Hacking

=
               ======

=
 <span style="color: rgb(236, 91, 232)"> <span style="color: rgb(0, 0, 0)">__<span style="color: rgb(237, 120, 120)"><span style="font-family: Georgia,serif">Hacking  __           ======

<span style="font-family: Georgia,serif">

<span style="font-family: Georgia,serif; color: rgb(214, 102, 102)"><span style="font-family: Georgia,serif; text-align: center; display: block"> <span style="font-family: Georgia,serif; color: rgb(214, 102, 102)"><span style="font-family: Georgia,serif; text-align: center; display: block">//What is Hacking?//

=
<span style="font-family: Georgia,serif"><span style="font-family: Georgia,serif">Hacking is the process of illegally corrupting or extracting private information from a computer system or network. They are generally of malicious intent, wishing to render networks unable to function by overloading their systems with traffic and causing them to crash, or steal data such as credit card details and security numbers. As such, Hacking is considered a very serious crime. ====== <span style="font-family: Georgia,serif"> <span style="font-family: Georgia,serif; color: rgb(214, 102, 102)"><span style="font-family: Georgia,serif; text-align: center; display: block">//What are the effects of Hacking on society?//

<span style="font-family: Georgia,serif">Some of the reasons why Hackers are so intent on targeting home and office computers are to gain client or customer information in order to spam them, discover credit card details and social security numbers for committing identity fraud or theft, steal passwords for access to online bank accounts etcetera, and access personal details of the computer owner.

<span style="font-family: Georgia,serif; color: rgb(214, 102, 102)"><span style="font-family: Georgia,serif; text-align: center; display: block">//What are the issues that arise from Hacking?//

<span style="font-family: Georgia,serif"> <span style="font-family: Georgia,serif"><span style="font-family: Georgia,serif">Hackers are most often convicted for committing treason against their country by infecting or hacking into the system of military computers and ruining or tampering with their security levels. The other issues are listed above, as they are also to do with the effects of Hacking on the general public.

<span style="font-family: Georgia,serif"> <span style="font-family: Georgia,serif; color: rgb(214, 102, 102)"><span style="font-family: Georgia,serif; text-align: center; display: block">//What are the possible solutions for Hacking?// <span style="font-family: Georgia,serif"> In order to deter Hackers from committing these or other crimes, Hacking has been deemed an offence punishable by custodial sanctions. However, as Hackers are masters at covering their tracks, it is very difficult to be correct in the assumption or accusation of somebody as a Hacker. The only possible preventative measures to Hacking are to increase security within networks and over the internet, so as to make sure there are limited cracks in the connection. We must also be careful not to download anything suspicious, as it might be a program such as a Trojan, which seems harmless but in fact creates an access point for the Hacker. In order to prevent this, installing a firewall or anti-virus software may be helpful.

<span style="font-family: Georgia,serif"><span style="display: block; font-family: Georgia,serif; text-align: center"><span style="display: block; color: rgb(136, 172, 246); font-family: Georgia,serif; text-align: center"><span style="display: block; font-size: 80%; color: rgb(142, 241, 148); font-family: Georgia,serif; text-align: right"><span style="font-family: Georgia,serif; color: rgb(231, 50, 50)">© britstix ; 10 'o8