|
|
Have you been looking all over the internet for a term paper? Stop looking now! Paper University has over 45,000 term papers all in one place. Our huge online paper library
has college papers on all sorts of topics and they are all available for downloading or printing immediately. If you are thinking this will cost an arm and a leg, you are
wrong! Get instant access to our members section for one low monthly price with no additional fees or long-term obligations. It doesn't matter if you are downloading one essay or one hundred.
Join today and get the essay writing help that you need.
Hackers
Beginning of Paper
Introduction . . . . . . . . . . . . . . . . . . . 1
Methodology . . . . . . . . . . . . . . . . . . . 6
What is the Computer Underground? . . . . . . . . 11
Topography of the Computer Underground . . . . . . 20
Hacking . . . . . . . . . . . . . . . . . 20
Phreaking . . . . . . .... Middle of Paper .... . . 75
APPENDIX A. COMPUTER UNDERGROUND PSEUDONYMS . . . 76
APPENDIX B. NEW USER QUESTIONNAIRE FROM A PHREAK/HACK BBS . 77
Introduction
The proliferation of home computers has been accompanied by a corresponding social problem involving the activities of so-called "computer hackers." "Hackers" are computer aficionados who "break in" to corporate and government computer systems using their home computer and a telephone modem. The prevalence of the problem has been dramatized by the media and enforcement agents, and evidenced by the ....
10104 words | 37 pages
Subscription Length |
Price |
Join |
30 days membership (recurring) |
$19.95 |
90 days membership (recurring) |
$39.95 |
180 days membership (non-recurring) |
$69.95 |
|
|
|
|
|