This simply means File transfer protocol. You use this when download image files or any other files. Now, onto hacking. Most people stereotype people simply as “hackers,” but what they don’t know is that there are three different types of computer whizzes. First, there are hackers. Hackers simply make viruses and fool around on the internet and try to bug people. They make viruses so simple. The get a program called a virus creation kit.
This program simply makes the virus of beholders choice. It can make viruses that simply put a constant beep in you omputer speakers or it can be disastrous and ruin your computers hard-drive. Hackers also go onto chat rooms and cause trouble. Chat rooms are simply a service given by internet providers to allow people all over the world to talk. As I was saying, Hackers go into these rooms and basically try to take over because in chat rooms there is one person in control. This person has the ability to put you in control or simply ban you.
These hackers use programs that allow them to take full control over any room and potentially, make the omputers on the other side overload with commands which in end, makes their computer collapse. Another type of computer whiz is called a cracker, crackers are sort of malicious. Crackers use security programs used by system operators for evil purposes. System operators use these programs to search the net for any problems, but they can be used for other purposes. When Crackers get into systems they usually just fool around but never destroy things.
The last computer whiz is called a phreaker. Don’t let the name fool ou, phreakers are very malicious and will destroy any information found when breaking into a system. The phreakers use the same techniques as crackers but they go a step further. When into systems, phreakers usually plant viruses and steal information. Now that you know some important things about computers and the internet it will take you no time to surf the web. But remember, never get into hacking, cracking and phreaking because no matter how much you know about computers you should never use it for malicious purposes.