Computer Memory Hacking
Computer Memory Hacking
Name:
Institution:
Computer Memory Hacking
Question 1
Hacking of the memory or hacking of the RAM is the process by which a computer’s memory is modified in a view to accomplishing tasks or goals, which are not the initial intended purpose. It is gaining unauthorized access to a computer’s memory or RAM. RAM is an abbreviation for Random Access Memory. The individual who engages this activity is referred to as a hacker (Erickson, 2008).
Question 2
Hackers use thousands of tools to hack computer memory. Some are more effective than others are. The newest memory hacker tool is the RAM Scraper. The RAM Scraper has been used to access computer memories of big stores such as Target and Home Depot recently. It is launched at the point of sale of the computers in the stores, to steal valuable customer card data. The RAM Scraper was installed at the point of sales systems and after that used to process card transactions that passed through the system. It uses a Remote-access Trojan and for it to work; it has to be launched secretly at the POS system. This can be done by sending a link to a cashier, or an infected email. Once he clicks on the link, the malware is silently installed in the system. This is referred to as phishing (Lininger & Vines, 2005). Once in the system, the hackers can access the administrator’s files where they steal valuable card data such as PINs.
The other most common hacker tool is a virus. These are often sent through emails, compact disks, and even on websites. Once one opens a file, the virus launches itself into the system, making the memory vulnerable to unauthorized access from outsiders. A virus is a program or software that is inserted in a computer memory to copy itself into files in the computer memory. A virus causes the memory to behave unexpectedly and breach the security of the system. The hacker can now access the computer memory remotely, and this can be very destructive, depending on the hacker’s intention. One of the greatest viruses to cause the largest damage was the Melissa virus, which was the first successful email-ware virus. It inserted quotes from the Simpsons cartoon into Word documents. It is estimated to have caused more than $80million worth of damage.
Question 3
One can protect their computer memory from being hacked. This can be done using the following ways:
- The most important practice is to protect one’s computer by installing anti-virus software. Examples include Kaspersky, Norton, and Avira antivirus.
- Avoid clicking on advertisements when online. These are often worms or viruses in disguise; when an individual clicks on the advertisement, the worm or virus installs itself secretly in the system, which corrupts the computer memory and may even crash it
- People should avoid adult websites. This is where hackers thrive. People should resist the temptation of visiting such sites as they are laden with viruses and other malware.
Question 4
Computer hacking
is not always malicious. Sometimes it is used with good intentions, which are referred to as ethical hacking. Ethical
hacking is hacking the computer memory to
identify vulnerability and loopholes in a system. Most organizations have hired
ethical hackers to assist them in ensuring their computer memory and systems are protected from malicious hackers. It has
had a positive impact in education, where
students are learning how to be ethical hackers, which is a career in itself.
People now understand that hacking does not always have to be malicious, but
constructive too.
References
Erickson, J. (2008). Hacking. San Francisco, Calif.: No Starch Press.
Lininger, R., & Vines, R. (2005). Phishing. Indianapolis, IN: Wiley Pub.
Top-quality papers guaranteed
100% original papers
We sell only unique pieces of writing completed according to your demands.
Confidential service
We use security encryption to keep your personal data protected.
Money-back guarantee
We can give your money back if something goes wrong with your order.
Enjoy the free features we offer to everyone
-
Title page
Get a free title page formatted according to the specifics of your particular style.
-
Custom formatting
Request us to use APA, MLA, Harvard, Chicago, or any other style for your essay.
-
Bibliography page
Don’t pay extra for a list of references that perfectly fits your academic needs.
-
24/7 support assistance
Ask us a question anytime you need to—we don’t charge extra for supporting you!
Calculate how much your essay costs
What we are popular for
- English 101
- History
- Business Studies
- Management
- Literature
- Composition
- Psychology
- Philosophy
- Marketing
- Economics