Free Essay

Computer Memory Hacking

In:

Submitted By jzsantana1
Words 997
Pages 4
Demetrius Hill
CIS 106
Professor J. Merritt
Assignment 1: Computer Memory Hacking
November 15, 2015

As the years go by technology will continually advance at a superb rate. With that comes many risks. The invasion of privacy for individuals and business owners is a concerning matter. The target hackers are aiming for these days is the computer memory. Third party individuals create a backdoor to the hardware and software of a machine to gain access to the hidden functions they may hold. Hackers break into computer systems by exploiting security vulnerabilities, such as poor configuration of web servers, disabled security controls, or poorly chosen or default passwords. Hackers may modify existing computer resources and settings without consent and, in so doing, cause damage or disruption to computer systems or networks. It is easily attainable since its open source and free software. The ethical issues surrounding hacking, stem from several sources mainly dealing with order and control, and information ownership. What is difficult to decipher from all the media hoopla surrounding the terms, "hacker" and "hacking" is both the simultaneous sensationalism and the condemnation of said activities. Of course just recently, even a movie was made and was appropriately called Hackers. The term and all that it implies has truly entered our popular consciousness when Hollywood has made a box office movie on it. As the advancement of computer technologies and systems of information become increasingly more and more complex in today's fast paced modern world and said technologies become an integral part of our homes and lives with rapid progress, we attempt to assert more and more control over what we consider "information," and "property." "Hacking" then seems to be the flagrant abuse of systems of information, complete and utter "unauthorized access."
With the right tools a hacker can have his way with anything. One of the commonly known tools such as the RAM scraper. I currently work at The Home Depot and I've noticed how the tools works. Viruses and worms have each had their day in the spotlight. Remote-access Trojans, which allow a hacker to open and maintain a secret backdoor on infected systems, have had their reign as well. These days, though, point-of-sale RAM scrapers are what’s making the news. Attackers installed these RAM scrapers surreptitiously on the point-of-sale systems used to scan and process credit and debit card transactions at Albertson’s and Supervalu. The tools make it easy to steal card numbers by the millions as they pass through the system. They were used recently in the Target and Home Depot breaches to net the hackers data on more than 100 million bank cards collectively. VISA issued a warning to retailers about their use in 2008. But they’ve become increasingly sophisticated and efficient at stealing massive caches of cards.
Due to the severe damage hacking can cause there are plenty of preventive measures that can be implemented. The most popular method of protection against hacking among personal home computer users is anti-virus software. Companies including Mcafee provide anti-virus software that scans a computer's hard drive for infected material, alerting customers when bad files are found. Firewalls, typically used for computer networks, have also become popular with home users, particularly those who use continual online connections such as cable modems and digital subscriber lines. Firewalls act as a deterrent to hacking by protecting private networks from the public, thus keeping most outsiders from tampering with computer systems. Other software options include Intrusion Detection Systems (IDS), content filtering software, sand-boxing software, and behavior analysis software. IDS is considered one of the best protection methods for large networks. With an IDS in place, system administrators can monitor network requests and detect large-scale malicious attacks. Content filtering software is advanced antivirus software that reads compressed files and allows IT managers to set specific filtering parameters to block threatening email. Sand-boxing software protects against malicious codes. The software creates a protected space within a computer where suspicious code can run, before it has a chance to interact with the main operating system. Behavior analysis software protects computer systems by monitoring entire networks and checking every command of all operations.Unfortunately, many malicious hackers eye security systems not as a deterrent but as a mere obstacle to overcome. However, as long as hacking attacks persist, both individuals and businesses will continue to invest in programs and software designed to protect systems from unwanted visitors.
Computer hacking pervades global society in the digital age. The act of breaking into a secure computer network serves many purposes, from corporate espionage to blatant theft and political insubordination. Computer hacking affects organizations in a variety of ways, some universal, others specific to the nature of the reason for hacking and the business in question. The direction of hacking whether the organization hacks or gets hacked also has an effect. Organizations in the computer and technology industry may benefit or lose drastically from instances of computer hacking. Independent firms specializing in hacking prevention software or network development stand to benefit tremendously as the impact of hacking spreads throughout the world. Small businesses in particular may expand operations exponentially if successful in obtaining and retaining a client base. However, a company in this field whose product or efforts fail in the face of hacking face a ruined reputation and thereby the potential loss of a client base and an inability to attract additional clients.

Zetter, K. (2014, September 14). How RAM Scrapers Work: The Sneaky Tools Behind the Latest Credit Card Hacks. Retrieved November 16, 2015, from http://www.wired.com/2014/09/ram-scrapers-how-they-work/

Dezenhall, E. (n.d.). A Look Back at the Target Breach. Retrieved November 16, 2015, from http://www.huffingtonpost.com/eric-dezenhall/a-look-back-at-the-target_b_7000816.html

Weissman, C. (2015, April 1). 7 easy ways to avoid being hacked. Retrieved November 16, 2015, from http://www.businessinsider.com/how-to-avoid-being-hacked-2015-4

Similar Documents

Free Essay

Computer Memory Hacking

...Computer Memory Hacking By: Christopher Slaton Professor Jamaz Hall CIS 106 The corruption of memory occurs in a program when the contents of a memory location are unintentionally modified due to programming errors; this is termed violating memory safety. Later in the program when the corrupted contents are used it usually leads to program crash or to erratic computer behavior. About 10% of application crashes on Windows systems are due to heap corruption. There are a host of applications that are designed to efficiently develop system software. Programming languages such as C and C++ contain powerful features memory management and pointer arithmetic. These features are designed for developing efficient applications and system software. Memory corruption is one of the most intractable class of programming errors. Computer memory hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creators original purpose. People who engage in computer hacking activities are often called hackers. While some hackers aren’t worried about the or concerned about the consequences of there actions, there is little debate about the fact that hacking has several negative effects. Businesses and governments spend an enormous amount of money to prevent damage from hacking. Hacking on a large scale can cause extensive website damage, an long lasting inconvenience. Computer hacking is largely common among teenagers and young adults. Many...

Words: 642 - Pages: 3

Premium Essay

Computer Memory Hacking

...When it comes to the term “hacking” whether it is someone’s memory or RAM, everyone starts to worry about their information. What is “hacking of memory”? It is to circumvent security and break into with malicious intent. It is finding a way into your computer without your permission let alone your knowledge to gain information like banking and documents. On a larger scale it also means getting into banks and big companies like Target or more recently Sony to gain access to accounts and thus steal money/information. There is however steps to prevent this from happening with the right equipment. To know how to prevent someone from hacking into your computer you first have to know what tools they use. There are a plethora of programs that are used some being dSniff, Netcat and John the Ripper. DSniff passively monitors a network for interesting data like passwords, e-mails, files etc. Netcat is designed to be a dependable back-end that has features that include port scanning, transferring files, port listening, and worse used as a backdoor. John the Ripper is a popular password testing and breaking programs but hackers would use it for the later. For dSniff, someone would have to first have access to your computer by the user either downloading the program by accident or the hacker pushing it to you. Then the tool is activated and monitors your computer for the right information. John the Ripper is used to break into computers and external hard drives. It would not be a tool that...

