This website uses cookies to ensure you have the best experience. Learn more

Computers, Hackers, And Phreaks Essay

1519 words - 7 pages


The Internet is a wondrous place. Practically anything you could ever want is

available on the Net. It's like a big city, it has the highly prestigious areas, and the

sex-ridden slums (Mitchell). It has the upstanding citizens, and it has the criminals.

On the Net, crime is more abundant than in a large city, though, mainly because of

the difficulties in tracking and prosecuting offenders. Even from its beginnings, the

Internet has always been a battlefield between phreaks and administrators.

     The Internet hasn't always been a public forum. In fact, the Internet has

been around for years. The Internet is just a new fad (Larson). The Internet
...view middle of the document...

This is mainly due to the fact

that in order to support the very high speed of the Net, a fast computer is needed

and a fast connection. A fast computer can cost in the thousands of dollars, at

least, and a quick connection can cost hundreds dollars or more. Individuals can

still get on the Net through these private institutions. The private institution

spoon-feeds the Net to the slower computers over their delayed connection lines

(Jones). The Internet began very high-class, due to the fact that only super

intelligent college students and professors could access it. The discussions tended

to stay intellectual, with very little, if any, disturbance (Larson). However,

relatively recent changes in the availability of the Net have changed that

atmosphere. Now, almost anyone can access the Internet. Internet access is offered

by every major online service (Himowitz). The fact that the major online services

charge for their use keeps many people away from them. Those people simply

turn to public dial-ups, which are free connections offered by universities that are

available to the general public (Spencer).

     Because accessing the Net is easier, and a lot more people are doing it,

naturally the amount of information on the Net is increasing at the same rate, if not

faster. In what is often referred to by Net users as the Resource Explosion, the

amount of information circulating the Internet has increased with the number of

users (Jones). Of all the other factors contributing to the large percent of online

crimes, perhaps the most influential is the design structure of the Internet. Experts

agree that the underlying structure with no central hub, where each computer is

equally powerful, gives unchecked power to the undeserving (Miller). The design

also makes controlling the frequency of break-ins almost impossible as well. Both

politicians and so-called 'experts' believe the Internet as a whole will be regulated

in the next five years. Hackers disagree, using the arguments that the Internet was

designed to be uncontrollable, that the basic structure doesn't support regulation

(Banja). In a network run by its users, which is designed to be impervious to

attack, not even the government has much muscle there. In fact, the Internet is one

of the few places that the government has little power. Because the Net is

international, any regulations forced upon domestic computer users can be

circumvented by routing through an overseas computer(Savage). The government

doesn't have the power to completely shut down the Net. In order to do that, every

one of the millions of computers on the Net must be disconnected. Even if only

two remain, the Net will continue to exist (Miller).

     The ease of adding something to the Net is also a factor preventing the total

regulation of the Net. A new site can be added to the Net in a matter of seconds,

and can be removed just as...

Other Essays Like Computers, Hackers, And Phreaks

People Are Too Dependent on Computers

1155 words - 5 pages not trust computer for one reason, “Hackers.” A hacker is someone who accesses a computer system without authorization. The problem is that people depend on computers to carry on with important transactions; credit card or other type of personal information. Hackers can infiltrate in a computer network (e-commerce website) and get access to customer’s bank account and for hence steal or access top secret information (army) In addition, a

Cmgt441 Week 3 Cyber-Attacks Individual Paper

836 words - 4 pages Cyber-attacks are a major problem to businesses as well as home users, it is in every nook, and cranny in the world of computers and prevention is a major concern to all. Many websites have contracted viruses or denial of service attacks and some host malware. Unsuspecting visitors visit these sites and contracted the spyware, malware, or viruses to their own home computer. What can we do for this? Well, there are preventive measures that one

Hacking

4628 words - 19 pages exploring the details of computers and how to stretch their capabilities". Clear from the definitions mentioned above that there is a controversy that encounters the judgment and definition of hacking, controversy aroused because it's hard to decide exactly what the aim is behind hacking or how to know the mentality of the hacker. That's why the ethics and motivation of hackers should be paid attention and discussed then understanding the hacker will be

Personal vs Apple

1168 words - 5 pages hackers and virus writers have created more viruses for them than the Mac. Mac is not being targeted as much as personal computers so that is definitely an advantage. Mac’s are susceptible to viruses but there are just not as many out there. Once a personal computer receives a virus it can knock out your entire system therefore having a Mac could be an advantage. Mac computers are limited to upgrades and personal computers can be upgraded which

