Topic > Once you get hacked, you never go back - 2048

Is there such a thing as good hacking? Yes, it may seem like an oxymoron but it exists. Computer hacking is the practice of altering computer hardware and software to achieve a goal other than the perpetrator's original goal. People who participate in these activities are called hackers. These hackers cause many complications for businesses and personal owners with malware and hacking attempts. According to Verizon's 2010 Business Data Breach Investigations for the year 2009, hacking attempts and malware were the top two and three in corporate data breaches. About forty percent of breaches are due to hacking activities. These actions are caused by “black hat hackers,” who like to break into companies to demonstrate that their security system has flaws. Hackers use security exploits that help them take advantage of a known weakness. Companies need to hire high-tech security teams to protect themselves from hackers, but they may have to hire a reformed hacker or two to get the job done. The history of hacking is very long and dates back to when texts were scripted. The hacking originally began when the text was first written and was posted on Egyptian walls called hieroglyphics. Hieroglyphics were encrypted messages that people posted to hide valuable secrets from enemies. Researchers believe that Egyptian hieroglyphics come from Sumerian writing, which was the earliest known form of written expression. Sumerian writing consists of a combination of logophonetic, alphabetic, consonantal, and syllabic signs. Hieroglyphs are modified Sumerian scripts in which there are phonetic, logographic and determinate glyphs. As writing these became more and more common, simplified forms of......medium of paper......Egyptian Egypt - Gods, Pyramids, Mummies, Pharaohs, Queens, Hieroglyphics, History, Life in Ancient Egypt , Maps. Network. 15 October 2011. .Editors, Focus. “The History of Hacking.” Focus: Connect with thousands of leading business experts. Get quality answers to your business questions. Network. October 13, 2011. .Kreider, Aaron. “Ambiguous Definitions of Hackers: Conflicting Discourses and Their Impact on Possibilities for Resistance.” University activism. Network. October 15, 2011. "Timeline: 40 Years of Hacking History - CNN." Featured Articles from CNN. November 19, 2001. Web. October 14. 2011. .