Вы находитесь на странице: 1из 5

HACKING AND CEACKING:

ABSTRACT:

Hacking is just like a cancer that has very dangerous effects on the
society. Today in this modern world, where measures have been taken to
improve the security level in the distributed systems hackers have found
a way to crack into systems and take away information. In this paper, I
will explain you few aspects of hacking that has caused of its existence
and few techniques through which we can minimize this.
What are the different issues and motivations that arise in a person that
he opts for hacking? Is money, thrill or something to break the rules
inspires the hacker to indulge into such acts are discussed in this paper.
This paper also gives you an insight to consider how important the
network security plays to avoid hackers to steal away information that is
very confidential. Measures are to be taken in order to remove these
possibilities.
In recent years we have seen a drastic change in the field of IT, where
electronic commerce, email, online shopping, online banking,
information bank of numerous data, software development has improved
leaps and bounds. As the technology has increased to new heights the
hackers have found a way to get easy money. They find ways to get into
government confidential files, personal banking details, steal away their
money from the banks, implant a Trojan or virus into different
computers to make them vulnerable to work. In this paper I have thrown
some light on hackers skills, their perspective, their targets.

This paper is a case study of a series of Windows Servers I have dealt


with over

The years that were the targets of malicious attacks and code.
Environments

range from an SMB business to a multi-national corporation to an ISP.


Operating

Systems include NT3.51, NT4.0, W98 and W2K Server and it spans a
period of

Eight years. This paper documents real-world cases, solutions, and cites

Relevant research. I highlight the differences of each attack/compromise


as well

the means of discovery, method of sterilization, and verification of


sanitization.

In addition I have encapsulated a historic perspective of the art of


hacking and

Cracking. My personal experience with computing, communications,


and

Networking closely parallel the evolution of the Internet, and I convey


some of my
own experiences along with the historic overview. I attempt to offer a
unique

Perspective of evolving technology and psychology in the world of the


Internet.

Abstract
Society relies heavily on technology for many things, but our use of
technology opens us up to become victims of cybercrimes, like computer
hacking. Hackers can be divided into three main categories: novice,
intermediate, and elite. Hacking has been in the information technology
(IT) field for a while. The first hackers appeared in the nineteen sixties
and hackers have continued to make progress since then. People hack for
a variety of reasons including ego, fun, knowledge, and profit. The first
major hacking program, SATAN, caused controversy in 1995, and
numerous hacking programs exist today. The future of hacking looks
bright because people will only continue to rely even heavier on
technology and as the IT field expands, so will the hacking community.

The threat from Hackers is complex which perhaps infects

Internal workings of a system, computers and computer

Networks in particular. The paper presents the potential risks

Associated by hacking analyzing different types of hacking and

Cracking like Inside Jobs, Rogue Access Points etc & its
Countermeasures like firewall, intrusion detection system and

Intrusion prevention system. Integrity Checkers, Virus

Construction Kits, and Rogue Access Points the paper has

Presented different motives behind hacking & cracking.

The Jargon Wikis first definition for hacker says: Hacker is a

person who enjoys exploring the details of programmable

systems and how to stretch their capabilities, as opposed to

most users, who prefer to learn only the minimum necessary,

whereas cracker is someone whose purpose is to circumvent or

break security measures. Some security crackers end up using

their powers for good, providing penetration testing services or

otherwise making efforts on the side of the angels.

Hacking is an attitude and practice surrounding the use, consumption,


and

production of computer-related work. I propose that the study of hacking

behaviors is an intriguing alternative to the institution-based work in


science and

technology that dominates STS discourse. In this paper, I show how


characteristics of hacking are found in a multitude of domains, starting
with

canonical computer hackers at MIT 1965-1985, and show similarities to


rural car

users at the beginning of the century and radio hams 1900-1975. I


conclude that

the key features of hacking are that it happens in a social context, that it
has an

irreverent attitude to the technology, that it is concerned with hands-on


ways of

knowing and learning and that is generally performed by males

Вам также может понравиться