Wednesday, June 1, 2011

Do you know any thing about HACKERS ???


History

  • Beginning in the 1960s, advancements in computer programming, design and technology were accompanied by advancements in the minds of hardware and software genius. By the late 1980s, through trial and error of learning and exploring computer systems and networks, skillful programmers began to manipulate electronic information unearthing private details, making them secure no longer.
    Initially, the term hacker was one of respect and used as a nomenclature for gifted individuals who engineered a new program or converted an old one into something ingenious. Hackers were motivated by the support from their peers and spent time working on the next challenge to amaze the masses. Later, the term became synonymous with cybercriminals.

Types

  • Within the hacker community, there are specialists who are able to perform tasks of a particular nature. An "algorithm hacker" solves problems with a sequence of instructions easily understandable to him. There are hackers who know the ins and outs of operating systems and hackers who can break any password or code.

Identification

  • While hackers are capable of accessing unauthorized information, they are also able to prevent other intruders from exploiting a system to access information. Although some hackers do harm, others simply prefer to test the limits to determine their full potential with no malicious objectives.

Effects

  • Some hackers break into systems with the intent to "destroy data, steal copyrighted software, and perform other destructive or illegal acts." Due to the "black hat" hackers, those who seek to wreak havoc, government and law enforcement have been forced to evolve with the advancements in technologically based crimes.
    Hacker-related cybercrimes have caused legislative enactments to protect victims from invasion of privacy and law enforcement to beef up its involvement in pursuing computer trespassing culprits. The FBI and Secret Service have specialists in computer intrusion. There are also computer crime specialists at the federally funded National White Collar Crime Center responsible for training law enforcement to recognize computer hacking criminals and bringing them to justice.






Prevention/Solution

Individuals can take precautions against hacker invasions. Installing a personal firewall and being cautious when accessing websites on the Internet are ways to shield yourself. Familiarize yourself with the options for Internet connections; the quickest connection does not mean it is the most secure. The nature of a hacker is to evolve and navigate around the obvious barriers to gain access where least detected. As hackers evolve, so too must protective measures against their hacks.


Potential

With the abundance of available information floating around on the Internet and stored seemingly secure in databases, the potential for identity theft and unauthorized access to confidential information will remain a threat. It has been said that there's nothing that you can do to guarantee your complete protection, but measures are being taken by government organizations to minimize future threats.


************************************************************************************

    No comments:

    Post a Comment