Computer Memory and Ram Hacking
Autor: Amanda Coates • April 24, 2016 • Essay • 983 Words (4 Pages) • 761 Views
Assignment #6: Computer Memory and Ram Hacking
Amanda R. Coates
CIS-106 Introduction to Information Technology
Professor Levonia Parker
February 11, 2016
Computer Memory and Ram Hacking
- Describe what hacking of memory or hacking of RAM means.
Hacking is any technical effort used to manipulate the normal behavior of network connections and connected systems. Hacking is any activity that engaged in clever, constructive, and tricky work that developing malicious programming attacks on the Internet and other networks. Memory hacking is a technique that involves modifying the game’s memory, which in turn alters the game play. This is how cheats such as monster vacuums, godmodes, fly hack, and other cheats are made.
- Examine the common tools that hackers use to hack into memory of computing devices. Detail two real-life examples of such tools in action.
The most common Memory hacking is accomplished by using every hacker’s best tool called Cheat Engine. Cheat Engine is done by creating a DLL file that is injected into the game process. Another less commonly used method is done by using other executable programs (EXEs), but it is harder to bypass. Memory hacking can do whatever you can imagine. It can do monster vacuums, godmodes, game exploits, packing editing (modifying data sent to the game server), and more can be done with memory edits. Another common tools for hacking is “Packet editors”. However, Cheat Engines is the most powerful tool in hacking, Cheat Engine can search for address, modify game memory, and basically just hack into system.
- Identify three best practices that one should use to protect their computer(s) from being hacked.
The best practices are using firewalls, anti-virus programs, and anti-malware programs.
- Firewalls- A firewall will assist your computer and data from being hacked or being enter or leave without your permission. A firewall makes you invisible on the internet and blocks communications from unauthorized sources. Computer that used the internet should use firewalls at the same time. At the moment, there are two types of firewalls that include software and hardware. An example of a software firewall is the “one that is built in with the operating system such as Windows 7 and 8”. Firewalls should be left on by default. A hardware firewalls include a “broadbands routers”. A router sits between your “modem and your computer on network.” It is hard to hack your computer or network when it is hidden behind a hardware firewall box. It is crucial to “configure your router by changing the default password to one that is difficult to crack.”
- Anti-virus programs- A computer program that destroy a virus which is itself a computer program. A computer virus is a program that spreads by first infecting files or the system areas of computer and making copies of itself. Computer viruses can harm and destroy files and other systems. It can spread to other computer programs. The job of the antivirus software is to protect your computer from viruses that destroy your data, slow down your computer’s performance, and cause your computer to crash and be corrupted. The anti-virus software scans your computer for patterns that indicate virus infection. It can scan for virus programs that hackers have written to destroy your data. The patterns that an antivirus software looks for are based on definitions and signatures of known viruses.
- Anti-malware programs- Malware is a “computer threats that include spyware, adware, Trojans horses, and other unwanted programs that may be installed without your knowledge.” The spyware can gather information through internet connection without your knowledge. Spyware introduce different files into your computers that may threaten or harm your data. These files are difficult to remove or find. Spyware can “track online activity and look for websites visited, financial data like credit card on your screen.” Spyware can record keyboard strokes like account number and bank accounts. The spyware programs may eliminate many of these threats. Anti-spyware and malware programs can help eliminate many of these threats. It is recommended that you use at least two or three anti-malware or spyware programs on your computer, these are sites offering free anti-malware software include Spybot Search and Destroy, super anti-spyware, and Malwarebytes.
Keeping your software up to date and installed patches for both your operating system and your software applications. Software patches or updates address problems or vulnerability within a program. Patches can protect your computer from hackers. Using a strong password can protect you from hackers. Always change your passwords and avoid spam emails in which hackers can retrieve your passwords.
The significance of hacking in modern society and organization are that hacking causes businesses and organizations to lose billions of dollars yearly as a result of “hacking and other computer breaches.” Organizations and companies can lose confidence and be held legally responsible for any loss to their customers. The attack of hacking cost businesses legal fees, investigative fees, stock performance, reputation management, customer support and etc. Organizations and businesses are investing more money into preventing an attack before it happens. Digital piracy is a form of hacking so widely occurring that the US passes a law that “criminalize production and dissemination of technology to circumvent measure taken to protect copyrights.” Companies must be careful about their own employee that may try to hack them by taking advantage of passwords, networks and financial information. Hackers can put a virus onto the company’s network and destroy the company’s files that will cost millions of dollars. As the number of computer crimes rise, many companies are using anti-spamware software, anti-spyware, software firewalls, and antivirus software to prevent hackers from getting into their computers. Hacking may be controlled if stopped by these anti-hacker software’s.
...