Tuesday, April 19, 2011

Hacking By Sally Bannoura

Hacking

     Today more and  more softwares are developing and people are getting more and  more options in their present softwares. But  many are not aware that they are being hacked without their knowledge.
Computer hacking is the most popular form of hacking nowadays, especially in the field of computer security, but hacking exists in many other forms, such as phone hacking, wireless hacking and etc.

Computer hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose. People who engage in computer hacking activities are often called hackers. Since the word “hack” has long been used to describe someone who is incompetent at his/her profession, some hackers claim this term is offensive and fails to give appropriate recognition to their skills.
Computer hacking is most common among teenagers and young adults, although there are many older hackers as well. Many hackers are true technology buffs who enjoy learning more about how computers work and consider computer hacking an “art” form. They often enjoy programming and have expert-level skills in one particular program. For these individuals, computer hacking is a real life application of their problem-solving skills. It’s a chance to demonstrate their abilities, not an opportunity to harm others.(wiseGEEK 2011)

There are three types of hackers:
● Black-Hat Hackers: or crackers are individuals with extraordinary computing skills, resorting to malicious or destructive activities. They use their knowledge and skill for their own personal gains probably by hurting others.
● White-Hat Hackers: Are those individuals professing hacker skills and using them for defensive purposes. This means that the white hat hackers use their knowledge and skill for the good of others and for the common good.
● Grey-Hat Hackers: These are individuals who work both offensively and defensively at various times. We cannot predict their behavior. Sometimes they use their skills for the common good while in some other times they use them for their personal gains.(Seminar Report, Ethical hacking, 2009)

Damage that a Hacker can do depend upon what backdoor programs are hiding on your PC. Different programs can do different amounts of damage. However, most allow a hacker to smuggle another program onto your PC. This means that if a hacker can't do something using the backdoor program, he can easily put something else onto your computer that can. Hackers can see everything you are doing, and can access any file on your disk. Hackers can write new files, delete files, edit files, and do practically anything to a file that could be done to a file. A hacker could install several programs to your system without your knowledge. Such programs could also be used to steal personal information such as passwords and credit card information.(Boloji 2011)

From my study search of hacking I noticed that the first advantage of hacking is that it can be used to recover lost information when the computer password has been lost, while on the other hand it teaches us that no technology is 100% secure. On the contrary, I found two important disadvantages of hacking; the first one is that criminals can use it to their advantage to steal information and passwords. The second one is that it can harm someone's privacy. (Mr. Majd Bannoura confirmed this by e-mail on 15 March 2011)

There are some steps that each person must follow in order to avoid others from hacking them. First of all, never post your IP address in a public place. Second, always run your  Firewall and Antivirus programs first. Third, when you are not using your computer, disconnect it from the Internet.

References:

·         whatishacking.org,  Computer software n.d. Available from:<http://whatishacking.org/>
·         wiseGEEK 2011, Computer hacking. Available from:< http://www.wisegeek.com/what-is-computer-hacking.htm>
·         Seminar Report, Ethical hacking, 2009. Available from:<http://www.scribd.com/doc/19124698/Seminar-Report>
·         Boloji.com 2011, Computing Internet Security. Available from:<http://www.boloji.com/computing/security/020.htm>  {3 April 2011}
·         Mr. Majd Bannoura, 2008,  Pers.comm., 15 March.
·         InfoHQ  2008, Avoiding Hackers. Available from:<http://www.infohq.com/Computer/Spam/avoid-spam-hackers.htm>. {7 November 2008}

No comments:

Post a Comment