Sunday, February 10, 2019
Hackers :: social issues
Hackers...they are unflustered hardly criminal in nature. The intention of most of these individuals is not to place down or exploit systems merely to learn in minute position how they are used and what they are used for. The quest is purely intellectual, but the drive to learn is so overwhelming that any obstacle auction block its course will be circumvented. Unfortunately the obstacles are usually area and federal laws on unauthorized computer access... This is a quote from Chris Goggans who was erst a member of the hack Legion of Doom club. On-line he was k straightn as Erik Bloodaxe.1 The term hacker was kickoff used in the nineteen sixties to describe college students at the Massachusetts Institute of Technology. The students were tending(p) this title because of their obsession with computers. They couldnt get enough of computers. Hacker was a label of pride to these students. These first hackers did things such as probe systems to get word out how they worked and ho w to make it give out secrets just as hackers do today. They believed computer time and software should be free and freely shared and resented those who protected ownership. A surprising aspect of hackers is that they actually had rules of their own of what they could do to others files and what they could not do. These rules said no whiz was to erase, damage, or change anyones files. One last rule that they had was no using any one system for personal gain. Surprisingly, most of the hackers followed these guidelines.. Now over the years, hacker is a label stating competence and knowledge to meaning someone who breaks into computers. With this information we now entertain the knowledge that hackers are older and do not have ethics and morals as they used to. The old rules have been forgotten and the FBI has made its own definition of a typical hacker 1. Eighteen to thirty-five years old. 2. Usually male. 3. Bright and highly motivated. 4. The first workers on the job in the morni ng. 5. The most trusted employees on the job. in that respect is an operation known as salami slicing. This is a form of selective information diddling that occurs when an employee steals small amounts from a large number of sources through the electronic ever-changing of data. Just like slicing thin pieces from a roll of salami. virtually hackers fall upon their information on accident.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment