Site Loader
Rock Street, San Francisco

What Really Is A Hacker? Essay, Research Paper

What Really is a Hacker?

Dan Parks

Julie Jackson & # 8211 ; Instructor

CIS 101

11-18-96

There is a common misconception among the general populace about what

constitutes a hacker and what hacking is. Choping is defined as & # 8220 ; deriving

illegal entry into a computing machine system, with the purpose to change, steal, or

destroy data. & # 8221 ; The cogency of this definition is still being debated, but most

persons would depict hacking as deriving entree to information which should

be free to all. Hackers by and large follow some basic rules, and keep these

rules as the & # 8220 ; ethical code. & # 8221 ; There are besides a few basic & # 8220 ; Hacker regulations & # 8221 ; that

are normally viewed by all in this alone group.

The rules that hackers abide by are characteristic of most people who

see the themselves to be a hacker. The first, which is universally agreed

upon is that entree to computing machines should be free and limitless. This is non

meant to be a invasion of privateness issue, but instead free usage of all computing machines

and what they have to offer. They besides believe that anyone should be able to

use all of a computing machines resource with no limitations as to what may be accessed

or viewed. This belief is controversial, it non merely could conflict upon

people & # 8217 ; s r

ight to privateness, but give up trade secrets every bit good. A deep misgiving

of authorization, some hackers consider authorization to be a bottleneck force. Not

all hackers believe in this ethic, but by and large authority represents something

that would maintain people from being able to hold full entree and/or free

information.

Along with the & # 8220 ; ethical codification & # 8221 ; of hackers there are a few basic & # 8220 ; choping

regulations & # 8221 ; that are followed, sometimes even more closely so there ain codification. Keep

a low profile, no one of all time suspects the quite cat in the corner. If suspected,

maintain a lower profile. If accused, merely disregard. If caught, plead the 5th.

Hackers consider a computing machine to be a tool and to restrict its handiness is

incorrect. Choping would discontinue if there was no barrier as to what information could

be accessed freely. By restricting the information which may be attained by

person, hampers the ability to be funny and originative. These people do non

privation to destruct, instead they want to hold entree to new engineering, package, or

information. These creative activities are considered an art signifier, and are looked upon

much like an artist positions a picture.

Mentions Consulted

Internet. hypertext transfer protocol: //www.ling.umu.se/~phred/hackfaq.txt Internet.

hypertext transfer protocol: //www.jargon.com/~backdoor Internet. hypertext transfer protocol: //www.cyberfractal.com/~

~andes.html

Post Author: admin

Leave a Reply

Your email address will not be published. Required fields are marked *