+ 1-888-787-5890  
   + 1-302-351-4405  
 
 
 
 

Essay/Term paper: Computers, hackers, and phreaks

Essay, term paper, research paper:  Technology

Free essays available online are good but they will not follow the guidelines of your particular writing assignment. If you need a custom term paper on Technology: Computers, Hackers, And Phreaks, you can hire a professional writer here to write you a high quality authentic essay. While free essays can be traced by Turnitin (plagiarism detection program), our custom written essays will pass any plagiarism test. Our writing service will save you time and grade.

The Internet is a wondrous place. Practically anything you could ever want is
available on the Net. It's like a big city, it has the highly prestigious areas, and the
sex-ridden slums (Mitchell). It has the upstanding citizens, and it has the criminals.
On the Net, crime is more abundant than in a large city, though, mainly because of
the difficulties in tracking and prosecuting offenders. Even from its beginnings, the
Internet has always been a battlefield between phreaks and administrators.

The Internet hasn't always been a public forum. In fact, the Internet has
been around for years. The Internet is just a new fad (Larson). The Internet
originally began as DARPANET, a government-created network, which was
designed for defense communications. The Net structure is such that it could
survive a nuclear war (Mitchell). The creation of the Net can not be blamed for the
existence of hackers though, hackers are older than the Net itself, but the Net is the
largest 'hacker haven' today (Spencer). The growth of the Net since its creation
has been nothing less than astounding. In the 25-plus years since its creation, the
Net now has over thirty million users using four million sites world wide.
Estimates rate the growth of the Net anywhere from ten to fifteen percent per
month (Spencer). The Internet was first released to major universities in the
United States of America. Since then, the universities have offered connections to
small business, service providers, and even to the individual user. Sometimes these
connections cost a fortune, and sometimes they can be obtained for free (Larson).
Although some of the original universities have dropped off the Net for various
reasons, every major university in the United States, and now, most others in the
world, have a connection to the Internet (Quittner).

Although it isn't easy for an individual to get a direct connection to the Net,
many private institutions are getting direct access. This is mainly due to the fact
that in order to support the very high speed of the Net, a fast computer is needed
and a fast connection. A fast computer can cost in the thousands of dollars, at
least, and a quick connection can cost hundreds dollars or more. Individuals can
still get on the Net through these private institutions. The private institution
spoon-feeds the Net to the slower computers over their delayed connection lines
(Jones). The Internet began very high-class, due to the fact that only super
intelligent college students and professors could access it. The discussions tended
to stay intellectual, with very little, if any, disturbance (Larson). However,
relatively recent changes in the availability of the Net have changed that
atmosphere. Now, almost anyone can access the Internet. Internet access is offered
by every major online service (Himowitz). The fact that the major online services
charge for their use keeps many people away from them. Those people simply
turn to public dial-ups, which are free connections offered by universities that are
available to the general public (Spencer).

Because accessing the Net is easier, and a lot more people are doing it,
naturally the amount of information on the Net is increasing at the same rate, if not
faster. In what is often referred to by Net users as the Resource Explosion, the
amount of information circulating the Internet has increased with the number of
users (Jones). Of all the other factors contributing to the large percent of online
crimes, perhaps the most influential is the design structure of the Internet. Experts
agree that the underlying structure with no central hub, where each computer is
equally powerful, gives unchecked power to the undeserving (Miller). The design
also makes controlling the frequency of break-ins almost impossible as well. Both
politicians and so-called 'experts' believe the Internet as a whole will be regulated
in the next five years. Hackers disagree, using the arguments that the Internet was
designed to be uncontrollable, that the basic structure doesn't support regulation
(Banja). In a network run by its users, which is designed to be impervious to
attack, not even the government has much muscle there. In fact, the Internet is one
of the few places that the government has little power. Because the Net is
international, any regulations forced upon domestic computer users can be
circumvented by routing through an overseas computer(Savage). The government
doesn't have the power to completely shut down the Net. In order to do that, every
one of the millions of computers on the Net must be disconnected. Even if only
two remain, the Net will continue to exist (Miller).

The ease of adding something to the Net is also a factor preventing the total
regulation of the Net. A new site can be added to the Net in a matter of seconds,
and can be removed just as quickly. It takes authorities considerable time to trace a
connection back to it's physical address, and if it disappears, it makes tracking it all
that more difficult. (Johnson) Once a resource becomes widespread, removing it
from the Internet is almost impossible. Each site that has the resource must be
found and the resources moved. If even one site has the resource, it can spread to
cover the Net easily (Himowitz). Some computer criminals go by the term
"Phreaks", or "Hackers." With all these things leaving the Internet open to
"phreaking", is it any wonder that so many computer law breakers exist? The
United States government has all of its computer systems on the Internet, yet many
universities have better security than the government computers containing
confidential information (Spencer). A majority of break-ins occur in university
computers, mainly because of the stiff penalties for being caught in a government
computer (Fisher). Over 10,000 break-ins that have occurred in recent months are
blamed on The Posse, a group of young phreaks (Quittner). If break-ins are done
on universities, then how secure are the government's secrets?

