More coursework: 1 - A | B | C | D | E | F | G | H | I - J | K - L | M | N - O | P - S | T | U - Y

Essay on hacking

Essay On HAckingby Philip smith

A topic that i know very well is computers and computer hacking. Computers

seem very complicated and very hard to learn, but, if given time a computer can be very

useful and very fun. Have you ever heard all of that weird computer terminology? for and

example, Javascript. Javascript is basically a computer language used when programming

internet web pages. Have you ever been on the internet and seen words go across the

screen or moving images? This is all done by the Java language. If you don not see

moving images then its because your web browser cannot read javascript. If you don't

know what a web browser is then I will tell you, a web browser is simply a tool used to

view the various websites on the internet. All web browsers are different, some only

interpret html language, which is another programming language used to design web page

and then there are some browsers that can play videos and sounds.

Have you ever wondered why when you want to go to a website you have to type

http://name of site.com? well I have been wondering for ages but still can't figure out, but

sometimes you type ftp:// before the name of the site. This simply means File transfer

protocol. You use this when download image files or any other files. Now, onto

hacking. Most people stereotype people simply as "HACKERS," but what they don't

know is that there are three different types of computer whizzes.

First, there are hackers. Hackers simply make viruses and fool around on the

internet and try to bug people. They make viruses so simple. The get a program called a

virus creation kit. This program simply makes the virus of beholders choice. It can

make viruses that simply put a constant beep in you computer speakers or it can be

disastrous and ruin your computers hard-drive. Hackers also go onto chat rooms and

cause trouble. Chat rooms are simply a service given by internet providers to allow

people all over the world to talk. As I was saying, Hackers go into these rooms and

basically try to take over because in chat rooms there is one person in control. This

person has the ability to put you in control or simply ban you. These hackers use

programs that allow them to take full control over any room and potentially, make the

computers on the other side overload with commands which in end, makes their computer

collapse.

Another type of computer whiz is called a cracker, crackers are sort of malicious.

Crackers use security programs used by system operators for evil purposes. System

operators use these programs to search the net for any problems, but they can be used for

other purposes. When Crackers get into systems they usually just fool around but never

destroy things.

The last computer whiz is called a phreaker. Don't let the name fool you,

phreakers are very malicious and will destroy any information found when breaking into a

system. The phreakers use the same techniques as crackers but they go a step further.

When into systems, phreakers usually plant viruses and steal information.

Now that you know some important things about computers and the internet it will

take you no time to surf the web. But remember, never get into hacking, cracking and

phreaking because no matter how much you know about computers you should never use

it for malicious purposes.



About this resource

This coursework was submitted to us by a student in order to help you with your studies.


Search our content:


  • Download this page
  • Print this page
  • Search again

  • Word count:

    This page has approximately words.


    Share:


    Cite:

    If you use part of this page in your own work, you need to provide a citation, as follows:

    Essay UK, Essay On Hacking. Available from: <https://www.essay.uk.com/coursework/essay-on-hacking.php> [27-05-20].


    More information:

    If you are the original author of this content and no longer wish to have it published on our website then please click on the link below to request removal: