ideal is realized, perhaps one-day people will again be able to publicly declare themselves to be hackers, without the fear of losing their jobs or facing prosecution.