Warning: Use of undefined constant referer - assumed 'referer' (this will throw an Error in a future version of PHP) in /usr/home/essaywo/public_html/essays on line 102

Warning: Use of undefined constant host - assumed 'host' (this will throw an Error in a future version of PHP) in /usr/home/essaywo/public_html/essays on line 105

Warning: Cannot modify header information - headers already sent by (output started at /usr/home/essaywo/public_html/essays:102) in /usr/home/essaywo/public_html/essays on line 106

Warning: Cannot modify header information - headers already sent by (output started at /usr/home/essaywo/public_html/essays:102) in /usr/home/essaywo/public_html/essays on line 109
Wire Pirates - Online Essays

Wire Pirates


Someday the Internet may become an information superhighway, but right now it is
more like a 19th-century railroad that passes through the badlands of the Old
West. As waves of new settlers flock to cyberspace in search for free
information or commercial opportunity, they make easy marks for sharpers who
play a keyboard as deftly as Billy the Kid ever drew a six-gun.

It is difficult even for those who ply it every day to appreciate how much the
Internet depends on collegial trust and mutual forbearance. The 30,000
interconnected computer networks and 2.5 million or more attached computers that
make up the system swap gigabytes of information based on nothing more than a
digital handshake ...

Want to read the rest of this paper?
Join Essayworld today to view this entire essay
and over 50,000 other term papers

it can be
instructive to look at the security record of other parts of the international
communications infrastructure.

The first, biggest error that designers seem to repeat is adoption of the
"security through obscurity" strategy. Time and again, attempts to keep a system
safe by keeping its vulnerabilities secret have failed.

Consider, for example, the running war between AT&T and the phone phreaks. When
hostilities began in the 1960s, phreaks could manipulate with relative ease the
long-distance network in order to make unpaid telephone calls by playing certain
tones into the receiver. One phreak, John Draper, was known as "Captain Crunch"
for his discovery that a modified cereal-box whistle could make the 2,600-hertz
tone required to unlock a trunk line.

The next generation of security were the telephone credit cards. When the cards
were first introduced, credit card consisted of a sequence of digits (usually
area code, number and billing office code) followed by a "check ...

Get instant access to over 50,000 essays.
Write better papers. Get better grades.


Already a member? Login


CITE THIS PAGE:

Wire Pirates. (2004, February 16). Retrieved April 24, 2024, from http://www.essayworld.com/essays/Wire-Pirates/3132
"Wire Pirates." Essayworld.com. Essayworld.com, 16 Feb. 2004. Web. 24 Apr. 2024. <http://www.essayworld.com/essays/Wire-Pirates/3132>
"Wire Pirates." Essayworld.com. February 16, 2004. Accessed April 24, 2024. http://www.essayworld.com/essays/Wire-Pirates/3132.
"Wire Pirates." Essayworld.com. February 16, 2004. Accessed April 24, 2024. http://www.essayworld.com/essays/Wire-Pirates/3132.
JOIN NOW
Join today and get instant access to this and 50,000+ other essays


PAPER DETAILS
Added: 2/16/2004 07:05:32 AM
Category: Computers
Type: Premium Paper
Words: 1088
Pages: 4

Save | Report

SHARE THIS PAPER

SAVED ESSAYS
Save and find your favorite essays easier

SIMILAR ESSAYS
» Outlaws In The Frontier
» The Cybernetic Plot Of Ulysses
» Benjamin Franklin Was A Man Of ...
Copyright | Cancel | Contact Us

Copyright © 2024 Essayworld. All rights reserved