answersLogoWhite

0

CRACKERS AND HACKERS

A hacker is a person intensely interested in the arcane and recondite workings of any computer operating system. Hackers are most often programmers. As such, hackers obtain advanced knowledge of operating systems and programming languages. They might discover holes within systems and the reasons for such holes. Hackers constantly seek further knowledge, freely share what they have discovered, and never intentionally damage data.

A cracker is one who breaks into or otherwise violates the system integrity of remote machines with malicious intent. Having gained unauthorized access, crackers destroy vital data, deny legitimate users service, or cause problems for their targets. Crackers can easily be identified because their actions are malicious

User Avatar

Wiki User

16y ago

What else can I help you with?

Trending Questions
How do you complete quests on the game Feudalism? What is the difference between a serial port and a parallel port? What if your friend has discoverd he has 128 mb of ram installed in two slots on his motherboard that has four slots and supports dual channeling the board runs at 667 mhz and uses ddr2 non-ecc dimm? What is Hamming Code Explain its importance with suitable example? What pre-requistes are required for ccnp training? What are the features of input devices? The information contained on the Internet makes it very much like a giant version of what? The performance of a computer is reduced after it has been using the Internet Which three tools could be run to try to improve the performance of the computer Choose three? What does the AR DS code Trainer Toolkit Enabler do in yugioh world championship 2008? Is there any client API for eXist db? What is computer aided design also known as CAD used for? Which description does NOT apply to the Internet? How entities can be related to each other using primary and foreign keys? What is the difference between a notebook webcam and a desktop webcam? How is a file processing system approach different from database approach? What is Each electronic document on the Web is called a Web which can contain text graphics audio and video.? How does serial ATA help keep a computer case cool better that parallel ATA? What is the broadcast address for the subnet 10.150.100.96-27? 13 What is the main reason why the old floppy discs have died out? What is a group of two or more computers and other devices connected by the means of one or more communications media called?