This is a free sample from the essay. Just join to view the full essay.
Hackers
Part 1 of Essay
Introduction . . . . . . . . . . . . . . . . . . . 1
Methodology . . . . . . . . . . . . . . . . . . . 6
What is the Computer Underground? . . . . . . . . 11
Topography of the Computer Underground . . . . . . 20
Hacking . . . . . . . . . . . . . . . . . 20
Phreaking . . . . . . . . . . . . . . . . . . 21
Pirating . . ....
Part 2 of Essay .... . . . . . . . . . . . . 75
APPENDIX A. COMPUTER UNDERGROUND PSEUDONYMS . . . 76
APPENDIX B. NEW USER QUESTIONNAIRE FROM A PHREAK/HACK BBS . 77
Introduction
The proliferation of home computers has been accompanied by a corresponding social problem involving the activities of so-called "computer hackers." "Hackers" are computer aficionados who "break in" to corporate and government computer systems using their home computer and a telephone modem. The prevalence of the problem has been dramatized by the ....
Word count: 10104 | Approximate pages: 37
|
|
Whether you are a high school freshman or a graduate student working on your thesis, you have come to the
right place if you are looking for assistance on your essay. We have helped thousands of students just like
you with their research. Stop wasting your time searching the internet. You have already found what you
are looking for here at EssayKing! We have over 45,000 essays available for download right now. Sign
up for a membership and get instant access to our massive term paper database.
Membership |
Price |
Instant Sign Up |
30 days recurring |
$19.95 |
90 days recurring |
$39.95 |
180 days non-recurring |
$69.95 |
|
|
|