Technology in Action, IntroductionFeatures
|
From inside the book
Results 1-3 of 37
Page 270
... Hackers Although there is a great deal of dissention ( espe- cially among hackers themselves ) as to what a hacker actually is , a hacker ( also called a cracker ) is defined as anyone who breaks into a computer system ( whether an ...
... Hackers Although there is a great deal of dissention ( espe- cially among hackers themselves ) as to what a hacker actually is , a hacker ( also called a cracker ) is defined as anyone who breaks into a computer system ( whether an ...
Page 272
... hackers may break into home computers bent on industrial espionage . For other hackers , hacking is a way to pass time . WHAT HACKERS STEAL Could a hacker steal my credit card number ? If you perform financial transactions online , such ...
... hackers may break into home computers bent on industrial espionage . For other hackers , hacking is a way to pass time . WHAT HACKERS STEAL Could a hacker steal my credit card number ? If you perform financial transactions online , such ...
Page 274
... HACKERS GAIN ACCESS How exactly does a hacker gain access to a computer ? Hackers can gain access to computers directly or indirectly . Direct access involves sitting down at a computer and installing hacking soft- ware . This rarely ...
... HACKERS GAIN ACCESS How exactly does a hacker gain access to a computer ? Hackers can gain access to computers directly or indirectly . Direct access involves sitting down at a computer and installing hacking soft- ware . This rarely ...
Contents
Specialty Computers | 21 |
IN FOCUS | 22 |
Choosing the Right Internet Connection Option | 73 |
Copyright | |
27 other sections not shown
Other editions - View all
Common terms and phrases
allows application software audio BITS AND BYTES browser cable cell phone chapter chip computer system computer's create database delete designed desktop dial-up digital cameras display document drive bays e-mail electronic Ethernet example files firewall FireWire flash memory floppy floppy disk folder graphics hackers hard drive hardware images inkjet inkjet printers input install Internet connection keyboard laptop line network located Mbps Microsoft Microsoft Word modem monitor mouse multimedia nodes operating system options phone line power line network printer processor puter screen search engine server shown in Figure software applications Sound Byte spam speed spreadsheet system unit tablet PC tasks TechTV tion transfer upgrade users viruses ware Windows XP Word Zip disk