Welcome to Essay Galaxy!
Home Essay Topics Join Now! Support
Essay Topics
American History
Arts and Movies
Biographies
Book Reports
Computers
Creative Writing
Economics
Education
English
Geography
Health and Medicine
Legal Issues
Miscellaneous
Music and Musicians
Poetry and Poets
Politics and Politicians
Religion
Science and Nature
Social Issues
World History
Members
Username: 
Password: 
Support
Contact Us
Got Questions?
Forgot Password
Terms of Service
Cancel Membership



Enter your query below to search our database containing over 50,000+ essays and term papers

Search For:
Match Type: Any All

Search results 31 - 40 of 774 matching essays
< Previous Pages: 1 2 3 4 5 6 7 8 9 10 Next >

31: The Computer Underground
... no excep- tion and derive from several sources. First, the bulk of our data come from computer bulletin board systems. BBSs are personal computers (PCs) that have been equipped with a telephone modem and special software that con- nects users to other PCs by telephone. After "logging in" by supplying a valid user name and password, the user can receive and leave messages to other users of the system. These messages are rarely private and anyone calling the BBS can freely read and respond to them. There is usually the capacity to receive (down- load) or send (upload) text files ("G-philes") or software pro-grams between the caller and host system. We logged the message section of CU BBSs to compile documen- tary evidence of the issues deemed important for discussion by participants. Logs are "captured" (recorded using ... and to the uninitiated they may appear to be licit chat or shareware boards. For callers with sufficient access, however, there exist back- stage realms in which "cracking" information is exchanged and private text or software files made available. With current technology, establishing a BBS requires little initial skill. Most boards are short-lived and serve only local or regional callers. Because of the generally poor quality and amateur na- ...
32: Computer Crime In The 1990's
... through the connection of a modem into a telephone line system. Then this "demon dialer" is programmed to subsequently dial with the express purpose of looking for and recording dialtone. A demon dialer is a software program that automatically calls thousands of phone numbers to find ones that are connected to computers. A basic hacker tool that can be downloaded from the internet. They are extremely easy programs to use. The ... this person can be put in prison for up to five years and be fined for up to $ 7500.00. The telephone network is a massive electronic network that depends on thousands of computer run software programs and all this software in theory can be reprogrammed for criminal use. The telephone system is in other words a potentially vulnerable system, by cracking the right codes and inputting the correct passwords a hacker can sabotage a ...
33: Computer Crime
... committing theft commits computer crime. (2) Any person who knowingly and without authorization uses, alters, damages, or destroys any computer, computer system, or computer network described in section 18-5.5-101 or any computer software program documentation, or data contained in such computer, computer system or computer network commits computer crime (Schmalleger, 1999, p. 486). Bloombecker (1986) suggested he history of computer crime and hacking started in the late 1950 ... the more sophisticated the systems that are being broken into are, the more exciting it is for the explorer. For the game player hacker, hacking is a sport that involves the identification and defeat of software, systems, and copyright protections. Vandals are hateful, angry hackers that strike harshly, randomly, and without any apparent personal gain other then knowledge, responsibility, and credit for such acts. Finally, addicts are your stereotypical nerdy individuals ... a devise, and military tactical procedures that out line the process and positioning of such devises to create the most damage. In the category of computer misuse, is the creation and deployment of viruses and software piracy. Schmalleger (1999) stated that a computer virus is a set of computer instructions that propagates copies or versions of itself into computer programs or data when it is executed (p. 477). This renders ...
34: The Y2K Problem
... a huge, expensive and international one. In many cases it is a problem lined with doubt as to it's effects. This paper will analyze the various aspects to the year 2000 problem, classical and software solutions to the problem, and present the author's ideas on how a systematic approach to the "millennia virus" can prevent doomsday from becoming a reality for many information technology managers and their corporations. What ... Time based calculations Hardware failure Will all be affected by the problem. "OLD will seem YOUNG, a FEW moments will seem like an ENTIRE century, FUTURE events will have ALREADY occurred." -- Duncan G. Connall , Global Software, Inc. Scope of Problems The scope of this problem is immense. The awareness and information available on this problem is growing rapidly, as a observation of the rate at which the amount of information available ... the Altavista index yielded 60000 pages! Even this volume of information does not sufficiently judge the magnitude of the problem. Early IBM-PC machines and compatibles will be rendered useless for date applications without running software patches as the system clocks on the hardware level will not handle the four-letter date format. This problem is not only limited to personal computers and mainframes, however. Most electronic devices that make ...
