.

Friday, March 22, 2019

Hackers :: social issues

Hackers...they atomic number 18 still hardly criminal in nature. The intention of well-nigh of these individuals is not to destroy or exploit systems but to learn in minute detail how they are used and what they are used for. The ask is purely intellectual, but the drive to learn is so overwhelming that all obstacle blocking its course will be circumvented. Unfortunately the obstacles are usually state and federal laws on unauthorized computer access... This is a quote from Chris Goggans who was once a member of the hacker Legion of show club. On-line he was known as Erik Bloodaxe.1 The term hacker was startle used in the nineteen sixties to describe college students at the mama Institute of Technology. The students were given this title because of their obsession with computers. They couldnt get decent of computers. Hacker was a label of pride to these students. These first hackers did things such as probe systems to find out how they worked and how to make it give out secr ets hardly as hackers do today. They believed computer time and software should be free and freely shared and resented those who protected ownership. A surprising aspect of hackers is that they really had rules of their own of what they could do to others files and what they could not do. These rules said no one was to erase, damage, or change anyones files. One last rule that they had was no victimisation any one system for personal gain. Surprisingly, most of the hackers followed these guidelines.. Now over the years, hacker is a label stating competence and knowledge to meaning somebody who breaks into computers. With this information we now have the knowledge that hackers are former(a)er and do not have ethics and morals as they used to. The old rules have been forgotten and the FBI has made its own definition of a typical hacker 1. Eighteen to thirty-five years old. 2. Usually male. 3. aglow(predicate) and highly motivated. 4. The first workers on the job in the morning. 5. The most trust employees on the job. There is an operation known as salami slicing. This is a form of data diddling that occurs when an employee steals small amounts from a large number of sources through with(predicate) the electronic changing of data. Just like slicing thin pieces from a roll of salami. Some hackers fall upon their information on accident.

No comments:

Post a Comment