answersLogoWhite

0

they break into computers for information

User Avatar

Wiki User

16y ago

What else can I help you with?

Related Questions

How do Hackers Hack a Computer?

Hackers hack computers by using viruses or coding that enables them to get onto your network and access files.


When hackers use computers to launch an attack on another computer the computers used to stage the attack are known as?

zombies


What are the typical threats a computer user can encounter when using the computer?

Common threats to computers nowadays include: * Malware (Viruses, Worms, Trojan Horses) * Hackers * Spam * Phishing


A person who uses one computer to break into another is a?

Cracker. Hackers are people who enjoy using computers, generally to make them do things they were not intended to do - like running Linux on a playstation. Crackers are a subset of hackers that use their skills to get into computer systems, generally without consent.


What is the importance of computer engineering in todays society?

Computers and computer technology are always changing and developing. Computer engineering is important because today's economy is dependent on computer systems that are fast, up-to-date, and secure from hackers.


How do bounties combat computer crime?

bountiesbounties are hackers who are sabotaging information in computers. They do this by applying firewall, passwords, encryption, audit trail etc in order to trace who ever was using the computer.


What does hacking do?

Hacking is the act of finding and exploiting weaknesses in computers, networks, software, or devices to gain access, control, or information. It can be used for legitimate purposes, such as security testing, vulnerability research, and improving defenses, when performed with authorization, or for malicious ends like data theft, financial fraud, service disruption (DDoS), spying, or installing malware. Techniques range from social engineering and phishing to exploiting software bugs, misconfigured systems, or weak credentials. The effects of hacking vary from minor privacy breaches to large-scale financial loss, reputational damage, and threats to public safety, depending on the attacker’s intent and the target. Defensive measures—patching, strong authentication, network segmentation, monitoring, and security training—help reduce the risk and impact of hacking.


What does a computer hacker do?

A hacker is a programmer who enjoys the challenge of breaking into other computers but does no harm, true hackers have a code of ethics and look down upon crackers.


Why do you have to type in those letters when you submit something on a computer?

This is used to prevent viruses, hackers, or computers gone crazy from getting into different things, the Internet for instance.


What type of program is a backdoor?

They are computer viruses that let hackers and other viruses in to your computer undetected. They are computer viruses that let hackers and other viruses in to your computer undetected.


Can you sue computer hackers?

Yes.


What law is broken by computer hackers?

The Computer Misuse Act.