Words: 774 - Pages: 4

Premium Essay

Computer Memory Hacking

...Computer Memory Hacking NAME Professor CIS 106 November 20, 2014 Technology continues to evolve exponentially. However these technological advancements continue to pose a threat to both individuals and information resources of companies and governments. There is therefore the need to protect one’s data and information due to the emerging threats and risks. Hacking is where third parties create a backdoor version of a hardware and software so as to manipulate or unlock hidden functionalities on a machine. Most of these hacks are open source and free soft wares. These hacks manipulate the firmware update option on many devices to run and install themselves. Many researchers have found out that breaking into a computer’s encrypted hard drive is very easy with the help of the right tools. A research by Princeton University revealed how low tech hackers access even the most well protected computers (Jordan Robertson 2008). This paper details how encryption was coveted for a long time as a vital shield against hackers, but can be manipulated by altering the operations of the memory chips. This paper outlines just how vulnerable the data we store on our computers and laptops is to possible hacking. Through freezing the Dynamic Random Access Memory (DRAM) chip, which is the most frequently used memory chip in personal gadgets. Freezing DRAM makes it retain data for many hours way after the machine loses its power. This data includes the keys used...

Words: 901 - Pages: 4

Premium Essay

Assignment 1: Computer Memory Hacking

...1: Computer Memory Hacking Professor Carl Brown CIS 106 Technology continues to evolve exponentially. However these technological advancements continue to pose a threat to both individuals and information resources of companies and governments. There is therefore the need to protect one’s data and information due to the emerging threats and risks. Hacking is where third parties create a backdoor version of a hardware and software so as to manipulate or unlock hidden functionalities on a machine. Most of these hacks are open source and free soft wares. These hacks manipulate the firmware update option on many devices to run and install themselves. Many researchers have found out that breaking into a computer’s encrypted hard drive is very easy with the help of the right tools. A research by Princeton University revealed how low tech hackers access even the most well protected computers (Jordan Robertson 2008). This paper details how encryption was coveted for a long time as a vital shield against hackers, but can be manipulated by altering the operations of the memory chips. This paper outlines just how vulnerable the data we store on our computers and laptops is to possible hacking. Through freezing the Dynamic Random Access Memory (DRAM) chip, which is the most frequently used memory chip in personal gadgets. Freezing DRAM makes it retain data for many hours way after the machine loses its power. This data includes the keys used to unlock encryptions. If the memory chip...

Words: 901 - Pages: 4

Premium Essay

Hacking

...Danish Jamil et al. / International Journal of Engineering Science and Technology (IJEST) IS ETHICAL HACKING ETHICAL? DANISH JAMIL Department of Computer Engineering, Sir Syed University of Engineering & Technology, Main University Road, Karachi, Sindh-75300,Pakistan mallick251@hotmail.com MUHAMMAD NUMAN ALI KHAN Department of Computer Engineering, Sir Syed University of Engineering & Technology, Main University Road, Karachi, Sindh-75300,Pakistan mallick89@yahoo.co.uk Abstract : This paper explores the ethics behind ethical hacking and whether there are problems that lie with this new field of work. Since ethical hacking has been a controversial subject over the past few years, the question remains of the true intentions of ethical hackers. The paper also looks at ways in which future research could be looked into to help keep ethical hacking, ethical. Keywords— Ethical hacking, hacking, hackers, education and training, risk management, automated security I. INTRODUCTION Understanding the true intentions of the general public is quite a hard task these days, and it is even harder so, to understand the intentions of every single ethical hacker getting into vulnerable systems or networks. Technology is ever growing and we are encountering tools that are beneficial to the general public, but in the wrong hands can create great controversy, breaching our basic right to privacy, respect and freewill. The constant issues highlighted by the media always...

Words: 3982 - Pages: 16

Premium Essay

Ethical Hacking

...Danish Jamil et al. / International Journal of Engineering Science and Technology (IJEST) IS ETHICAL HACKING ETHICAL? DANISH JAMIL Department of Computer Engineering, Sir Syed University of Engineering & Technology, Main University Road, Karachi, Sindh-75300,Pakistan mallick251@hotmail.com MUHAMMAD NUMAN ALI KHAN Department of Computer Engineering, Sir Syed University of Engineering & Technology, Main University Road, Karachi, Sindh-75300,Pakistan mallick89@yahoo.co.uk Abstract : This paper explores the ethics behind ethical hacking and whether there are problems that lie with this new field of work. Since ethical hacking has been a controversial subject over the past few years, the question remains of the true intentions of ethical hackers. The paper also looks at ways in which future research could be looked into to help keep ethical hacking, ethical. Keywords— Ethical hacking, hacking, hackers, education and training, risk management, automated security I. INTRODUCTION Understanding the true intentions of the general public is quite a hard task these days, and it is even harder so, to understand the intentions of every single ethical hacker getting into vulnerable systems or networks. Technology is ever growing and we are encountering tools that are beneficial to the general public, but in the wrong hands can create great controversy, breaching our basic right to privacy, respect and freewill. The constant issues highlighted by the media always reporting some type...

