Wednesday, July 17, 2019
Computer Memory Hacking Essay
Hacking of memory or hacking of impel describes when a person or person(s) gains illegitimate rile to the thrust (random access memory) of a computing device governing body. There a duet of soils that one might participate in hacking the memory of a computer system. star reason that a person may attempt to gain unauthorized access to a computer is simply to abut that they are capable of doing so. By demonstrating this skill, the drudge (the person gaining unauthorized access) has shown that the security of the computer system can be pass aroundd.This is a great deal affairful when the owner of the computer system call fors to ensure its security is optimal. Another reason a person or person(s) would want to access a computer systems RAM without the owners permission would be to gain tuition from that computer system. That learning may or may not include own(prenominal) data such as names, addresses, hollo numbers, email addresses, credit card information, bank not e numbers, and other pertinent information that thieves could use to gain financially.Hackers use many tools and techniques to penetrate the security of the computer system that they make out to attack. Some techniques can include dns spoofing, megabucks sniffers, social design, and trojan dollar bills. DNS spoofing occurs when the hacker changes the DNS accession on a server and redirects the browser to an alternate site. This method is often employ to steal usernames, passwords, or other private information. Packet sniffers were originally designed for administrators to rectify their systems. They are devices that intercept and interpret packets of information crossing a earnings. Social engineering is the method of obtaining personal information and network information through deception or manipulation. For example, pretending to be an employee who forgot their username/password. Trojan horse programs are often referred to as the gumption door to computer systems.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.