Банк рефератов содержит более 364 тысяч рефератов, курсовых и дипломных работ, шпаргалок и докладов по различным дисциплинам: истории, психологии, экономике, менеджменту, философии, праву, экологии. А также изложения, сочинения по литературе, отчеты по практике, топики по английскому.
Полнотекстовый поиск
Всего работ:
Теги названий
Авиация и космонавтика (304)
Административное право (123)
Арбитражный процесс (23)
Архитектура (113)
Астрология (4)
Астрономия (4814)
Банковское дело (5227)
Безопасность жизнедеятельности (2616)
Биографии (3423)
Биология (4214)
Биология и химия (1518)
Биржевое дело (68)
Ботаника и сельское хоз-во (2836)
Бухгалтерский учет и аудит (8269)
Валютные отношения (50)
Ветеринария (50)
Военная кафедра (762)
ГДЗ (2)
География (5275)
Геодезия (30)
Геология (1222)
Геополитика (43)
Государство и право (20403)
Гражданское право и процесс (465)
Делопроизводство (19)
Деньги и кредит (108)
ЕГЭ (173)
Естествознание (96)
Журналистика (899)
ЗНО (54)
Зоология (34)
Издательское дело и полиграфия (476)
Инвестиции (106)
Иностранный язык (62791)
Информатика (3562)
Информатика, программирование (6444)
Исторические личности (2165)
История (21319)
История техники (766)
Кибернетика (64)
Коммуникации и связь (3145)
Компьютерные науки (60)
Косметология (17)
Краеведение и этнография (588)
Краткое содержание произведений (1000)
Криминалистика (106)
Криминология (48)
Криптология (3)
Кулинария (1167)
Культура и искусство (8485)
Культурология (537)
Литература : зарубежная (2044)
Литература и русский язык (11657)
Логика (532)
Логистика (21)
Маркетинг (7985)
Математика (3721)
Медицина, здоровье (10549)
Медицинские науки (88)
Международное публичное право (58)
Международное частное право (36)
Международные отношения (2257)
Менеджмент (12491)
Металлургия (91)
Москвоведение (797)
Музыка (1338)
Муниципальное право (24)
Налоги, налогообложение (214)
Наука и техника (1141)
Начертательная геометрия (3)
Оккультизм и уфология (8)
Остальные рефераты (21692)
Педагогика (7850)
Политология (3801)
Право (682)
Право, юриспруденция (2881)
Предпринимательство (475)
Прикладные науки (1)
Промышленность, производство (7100)
Психология (8692)
психология, педагогика (4121)
Радиоэлектроника (443)
Реклама (952)
Религия и мифология (2967)
Риторика (23)
Сексология (748)
Социология (4876)
Статистика (95)
Страхование (107)
Строительные науки (7)
Строительство (2004)
Схемотехника (15)
Таможенная система (663)
Теория государства и права (240)
Теория организации (39)
Теплотехника (25)
Технология (624)
Товароведение (16)
Транспорт (2652)
Трудовое право (136)
Туризм (90)
Уголовное право и процесс (406)
Управление (95)
Управленческие науки (24)
Физика (3462)
Физкультура и спорт (4482)
Философия (7216)
Финансовые науки (4592)
Финансы (5386)
Фотография (3)
Химия (2244)
Хозяйственное право (23)
Цифровые устройства (29)
Экологическое право (35)
Экология (4517)
Экономика (20644)
Экономико-математическое моделирование (666)
Экономическая география (119)
Экономическая теория (2573)
Этика (889)
Юриспруденция (288)
Языковедение (148)
Языкознание, филология (1140)

Реферат: Hackers Essay Research Paper The popular definition

Название: Hackers Essay Research Paper The popular definition
Раздел: Топики по английскому языку
Тип: реферат Добавлен 08:51:37 15 ноября 2010 Похожие работы
Просмотров: 2 Комментариев: 14 Оценило: 2 человек Средний балл: 5 Оценка: неизвестно     Скачать

Hackers Essay, Research Paper

The popular definition of a hacker has a negative connotation in today’s society, but computer

hackers aren’t criminals by their definition of the word. Their definition deals with how someone

approaches an activity in life, not just when dealing with computers. Hackers feel a certain depth

of commitment and an enhanced level of excitement at hacking a system. Hacking basically

means learning all there is to know about a system, becoming immersed in the system to the

point of distraction, and being able to fix the system if it breaks.