Words: 3974 - Pages: 16

Free Essay

Ethical Hacking

...#2 Research Topic – Ethical Hacking 1. http://www.networkworld.com/news/2009/042409-usenix-hacking.html This is a Network World article talking about the legal risks of ethical hacking. The article talks about whether or not ethical hackers risk prosecution themselves. The articles discusses developing a set of ethical guidelines that can be shown to the government when and if they starting taking a greater role in oversight. It mentions that it might be a good idea to work with law enforcements when it comes to ethical hacking. 2. https://www.eccouncil.org/certification/certified_ethical_hacker.aspx This site provides information about becoming a certified ethical hacker. The group doing the certifying is the International Council of E-Commerce Consultants (EC-Council). This is a member-based organization that certifies individuals in various e-business and information security skills. The site provides a great FAQ, exam info, where to get training, and the path to get certified as an ethical hacker. 3. http://www.go4expert.com/forums/forumdisplay.php?f=55 This is a great online forum for those who are ethical hackers, or interested in becoming one. The page warns that the forum is only for ethical or as a learning purpose. It gives many tips, tricks, and tutorials share amongst other ethical hackers in this online community. 4. http://www.purehacking.com/ This company offers penetration testing and other ethical hacking services for a company to use...

Words: 339 - Pages: 2

Free Essay

Ethical Hacking

...Ethical Hacking Overview    Describe the role of an ethical hacker Describe what you can do legally as an ethical hacker Describe what you cannot do as an ethical hacker Hands-On Ethical Hacking and Network Defense 2  Ethical hackers  Employed by companies to perform penetration tests  Penetration test  Legal attempt to break into a company’s network to find its weakest link  Tester only reports findings, does not solve problems  Security test  More than an attempt to break in; also includes analyzing company’s security policy and procedures  Tester offers solutions to secure or protect the network Hands-On Ethical Hacking and Network Defense 3  Hackers  Access computer system or network without authorization  Breaks the law; can go to prison  Crackers  Break into systems to steal or destroy data  U.S. Department of Justice calls both hackers  Ethical hacker  Performs most of the same activities but with owner’s permission Hands-On Ethical Hacking and Network Defense 4  Script kiddies or packet monkeys  Young inexperienced hackers  Copy codes and techniques from knowledgeable hackers  Experienced penetration testers write programs or scripts using these languages  Practical Extraction and Report Language (Perl), C, C++, Python, JavaScript, Visual Basic, SQL, and many others  Script  Set of instructions that runs in sequence Hands-On Ethical Hacking and Network...

Words: 1129 - Pages: 5

Free Essay

Computer Forensics

...Computer Forensics The world of crime has expanded right along with the explosion of the internet. The modern cyber criminal has veritable global playground in which to steal money and information from unsuspecting victims. Computer forensics is a quickly emerging science against the increasingly difficult battle to bring criminals to justice who perpetrates crimes on others. The computer forensics field is a relatively new investigative tool but enjoys continual advances in procedures, standards, and methodology which is making the identification, preservation, and analyzing of digital evidence a powerful law enforcement apparatus. The job of the cyber forensic professional is to look for clues the attacker left behind on web sites, servers, and even the e-mail message itself that will unravel their sometimes carefully woven veil of secrecy. Attackers come in all forms and from a variety of different circumstances. For instance, an attacker can begin a phishing scam with only a web server they control with very little programming experience and a way to send a lot of e-mail messages. (Jones 4) In order to combat the waves of cyber-attackers, we must utilize Open Source Community applications to combat the continual onslaught of infections, exploitations, and trickery employed everyday against our systems and networks. Today's attacker uses a variety of technologies to employ their methods and understanding those abilities is integral to preparing for an investigation...

