This website uses cookies to ensure you have the best experience. Learn more

Hacking Essay

576 words - 3 pages

Dr. Steve Johnsom
Weak or strong the all fall sometimes.
Nowadays, Internet hacking is the most dangerous things that may happen to you. Some people could think that their password is secured however, for other it is just a matter of time to hack into your system and turn your life into a mess.
This research has proved me that most people think their live is secure, their password is save, on the other hand some of them thought that they might even find themselves hack someday. Today, I tried to hack into the system of three of my closest friends. The first one was an Email password, the other one was an online Banking, the last but not least was putting you in your friend mind and tried to figure out his Facebook password.
Password cracking is the process of ...view middle of the document...

There are many way of doing so just a manner of time and wisdom.
For instance, let take a look of the most social network uses this day. Facebook; is an online social networking service, that helps you to keep up with friends faster than ever, see what your friends are up to, allow you to share updates, photos and videos and so one. According to Henris levis; a social network researcher, he stated that there is 1.15 billion of people that frequently use Facebook almost every day. According to him, there is at least one of them every single minute that have been hack in without even notice. We share our lives on Facebook. We share our birthdays and our anniversaries. We share our vacation plans and locations. We share the births of our sons and the deaths of our fathers. We share our most cherished moments and our most painful thoughts. We divulge every aspect of our lives. But we sometimes forget who is watching.
Password, weak or strong the all fall sometime into the hand of a hacker or a programmer. Likewise, my friends and I thought that we had a secure and uncracking password, I proved them wrong by hacking their account without their knowledge. We use Facebook as a tool to connect, but there are those people who use that connectivity for malicious purposes. We reveal what others can use against us. They know when we're not home and for how long we're gone. They know the answers to our security questions. People can practically steal our identities and that's just with the visible information we purposely give away through our public Facebook profile.
The scariest part is that as we get more comfortable with advances in technology, we actually become more susceptible to hacking. This paper had showed how strong or weak may appear to be our password we might be a victim one day. Hopefully, this will show you how to prevent it from happening to you by not trusting the internet and not even revealing it to someone else.

Other Papers Like Hacking

Internet Hacking Essay

965 words - 4 pages : UNIX SYSTEMS ARE QUITE COMMON SYSTEMS ACROSS THE COUNTRY. THEIR SECURITY APPEARS AS SUCH: LOGIN; (OR LOGIN;) PASSWORD: WHEN HACKING ON A UNIX SYSTEM IT IS BEST TO USE LOWERCASE BECAUSE THE UNIX SYSTEM COMMANDS ARE ALL DONE IN LOWER- CASE. LOGIN; IS A 1-8 CHARACTER FIELD. IT IS USUALLY THE NAME (I.E. JOE OR FRED) OF THE USER, OR INITIALS (I.E. J.JONES OR F.WILSON). HINTS FOR LOGIN NAMES CAN BE FOUND TRASHING

Hacking To Peaces Essay

1404 words - 6 pages The 'Information Superhighway' possesses common traits with a regular highway. People travel on it daily and attempt to get to a predetermined destination. There are evil criminals who want to violate citizens in any way possible. A reckless driver who runs another off the road is like a good hacker. Hacking is the way to torment people on the Internet. Most of the mainstream hacking community feel that it is their right to confuse others for

Phising and Hacking

1256 words - 6 pages Content 1. Hacking & Phishing 2. What is hacking? 3. How hackers discover your PC’s address? 4. How does a firewall work? 5. What is Phishing? 5.1 Introduction 5.2 Types of Phishing 5.2.1 Clone Phishing 5.2.2 Spear Phishing 5.2.3 Phone Phishing 1. Hacking & Phishing No, we're not talking about baiting the hook while you have a bad cold. Hacking and Phishing are two very different types of computer security threats. Hacking is an extremely

Hacking and Countermeasures

701 words - 3 pages 1. List five steps of the hacking process? 1— 2—Scanning 3—Gaining Access 4—Maintaining Access 5—Covering Tracks 2. In order to exploit or attacks the targeted systems, what can you do as an initial first step to collect as much information as possible about the targets prior to devising an attack and penetration test plan? I would do some reconnaissance such as look tough the trash for info on the network. This would allow me to gather

