Top 3 Products & Services


Dated: Aug. 13, 2004

Related Categories

Network Security

Dictionary defines a Hacker as "one who uses programming skills to gain illegal access to a computer network or file." This is a problem for many computer users and even companies. There are many files a hacker can get from its source, whether it be a file that has no importance at all or one that contains personal information like your address, social security number, or even your credit card number

What we're about to tell you is frightening, plain and simple. You don't have to be a hacker to understand this. The words and ideas are easily translatable to any time and any culture.

Hackers, in the original sense of the word, change the world by hacking away at things. They love their computer tools. They value rough consensus and smooth code. Hackers are often intellectuals who wish to hack society, not just software. UCSD Communications professor, Phil Agre says in a recent essay, "Ideas become machinery; machinery becomes ideas. Each can set the other straight. Each can confuse."

In a "cyber-war", where is the enemy? The FBI would just love to know that hackers have managed to positively identify which sites belong to those responsible for the terrorist attacks. Even if they could be identified, attacking them could destroy crucial evidence. Blindly attacking sites perceived to be vaguely Arabic is just plainstupid (or at least not a sign of a true genius). Attacking sites of people who aren't even remotely involved to vent emotions is even more moronic.

Hacker inside

Hacking is morally and ethically wrong, an offense against the government of the United States of America. You can see how hacking has changed from 1878 to the present day and how quickly it is becoming more of a threat to everyday life. This is due to the fact that many homes and businesses use computers placing themselves at a risk of getting hacked. Although, the Government officials and software companies are taking these matters into consideration by changing operating systems and laws in order to give users a sense of security. Software companies need to fix the bugs and other loopholes in the operating systems in order to keep out hackers. The Government is doing a good job with laws against privacy but needs to do a better job in monitoring these events. However, there are some pros and cons of hacking. For example, the FBI could use hacking in order to get into a criminals computer that holds valuable information, but the same thing could happen to the FBI (McCullagh).

To be a hacker one must have the knowledge needed for hacking. Hackers help make the tools needed to perform these actions. They also must learn about how to become a cracker and get into an operating system in order to bypass the security. Crackers are generally the people who find a hole in the security and pass right on through. Another method they must know is how to be a phreaker. A Phreaker blocks the phone line so it is almost impossible to find out who is doing the hacking.

Personally, I feel that a little bit of information regarding hacking is necessary in order to capture criminals and other people that commit crimes. When hackers go to the extreme and steal files from people and companies, it is very unethical to steal important information and should be stopped. And here at TechiWarehouse, we strongly feel that correct and precise information given to the right crowd can and will bring change to many things that should not be.

Please stay tuned for other personal network security issues to be discussed in our future articles. Until next week, So Long!

For any response, Click Here

Now that you've gotten free know-how on this topic, try to grow your skills even faster with online video training. Then finally, put these skills to the test and make a name for yourself by offering these skills to others by becoming a freelancer. There are literally 2000+ new projects that are posted every single freakin' day, no lie!

Previous Article

Next Article

Ajeet's Comment
28 Mon Jun 2010
Admin's Reply:

Thanks Ajeet .