ny instantly loses $300. Three hundred dollars may not seem to be that much money for one instance. However, if 1,000 people copy this same package, then the company is out $300,000 which is a large amount of loss in profits.Data theft is another way of committing a computer crime. For example, if an office manager of a stock law firm obtained merger and acquisition information from one of the company's files, he could then use that information to trade the securities of the companies involved with the merger. In this case, the criminal would make millions of dollars from trading the related securities, and the companies could end up at a huge loss.Output theft commonly occurs when information is taken from another's printout or screen. This information is then used to profit unfairly.Various techniques are used to commit computer crimes including a trapdoor, round down, salami, masquerading, and eavesdropping.A trapdoor is a set of computer instructions that will let a user bypass the system's normal controls. It is usually used during system development and removed before system operation. If the trapdoor is left in place, it is done so in order to allow access to the system easily.The round down technique takes advantage of financial institutions, more specifically those that pay interest. A user of the financial institutions system, such as a knowledgeable band teller, can program instructions into the businesss system that will round down all interest calculations to two decimal places instead of carrying out half cents or even smaller amounts of pocket change. The user then can deposit the difference into their account. While this may not seem very profitable, the fractional cents add up very quickly.The salami technique is also used to steal money in small amounts. For example, an accountant could use a computer to increase production costs by a fraction of a percent every few months and deposit the difference into a dum...