Pros and Con

645 words - 3 pages wants, the more costly it will be. The more inexpensive providers might not have good reception in a lot of areas and the areas they do get reception it usually is slow. Both WLAN and WIFI use radio waves to give access to the internet, the difference is that WLAN is a network of different computers all using basically the same server in an area of 100 feet, according to the website Difference between.net." A wifi is a trademark name to brand

Cyber Crime the New Age Devil

1279 words - 6 pages involvement of the medium mostly virtual one like computers and sometimes electronic such as mobile phones, in cyber crimes. In the first place, let us see few causes that make cyber crimes possible. 1. Storage of data in comparatively small space on a computer : This makes it easy to derive or steal or damage or manipulate the stored data. 2. Easy accessibility of data: Unauthorized access to data is possible by secretly implanted logic

Threats to Computer Security

1164 words - 5 pages , spikes, and brownouts), loss of communications, water outages and leaks, sewer problems, lack of transportation services, fire, flood, civil unrest, and strikes. 5. Malicious Hackers The term malicious hackers, sometimes called crackers, refers to those who break into computers without authorization. They can include both outsiders and insiders. Much of the rise of hacker activity is often attributed to increases in connectivity in both

Kosovo 1999: the First Cyberwar

858 words - 4 pages Kosovo 1999: The First Cyberwar Kosovo 1999: The First Cyberwar Up until now, wars and conflicts have been fought on domestic and foreign battlefields. As computers become more essential to our daily lives, they also become the new battlegrounds of a new type of war-“cyberwar”. With the rapid progression of technology, wars are no longer only fought with rifles and bombs but with scripts and codes. Although the definition and guidelines of

Full Time

1771 words - 8 pages (small businesses included). When quantum computers become more main stream, there is a matter of data security and how to prevent hackers on traditional computer systems. The security of traditional computers will not be able to hold against an attack whether it’s a personal or business. As newer technology moves out the traditional systems, the requirement for a system to discretely pass information is mandatory. Quantum Cryptography It was

Computer Crime

3143 words - 13 pages literally addicted to computer technology and hacking itself like an addict is to drugs. Due to these obsessive behavioral patterns it is not surprising that many of these types of hackers are coincidentally hooked on illicit drugs too. Who Does the Problem Affect? Since the 1950¡¦s, technology has skyrocketed raising the capability of computers along with it. In turn computer crime has also evolved at the same rate from mere phone phreaking, to

Firewall N Vpn

999 words - 4 pages Stephy Stitt Firewall/VPN Project 1 August 24, 2014 There are a number of risks on our network. Those risks are data confidentiality, data access and network issues. Our network has a router/firewall configuration. All files are kept on the network. The network can be accessed from home. The computers in the lab have direct access to the internet. All of these can invite potential threats at any time. The network allows potential

Related Papers

Hacking And Ethics Essay

1202 words - 5 pages , make an argument and critical judgement of the positive and negative aspects of hacking.The media uses the term 'hacker' to describe computer criminals whose motivations are sinister. However, in reality, hackers hack to gain knowledge about computers and security. They enjoy exploring the details and stretching the capabilities of programmable systems, unlike most users, who prefer to learn only the minimum necessary to operate them. Emmanuel

Botnet Zombies Essay

644 words - 3 pages Botnets are computer programs that are designed to take control of your computer without your knowledge. They are designed to infect computers and allow hackers to remotely control your computer via an Internet connection. Most users are unaware their computer has been hijacked because little evidence can be found that the computer is not working as expected. Once a computer has been compromised it is sometimes referred to as a bot or zombie

Critical Thinking Essay

531 words - 3 pages The topic I chose is people are too dependent on computers. The reason I chose this topic is after I read the topic I stopped to think and look around, and computers are everywhere and it would be interested to dig a little deeper to show just how dependent we are on computers. Also my grandmother just helped my cousin out of a recent situation where he lost his wallet with his drivers licence and bank cards and had no cash. My grandmother went

Heartbleed Bug Essay

601 words - 3 pages Computers and the software used to operate them in my opinion are the most fascinating tools created by man. As a result of the computer arise all kind of computer viruses and hackers which intrigued me even more so I decided to study in the field of network security. During this learning process, I would to obtain a vast knowledge of the different kinds of computer viruses; how these programs are written by hackers and the security programs