-
Essay / A Snapshot of Computer Hacking - 1171
A Snapshot of Computer Hacking Computer hacking has been around for over fifty years. Every time a new technology comes to the forefront, there are people who want to develop it. Piracy, in general terms, is simply taking technology and trying to improve it without the owner's permission. I want to highlight two terms that I will use throughout this article: hacker and cracker. A hacker is a person who has extensive computer knowledge and enjoys solving technical problems. The goal of hackers is not to cause damage to the computer system or network by infiltrating it. They are there to try to learn and improve the program. A hacker believes that information should be free, so they usually share how they carried out the infiltration. A cracker is a person who uses his knowledge for personal gain in violation of the law. EX: stealing account numbers, distributing viruses, etc. It's safe to say that all crackers are hackers, but not all hackers are crackers. This is an important distinction. Most people don't realize the difference, due largely to ignorance and the media. According to Tellis (2000) “The fundamental difference between hackers and crackers is this: hackers build things, crackers break things”. Often, companies employ hackers who break into their systems. Taking them out of what could lead to a life of crime and turning them into ethical hackers. Ethical hackers, also known as White Hats, are professionals who write codes to verify the integrity of programs on behalf of their owners. The first hackers appeared at MIT. (Focus Editors). The term hacking was borrowed from members of a model train club, who reconfigured switches and r...... middle of paper ...... J (2006). A Short History of Hacking. Retrieved from http://www.neatorama.com/2006/08/28/a-short-history-of-hacking/Unknown author (nd). Hacking History. Retrieved from http://www.campusactivism.org/html-resource/hackers/section4.htmlPerrin, C (August 16, 2010). Hackers and crackers: a lesson in etymology and clear communication. Retrieved from http://blogs.techrepublic.com.com/security/?p=4237Taber, M (nd). Maximum Security: A Hacker's Guide to Protecting Your Website and Network (Chapter 3.) Retrieved from http://newdata.box.sk/bx/hacker/ch03/ch03.htmTellis, PS (November 6, 2000). Pirates are not crackers. Retrieved from http://db.glug-bom.org/lug-authors/philip/docs/hackers-not-crackers.htmlAuthor unknown (nd). Ethical hacker. Retrieved from http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci921117,00.html