Computer Hackers and World of Hacking
“Russian hacker’s steal $10,000,000 from the U.K Bank”
“Israeli Hackers breaks into 400 pentagon server”
Such headlines are quite a common sight in most of today’s news papers, who are hackers? Are they criminals? How do they do what they do? If these questions knock your grey cells, then please keep reading.
The term Hacker and Hacking was introduced in 1969 at Massachusetts institute of technology (MIT).Computer Hackers are those highly skillful computer network users, who have ability to manipulate machines in order to get remote access to highly confidential information. Driven by extreme curiosity, hackers believe that information should be freely available to any one who wants it. For most of them stealing confidential information is pure thrill, much like what playing video games means to children. A very few of them use “Hacker Dom” to earn money just for pleasure of vandalism.
“You build atom bombs, you age ware, you murder cheat, and lie to us and try to make us believe it’s for our own good, yet we are criminals. Yes I am a criminal. My crime is that of curious”
-The conscience of a hacker
By Loyd Blackenship (The Mentor)-He was tried in 1990 for extreme planning the function of the emergency telephone service in US.
Yes Hackers are not criminals. They only chose the hobby for the gate of satisfaction they get by breaking into high security system. There are exception like in every other good thing. Since this is the world of fast buck,crime is always a high possibility.
Hacker’s believe that:
-Access to the computer should be unlimited and total.
-All information’s should be free.
-Authorities should not be trusted and decentralization promoted.
Hackers should be judged by their skill, not by their education, age, race or position.
Hackers: Heroes of computer Revolution by system levy (To officially demand money).
Once a Hacker breaks into any computer, He has a absolute right or control over all of its resources. There is no Limit of control. One of the best example of this could be the use hackers by US defense to break into the computer system of Iraq warship during the Gulf war. The warship was fully controlled by America while the Iraqis did not know that the war was going on. A brilliant piece of computer work!
Some of us might be interested to know how the hackers break into any computer around the world. To understand the process we first have to understand the internet.
Much like The Telephone line which connects one telephone set to another, Located some where around the world, the internet is such as communication system which connects users.

Nice Article It helped me to gain knowledge on hacking great mind!!
שולחן אוכל
Hey it's great idea.just like this site there is another good site of insurance,tesco car insurance itt provide insurance discount and quality cover at tesco price