Thesis statement: Computer Hacking satisfies obsession for forbidden information and exploitation of skills. I. General Consideration
Hacking has been around for more than a century. At first, the term “hacker” was a positive term for a person with a mastery of computers who could push programs beyond what they were designed to do. But because of the exploitation of these knowledge and the obsession to forbidden information, it soon became a threat to computer technology. The root of computer hacking was dated back in the early 1960’s by a group of university students, especially in M.I.T. and Stanford. II. Statement of the Problem
The researcher wants to know the answers to these following inquiries: A. What is hacking? A hacker?
B. What are the different types of hackers?
C. Why do hackers hack?
D. What are the basic principles of a hacker?
E. What are the negative effects of hacking in the society? F. What are the ways to minimize potential for hacking? III. Objectives of the Problem
A. To know more about hacking and hackers.
B. To educate people about the negative effects of hacking. C. To prevent hackers in manipulating private information. D. To observe the effect of computer hacking in the modern world. IV. Importance of the Problem
I choose this topic because as an IT student, this will be very helpful in my studies since this is related to my course and the benefits that I can get from this is I will be knowledgeable about the facts in computer hacking so that I will be able to fight hackers as part of my future occupation. Another reason is so that since I will be knowledgeable, I can educate people about its dangerous effects it can cause us and to find a solution for it. V. Definition of Terms
A, Hacking - intruding into computer systems by stealth and without permission or any crime committed with, by, through, or against a computer. B. Hacker - A person who enjoys exploring the details of programmable systems and how to stretch their capabilities, as opposed to most users, who prefer to learn only the minimum necessary. C, Webpage - A Web page is what you see on the Net. One page with text and graphics. These can be about anything the author of the page wants it to be about. D. Software - Software is a general term for the various kinds of programs used to operate computers and related devices. E. Programming - creating a sequence of instructions to enable the computer to do something. F. Cracking – the art of decoding something.
G. Cracker - is someone who breaks into someone else's computer system, often on a network; bypasses passwords or licenses in computer programs; or in other ways intentionally breaches computer security. H. Filters - A program that accepts a certain type of data as input, transforms it in some manner, and then outputs the transformed data. I. Computer System - A set of related but unconnected components (hardware) of a computer or data-processing system. J. Install – to place or to put something in the computer for use. K. The Pentagon - a five-sided building in Arlington, Va., in which the main offices of the U.S. Department of Defense are located; hence, the U.S. military establishment. L. Patches - is a quick-repair job for a piece of programming. M. Ethics - A theory or a system of moral values. N. Server - A computer that processes requests for HTML and other documents that are components of web pages. O. Virus - an unsanctioned and self-replicating program which, when activated, corrupts a computer's data and disables its operating system. DISCUSSION
A. What is hacking? A hacker?
Today the term...