Preview

Hacking

Good Essays
Open Document
Open Document
4142 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Hacking
Hacking

Contents ~~~~~~~~ This file will be divided into four parts:

Part 1: What is Hacking, A Hacker's Code of Ethics, Basic Hacking Safety Part 2: Packet Switching Networks: Telenet- How it Works, How to Use it, Outdials, Network Servers, Private PADs Part 3: Identifying a Computer, How to Hack In, Operating System Defaults Part 4: Conclusion- Final Thoughts, Books to Read, Boards to Call, Acknowledgements

Part One: The Basics ~~~~~~~~~~~~~~~~~~~~ As long as there have been computers, there have been hackers. In the 50's at the Massachusets Institute of Technology (MIT), students devoted much time and energy to ingenious exploration of the computers. Rules and the law were disregarded in their pursuit for the 'hack'. Just as they were enthralled with their pursuit of information, so are we. The thrill of the hack is not in breaking the law, it's in the pursuit and capture of knowledge. To this end, let me contribute my suggestions for guidelines to follow to ensure that not only you stay out of trouble, but you pursue your craft without damaging the computers you hack into or the companies who own them.

I. Do not intentionally damage *any* system. II. Do not alter any system files other than ones needed to ensure your escape from detection and your future access (Trojan Horses, Altering Logs, and the like are all necessary to your survival for as long as possible.) III. Do not leave your (or anyone else's) real name, real handle, or real phone number on any system that you access illegally. They *can* and will track you down from your handle! IV. Be careful who you share information with. Feds are getting trickier. Generally, if you don't know their voice phone number, name, and occupation or haven't spoken with them voice on non-info trading conversations, be wary. V. Do not leave your real phone number to

You May Also Find These Documents Helpful

  • Powerful Essays

    • Take reasonable care not to put other people, including other employees and members of the public at risk by what you do or don’t do at work…

    • 5393 Words
    • 22 Pages
    Powerful Essays
  • Satisfactory Essays

    Nt1310 Final Exam

    • 393 Words
    • 2 Pages

    The Motives Behind Hacking: Vandalism, Public Interest, Reveal Wrongdoing, Financial Gain, As a Protest, The Challenge (fun).…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Unit 4222-208

    • 2924 Words
    • 12 Pages

    • Take reasonable care not to put other people, including other employees and members of the public at risk by what you do or don’t do at work.…

    • 2924 Words
    • 12 Pages
    Powerful Essays
  • Satisfactory Essays

    •act within your competence and not take on anything you do not believe you can safely do.…

    • 409 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Computer Memory Hacking

    • 820 Words
    • 2 Pages

    of reasons that one might participate in hacking the memory of a computer system. One reason…

    • 820 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Unit 205

    • 2786 Words
    • 12 Pages

    not act or fail to act in a way that results in harm act within your competence and not take on anything you do not believe you can safely do.…

    • 2786 Words
    • 12 Pages
    Powerful Essays
  • Good Essays

    Nvq Level 3

    • 687 Words
    • 3 Pages

    Take reasonable care not to put other people, including other employers and members of the public at risk by what you do or don’t at work.…

    • 687 Words
    • 3 Pages
    Good Essays
  • Better Essays

    The information was gathered about this “hack” though Edward Snowden (Savage, et al 4). Snowden is a former NSA contractor, who has leaked over 200,000 documents to the press. Recently, Snowden is involved in the huge news story about the NSA hacking into Google and Yahoo and collecting data about millions of account users of these networks. He leaked stories to The Guardian and The Washington Post during his NSA career, because he knew something was happening that needed told to the public. They are supposed to protect our country by bringing in information to help take down potential or current terrorist threats, and, instead, the government is wasting money to have them spy on innocent citizens. So far there’s not even a good reason to it, because not every single person who owns a phone or computer is a threat. Some use these things to do homework and talk to people, without the worry of someone tracking their information and keeping it in data centers “just in case.” It’s all very…

    • 1637 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    Make sure you know what you are doing; before taking on or completing a task. Make sure you understand the task and are capable of completing what has been asked if you can or have completed it before. Nobody will think less of you for being careful and they will help stand by and teach you the task in hand.…

    • 363 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    always act within your own competence and do not do something which you can not do safely…

    • 531 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Unit 8

    • 3776 Words
    • 12 Pages

    Ensure to take reasonable care not to put other people at risk including fellow employees and members of the public at risk by what you do or don’t do I the course of your work…

    • 3776 Words
    • 12 Pages
    Powerful Essays
  • Good Essays

    7 army values

    • 806 Words
    • 4 Pages

    Show concern for and make an effort to check on the safety and well-being of others.…

    • 806 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Hacking Into Harvard

    • 589 Words
    • 3 Pages

    As described by Harvard Dean Kim B.Clark, the applicants who hacked were said to be unethical and lack of integrity. Harvard also concluded that these potential students are not tomorrow’s leaders and Harvard only wants to educate honorable leaders with sense of righteousness and morality which they do not possess. (Gloeckler.G and Merritt.J, 2005) Due to their unethical actions, they have lost the trust that people used to have on them and it would be very difficult to gain back them again. For example, other universities that the applicants might doubt whether the applicants would repeat their actions again or companies which these applicants apply jobs to might also worry if they would hack into their system to acquire confidential documents.…

    • 589 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Take a trip down memory lane with these top cyber films. Designed for computer buffs, these movies range from spy thrillers to cyber crime movies. They were selected based on their excellent plot lines and portrayals of technology. Unlike typical movies, these films use computers the way they are actually used in real life with a few exceptions.…

    • 598 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Lab 7 Ethical Hacking

    • 293 Words
    • 2 Pages

    In this lab, you used AVG AntiVirus Business Edition to identify the viruses, worms, Trojans,…

    • 293 Words
    • 2 Pages
    Satisfactory Essays