Ryan B Lauren C Luisa C Joey F. Computer hacking is the practice of modifying computer hardware and...
-
Upload
dustin-short -
Category
Documents
-
view
216 -
download
0
Transcript of Ryan B Lauren C Luisa C Joey F. Computer hacking is the practice of modifying computer hardware and...
![Page 1: Ryan B Lauren C Luisa C Joey F. Computer hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s.](https://reader036.fdocuments.us/reader036/viewer/2022062423/56649f3a5503460f94c574f9/html5/thumbnails/1.jpg)
Ryan BLauren CLuisa CJoey F
![Page 2: Ryan B Lauren C Luisa C Joey F. Computer hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s.](https://reader036.fdocuments.us/reader036/viewer/2022062423/56649f3a5503460f94c574f9/html5/thumbnails/2.jpg)
Computer hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose
Computer hacking is becoming more popular
![Page 3: Ryan B Lauren C Luisa C Joey F. Computer hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s.](https://reader036.fdocuments.us/reader036/viewer/2022062423/56649f3a5503460f94c574f9/html5/thumbnails/3.jpg)
Creator of Panda Virus Began hacking at 17 Took lessons from Lei Lei Bombing of China’s
embassy in Belgrade Land Rover "Bread will come. Milk will
come. Everything can be restarted all over again"
![Page 4: Ryan B Lauren C Luisa C Joey F. Computer hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s.](https://reader036.fdocuments.us/reader036/viewer/2022062423/56649f3a5503460f94c574f9/html5/thumbnails/4.jpg)
Virus located in email Icons become pandas Steal virtual credits from
10 different sources Earn $+1200 per day Sold siphoning money tool
to 10 distributors for $120 each
Panda attack became known as the first case of organized cybercrime in China
![Page 5: Ryan B Lauren C Luisa C Joey F. Computer hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s.](https://reader036.fdocuments.us/reader036/viewer/2022062423/56649f3a5503460f94c574f9/html5/thumbnails/5.jpg)
Each person does a specific job and gets paid piecemeal by selling his work
Programmer of malicious programs assembles program with lines of code bought elsewhere
Others spread the malicious software and trigger it
![Page 6: Ryan B Lauren C Luisa C Joey F. Computer hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s.](https://reader036.fdocuments.us/reader036/viewer/2022062423/56649f3a5503460f94c574f9/html5/thumbnails/6.jpg)
Former hackers are hired by Chinese police to break into accounts of internet users.
China rejects the claim China is the country worst hit by world
wide hackers
![Page 7: Ryan B Lauren C Luisa C Joey F. Computer hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s.](https://reader036.fdocuments.us/reader036/viewer/2022062423/56649f3a5503460f94c574f9/html5/thumbnails/7.jpg)
Computer hacking is a world-wide crisis
![Page 8: Ryan B Lauren C Luisa C Joey F. Computer hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s.](https://reader036.fdocuments.us/reader036/viewer/2022062423/56649f3a5503460f94c574f9/html5/thumbnails/8.jpg)
+20 companies were attacked by Aurora
Targets specific employers within the companies
New York times reported that attacks have been traced to computers in China’s Shanghai Jiaotong University and Lanxiang Vocational School in Shandong Province
![Page 9: Ryan B Lauren C Luisa C Joey F. Computer hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s.](https://reader036.fdocuments.us/reader036/viewer/2022062423/56649f3a5503460f94c574f9/html5/thumbnails/9.jpg)