Hackers basically want to know how a system they find interesting works. Most are not

interested in making money or seeking revenge, although certain hackers do cross that line to

become what the hacker community calls crackers. Computer hackers become outraged when

they are compared with these vandals and criminals the popular media now calls hackers

(instead of crackers). For the sake of this paper I am going to be focusing on crackers, as that

was the group that I studied, and I will also be referring to them as hackers. Hopefully this paper

will give you a little more insight on what the hacker/cracker community is all about.

Most of the hackers (I would estimate over 90%) on the Internet are not malicious. Most of the

time when a hacker gains access to a system they will just leave a little sign that they were there

and leave things pretty much the same as before they were there. This can be in the form of a

web page, a small file saying they were there, or maybe even some type of executable file (such

as one that pops up everytime a person logs on to a system that displays some message the

hacker wrote). To this group, hacking is kind of like a sport, where each hack is sort of like a

trophy. They try to gain access to the biggest or the most systems just like a trophy game

hunter. The rest of the hackers tend to be malicious and hack in order to gain access to data

they normally wouldn’t have, destroy data, and to try and bring down a system or a network.

These are the hackers that you usually read or hear about in the news.

Probably the most sacred thing to a hacker is his or her anonymity. A person can remain

unknown on the Internet with hardly any effort at all, so this makes the perfect home for hackers.

Many hackers to come up with their own nicknames so that they have some way to lay claim to

their exploits. The worst thing that could happen to a hacker is for the real world identity to be

found out. This would be comparable to a person on the run from the law being found out by the


The hacker community primarily exists over the Internet because the Internet is the most

convenient way for them to gather and exchange information. One of the largest sources of

hacking information is Usenet. The largest and most extensive newsgroup on hacking would

have to be alt.2600.hackers. This group gets hundreds of posts daily and gets posts about

every aspect of hacking. This newsgroup is also where many hackers go to brag about their

hacks and other accomplishments. If a hacker needed to find out the latest utility that was

available for finding out other users passwords, they could read the postings in this group and

probably find it.

Usenet is not the only way to get the latest hacking hints and tricks. The most convenient would

probably be the World Wide Web. One of the most extensive web sites around showing most of

the latest hacking exploits around for every major operating system and network packages is at

www.technotronic.com. This site was designed for system administrators and security

programmers so that they could be made aware of what methods hackers were using. This site

gives the fix on how to prevent the hacks. The site not only has all of the patches to the hacks,

but it also has the actual code for the actual hacks themselves. Since not every system

administrator has the time to keep their system completely up to date, they are leaving the door

wide open to hackers. All a hacker would have to do is simply get one of the hacks off of this

site and then test it out on different systems until they find one that isn’t protected.

The are hundreds and hundreds of web sites devoted to hacking. A person could go to any

popular search engine, type in hacking and come up with a list of invaluable hacking web sites.

As a matter of fact there are even search engines that are strictly devoted to hacking such as

http://astalavista.box.sk and http://www.kaboo.123hostme.com/hackme/mattindex.HTM. There is

also a site devoted to tracking and showing off many hacker exploits. The site is

www.antionline.com and they specialize in capturing what system was hacked, by whom, and

they also show you the actual hack itself.

