Internet Hacking

Topics: Internet, Domain Name System, IP address Pages: 5 (2136 words) Published: November 16, 2005
Imagine this, anyone, anywhere has the ability to connect to almost every computer in the whole world without even leaving this own home. Most of these computers are connected to the Internet which is, with the Internet's growing popularity and widespread usage, one of the most susceptible targets to the continually growing hacking movement. The term hacker has caused much debate in regards to the actual meaning of it, but hacking by any definition is the art of thinking outside the box. In order to be a great hacker there is not necessarily a ton of technical computer knowledge that one must know, but more the less one must be creative and have an open mind and try to think outside of the box. Another big debate within the hacking movement is the argument that is there a difference between a hacker and a cracker. It is said to be that a hacker is one who uses their skill for the good of society and a cracker uses this same skill maliciously in the destruction of society. Be it a hacker or a cracker they still have the same rare skill but just choose to use it in different ways. The hacking culture does not have leaders, it is built strictly on reputation. Those who think outside the box are usually very brilliant in several different areas. These ways do not just consist of hacking, but also in phreaking, virii, and crypto. Of course everyone already understands the definition of hacking but not many people have heard of phreaking, virii, or crypto. Phreaking is hackings the public telephone network. Virii is the plural of virus and means computer virus. Most people do not realize that virii really have nothing to do with hacking but are used very commonly in hacking. Crypto is the abbreviation of cryptography. An encryption algorithm is a complex mathematical and logical equation used to cipher data. The algorithm is used to convert the ‘clear text' into the ‘cipher text'. There are two types of data encryption password hashing and VPNs. Password hashing is when the Computer hacking can be categorized into three distinct genres, such as on-site access, which is being inside the confines of the network. Also there is access by dial-up, which is using a modem to dial into another computer's modem. Finally there is gaining access through the internet. On-site hacking can be easily found in most of the hacking texts present, whether it is on the Internet or in the computer section at any bookstore. Most of these texts also focus on dial-up hacking. It still remains extremely difficult to find information on Internet hacking because the internet has only been around for thirty years, unlike dial-up which has been around for a long time. Before anyone tries to start hacking they will need a variety of items. They will need a computer and an ISP. Preferably the ISP account should not be attached to the hacker. Hackers also utilize a whole lot of software, a Internet browser, a telnet client, a FTP client, a ping utility, a IP scanner, a port scanner, a whois and nslookup utility, a traceroute utility, and a password cracker. Internet browsers are very important and before even beginning to understand how to hack one must know a great deal about how they work. The only truly important thing about the Internet browser chosen is the fact that is must support proxies, and preferably gopher. The telnet client is an extremely important part of hacking because it is the hacker's primary means of connecting to other computers. Telnet clients are found within almost any OS. FTP clients are built into almost every OS and are used to transfer files between two computers. The ping utility is used to test the connection between two computers. A successful ping might look like FIGURE 1 while an unsuccessful ping might look like FIGURE 2. The ping utility can be change the size of the packet and number of packets. IP scanners ping a certain range of IP addresses. These however are not built into the OS...
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Essay about The Good the Bad to Hacking
  • Ethical Hacking Essay
  • Most Common Internet Server Operating Systems Essay
  • Hacking Research Paper
  • Rogerain Essay on Computer Hacking
  • Research Paper Computer Hacking
  • Ethical Hacking Essay
  • Internet Technology Essay

Become a StudyMode Member

Sign Up - It's Free