Need an research paper on web server hacking. Needs to be 8 pages. Please no plagiarism. Customer support services are more efficient when performed electronically as more customers get to access the services at the same time. As a result of the transmission of sensitive financial and confidential information, cybercriminals have chosen to engage in illegal activities over the internet. To add to the attraction and profitability of these hacking attacks is the proliferation of insecure web applications (Zachary, 2006). These attacks on computer systems with negative intent are not new. They go as far back as the eighties when hackers used their skills to break into computer systems and perform their illegal activities. The advent of web based applications, though, has led to an increase of sophistication in hacking attacks. The skill required to perform these attacks, on the other hand, has lessened proportionately. In order to understand the need for security in one’s computer system, he or she should realize the risks involved. Most operating systems have a default configuration that is not designed with security as the chief focus. The default setup, instead, focuses on functionality, communications and usability. There is therefore a need to understand the server vulnerabilities in a system in order to perform particular functions to improve security (Leyden, 2002). It is hence clear that web server hacking is an important topic that should be evaluated in detail and understood by users of computer systems.When one tries to break into or use a computer system wrongly, he or she is considered an intruder. ‘Using wrongly’ is not a restricted term and can be used to represent an act of stealing confidential information or a minor offense of just misusing one’s email for the spam (Zachary, 2006). Presently, more people both through the internet and corporate intranets are continuously attempting to test the various systems’ security. The motive differs in every instance but revenge and stealing for profit are some of the motives driving intruders. ‘Hacker’ and ‘attacker’ are the two terms that are used in describing a person who tries to get into networks and systems.