There are different specialists who can provide different meaning
of hacker among them are.
According to Pakditawan
(2006). Hacker is a person tries to gain
access to the content of a computer’s memory without permission.
According to Raymond (1996).
Hacker as individual or group of individual who gain unauthorized access
to a computer system, by harking in to it, the act of the computer hacker is
generally not malicious
Hacker refers to people who break in to computer system, usually
via network access (Ned, 2007).
So as to mean that hacker is a person entrance fee is very bad in
the next computer is the of these effect hacker in the computer are as follow:
- Hacker cause virus in computer. Hacker this is due to open various data randomly causing viruses to enter more easily ,at the first glance the Trojan horse will appear to be useful soft ware but will actually do damage once installed or run on your computer .Trojan some time the effect can be more annoying than malicious it means changing your desktop, adding un wanted active desktop icons ,another example of virus which hacker course effect computer Worm and Logic bombs.( Curran, 2009)
- vHacker effects initially locate the network device. This happen when he can enter in to computer and can destroy the whole process of being able get contact ,hacker using either the passive method of listening for access points and broad cat beacons ,or the aggressive method of transmitting client beacons example wireless(.Lech,2007)
- Hackers delete the sensitive information gaining access to it. Hacker delete the important formation such as defferent data example notes ,so user computer has been hacked is at the risk of losing all data stored on his or her computer ,manipulative user data is a grave consequence of harking ,also deletion secret issue example issue in officer.
- Hackers destroy computer security. Hacker harking activities expose confidential user information like personal detail ,social security number ,bank account data it card ,destroy credit card number ,and photography and some time destroy file they can opened fail in it and found it lies empty.
- Hacker cause password grabbers .However are useful are owners of system as well as at crackers as they provide them with ability to monitor transaction carried out buy the users for security auditing. Here are several types of password grabbers available such a key copy which copies all the key strokes to a file times tamp (Curran,2007)
- Hacker theft of information in computer. Hacker sensitive information which could be used to fuel .So can cause damage to credit information from consumer agencies ,ruins with the identity committed a crime or other damage which may not be repairable at all;
All in all is very good to be
careful with these people who break computer procedures in order to avoid
unnecessary problem in a computer irregular.Ensure that computer not problem in
deferent case of hacker.
REFFERENCE
Curran,
K. (2009) .Understandings the internet. UK: Publisher Elisevier.
Lech,
J. (2007).cyber warfare and cyber terrorism .Newyowk: Publisher Idea
group Inc (IGI).
Ned,
K. (2007). Collaboration in modern organizations initiating and managing
distributed project .London: Publisher IGI global.
Pakdidawan,
S.(2006).Computer virus.Newyowk :Publisher GRIN
Verlag.
Raymond.
(1996).The new Hacker Dictionary. London: Publisher MIT Press.
No comments:
Post a Comment