Paper Details  
 
   

Has Bibliography
4 Pages
1045 Words

 
   
   
    Filter Topics  
 
     
   
 

Hacking

can access data from different positions. One way which is used totry to prevent hackers gaining access is a program used by companies called a Firewall.A Firewall is a program which stops other connections from different servers to thefirewall server. This is very effective in stopping hackers entering the system. Tho this isnot a fool proof way of stopping hackers as it can be broken and hackers can get in. Thothis is a very good way of protecting your system on the InterNet. Major Hacks Some ofthe major hacks that have been committed have been done by young teens agedbetween 14 and 18. These computer geniuses as they are known have expert knowledgeon what they are doing and also know the consequences. Tho the consequences do notreally enter there mind when they are doing it. This hack occurred on February 10,1997, and again on February 14, 1997 Portuguese hackers launched a political attackon the web page of the Indonesian government, focusing on that country's continuedoppression of East Timor. The attack was online for about 3 hours from 7.00 PM to10.00 PM (Portuguese Time) at the web site of the Department of Foreign Affairs,Republic of Indonesia. The hackers did not delete or change anything. The said "We justhack pages". Another major hack that occurred was on April 1 1981 by a single user.This hacker who was situated in an east coast brokage house was interested in the stockmarket. SO he purchased $100,000 worth of shares in the stock market. Then hehacked into the stock markets main computers and stole $80 million dollars. The hackerwas eventually caught although $53 million dollars was not recovered. On Wednesday,March 5 1997 The home page of the National Aeronautics and Space Administration'swas recently hacked and the contents changed. The group known as H4G1S. This groupof hackers managed to change the contents of the webpage The hacking group changedthe webpage and left a little message for all. It said " Gr33t1ngs fr0m t...

< Prev Page 2 of 4 Next >

    More on Hacking...

    Loading...
 
Copyright © 1999 - 2025 CollegeTermPapers.com. All Rights Reserved. DMCA