Student: Carrera, Adolfo D.
Professor: Weidman, Elizabeth
CIS 106 (Introduction to Information Technology)
5/17/15
Hacking of random access memory (RAM) is a very basic idea. Hacking itself is defined as using a computer to gain unauthorized access to data within a system. Another way of defining hacking is the crashing a computer system. Following below is some information of how hacking RAM is useful as well as commonly used programs used by so-called ethical hackers.
One such program is called metasploit. This program is used by cyber security personnel to help advise clients of possible vulnerabilities against their own systems. Metaslpoit is owned by Rapid7, who provides security data and analytic …show more content…
Nmap now in version 4.0 is an open source scanner. It test can test your firewall and network applications whether hidden or not. Nmap also tests the intrusion detection system (IDS). Nmap is fairly easy to use and a simple scan just scratches the surface of the capabilities the program can do for you in a network vulnerability scan. There is also a website dedicated to the commands you can enter into nmap and usage scenarios that you may encounter. At the very core, nmap uses a system of 11 scan techniques, all with different customizations (Fellinge 2006). The newer version of nmap allows users now to run the make certain changes to the program without having to restart the application, this new feature sets a milestone in the online hacking …show more content…
Just never log on to your computer and never connect it to the internet. So while simple yes, you cannot do that as it would defeat the purpose of owning a PC or having a company with many of them. There are free programs out there that may help from your computer from being hacked. One program is the Microsoft baseline security analyzer (MBSA). Another program is Sysinternals, there are also some security programs build into the windows OS which are NetBIOS and TCP/UDP. A good practice to prevent hacking is to have multiple security programs working hand in hand with each other. Which in turn may make your computer possible harder to crack into and thus making a hacker possibly turn his attention elsewhere. Installing multiple firewalls around vulnerable programs also helps against being a soft target for hackers. Having to crack through or maneuver around them. You have to be continually testing your network and system to ensure that you have no cracks in your armor. Staying vigilante would be another good practice to partake in to help combat your computer being hacked into. You should always want to stay one step ahead of anyone trying to crack your