Teaching Hacking in College

1111 words - 5 pages hacking into networks. “Nuclear power plants and other industrial sites may be vulnerable to catastrophic attacks by a clever hacker who wants to wreak havoc by breaking into computer networks.” (Carnevale, 2005) Hackers will find vulnerabilities in firewalls and routers that will allow them to access private networks. Once within the network, hackers will be able use network sniffers to view traffic that is being passed across the network

Hacking Technologies Midterm Study Guide

3917 words - 16 pages Mid-term Exam Unit 1 Questions: 1. Explain the Morris Worm and its significance. It is considered to be the first Internet Worm. It was designed to count the number of systems connected to the Internet, however due to a flaw the worm replicated quickly and caused widespread slowdown across the globe. 2. Explain what____ hackers are. White-Hat- Those that know how hacking works but use skills for good Black-Hat – Those that through

Cause and Effect of Network Hacking

1042 words - 5 pages detected by victims, many of these crimes are never reported to authorities and partly because the losses are often difficult to calculate. A common example is when a person starts to steal information from sites, or cause damage to, a computer or computer network. This is the so-called “hacking”. Hacking is when someone attempts to defeat or exploit the security capabilities of a computer system. A person who hacks a network is called â

Case Study About Moral of Hacking

713 words - 3 pages Contemporary Practices in Information Technology 7WCM0005/7WCM0006 (SDL) Case Study - Coursework 1 The morality of hacking - Gary McKinnon – Did he break the British Computer Society Code of Conduct? Gary McKinnon was a Scottish Systems Administrator who in 2002 was accused of carrying out the “biggest military computer hack of all time”. McKinnon claimed that he was merely looking for evidence of a cover-up of Unidentified Flying

Hacking Techniques

859 words - 4 pages Dennis Abanga IS317 Project part 3 Investigate Findings on the Malware In the present day malware has changed in nature dramatically with the criminal element realizing the advantages of using it for more malicious purpose. In the past it was not uncommon for malware to be written as a prank or to annoy the victim, but times have changed, malware in the current day has been adopted by criminals for a wide array of purpose to capture

Ethical Hacking

635 words - 3 pages What are Header files?        Header file contains different predefined functions, which are required to run the program. All header files should be included explicitly before main ( ) function.Header files are also called as Pre-compiled header. Here is some C programming header files ... * <assert.h> * <complex.h>  * <ctype.h> * <errno.h>   * <fenv.h>  * <float.h>  * &lt

Chemistry

4728 words - 19 pages . Hacking Research Paper Hacking Describe a negative aspect of ICT’s impact on the information society. Describe how ICT has brought this about and what society is has done in response to it.  Abstract Hacking has been and still disease different societies suffer from. The essay aims to provide the reader with knowledge regarding the effects hacking caused to our society, and how the society responded and tried to solve or minimize

Related Essays

Ethical Hacking Essay

1144 words - 5 pages Chapter 1 Ethical Hacking Overview    Describe the role of an ethical hacker Describe what you can do legally as an ethical hacker Describe what you cannot do as an ethical hacker Hands-On Ethical Hacking and Network Defense 2  Ethical hackers  Employed by companies to perform penetration tests  Penetration test  Legal attempt to break into a company’s network to find its weakest link  Tester only

Ethical Hacking Essay

1344 words - 6 pages What is Ethical Hacking Ethical hacking provides a way to determine the security of an information technology environment – at least from a technical point of view. As the name ethical hacking already tells, the idea has something to do with hacking. But what does “hacking” mean “The word hacking has two definitions. The first definition refers to the hobby/profession of working with computers. The second definition refers to breaking

Ethical Hacking Essay 879 Words

879 words - 4 pages As the internet is growing there has been a higher demand for network security. With the higher demand comes a new form of job known as ethical hacking. An ethical hacker is a person that conducts penetration testing on networks to test the integrity of a network for any given business or corporation (White hat (computer security)). With this technique, corporations and businesses will have the assurance they need for protecting their personal

Ethical Hacking Essay 6482 Words

6482 words - 26 pages Ethical hacking by C. C. Palmer The explosive growth of the Internet has brought many good things: electronic commerce, easy access to vast stores of reference material, collaborative computing, e-mail, and new avenues for advertising and information distribution, to name a few. As with most technological advances, there is also a dark side: criminal hackers. Governments, companies, and private citizens around the world are anxious to be a part