Computer Hacking (Expository)

1159 Words5 Pages
IF ONLY WE COULD MAKE NETWORKING A SAFER OPTION… Kevin Mitnick first hacked into a computer in 1979 at the age of 16, where he gained unauthorized access to the computer system: Digital Equipment Corporation (DEC). He broke in to DEC’s network and copied their software, and apparently cost the company up to $160,000 in clean up costs. He wasn’t convicted for the crime until 9 years later in 1988, where he was sentenced to a year in prison, followed by a three-year period of supervised release. Near the end of his supervised release, he hacked in to a voice mail system. He was issued a warrant, but he fled the country, making him a fugitive for the next two and a half years. He used cloned cellular phones to hide his location and copied valuable private and personal software from some of the country’s largest cellular telephone and computer companies. Mitnick also intercepted and stole computer passwords, altered computer networks, and broke into and read private e-mail. Mitnick was arrested in 1995, and was sentenced to 5 years in jail. Kevin Mitnick became well known late in the 20th century, as one of the most wanted US hackers in history. Kevin Mitnick is a computer hacker, someone who gains access to a computer illegally, without authorization. Hackers use any type of methods to access certain information depending on what they intend on doing in the system. Hackers use a variety of ways to hack into a system. If the hacker is smart and experienced, they will use telnet to access a shell on another computer. Telnet is a basic hacking tool, used to connect to someone else’s computer. Telnet does not use the resources of the victim’s computer, but uses the resources of the victim’s server and identity. Basically it is a program they use, so that the risk of getting caught is lower than using their own system. The ways in which hackers get into the system

More about Computer Hacking (Expository)

Open Document