Computer hacking is the controversial procedure to manipulate someone’s hardware and soft ware resources in order to achieve a goal; being an outsider, that is definitely not the original purpose. The crackers turn the computer into a pet computer that exploits the weakness of the user’s computer’s operating system and steals information without letting the owner know about it. The general view about the hackers is that they are the computer geeks and know very intricate details of the operating systems. Actually, most of the hackers are usually teenagers or the young people with less information about the computer systems or programming skills. They do not possess any proficiency in writing the programming codes or scripts. This is the reason these people are called script kiddies. Some of the hackers are actually the computer and programming geeks which extensive knowledge about the programs that hack. They may write expert level codes to break into someone’s private information and they enjoy practicing their programming skills by hacking.
Any two or more computers networked can get hacked. The hacking is done by the hacker sending an installation program to the victim computer. Any communication program like email, chat windows, a networked computer, or a web site is able to infect a computer. Sometimes the hackers send the malicious programs in disguise of some other program that the victim computer will accept as a different program. Sometimes a pop up window appears on the websites with a button ‘no thanks’. When the users click on this button, the pop up closes but start to install a malicious program invisibly. Once this program has been installed, the victim has to activate it. The hackers are clever enough to give the victim a feeling that this is a safe program to run e .g. a picture or a multimedia file. Once it has been run, there is nothing to reverse this. These programs attach to the operating systems files and generate their activation every time the computer starts. Once a computer has been hacked, the hacker has access to the victims’ computer resources.
A type of hacking that is deliberately installed by many organizations to find flaws in their networks to identify the flaws in the computers with security purposes. The purpose of this hacking is completely ethical and is used to prevent the identity theft and data stealing crimes. In order to protect the computer system from hacking, a good investment in the installation of a good firewall is effective.