This page was not written to encourage hacking, but to show educators what type of control students can take over computers and how to identify these hacks.
The term hack has several related meanings in the technology and computer science fields. It may refer to a clever or quick fix to a computer program problem, or to what may be perceived to be a clumsy or inelegant (but usually relatively quick) solution to a problem. The term is also used to refer to a modification of a program or device to give the user access to features that were otherwise unavailable.
Most networks start off with poor security. But over time, with patches, network security does increase. At this point, a hacker that has gotten use of a certain system may be lose their additional access for a while. But usual the hacker goes on to find new holes. There is only so much an admin can
disable on your computer before it becomes no use to anyone. 
To get access to a network, a hacker can use whatever programs are on a computer.. If you are a student then you will undoubtedly have programs that aid in study, such as Notepad, MS Word, PowerPoint and others. All these programs can be used to the hackers advantage. 
On this page of the course we will discuss how educational computers are hacked to take access of student files and data.
By knowing these hacks, administrators and teachers will be better able to spot when students are hacking into networks.
With Microsoft Windows based computers, the first line of security is to lock out the control panels and the MS-DOS prompt. Most administrators stop MS-DOS prompt from working, because it's the best way to get administrative privileges. Although these two items are locked down, by searching the internet you can find a number of hacks to get around many of these.
By opening up a Notepad document, it it is easy to make a .com and .bat file that can be used to run locked down parts of the machine.