blog




  • Essay / Once hacked, you never go back - 2048

    Is there such a thing as a good hack? Yes, it may sound like an oxymoron, but it exists. Computer hacking is the practice of modifying computer hardware and software to achieve a different goal than that originally intended by the creator. People who participate in these activities are called hackers. These hackers cause many complications to businesses and personal owners with malware and hacking attempts. According to Verizon's Business 2010 Data Breach Investigations for 2009, hacking attempts and malware were the top two and three areas of enterprise data breaches. About forty percent of breaches were due to hacking. These actions are caused by “black hat hackers”, who like to break into companies to show that their security system has flaws. Hackers use security exploits that help them take advantage of a known weakness. Businesses need to hire high-tech security teams to protect against hackers, but they may need to hire a reformed hacker or two to do the job. There is a very long history of computer hacking dating back to the days when texts were beginning to become scripted. Piracy began when text became script and was displayed on Egyptian walls called hieroglyphics. Hieroglyphics were cryptic messages that people displayed to hide valuable secrets from their enemies. Researchers believe that Egyptian hieroglyphs come from the Sumerian script, the oldest known form of written expression. The Sumerian script consists of a combination of logophonetic, consonant alphabetic and syllabic signs. Hieroglyphs are modified Sumerian scripts in which they include phonetic glyphs, logographs and determinatives. When their writing became more and more common, simplified forms of ...... middle of paper ......egypt - Gods, Pyramids, Mummies, Pharaohs, Queens, Hieroglyphics, History, Life in ancient Egypt, Maps. Internet. October 15, 2011. .Editors, Focus. “The History of Piracy.” Focus – Connect with thousands of leading business experts. Get quality answers to your business questions. Internet. October 13, 2011. Kreider, Aaron. “Ambiguous definitions of hacker: contradictory discourses and their impact on the possibilities of resistance.” Campus activism. Internet. October 15, 2011. “Timeline: 40 years of hacking history - CNN.” CNN Featured Articles. November 19, 2001. The web. October 14. 2011. .