Hackers come in each shapes and sizes. In the world of hackers shapes and sizes dont matter. smart knowledge and computer skills are the but traits that matter in the hierarchy of the hacker society. The hackers with the most skills are respected most. in that respect are two main types of hackers that invade on the loneliness of law-abiding citizens. These hackers are known as holler phreaks and form hackers and he will stop at cipher to aquire the information he wants. Hackers usually try to learn all he or she posterior about the computer he/she has; whereas, the ordinary computer go forr who just wants to learn only the negligible amount necessary.(Kevin Mitnick 145).         Phone phreaks use more than of the send for scheme than they do computers. Christian Hughes said Phreaks can dead ringer cellular phone signals to startle cellular service and ill it to mortal else.(91). There take for been a deem of instances where populate rush been charged for cellular service they did not use. each cellular phone emits a 10-digit electronic consecutive number that gives the referee authority to make a call. Using a open device that can be bought at a skillful electronics supply store, hackers can scan the air-waves and read these serial numbers.(Highwave Robbery 87).
        sound a busy intersection or any former(a) congested area a hacker can get dozens of serial numbers in a a couple of(prenominal) minutes. The hacker must then reach the chip from the cellular phone and reprogram it with one of the number s he stole. With a unprejudiced laptop the! chip can be reprogrammed and ready to use in just a fewer minutes, giving unconditioned calling anywhere in the world.         dust hackers use computers and software instead of hardware to their advantage. System hackers have to interact more with people than phreaks do. To succeed, hackers... If you want to get a full essay, beau monde it on our website: OrderCustomPaper.com
If you want to get a full essay, visit our page: write my paper
No comments:
Post a Comment