We get it: Ads are not what you are here for. But ads help us keep the lights on. So, add us to your adblock's whitelist or register for free to remove this notice. Either way, you are supporting our journalism. We'd really appreciate it.
What do you know about hacking? Do you think getting into someone’s Facebook account or Google account is called hacking? No. Not really. In computer networking, hacking is any technical effort to manipulate behavior of network, connections and connected systems.
Hacking is historically referred to constructive, clever technical work that was not necessarily, related to computer systems. So when did hacking originate? MIT engineers in 1960s carried out some harmless technical experiments and fun learning activities. These were so called hacks.
Before the internet, several hackers in US experimented with methods to modify telephones, for making ‘FREE’ long distance calls over the phone network illegally. As computer networking and internet exploded in popularity, data networks became the most common target of hackers.
Malicious attacks on computer networks are officially known as cracking, while hacking truly applies only to activities having good intentions. However, most non technical people fail to make this distinction.
Hacking on computer networks is often done through scripts or other network programming. These programs generally manipulate data passing through a network connection in ways designed to obtain more information about how the target system works.
Many such pre-packaged scripts are posted on the Internet for anyone, typically entry-level hackers to use. More advanced hackers may study and modify these scripts to develop new methods.
A few highly skilled hackers work for commercial firms with the job to protect that company’s software and data from outside hacking. Cracking techniques on networks include creating worms, initiating denial of service (DoS) attacks, or establishing unauthorized remote access connections to a device.
Let me know if I have missed anything in the comments section below.