Words: 2742 - Pages: 11

Premium Essay

Computer Crime Journal

...Journal - Week 1, Due 09.28.2014 Beginner’s Guide to Internet Protocol (IP) Addresses Beginner’s Guide to Internet Protocol (IP) Addresses. (2011, Mar. 04). Retrieved on September 26. 2014 from ICANN site: https://www.icann.org/resources/files/ip-addresses-beginners-guide-2011-03-04-en The Beginner’s Guide to IP Addresses is a publication by the Internet Corporation for Assigned Names and Numbers (ICANN), the private sector, non-profit corporation which assumes responsibility for IP address space allocation, protocol parameter assignment, domain name system management, and root server system management functions. The publication is part of the Beginner’s Guide series, published in the interest of educating new users about internet issues. The document details IP addresses, why we need them, protocol version history, implementation/distribution methods, and how these topics affect users. This particular concept is not new to me, but reading the document provided a ‘refresher course’ on topics that I have not recently studied. I use this information and technology on a daily basis - but through the course of use it is easy to step away from the fundamental details. In follow up reading, I find myself curious about the success of implementing IPv6 addressing. I know that it can be done, but have not seen a great deal of evidence that it is being done. As of June, 2014 the percentage of users accessing Google via IPv6 reached a milestone. 4%. While the 4% mark...

Words: 7665 - Pages: 31

Free Essay

Manager

...[Chapter 3] Hardwar : Input, Procession, and Output Devices Computer systems : integrating the power of technology - Employing information technology and providing additional processing capabilities can increase employee productivity, expand business opportunities, and allow for more flexibility. - To assemble an effective and efficient system, you should select and organize components while understanding the trade-offs between overall system performance and cost, control, and complexity. ex) Racecar : power delivery(effective and efficiency), how much(cost), how reliable(control), how many engine(complexity) hardware components - computer system hardware components include devices that perform input, processing, date, and output. - Central processing unit (CPU) consists of three associated elements : the arithmetic/logic unit, the control unit, and the register areas. - Primary storage, also called main memory or memory, is closely associated with the CPU. Memory holds program instructions and data immediately before or after the registers. Hardwar components in Action : instruction and execution Instruction time : Step 1) fetch instruction, step 2) decode instruction Execution time : step 3) execute instruction, step 4) store result Completing the instruction phase followed by the execution phase is called a machine cycle. Some processing units can speed processing by using pipelining, whereby the processing unit gets one instruction...

Words: 1317 - Pages: 6

Free Essay

Nios-Multicore Accelerator

...Creating Multiprocessor Nios II Systems Tutorial Creating Multiprocessor Nios II Systems Tutorial 101 Innovation Drive San Jose, CA 95134 www.altera.com TU-N2033005-2.0 Document last updated for Altera Complete Design Suite version: Document publication date: 11.0 June 2011 Subscribe © 2011 Altera Corporation. All rights reserved. ALTERA, ARRIA, CYCLONE, HARDCOPY, MAX, MEGACORE, NIOS, QUARTUS and STRATIX are Reg. U.S. Pat. & Tm. Off. and/or trademarks of Altera Corporation in the U.S. and other countries. All other trademarks and service marks are the property of their respective holders as described at www.altera.com/common/legal.html. Altera warrants performance of its semiconductor products to current specifications in accordance with Altera’s standard warranty, but reserves the right to make changes to any products and services at any time without notice. Altera assumes no responsibility or liability arising out of the application or use of any information, product, or service described herein except as expressly agreed to in writing by Altera. Altera customers are advised to obtain the latest version of device specifications before relying on any published information and before placing orders for products or services. Creating Multiprocessor Nios II Systems Tutorial June 2011 Altera Corporation Contents Chapter 1. Creating Multiprocessor Nios II Systems Introduction to Nios II Multiprocessor Systems . . . . . . . . . . . . . . . . . . . . . . ...

