Hacking Powerpoint - Hacking Bill Frino Click to edit...

Info iconThis preview shows pages 1–6. Sign up to view the full content.

View Full Document Right Arrow Icon
Click to edit Master subtitle style 4/18/11 Bill Frino Fall 2010 CMIS 335 Computer Forensics Hacking
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
4/18/11 I chose to do my project on hacking because it can happen to any of us…and more than likely already has to someone in here. Why? Use protection!
Background image of page 2
4/18/11 Hacking is intentionally accessing a computer with authorization or beyond authorized permission. Once a hacker gets into a the device they are hacking, he or she can read sensitive files, delete or modify files, and change the system to make it easier to attack in the future. If the hacking is intentional, and if a sufficient amount of damage is done, hacking is a crime in the United States and many other countries. What is hacking?
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
4/18/11 Hacking is not limited to computers. The real meaning of hacking is to expand the capabilities of any electronic device, to use them beyond the original intensions of the manufacturer. The first hacker appeared in the 1960’s at the Massachusetts Institute of Technology, and their first victims were electric trains. They wanted them to perform faster and more efficiently. Not just for computers…
Background image of page 4
4/18/11 By the 1980’s, hackers started to migrate to computers, and the first Bulletin Board Systems appeared. These systems are like the yahoo groups of today, were people posted messages of any kind of topics. During the 1970’s a different kind of hacker
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 6
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 04/17/2011 for the course COMPUTER S 101 taught by Professor Xxx during the Spring '11 term at Holy Family University.

Page1 / 15

Hacking Powerpoint - Hacking Bill Frino Click to edit...

This preview shows document pages 1 - 6. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online