A computer system comprises hardware and software components, aiming to offer a powerful computational tool. These systems play a crucial role across diverse domains, aiding us in numerous tasks. The prevalence of the internet has significantly bolstered the utilization of computers for information sharing and communication. Computer systems empower us to store, process, display, and transmit information. Even in a basic modern computer system, multiple programs are typically required to carry out various functions effectively.

Saturday, April 26, 2014

What is computer hacker?

In the computer security context, a hacker is a person who attempts to breach the security of computer system by access from a remote point, especially by guessing or otherwise obtaining a password.

The person had an instinctive knowledge enabling him or her to develop software apparently by trial and error.

The broadest term of hacker would be a computer expert who is capable of clever or novel solution to computer problems.

Hacking, in computerese, is the obsessive use of computers, or the unauthorized access and use of networked computer system. Illegal hackers (also called crackers) frequently assault the internet and other networks to steal or damage data and programs.

Although many person in the computer industry continue to use the term ‘hacker’ to pick out programmers of distinction, the term ‘hacker’ is now used by most person only to pick out persons who intrude upon systems and machines belonging to other people without any meaningful authorization.

Hackers can monitor E-mail, Web server access, or file transfer to extract passwords or steal network files, or to plant data that will cause a system to welcome intruders.

A hacker may also use remote services that allow one computer on a network to execute programs on another computer to gain privileged access within network.

Hackers, crackers and computer criminals have a growing palate of tactics and technologies that can used to achieve their purpose.

This include harvesting passwords from unsuspecting user, stepping stones that conceal the ultimate source of an intrusion and stolen storage space to serve as caches for among other things, attack programs, password files or stolen card credit numbers.

The good and bad hackers have similar personalities. What separate them is their ethics.
What is computer hacker?

The Most Popular Posts

  • Genghis Khan, born Temujin in 1162 on the Mongolian steppes, remains one of history's most transformative figures. As the founder of the Mongol Empire, the...
  • Mangosteen juice, derived from the tropical fruit mangosteen, is renowned for its exceptional antioxidant content. Antioxidants are vital compounds that ne...
  • Secondary metabolites are an extraordinary array of organic compounds synthesized by plants that go beyond basic physiological processes like growth, dev...