Preview

The Good the Bad to Hacking

Better Essays
Open Document
Open Document
1908 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
The Good the Bad to Hacking
The Good, The Bad, and The Inbetweens of Hacking “During a three-day period in February 2000, some of the most high-profile sites on the World Wide Web were temporarily knocked out of service.”(Issues and Controversy) This quote is one of the many that show the down side to hacking. A hacker is a person who takes pleasure in understanding the internal workings of a systems. This does not necessarily classify hackers as bad. There are good hacking and bad hacking. But on the subject of hacking, its unclear whether or not they are truly good or bad. Not every single hack is bad. From the computer stand point, a hacker is a person who wants “ to gain access to a computer illegally.” (Webster Dictionary). But that is only one part of the definition, but this is the definition most people associate hacking with. The other part of the definition is “to write computer programs for enjoyment.“ (Webster Dictionary). Most just classify these kinds of people as programmers, but truly, if you can make a program, you are a basic at hacking. That’s one reason why not all hacking is bad. “Hacking includes a wide range of activities, from writing software, to practical jokes, to exploring roofs and tunnels of the MIT campus.” (Stallman). Now when have practical jokes ever gone to far to be considered bad. Look at the group of people called Improv Everywhere. They’ve done large scale practical jokes ranging from freezing at the grand station (http://www.youtube.com/watch?v=jwMj3PJDxuo), to creating a giant bulls eye in the middle of a park. (http://www.youtube.com/watch?v=xkVTg6TT2XE). This group of actors and volunteers stage huge events to just have fun. If the definition of hacking is about practical jokes and this group isn’t considered bad but actually very popular, then the group of hackers that like to have fun by playing jokes on people cant be considered bad too. Going on Stallman’s definition of hacking, writing software can be seen going both ways of good or


Bibliography: “Key events in Computer Hacking.” 12 May 2000. Issues and Controversies Facts on File News Services. 31 Jan. 20008 <www.2facts.com> “Computer Hacking.” 18 July 2005. Issues and Controversies. Facts on File News Services. 31 Jan. 2008 <www.2facts.com> Long, Johnny. "Why Johnny Long Hacks Stuff". Computer Science Coporations. January 31, 2008 <newworksasia.net>. Guisnel, Jean, Schnarau, Wihn. Cyberwars:Espionage on the internet. New York, 1997 Friedman, Lauri S. The Patriot Act. Michigan, 2006. Judson, Karen. Computer Crime : Phreaks, Spies and Slami Dices. 2000 "Hacking And Hackers". Thocp. 31, Jan 2008 <Thocp.net>. Stallman, Richard. “On Hacking” . Stallman articles. January 31, 2008 <Stallman.org> Arnone, Michael “White hat, gray hat, black hat”. Computer Crime Research Center. January 31, 2008 <crime-research.org>

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Nt1310 Final Exam

    • 393 Words
    • 2 Pages

    The Motives Behind Hacking: Vandalism, Public Interest, Reveal Wrongdoing, Financial Gain, As a Protest, The Challenge (fun).…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Tim J. Watts goes more into the dark side of the “hacker” community by bringing up the constant back in forth between computer security officers and the so called hackers. This article, being written this year is able to reflect on the events of September 11, 2001 and new homeland security measures. He represents this viewpoint of a dangerous hacker in his definition: “While some hackers are harmless, others break into systems with the intent to steal information or to do destruction to the system. Hackers performing the latter pose a serious threat to the economic future of the United States” (Watts). Tim Watt outright blames the hacker community of accessing information that should be private. Only looking and reflecting on the serious threat…

    • 154 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Hacking is when a highly technical skilled individual or a group pass their way into a computer network or program without permission. This ends up in important data being stolen by the hacker which is illegal.…

    • 769 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Crt 205 Final Project

    • 2361 Words
    • 10 Pages

    | |author. If none exist, explain how you |However, hacking is a process use be Information Technology (IT) |…

    • 2361 Words
    • 10 Pages
    Satisfactory Essays
  • Good Essays

    Hacker: An individual who enjoys breaking systems or software without causing harm, presumably with the intent to better understand and improve security.…

    • 413 Words
    • 2 Pages
    Good Essays
  • Good Essays

    The article “Inside America’s Hacking Epidemic,” shows the destructive power and capability of cyberwarfare. Cyberwarfare has grown increasingly common over the years, and is one of the few areas where combat is on a level playing field. With the widespread use and access to internet, hackers and cases of hacking are continuing to grow at an alarming rate. Not only, but these hacks are usually targeted at important government facilities like the Pentagon, State Department, and the White House. Attacks substantial as this not only have the capability breach classified information, but they also carry a large risk of harming the infrastructure and national security.…