Words: 12538 - Pages: 51

Premium Essay

Report to Compare and Contrast the Hardware Specification of Two Laptops/Desktops or Servers.

... For the purpose of this report, I will be comparing two different computers and comparing the various aspects of hardware specifications of the two separate platforms in detail, including performance in terms of processor, memory and storage. The first computer I have chosen for this report is a 15-inch MacBook Pro with Retina display, which is a powerful laptop, also known as a notebook. This computer is made by a company called Apple, which is possibly the most desirable brand in the computer hardware market today. The second computer I have chosen, for which to compare against the MacBook Pro, is the 27-inch iMac with Retina display, which is an innovative and modern desktop which is also a product of the company Apple. The reason I have chosen these two computers for this report is in part because they are from the same company, and a company which, according to the Forbes website, is number 1 on the list of the world’s most valuable technology brands. (Forbes 2014). Due to the prestigious position of the Apple Company, both these computers will no doubt have been built using the most up to date technology, the best engineers and designers, and the best possible materials. By using the same brand, we will be given a good insight into the differences between the most powerful laptop and the most powerful desktop which were both designed using the best resources possible. To compare these two computers adequately and fairly, I felt it was necessary to choose the model from...

Words: 2565 - Pages: 11

Free Essay

It 190 Unit6

...the following questions. If you use your book, please place the page number from your book in parentheses next to the answer. Requirements: 1. You notice that your computer is running a bit sluggishly and you want to determine if there is a way to increase your performance without purchasing additional hardware or software. Learn more about your computer’s performance by using Windows Task Manager and the MSConfig Utility. Immediately after booting your computer, run Windows Task Manager, then answer the following questions. a. Click the Applications tab and list all applications. Are any of the applications listed as Not Responding? No. b. Click the Processes tab. Identify how many processes are running, the CPU usage, and physical memory usage. 58 processes cpu usage between 0 and 14 % phy mem usage 42% c. While the Processes tab is still selected, click View on the Menu bar and click Select Columns. List four additional columns that could be displayed. PID, session id, cpu time, page faults d. Sort the CPU times in descending order. Which process is using the most CPU resources and what percentage is it using? rundll32.exe 2% e. Sort the memory usage in descending order. Which process is using the most memory and what percentage is it using? iexplore.exe 151,584 k f. Are there any tasks that you don’t recognize? i. If so, list these tasks...

Words: 1911 - Pages: 8

Free Essay

Nuckal

...MAIN MEMORY Refers to physical memory that is internal to the computer. The word main is used to distinguish it from external mass storage devices such as disk drives. Another term for main memory is RAM. The computer can manipulate only data that is in main memory. Therefore, every program you execute and every access you must be copied from a storage device into main memory. The amount of main memory on a computer is crucial because it determines how many programs can be executed at one time and how much data can be readily available to a program. Because computers often have too little main memory to hold all the data they need, computer engineers invented a technique called swapping, in which portions of data are copied into main memory as they are needed. Swapping occurs when there is no room in memory for needed data. When one portion of data is copied into memory, an equal-sized portion is copied (swapped) out to make room. INTRODUCTION OF DRAM Dynamic random-access memory (DRAM) is a type of random-access memory that stores each bit of data in a separate capacitor within an integrated circuit. The capacitor can be either charged or discharged; these two states are taken to represent the two values of a bit, conventionally called 0 and 1. Since even "nonconducting" transistors always leak a small amount, the capacitors will slowly discharge, and the information eventually fades unless the capacitor charge is refreshed periodically. Because of this refresh requirement...

Words: 3990 - Pages: 16