35: Computer Crime
... into other peoples computer files. Then it becomes a crime, but what is a computer crime really, obviously it involves the use of a computer but what are these crimes. Well they are: Hacking, Phreaking, & Software Piracy. To begin I will start with Hacking, what is hacking. Hacking is basically using your computer to "Hack" your way into another. They use programs called scanners which randomly dials numbers any generating tones or ... devices than do various things, such as make outgoing calls free, make incoming calls free, simulate coins dropping in a phone, etc. People who "Phreak" are caught alot these days thanks to the new technology. Software Piracy is the most common computer crime, it is the illegal coping of software. "People wouldn't think of shoplifting software from a retail store, but don't think twice about going home and ...
36: The Computer Underground.
... method of phreaking is generally called "carding," it is generally looked on as the lowest form of phreaking as almost no technical skill is necessary. Another role in the computer underground is that of the software pirate. Software piracy refers to the unauthorized copying and distribution of copyrighted software. This activity centers around computer bulletin board systems, and parts of the internet that specialize in "warez." Pirates and phreak/hackers/crackers do not ...
37: Computer Crime
... into other peoples computer files. Then it becomes a crime, but what is a computer crime really, obviously it involves the use of a computer but what are these crimes. Well they are: Hacking, Phreaking, & Software Piracy. To begin I will start with Hacking, what is hacking. Hacking is basically using your computer to "Hack" your way into another. They use programs called scanners which randomly dials numbers any generating tones or ... devices than do various things, such as make outgoing calls free, make incoming calls free, simulate coins dropping in a phone, etc. People who "Phreak" are caught alot these days thanks to the new technology. Software Piracy is the most common computer crime, it is the illegal coping of software. "People wouldn't think of shoplifting software from a retail store, but don't think twice about going home and ...
38: Crime and the Black Market in Modern Day China
... from me, receives instruction himself without lessening mine; as he who lights his taper at mine, receives light without darkening me." Unfortunately, Thomas Jefferson lived in a different time. He lived in a time when piracy was not as evident and intellectual property was not worth so much. In China, the largest crime which is currently occurring is intellectual piracy. Unlike the pirates of old who plundered the merchant vessels and ports of the South China Sea, modern day pirates are more interested in illegal replication of intellectual rights. From music compact discs to computer software to films to best selling novels, The Chinese black market is a virtual warehouse of "plundered goods". It is estimated that there are at least thirty illegal high tech factories in China that can ...
39: Computer Crime in the 90's
... into other peoples computer files. Then it becomes a crime, but what is a computer crime really, obviously it involves the use of a computer but what are these crimes. Well they are: Hacking, Phreaking, & Software Piracy. To begin I will start with Hacking, what is hacking. Hacking is basically using your computer to "Hack" your way into another. They use programs called scanners which randomly dials numbers any generating tones or ... devices than do various things, such as make outgoing calls free, make incoming calls free, simulate coins dropping in a phone, etc. People who "Phreak" are caught alot these days thanks to the new technology. Software Piracy is the most common computer crime, it is the illegal coping of software. "People wouldn't think of shoplifting software from a retail store, but don't think twice about going home and ...
40: Computer Crimes
... into other peoples computer files. Then it becomes a crime, but what is a computer crime really, obviously it involves the use of a computer but what are these crimes. Well they are: Hacking, Phreaking, & Software Piracy. To begin I will start with Hacking, what is hacking. Hacking is basically using your computer to "Hack" your way into another. They use programs called scanners which randomly dials numbers any generating tones or ... devices than do various things, such as make outgoing calls free, make incoming calls free, simulate coins dropping in a phone, etc. People who "Phreak" are caught alot these days thanks to the new technology. Software Piracy is the most common computer crime, it is the illegal coping of software. "People wouldn't think of shoplifting software from a retail store, but don't think twice about going home and ...


Search results 31 - 40 of 774 matching essays
< Previous Pages: 1 2 3 4 5 6 7 8 9 10 Next >

 Copyright © 2003 Essay Galaxy.com. All rights reserved