Paper Details  
 
   

Has Bibliography
6 Pages
1446 Words

 
   
   
    Filter Topics  
 
     
   
 

Defend your computer from hackers

ll? Just what is that? Well, it either a software program of hardware device that effectively blocks outsiders from entering your computer. Software firewalls just need to be installed onto your computer and can be either automatically configured of manually. Hardware involves connecting your computer into another device. Two of the more popular software firewalls are Zone Alarm (www.zonelabs.com) and Norton Personal Firewall (www.symantec.com). Using Zone Alarm, the above sites could find no exposed ports or even that this computer even was on; Zone Alarm completely cloaks your computer.Before I go further, the motives and history if the hacker should be discussed. It usually begins with contempt; most virus writers and hackers feel left out of mainstream society. They are usually at least mildly smart, but dont want to get a regular job. They sometimes want to be famous, or to at least be recognized. Money, however, is not the motivation in most cases. Hackers often complain that information should be free. However, one cannot purchase groceries for free. If someone generates useful information they usually expect to be able to feed and house themselves because of their effort. The hacker theory of free information also ignores the huge amount of work that preceded the hackers access to the Internet and computers. All to often, a hacker is the intellectual version of those spray-painting teens. Feeling powerless, they can at least break into someone elses computer; leave a mark of some kind, thus, letting the world know that they exist. Of course, you cannot stereotype a whole group of people with a single portrait. Im sure that not all hackers are socially inept and nerdy; there are undoubtedly handsome, popular, athletic hackers. Perhaps, one or two. When these hackers grow up, those that are actually talented often join the other side. They end up working for the government of business that they once despised. Kevin Mitenick, proba...

< Prev Page 2 of 6 Next >

    More on Defend your computer from hackers...

    Loading...
 
Copyright © 1999 - 2025 CollegeTermPapers.com. All Rights Reserved. DMCA