Against Hackers on the Computer
-
Upload
rozalia-meszaros -
Category
Documents
-
view
44 -
download
1
description
Transcript of Against Hackers on the Computer
Practice of modifying computer hardware Practice of modifying computer software Most common among teenagers and young
adults They enjoy programming and have expert
level skills in particular programs
Enjoys learning details of a programming language
Enjoys doing the programming Person capable of appreciating someone
else’s hacking Person who pick up programming quickly Person who is an expert in a particular
programming language
How to program Get one of the open source Unixes Learn how to use the internet and write
HTML Know functional English
1970s- Origins of Hacker Subculture 1980s- 1985 – All Fun and War Games 1985 – 1990 – Theft and Bugs 1990- Combating the Perceived Hacker
Threat 2000 – New Trends
Hackers’ computer equipment, modems and storage devices should be taken away.
First offense Second offense Third offense
"Facts/Statistics About Computer Security and Loss of Data." Google Answers. 6 Feb. 2004. 8 Aug. 2008 <http://answers.google.com/answers/threadview?id=304308>.
Harvey, Brian. "What is a Hacker?" What is a Hacker? 8 Aug. 2008 <http://www.cs.berkeley.edu/~bh/hacker.html>.
Heaton, Jordana. "Hacker History." Hacker History. 8 Aug. 2008 <http://www.slais.ubc.ca/people/students/student-projects/j_heaton/>.
Hinders, Dana. "What is Computer Hacking?" What is Computer Hacking? 8 Aug. 2008 <http://www.wisegeek.com/what-is-computer-hacking.html>.