Both hackers and phreakers tend to stay away from heavy-duty government
hacking, though. Exploring innocently and generally harmless pranks are done the
most, and many hacks/phreaks don't limit themselves to the Internet, or even to a
computer (Spencer). The next step up for a good computer hack/phreak is to 'field
phreaking', which covers many various activities, but mainly using telephone
company boxes to make free calls and other various things, but most field
phreaking is somehow technically related to their computer skills (Jackson). Field
phreaking does happen, and it does happen quite a lot. For example, when two
bachelors rented a billboard in hopes of finding a mate, a phreak broke into their
voice mail box and changed the message to a "'perverted' sexually suggestive
message" (Jones) More recently, a hacker obtained tens of thousands of
passwords using a Trojan horse program, which records the first 128 keystrokes
when someone connects to the Internet. These 128 keystrokes normally contain the
user's name and their password (Himowitz).

Kevin Lee Poulsen was featured on Unsolved Mysteries in 1991 for charges
including tampering with the telephone network and stealing government
documents, all via computer. Because of this appearance, he was captured by two
bag-boys in a Hughes Supermarket who saw his picture on the show (Fisher).
Tonya Harding's E-mail in the Olympic computers was "open to the public since
she never changed her password from it's default, 1112, which corresponds to her
birthday, December 11th" (Nevius). Mark Abene, whom many believe to be the
greatest phreak ever, who is known online as Phiber Optik, was sentenced to one
year in prison, a stiff punishment for his charge of breaking into a telephone
network (Johnson). Although the job is hard, there are groups devoted to stopping
violations committed online. One such group, the Computer Emergency Response
Team, or CERT, a government-funded team at Carnegie-Mellon University gives
advisories and support to systems that have been broken into or are at risk of being
broken into (Mitchell). Another method of preventing break-ins are new security
measures. Almost every day, another operating system or communication protocol
comes out which covers holes found in previous copies of the software. This is
good as a temporary solution, but as soon as the new software comes out, a new
hole is found and the game continues (Larson).

Stopping computer hacking is probably impossible, although undoubtedly
stopping hacking altogether is impossible. Why? Because many professionals
spend millions of dollars to prevent break-ins, but smaller systems don't spend
anything. Free security will never be able to hold everyone out. FtS Productions
said it best in "Avoiding Detection": "Free Security—You get what you pay for."

 

Other sample model essays:

The mind-body problem has captivated the minds of philosophers for centuries. The problem is how the body and mind can interact with each other if they are separate and distinct. One solution to the...
Technology / Computer Crime
Laws must be passed to address the increase in the number and types of computer crimes. Over the last twenty years, a technological revolution has occurred as computers are now an essential element of...
Technology / Computer Hackers
Computer Hacker The meaning of Hacker is one who accesses a computer which is supposably not able to be accessed to non authorised people of the community. Hackers may use any type of system to...
Technology / Computer Simulation
WARSIM 2000 is simulation software, used by the armed forces. Extensive, thorough, and tiring work has been done on thgis program. It covers almost all aspects and situations required for ...
Technology / Computer Virus
COMPUTER VIRUSES Cateye <1>WHAT IS A COMPUTER VIRUS: The term usually used to define a computer virus is: ' A computer virus is often malicious software which replicates itself' [ Podell 1987 fo...
Technology / Computer Viruses
A computer virus is a relatively small program that attaches itself to data and program files before it delivers its malicious act. There are many distinct types of viruses and each one has a unique ...
Conditional and Iterative A programming language cannot be a programming language with out its conditional and iterative structures. Programming languages are built to accomplish the task of cont...
Technology / Cray SuperComputer
The Cray X-MP/22 manufactured by Cray Research Incorporated (CRI) of Minneapolis, Minnesota was delivered and installed at the U of Toronto this September. The Cray is a well respected computer - main...
Technology / Crypography
Cryptography is way you can keep information secure. A person who does not know the method used to change the information to keep it secure cannot copy the method used or reverse the change. The ba...
Technology / Data Compression
Word Count: 1546 "Data Compression" just sounds complicated. Don"t be afraid, compression is our good friend for many reasons. It saves hard drive space. It makes data files to handle. It also...
Experience with Dream Essay - Reliable and great customer service. Quality of work - High quality of work.
, ,
Dream Essay - Very reliable and great customer service. Encourage other to try their service. Writer 91463 - Provided a well written Annotated Bibliography with great deal of detail per th
, ,
it is always perfect
, ,
The experience with Dream Essay is stress free. Service is excellent and forms various forms of communication all help with customer service. Dream Essay is customer oriented. Writer 17663
, ,
Only competent & proven writers
Original writing — no plagiarism
Our papers are never resold or reused, period
Satisfaction guarantee — free unlimited revisions
Client-friendly money back guarantee
Total confidentiality & privacy
Guaranteed deadlines
Live Chat & 24/7 customer support
All academic and professional subjects
All difficulty levels
12pt Times New Roman font, double spaced, 1 inch margins
The fastest turnaround in the industry
Fully documented research — free bibliography guaranteed
Fax (additional info): 866-332-0244
Fax (additional info): 866-308-7123
Live Chat Support
Need order related assistance?—Click here to submit a inquiry
© Dreamessays.com. All Rights Reserved.
Dreamessays.com is the property of MEDIATECH LTD