    • 445 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    ARTICLE SUMMARY

    • 1028 Words
    • 7 Pages

    An ethical hacker is a person who performs most of the same activities a cracker does, but with the owner or company’s permission.…

    • 1028 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    Flawfinder

    • 277 Words
    • 1 Page

    Phillips, S., & Oriyano, G. (2010). Hacker Technique, Tools, and Incident Handling. Jones & Bartlett Learning…

    • 277 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Cybercrime: Hacking

    • 1198 Words
    • 4 Pages

    With everything in society advancing rapidly, it should be of no surprise that technology is now used to commit crimes against other people. Those crimes include identity theft, stealing money, illegal gambling, and cyberstalking. This paper will review cybercrime and the differences there are from traditional crime and it will review the purpose of hackers. There will also be three cases reviewed to help bring light to what kind of cybercrimes are being committed around the world.…

    • 1198 Words
    • 4 Pages
    Powerful Essays
  • Better Essays

    Kevin Mitnick

    • 1277 Words
    • 6 Pages

    The word hacker in today’s society has many meaning, but the definition that I will be talking about in this paper is best described by dictionary.com as, “One who uses programming skills to gain illegal access to a computer network or file.”[1] According to wikipedia.com there are three different types of hackers, white hat hackers, grey hat hackers and black hat hackers. A white hat hackers is, “. . .a person who is ethically opposed to the abuse of computer systems. Realizing that the Internet now represents human voices from all around the world makes the defense of its integrity an important pastime for many.”[2] A grey hat hacker is, “. . .a skilled hacker who sometimes acts legally and in good will and sometimes not. They are a hybrid between white and black hat hackers. They hack for no personal gain and do not have malicious intentions, but occasionally may or may not commit crimes in their actions.”[3] And lastly a black hat hacker is, “a malicious or criminal person whose correct label is "cracker". . .Usually a Black Hat refers to a person that maintains knowledge of the vulnerabilities and exploits they find as secret for private advantage, not revealing them either to the general public or manufacturer for correction.”[4]…

    • 1277 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    Hackers: A hacker is someone who finds weaknesses in a computer or computer network, enters, and modifies or/and steals data this could slow down performance very much or even completely halt it.…

    • 555 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    A few of the members transfer their curiosity and rigging skills to the new mainframe computing systems being studied and developed on campus. Hacking groups begin to form. Among the first are Legion of Doom in the United States, and Chaos Computer Club in Germany. The movie "War Games" introduces the public to hacking. A computer hacker intends to ruin businesses performing an act much more unprincipled than an enthusiastic biologist 'hacking' away at work or theory. The truth is that computer hacking is in fact easy in the general sense, but more consideration must be given. Some aspects of hacking are used in everyday life and you may not know that accessing wireless internet from another person's account is considered wireless hacking even though your borrowing there connection. During the 1970's, a different kind of hacker appeared: the phreaks or phone hackers. They learned ways to hack the telephonic system and make phone calls for free. Within these group of people, a phreaker became famous because a simple discovery.…

    • 1291 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Kevin Poulsen Report

    • 1849 Words
    • 8 Pages

    Kevin Poulsen is a news editor at wired.com, and is co-author of Kingpin — How One Hacker Took Over the Billion Dollar Cyber Crime Underground (Crown, 2010). However, Poulsen did not start out as a journalist. Kevin Poulsen began his “career” as a hacker, and thanks to media attention, became rather notorious for his exploits. In this report I will attempt to highlight what Kevin Poulsen is famous for, what techniques he used, the criminal charges faced and the possible punishments, the social and ethical issues surrounding the case, and what countermeasures could have been used to prevent Poulsen's attacks.…

    • 1849 Words
    • 8 Pages
    Good Essays
  • Powerful Essays

    hacking

    • 8064 Words
    • 33 Pages

    Jagnarine, Amit Anand, "The Role of White Hat Hackers in Information Security" (2005). Honors College Theses. Paper 14.…

    • 8064 Words
    • 33 Pages
    Powerful Essays
  • Good Essays

    Imagine yourself going into the bank to get money out of your account for your rent or other important bill, and the account is dry and you just got paid the day before..or going to pay a bill with your credit card and card after card is maxed out then you find out that someone has stolen all your information and used all of your resources to live and pay bills. If this happened to me my heart would be beating so fast in panic id probably pass out considering I have so many kids to provide for. Well it happens everyday to people everywhere all over the world. One of the major problems causing this is called hacking which is defined by the company who created the website the free dictonary dot com, Houghton mifflin company, as to gain access to a computer file or network illegally or without authorization. It is a big problem not just here but in other countries as well.One incident id like to mention is the playstation store being hacked into…

    • 521 Words
    • 3 Pages
    Good Essays

Related Topics