Computer Hackers

Topics: White hat, Hacker, Black hat Pages: 2 (722 words) Published: March 27, 2012
The sub culture group of hackers has been around since the 1960s. The underground sub culture of hacking has evolved into a mainstream open community. Some famous hackers like Eric Corlery, Gordon Lyon, Gary McKinnon, and Kevin Mitnick have done their fair share of infiltrating network bases all over the United States. These people have a unique mindset that allows them to crack these codes set up by government officials. Eric Raymond tries to classify this group of people as crackers because they crack codes of computers but the community wanted to keep the name hackers. Regardless of the name the community of people is smart and can break down your computer at anytime. A hacker is a person who finds a weakness in a system and exploits it. Some motivation for hackers can be money, challenge, or pure adrenaline rush. There is a difference between a cracker and a hacker. Crackers are normally considered when people are involved with computers. There are several types of hackers all over the world. White hat hackers breach security for no reason at all. The term white hat means ethical hacker. A black hat hacker breaks into secure networks to destroy data or to make the networks not useable for those who are allowed to use it. Black hat hackers have a process called pre hacking to help them determine which network to hack. The hacker first looks for an open port to gain access to. After that is done the hacker will find ways to get vital information about the network to get into the system. Hackers will even go above and beyond to engage activities like dumpster diving. Dumpster diving is when people actually dive into a dumpster to get information like documents that can help them breakdown the network. A grey hat hacker is a combination of white hat hacker and black hat hacker. A grey hat hacker will surf the internet just to crack the network and charge the administrator to set up a firewall. Basically the hacker sets up the administrator...
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • The Past, Present and Future of Computer Hacking Essay
  • Computer Hacking Essay
  • Rogerain Essay on Computer Hacking
  • Essay on Anonymous hackers
  • How Has Computer Hacking Interfered Modern Society? Essay
  • hackers Essay
  • Computer Ethics Essay
  • Computer Hacking Essay

Become a StudyMode Member

Sign Up - It's Free