6 results found, view free essays on page:
-
Trojan Horses Unauthorized Access
1,176 words... ) and checksum-based change detection tools. Design of configuration review tools requires intimate knowledge of the system, but no knowledge of the worm code. Another class of add-on tools is the intrusion detection tool. This is somewhat analogous to the PC monitoring software, but is usually more complex. This tool reviews series of commands to determine if the user is doing something suspicious. If so, the system manager is notified. One type of network security tool is the wrapper progr...
Free research essays on topics related to: unauthorized access, file system, operating system, computer security, trojan horses -
Computer Security Phone System
1,127 words... up ports. There are two advantages of attacking systems through the phone system. The first advantage is that, phone system attack are hard to trace. It is possible to make connections through multiple switching units or to use unlisted or unused phone numbers to confound a tracing effort. Also by being in the phone system, it is sometimes possible to monitor the phone company to see if a trace is initiated. The second advantage to using the phone system is that a sophisticated host machine ...
Free research essays on topics related to: threats, computer security, controls, phone system, phone -
Computer Crime Credit Card
1,514 wordsIts the weekend, you have nothing to do so you decide to play around on your computer. You turn it on and then start up, you start calling people with your modem, connecting to another world, with people just like you at a button press away. This is all fine but what happens when you start getting into other peoples computer files. Then it becomes a crime, but what is a computer crime really, obviously it involves the use of a computer but what are these crimes. Well they are: Hacking, Phreaking...
Free research essays on topics related to: pirated software, computer crime, credit card, phone system, software piracy -
Macro Viruses Computer Viruses
3,088 wordsComputer Crime Its the weekend, you have nothing to do so you decide to play around on your computer. You turn it on and then start up, you start calling people with your modem, connecting to another world, with people just like you at a button press away. This is all fine but what happens when you start getting into other peoples computer files. Then it becomes a crime, but what is a computer crime really, obviously it involves the use of a computer but what are these crimes. Well they are: Hac...
Free research essays on topics related to: personal computers, computer crime, anti virus, macro viruses, computer viruses -
Technological Advancements Younger Generations
2,762 wordsI. Introduction The 60 s and 70 s Social Advancements Technological Advancements The Time Was Right II. Phreaking Is Born III. The Technical Aspects That Allowed Phreaking To Work IV. Phreaker Culture Famous Phreaker's Phreaking in the Media V. The Downfall of Phreaking VI. What s Left For The Phreaking Community VII. Bibliography. I. Introduction The 60 s and 70 s It s hard for one not to be familiar with the state of our nation in the 60 s and 70 s. The period was arguably the high point of in...
Free research essays on topics related to: younger generations, phone system, technical aspects, technological advancements, independent thought -
Real Threat Phone Company
2,381 wordsThe Prisoner: Phiber Optik Goes Directly to Jail January 12, 1994 Phiber Optik went to prison that week and if you ask me and a whole lot of other people think thats just a shame. To some folks, of course, its just desert. Talk to phone-company executives, most computer-security experts, any number of U. S. attorneys and law-enforcement agents, or Justice Louis Stanton of the Southern District of New York (who handed Phiber his year-and-a-day in the federal joint at Minorsville, Pennsylvania), a...
Free research essays on topics related to: one thing, real threat, jail time, phone company, phone system
6 results found, view free essays on page: