Essay on Hacking and Cracking

Topics: Computer security, Computer, Black hat Pages: 9 (3042 words) Published: September 15, 2012
1.1 What is Hacking ?
Hacking is often portrayed to be many things it is not. Thanks to popular portrayal of hacker as young immoral computer expert associated withnearly and possible illegal and immoral activity that can be conducted through a computer, We see hacker outlaws of cyber space, out to steal passwords, or get access to your bank account and steal money. They are portrayed as the equivalent to thieves who break into houses and rob banks or in the mildest case; peeping toms try to get a look into your private life. Own computer or that of a friend’s to help him or help out? This could not be farther from the truth. Sure, the act of remotely accessing someone’s computer to steal their private files would be hacking. Note the words “Steal their private files”. What if that condition was removed? Or what if you are simply accessing your own computer or that of a friend’s to help him or help out? Computer hacking is the most popular form of hacking nowadays, especially in the field of computer security, but hacking exists in many other forms, such as phone hacking, brain hacking, etc. and it's not limited to either of them. 1.2 What is Cracking ?

Software cracking is the modification of software to remove or disable features which are considered undesirable by the person cracking the software, usually related to protection methods: copy protection, trial/demo version, serial number, hardware key, date checks, CD check or software annoyances like nag screens and adware. The distribution and use of cracked copies is illegal in almost every developed country, there have been lawsuits over cracking software. "Cracker - This is the common term used to describe a malicious hacker. Crackers get into all kinds of mischief, including breaking or "cracking" copy protection on software programs, breaking into systems and causing harm, changing data, or stealing. Hackers regard crackers as a less educated group of individuals that cannot truly create their own work, and simply steal other people's work to cause mischief, or for personal gain." 1.3 Difference in Hacking and Cracking?

Hacking means a hacker uses our system for his own purposes. Also he can hack the information of hacked system. He can use the network of hacked system for his own purpose. Also he can use hacked system as his own server and this can slow performance of hacked system and can be cause of share the data and personal information. We should need to use good antivirus and Internet security to avoid hacking our system. Cracking means crack (break) the license (product) key. Every original software gives the product key (serial key) to every user. This is always a unique key and generated by software companies special software. If anyone steel that utility or make any key-gen to generate the serial number for pirated use that is called cracking. Cracking is a totally illegal method also called piracy and we should not use the cracked software. Almost 100% cracked software contains harmful viruses and your computer can be hacked easily.

1.1 How safe is your Computer
Business Aspects
Now the hacking is very common in the entire world. For bewaring of hacking all organization take many steps. The OPEN WEB APPLICATION SECURITY PROJECT (OWASP) is a non profitable organization that aims to improve the security of software. To aid this effort, they provide many tools and documentation for the same. We will be looking at “OWASP Top 10 for 2010” lists, which is their list of the top 10 security risks affecting web applications.

3.1 Open web application security project logo
1. Injection:
* Injection flaws, such as SQL, OS, and LDAP injection, occur when untrusted data is sent to an interpreter as part of a command or query. The attacker’s hostile data can trick the interpreter into executing unintended commands or accessing unauthorized data. 2. Cross-Site...
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Hacking Essay
  • Essay on Hacking
  • Hacking Essay
  • Rogerain Essay on Computer Hacking
  • Hacking Essay
  • Password Cracking Essay
  • essay
  • essays

Become a StudyMode Member

Sign Up - It's Free
A Walk among the Tombstones | Business and Disney - 301 Words | └ Handys & Kommunikation