In the emerging economy there is a new infrastructure, based on the internet, that is causing us to scrutinies most of our assumptions about the business. As a skin of networks - growing in ubiquity, robustness, bandwidth, and function - covers the skin of the planet, new models of how wealth is created are emerging.

Thursday, June 23, 2011

What is Computer Hacking?

Hacking, in computerese, is the obsessive use of computers, or the unauthorized access and use of networked computer system. Illegal hackers (also called crackers) frequently assault the internet and other networks to steal or damage data and programs.

One of the issues in hacking is what to do about a hacker who commits only electronic breaking and entering: that is, gets access to a computer systems, reads some files, but neither steals nor damages anything.

This situation is common in computer crime cases that are prosecuted. In several states, courts have found that the typical computer crime statute language prohibiting malicious access to a computer system did apply to anyone gaining unauthorized access to another’s computer networks.

Hackers can monitor E-mail, Web server access, or file transfer to extract passwords or steal network files, or to plant data that will cause a system to welcome intruders. A hacker may also use remote services that allow one computer on a network to execute programs on another computer to gain privileged access within network.

Telnet, an internet tool for interactive use of remote computers, can help hackers discover information to plan other attacks. Hackers have used telnet to access computer E-mail port, for example, to monitor E-mail messages for password and other information about privileged user accounts and networks resources.

These are just some of the typical types of computer crimes that hackers commit on the internet on a regular basis. That is why internet security measures like encryption and fire walls, are so vital to the success of electronic commerce and other E-business applications.
What is Computer Hacking?

The most popular articles

My Blog List