-
Hacker is the transliteration of the English word "hacker", derived from the English verb hack, which originally meant "hack", and was later used to refer to those programmers who love to explore the deep technology of computers. The first hackers appeared on the campus of the Massachusetts Institute of Technology, they were computer enthusiasts, and they liked to explore the mysteries of computers in depth, rather than just learning what others assigned to know about computers, as ordinary people do. They were ingenious, skilled, and willing to study, and in their spare time, they often used the computer to play their own games, joke or play pranks, and the word "hacker" at that time was a word with a positive connotation. "Hackers" have played an indelible role in the development of the Internet, but later with the popularization of computers, the hacker team has become more and more complex, and some people have begun to use hacking technology to spy on other people's privacy, vent their personal anger, destroy network resources, seek personal gain, and even carry out computer crimes, bank theft, credit card theft and other cases occur from time to time, gradually, the image of hackers in people's minds has become complicated......
-
A computer hacker is a person who uses a system security breach to attack, destroy, or steal information from a network. Hackers first originated from English hackers, and they were praised in the computer industry in the United States in the early days. But in the first report, the word hacker often refers to those software hackers.
The term hacker originally referred to an enthusiastic person in computer technology.
Highly skilled computer specialists, especially programmers. Today, however, the term hacker has been used to refer to those who specialize in the use of computer networks.
Engage in vandalism or mischief.
Guys. The correct English name for these people is cracker, which some translate as hacker.
The word hacker originally meant a computer enthusiast and a clever programmer, and is now extended to a person who uses computer technology to create terror or engage in sabotage activities. The first hackers were programmers who discovered and patched security vulnerabilities in their systems. Hackers, on the other hand, don't necessarily make up early schedules, but for a variety of purposes, hacking techniques are used to break into systems to obtain sensitive information, or even disintegrate or crash systems.
The main destructive role of hackers is to illegally peep into the core secrets of others on the network, intercept passwords in use, manipulate computers from a distance to steal huge sums of money, transplant latent viruses and at critical moments.
Activate it, transmit reactionary, pornographic, violent, and grotesque information, use a large amount of information garbage to block the output and input channels of a terminal in the network, and so on.
Hacking first began in the 50s of the 20th century, and the first computer was in 1946 at the University of Pennsylvania. >>>More
360TimeProtect time protection tool.
Thanks to MJ0011 for delivery. >>>More
Beijing University of Posts and Telecommunications, Beijing Aerospace, Zhejiang University, Wuhan University, etc.; Later computers, they all relied on mathematics and physics.
- Give examples of the impact of computer networks on modern human civilization and what do you think will be the future of computing + machine networks. >>>More
What is "logic"? To put it simply, logic is that people artificially divide some things that are not regular into regular combinations in order to facilitate memory, such as: "banana, 32, pineapple, high jump, running, boy" can meet the condition of "is a Chinese character", according to the logic to divide "banana, pineapple, high jump, running"; If you can meet the condition of "can eat", there will be "banana, pineapple" logically, and the simple point of logical address is to establish some kind of connection or operation, and meet certain conditions as the premise to distinguish some types of data, for example, there are a lot of data in your computer's memory address, and all the data that can meet the requirements of "greater than 2561 and less than 3651 and are odd" is named "xsd", and the address named "xsd" is the logical address. >>>More