Overview of Hacking

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 4

Abstract

Abstract: Hacking and hacker are terms that generally tend to have negative effect on people. These days, largely due to popular media most people wrongly think of hackers as computer criminal and the person who doing something mischievous things in other computer, delete data, damage os & steal password and cause harm to system release viruses etc. “Hacker” is not computer criminal. The tech community now distinguishes between hackers, who identify security flaws in order to improve computer systems and crackers, who attempt toexploit those flaws to their own advantage. Now different sides of hacking is discussed.

Authors and Affiliations

Sova Pal (Bera)

Keywords

Related Articles

 Image Restoration - A Survey

 Abstract: Image restoration is the process of restoring the degraded or corrupted image back to its original form. It is the initial step of image processing. Noise is added in the image while sending an image from...

 Auto-Scaling, Load Balancing and Monitoring As service in public cloud

 Abstract: Cloud computing[1][2][3] word has changed the classical computing environment in IT industries. it is most emerging & popular technology in IT & research field because of its great feature such as...

 Performance Comparison of K-means Codebook Optimization using different Clustering Techniques

 Vector quantization is a compression technique which is used to compress the image data in the spatial domain. Since it is a lossy technique, so maintaining the image quality and the compression ratio is a diffic...

Management Support System (Mss) In Higher Educational Institutions (Heis): University Of Jos, Nigeria. Ict Support

Abstract: Management support system is of great importance in the institutions of higher learning, as an interactive computer-base system that support cooperate memory or knowledge base that constitutes the problem-solvi...

 Multilevel Privacy Preserving by Linear and Non Linear Data Distortion

 These days privacy preservation topic is based on one of the heated topics of data mining today. With the development of data mining technology, an increasing number of data can be mined out to reveal some potent...

Download PDF file
  • EP ID EP159545
  • DOI -
  • Views 92
  • Downloads 0

How To Cite

Sova Pal (Bera) (2016). Overview of Hacking. IOSR Journals (IOSR Journal of Computer Engineering), 18(4), 90-92. https://europub.co.uk/articles/-A-159545