Pages

Pages

Monday 12 January 2015

HACKER


There are different specialists who can provide different meaning of hacker among them are.
 According to Pakditawan (2006).  Hacker is a person tries to gain access to the content of a computer’s memory without permission.
According to Raymond (1996).    Hacker as individual or group of individual who gain unauthorized access to a computer system, by harking in to it, the act of the computer hacker is generally not malicious
Hacker refers to people who break in to computer system, usually via network access (Ned, 2007).
So as to mean that hacker is a person entrance fee is very bad in the next computer is the of these effect hacker in the computer are as follow:
  •  Hacker cause virus in computer. Hacker  this is due to open various data  randomly causing viruses to enter more easily ,at the first glance the Trojan horse will appear to be useful soft ware but will actually do damage once installed or run  on your computer .Trojan some time the effect can be more annoying than malicious  it means changing your desktop, adding un wanted active desktop icons ,another example of virus which hacker course  effect computer  Worm and Logic bombs.( Curran, 2009)

  • vHacker effects initially locate the network device. This  happen when  he can enter in to  computer and can destroy  the whole process of being able get contact  ,hacker using either the passive method of  listening  for access points and broad  cat  beacons ,or the  aggressive method of transmitting  client beacons example wireless(.Lech,2007)

  • Hackers delete the sensitive information gaining access to it. Hacker delete the important formation such as defferent data example notes ,so user computer has  been hacked is at the risk of  losing  all data  stored  on his or her computer  ,manipulative user data is a grave consequence  of harking ,also deletion  secret issue example issue in officer.

  • Hackers destroy computer security. Hacker harking activities  expose confidential user information  like  personal detail ,social security number ,bank account data  it card ,destroy credit card number ,and photography  and some time destroy file they can opened fail in it and found it lies empty.

  • Hacker  cause password  grabbers .However are useful are owners of system as well as at crackers as they provide them with ability to monitor transaction  carried  out buy the users for security auditing. Here are several types of password grabbers available such a key copy which copies all the key strokes to a file times tamp (Curran,2007)

  • Hacker theft of information in computer. Hacker sensitive information which could be used to fuel .So can cause damage to credit information  from consumer agencies ,ruins with  the identity committed a crime  or other damage which may not be repairable at all;

All in all is very good to be careful with these people who break computer procedures in order to avoid unnecessary problem in a computer irregular.Ensure that computer not problem in deferent case of hacker.


                                          REFFERENCE

Curran, K. (2009) .Understandings the internet. UK: Publisher Elisevier.
Lech, J. (2007).cyber warfare and cyber terrorism .Newyowk: Publisher Idea group Inc (IGI).
Ned, K. (2007). Collaboration in modern organizations initiating and managing distributed project .London: Publisher IGI global.  
Pakdidawan, S.(2006).Computer virus.Newyowk :Publisher  GRIN  Verlag.
Raymond. (1996).The new Hacker Dictionary. London: Publisher MIT Press.

No comments:

Post a Comment