Share
Explore BrainMass

Computer Memory Hacking

1, Describe what the hacking of memory or hacking of RAM means.

2. Examine the common tools that hackers use to hack into memory of computing devices. Detail two real-life examples of such tools in action.

3. Identify three best practices that one should use to protect their computers from being hacked.

4. Analyze the significance of hacking in organizations and modern society.

Solution Preview

1. Describe what hacking of memory or hacking of RAM means.
Hacking is any technical effort use to manipulate the normal behaviour of network connections and connected systems. Hacking is any activity that engaged in clever, constructive, and tricky work that developing malicious programming attacks on the Internet and other networks. Memory hacking is a technique that involves modifying the game's memory, which in turn alters the game play. This is how cheats such as monster vacuums, godmodes, fly hack, and other cheats are made.

2.Examine the common tools that hackers use to hack into memory of computing devices. Detail two real-life examples of such tools in action.
The most common Memory hacking is accomplished by using every hacker's best tool called Cheat Engine. Cheat Engine is done by creating a DLL file that is injected into the game process. Another less commonly used method is done by using other executable programs (EXEs), but it is harder to bypass.

Memory hacking can do whatever you can imagine. It can do monster vacuums, godmodes, game exploits, packet editing (modifying data sent to the game server), and more can be done with memory edits. Another common tools for hacking is "Packet editors". However, Cheat Engines is the most powerful tool in hacking. Cheat Engine can do everything a packet editor can. Cheat Engine can search for address, modify game memory, and basically just hack into system.

3.Identify three best practices that one should use to protect ...

Solution Summary

This is a in-depth discussion of computer hacking. Hacking is any technical effort use to manipulate the normal behaviour of network connections and connected systems. Hacking is any activity that engaged in clever, constructive, and tricky work that developing malicious programming attacks on the Internet and other networks.

$2.19