Реферат по предмету "Иностранный язык"


Essay On Hacking Essay Research Paper Essay

Essay On Hacking Essay, Research Paper

Essay On Hacking

by Philip Smith

A topic that i know very well is computers and computer hacking.

Computers seem very complicated and very hard to learn, but, if given time a

computer can be very useful and very fun. Have you ever heard all of that

weird computer terminology? for and example, Javascript. Javascript is

basically a computer language used when programming internet web pages. Have

you ever been on the internet and seen words go across the screen or moving

images? This is all done by the Java language. If you don not see moving

images then its because your web browser cannot read javascript. If you don’t

know what a web browser is then I will tell you, a web browser is simply a tool

used to view the various websites on the internet. All web browsers are

different, some only interpret html language, which is another programming

language used to design web page and then there are some browsers that can play

videos and sounds.

Have you ever wondered why when you want to go to a website you have to

type http://name of site.com? well I have been wondering for ages but still

can’t figure out, but sometimes you type ftp:// before the name of the site.

This simply means File transfer protocol. You use this when download image

files or any other files. Now, onto hacking. Most people stereotype people

simply as “HACKERS,” but what they don’t know is that there are three different

types of computer whizzes.

First, there are hackers. Hackers simply make viruses and fool around

on the internet and try to bug people. They make viruses so simple. The get

a program called a virus creation kit. This program simply makes the virus of

beholders choice. It can make viruses that simply put a constant beep in you

computer speakers or it can be disastrous and ruin your computers hard-drive.

Hackers also go onto chat rooms and cause trouble. Chat rooms are simply a

service given by internet providers to allow people all over the world to talk.

As I was saying, Hackers go into these rooms and basically try to take over

because in chat rooms there is one person in control. This person has the

ability to put you in control or simply ban you. These hackers use programs

that allow them to take full control over any room and potentially, make the

computers on the other side overload with commands which in end, makes their

computer collapse.

Another type of computer whiz is called a cracker, crackers are sort of

malicious. Crackers use security programs used by system operators for evil

purposes. System operators use these programs to search the net for any

problems, but they can be used for other purposes. When Crackers get into

systems they usually just fool around but never destroy things.

The last computer whiz is called a phreaker. Don’t let the name fool

you, phreakers are very malicious and will destroy any information found when

breaking into a system. The phreakers use the same techniques as crackers but

they go a step further. When into systems, phreakers usually plant viruses and

steal information.

Now that you know some important things about computers and the internet

it will take you no time to surf the web. But remember, never get into hacking,

cracking and phreaking because no matter how much you know about computers you

should never use it for malicious purposes.




Не сдавайте скачаную работу преподавателю!
Данный реферат Вы можете использовать для подготовки курсовых проектов.

Поделись с друзьями, за репост + 100 мильонов к студенческой карме :

Пишем реферат самостоятельно:
! Как писать рефераты
Практические рекомендации по написанию студенческих рефератов.
! План реферата Краткий список разделов, отражающий структура и порядок работы над будующим рефератом.
! Введение реферата Вводная часть работы, в которой отражается цель и обозначается список задач.
! Заключение реферата В заключении подводятся итоги, описывается была ли достигнута поставленная цель, каковы результаты.
! Оформление рефератов Методические рекомендации по грамотному оформлению работы по ГОСТ.

Читайте также:
Виды рефератов Какими бывают рефераты по своему назначению и структуре.

Сейчас смотрят :

Реферат Законный интерес как форма выражения правовых возможностей (дозволений) и объект судебно-правовой защиты
Реферат «красные» и «белые»
Реферат Теоретические аспекты использования новых информационных технологий в оперативном управлении пр
Реферат Политические и правовые учения в Европе в начале ХХ в.
Реферат Преимущества использования СПС КонсультантПлюс в профессиональной деятельности
Реферат Relations between Ukraine and English-speaking countries
Реферат Довженко А.П.: cуспільна та філософська діяльність
Реферат Агроэкологическая оценка и разработка экологически безопасных технологий системы земледелия или
Реферат Разработка технологического процесса производства бюсгалтера
Реферат Современные концепции маркетинговой деятельности
Реферат Історичний портрет Олекси Довбуша
Реферат Анализ педагогической деятельности учителя начальных классов шевляковой светланы викторовны. Мой педагогический стаж 26 лет. По итогам предыдущей аттестации 2006 год
Реферат Позакласна робота з інформатики в початковій школі
Реферат Barn Burn By William Faulker Essay Research
Реферат Issue of Russian identity