What is Hacking? Are You a Hacker?
2008-06-25来源:
WHAT IS HACKING?Hacking, sometimes known as "computer crime" has only recently been taken very seriously. The activities undertaken by the real hackers have been criminalized and they are now being legally persecuted on a scale disproportional to the actual threat they pose.For those who don't know better, a hacker, by wrong-definition, can be anything from a computer-user to someone who destroys everything they can get their evil terminals into.Real hackers want their motivations and ethics to be viewed as legitimate, or at least understood, instead of being simply written off as malicious, vandalising, thieving, terrorist out to take over the computers of the world for personal gain, or devious teenagers who have nothing better to do than crash every available computer.It is thanks to the mass media and people who have absolutely no understanding of computers, who use terms like "information superhighways", "IT", and "computer crime" to try and make themselves sound important that it is assumed all "hackers" (the good and the bad) fit the above descriptions. There are people who do stuff like the above but they ARE NOT real hackers, They buy the magazine "2600" and they ask questions. They do not want knowledge. They do not want to learn how things work, they do not want to explore. All They want to know is the answer to their damn questions, they are not real hackers.They are the real criminals and are the threat to every appliance connected to the Internet, they destroy, steal and mess up the flow of information then let the real hackers take the blame!Hacking IS NOT about the mindless idiotic destruction of files and/or crashing systems intentionally.Real hackers have an ethical code of practice, which includes things such as:☞ Leave a system in the state it was found.
☞ Do not intentionally destroy or modify anyone else's data.
☞ Do not cause any legitimate user problems with computer resources.
☞ Do not access emergency services computers.Real hackers are enraged when so called "hackers" cause damage to or compromise resources. Hacking is about looking for answers and knowledge, it is about learning. That's why hackers hack, to search around inside a place they have never been, to explore all the little nooks and crannies of a world so unlike the boring cess-pool they live in.Their aim is to rise above the rest, and then to pull everyone else up to the same new level. Real hackers justify accessing computer systems by claiming that it is not unfair to break into otherwise idle computer resources and to download files with the intent to learn.The already terrible reputation carried by the real hackers is cased by the ignorant and stupid people who like the label of "hacker" that screw things up, mainly though the destruction of stored information and or all passable activities of computer related fraud.For those who don't know better it is thanks to the mass Media who have blown it way out of proportion. A hacker, by wrong-definition, can be anything from a computer-user to someone who destroys everything they can get their evil terminals into.And the people who have absolutely no understanding of computers, who use terms like "information superhighways", IT, and computer crime to try and make themselves sound important that it is assumed all hackers are malicious, vandalising, thieving, terrorist out to take over the computers of the world for personal gain. There are people who do stuff like the above but they ARE NOT real hackers, They buy the magazine "2600" and they ask questions.They do not want knowledge. They do not want to learn how things work, they do not want to explore. All They want to know is the answer to their damn questions, they are not real hackers.They are the real criminals and are the threat to eve
相关文章
- How To Cover Your Tracks On The Internet
- From Spyware with Love!
- The Attack of the Advertiser - Spy Mother Spy
- Securing Your Accounts With Well-Crafted Passwords
- Secure Your PC From Hackers, Viruses, and Trojans
- Phishing-Based Scams: A Couple of New Ones
- Is Your Email Private? Part 1 of 3
- 8 Surefire Ways to Spot an EBAY Scam E-Mail and Protect Yourself from Identity Theft
- Viruses, Trojans, and Spyware - Oh My!
- 3 Pervasive Phishing Scams