Paper Details  
 
   

Has Bibliography
3 Pages
840 Words

 
   
   
    Filter Topics  
 
     
   
 

Computer Crime

e hackers are based in a place 20 miles outside of Moscow. Since these attacks happen during the day, 5am-8pm Moscow time, the FBI believes these individuals are working out of an office. Many believe that these hackers are working for the Russian Government, and are using espionage to gain access to sensitive information.Although these hackers motives were to sabotage and destroy, not all hackers are like this. Most are just after information, they might make a mistake now and then but most do not cause damage. Enclosed in this paper is Mentor's Last Words. Something that Mentor wrote because he felt people should hear it. He was tired of people mislabeling and mis-judging his kind. He wanted to show the world that the newspapers, magazines, and radio stations were not right. Hacker was a term originally given to those who went in search of knowledge inside other peoples computers. They did not cause any damage, they just wished to learn more. A Phreaker is a person that has extensive knowledge of the phone system. These people spend hours reading text documents and browsing around phone companys computers. Most phreakers will say that what they do is for the pursuit of knowledge, which is true, but there are always those people that take advantage of things. Some things that phreakers can do are, make free calls from payphones, enable call waiting, caller id, call conferencing, and receive no phone bills. They also know how to make phone calls using other peoples telephone lines, charging them instead of themselves. The last group of computer criminals, and probably the easiest to identify are the Software Pirates. These are the people that make copies of software, and either register the program illegally, or sell the software to another party. Any pirated software is known as warez. Warez is divided into sub categories, these are the following; Applications of any sort are known as Appz, Computer games are change...

< Prev Page 2 of 3 Next >

    More on Computer Crime...

    Loading...
 
Copyright © 1999 - 2025 CollegeTermPapers.com. All Rights Reserved. DMCA