Tuesday, March 23, 2010

Computer Hacking

The term hacker has a double meaning within the field of computing. A hacker can be an expert computer programmer who creates complex software and hardware. These hackers are experts in the field of computing and have achieved a certain elite status within their field. The other commonly known meaning of the word is someone who breaks into computer security networks for his own purpose.

The media has perpetuate the more exciting connotation of the word hacker with films and books on the subject. Films such as War Games expose breaking into the Pentagon’s security system as similar to playing a computer game. A film about the computer hacker designing a software system would probably not do very big business at the box office.

A hacker who who breaks into systems primarily to steal is not regarded as a computer expert, although she can be. A hacker within the professional world of computing is regarded as a professional computer expert within his field. In the professional computing world, a hacker can be a computer and network security expert. She can also be a highly skilled software programmer or a hardware modifier. The type of hacker who breaks into bank accounts or a company’s network does exist, but the meaning is entirely different from that of a professional hacker.

The stereotypical image of a computer hacker, as portrayed by the media, is one of a shadowy figure, alone at a computer, stealing secrets and money. This type of computer hacking can bring rewards, but it can also bring huge fines and prison sentences. Thanks to the media, the average person is likely most proverbial with this definition of a computer hacker.

It is true that computer crime is on the increase, but it mainly takes the form of computer fraud. People are duped into giving out their bank and personal details after receiving bogus emails. This is not computer hacking, as it does not involve an attempt to break into a computer’s software system.

It is not on the whole difficult to gain access to someone’s email password. There are many Internet sites that claim to be able to gain access for a fee. However, these sites usually work by sending bogus emails asking the addressee to verify passwords for security reasons. This is not real computer hacking.

A real hacker in the field of computer security is someone employ to stop any unauthorized access to a network’s security system. If someone tells you that he is a computer hacker, it is not automatically a bad thing. He may be able to help upgrade your computer as a substitute of breaking into it.


Computer hacking is the practice of modifying computer hardware and software to complete a goal outside of the creator’s original rationale. People who engage in computer hacking activities are often called hackers. Since the word “hack” has long been used to describe someone who is incompetent at his/her profession, some hackers claim this term is offensive and fails to give appropriate recognition to their skills.

Computer hacking is most common among teenagers and young adults, although there are many older hackers as well. Many hackers are true technology buffs who enjoy learning more about how computers work and consider computer hacking an “art” form. They often enjoy programming and have expert-level skills in one particular program. For these individuals, computer hacking is a real life application of their problem-solving skills. It’s a chance to demonstrate their abilities, not an opportunity to harm others.

Since a large number of hackers are self-taught prodigies, some corporations actually employ computer hackers as part of their technical support staff. These individuals use their skills to find flaws in the company’s security system so that they can be repaired quickly. In many cases, this type of computer hacking helps prevent identity theft and other serious computer-related crimes.

Computer hacking can also lead to other constructive technological developments, since many of the skills developed from hacking apply to more mainstream pursuits. For example, former hackers Dennis Ritchie and Ken Thompson went on to create the UNIX operating system in the 1970s. This system had a huge impact on the development of Linux, a free UNIX-like operating system. Shawn Fanning, the creator of Napster, is another hacker well known for his accomplishments outside of computer hacking.

In association to those who develop an interest in computer hacking out of simple logical curiosity, some hackers have less noble motives. Hackers who are out to steal personal information, change a corporation’s pecuniary data, break security codes to gain unauthorized network access, or conduct other destructive activities are sometimes called “crackers.” This type of computer hacking can earn you a trip to a federal prison for up to 20 years.
If you are interested in protecting your home computer against malicious hackers, investing in a good firewall is highly recommended. It’s also a good idea to check your software programs for updates on a regular basis

No comments:

Post a Comment