Another way that hackers use the Internet to communicate with each other is through chat

rooms using Internet Relay Chat (IRC). The are hundreds of chat rooms devoted to hacking on

the three main IRC networks (Dalnet, Efnet, and Undernet) and countless others on the smaller

chat networks. In these chat rooms hackers can simply ask someone how to do something and

get almost instant feedback, instead of having to search the web or reading through


Hackers tend to work alone but sometimes they team up to form a group. Usually the groups say

that they are fighting a worthy cause and sometimes they do it just to spite another group. A few

groups stand out as elite, as they have done some of the biggest hacks around. Hacking for

girliez (H4gls) is most known for their hack of Yahoo.com, but has also hacked other sites

including: greenpeace.org, slashdot.org, rootshell.com, www.hq.nasa.gov, and nytimes.com. A

few other famous hacking groups are the Masters of Download (M0D) and the Lordz of

Download (L0D).

Many of these hacking groups rally around the fight to free Kevin Mitnick. Kevin Mitnick was a

solo hacker who was able to hack into what was believed to some of the most secure sites out

there. He was even able to hack his way into Motorola’s security expert’s personal computer

and leave him a little “I was here” message. He was eventually caught and put in jail where he is

now in pretrial detention without bail, a bail hearing, and without having been convicted for over

four years. The government has finally set a sentencing hearing date for this summer.

Meanwhile hackers around the world tirelessly fight for his freedom, looking up to Kevin as the

hacking pioneer. Many hackers put the following banner on all over their webpages, and it is

linked to the Kevin Mitnick web page.

Some hackers specialize in creating computer viruses that are designed to wreak havoc on the

end users’ computer, rather than the servers. These viruses can be distributed in many ways.

Most commonly they are attached to an email, or in a downloadable file that is available on the

Internet. These viruses usually try to erase system files on a computer and render it useless.

One of the latest viruses to be in the news was the Melissa Virus. This virus was developed to

run on the end users’ computer, but it was designed to crash the email servers by flooding them

with more emails then they could handle.

Other hackers specialize in “cracking” commercial software packages and making them freely

available on the Internet as “warez”. I would estimate that at least 80% of all commercial

software packages have been cracked and can be downloaded for free. Software companies

are fighting a never ending battle to stop the free distribution of their software so the website

they are posted to are usually shut down pretty fast. One of the most popular warez site on the

web is www.liquidwarez.com and they provide links to these temporary sites. These “warez” are

also distributed via IRC. The names of the chat rooms are always changing, but they are easy to

find just by looking for rooms with the string “warez” in it.

Hackers definitely do form an online community. Everyone, from the largest computer

companies, down to the novice computer user knows their presence. All computer users

generally fear hackers even though most of them are not out to do any harm. But the ones that

do end up being malicious, usually do enough damage do strike fear into everybody’s mind.

There are a few simple rules one can follow to protect yourself from some of the hacker’s

devious plot. The biggest thing the end user can do is to always have a virus program running

and to keep it up to date. Another big thing is to never download anything from an untrusted

source, or to open an email attachment from an untrusted sender. There is no 100% way to

safeguard yourself from hackers because they are always new hacks coming out.

Оценить/Добавить комментарий
Привет студентам) если возникают трудности с любой работой (от реферата и контрольных до диплома), можете обратиться на FAST-REFERAT.RU , я там обычно заказываю, все качественно и в срок) в любом случае попробуйте, за спрос денег не берут)
Olya22:18:46 28 августа 2019
.22:18:45 28 августа 2019
.22:18:44 28 августа 2019
.22:18:43 28 августа 2019
.22:18:43 28 августа 2019

Смотреть все комментарии (14)
Работы, похожие на Реферат: Hackers Essay Research Paper The popular definition

Станете ли вы заказывать работу за деньги, если не найдете ее в Интернете?

Да, в любом случае.
Да, но только в случае крайней необходимости.
Возможно, в зависимости от цены.
Нет, напишу его сам.
Нет, забью.

Комментарии (3428)
Copyright © 2005-2020 BestReferat.ru support@bestreferat.ru реклама на сайте