What is Hacking? Are You a Hacker?

WHAT IS HACKING?

Hacking, sometimes known as "computer crime" has only recently been taken very seriously. The activities undertaken by the real hackers have been criminalized and they are now being legally persecuted on a scale disproportional to the actual threat they pose.

For those who don't know better, a hacker, by wrong-definition, can be anything from a computer-user to someone who destroys everything they can get their evil terminals into.

Real hackers want their motivations and ethics to be viewed as legitimate, or at least understood, instead of being simply written off as malicious, vandalising, thieving, terrorist out to take over the computers of the world for personal gain, or devious teenagers who have nothing better to do than crash every available computer.

It is thanks to the mass media and people who have absolutely no understanding of computers, who use terms like "information superhighways", "IT", and "computer crime" to try and make themselves sound important that it is assumed all "hackers" (the good and the bad) fit the above descriptions. There are people who do stuff like the above but they ARE NOT real hackers, They buy the magazine "2600" and they ask questions. They do not want knowledge. They do not want to learn how things work, they do not want to explore. All They want to know is the answer to their damn questions, they are not real hackers.

They are the real criminals and are the threat to every appliance connected to the Internet, they destroy, steal and mess up the flow of information then let the real hackers take the blame!

Hacking IS NOT about the mindless idiotic destruction of files and/or crashing systems intentionally.

Real hackers have an ethical code of practice, which includes things such as:

☞ Leave a system in the state it was found.
☞ Do not intentionally destroy or modify anyone else's data.
☞ Do not cause any legitimate user problems with computer resources.
☞ Do not access emergency services computers.

Real hackers are enraged when so called "hackers" cause damage to or compromise resources. Hacking is about looking for answers and knowledge, it is about learning. That's why hackers hack, to search around inside a place they have never been, to explore all the little nooks and crannies of a world so unlike the boring cess-pool they live in.

Their aim is to rise above the rest, and then to pull everyone else up to the same new level. Real hackers justify accessing computer systems by claiming that it is not unfair to break into otherwise idle computer resources and to download files with the intent to learn.

The already terrible reputation carried by the real hackers is cased by the ignorant and stupid people who like the label of "hacker" that screw things up, mainly though the destruction of stored information and or all passable activities of computer related fraud.

For those who don't know better it is thanks to the mass Media who have blown it way out of proportion. A hacker, by wrong-definition, can be anything from a computer-user to someone who destroys everything they can get their evil terminals into.

And the people who have absolutely no understanding of computers, who use terms like "information superhighways", IT, and computer crime to try and make themselves sound important that it is assumed all hackers are malicious, vandalising, thieving, terrorist out to take over the computers of the world for personal gain. There are people who do stuff like the above but they ARE NOT real hackers, They buy the magazine "2600" and they ask questions.

They do not want knowledge. They do not want to learn how things work, they do not want to explore. All They want to know is the answer to their damn questions, they are not real hackers.

They are the real criminals and are the threat to every appliance connected to the Internet, they destroy, steal and mess up the flow of information and let the real hackers take the blame!

Hacking IS NOT about the mindless idiotic destruction of files and / or crashing systems intentionally.

Hacking is about looking, searching for answers and knowledge, it is about learning, satisfying their curiosity. That's why they get into the system, to search around inside a place they've never been, to explore all the little nooks and crannies of a world so unlike the boring cess-pool they live in. They seek to rise above the rest, and then to pull everyone else up to the same new level.

Why destroy that which they love? To take away someone else's chance to succeed in getting in as he did? To fuel an already terrible reputation and increase their chances of getting caught and thus have their lives and careers effectively ruined? IT IS ILLOGICAL!

The real problems are caused by the ignorant and stupid people who like the label of "hacker" that screw thing up by destroying everything they can get their evil terminals into.

It is thanks to the mass Media and people who have absolutely no understanding of computers, who use terms like "information superhighways", IT, and computer crime to try and make themselves sound important that it is assumed all hackers are malicious, vandalising, thieving, terrorist out to take over the computers of the world for personal gain.

ARE YOU A HACKER?

Too identify users who like the label of "hacker". Even as I type this they are dammaging the already terrible reputation carried by the real hackers. This file is meant to help these people who are not helping the movement by pointing out the errors of their ways! What is that you say, "but I am a "badass" hacker". Just ask your self whether any of the following descriptions sound like you, if so then you are part of the problem!.

You have been surfing the net, and you laugh at those media reports of the information superhighways. You have a red box. You do not have to pay for phone calls. You have crackerjack, and you have run it on the password file at a Unix on which you have an account. Your computer knowledge has impressed everyone at your school, you are the one the teachers ask for help. Am I getting warmer?

Or may be you are one of the free loaders. There are thousands of you out there. You buy 2600 and you ask questions. You read phrack and you ask questions. You join #hack and you ask questions. What is that you say, "what is wrong with that? After all, to be a hacker is to question things, is it not?" Nevertheless, you do not want knowledge. You want answers. You do not want to learn how things work. You only want answers. You do not want to explore. All you want to know is the answer to your damn questions. Dose this sound like you?

Or if not the above you are what I refer to as a non event. You read 5% of 5 or 10 of the hacking FAQs and or tutorial files. You no not fully understand the essentials of hacking. Or the reasons for cacking. You have never heard of social engineering or if you have you think it is not important. You think the world of computers and security opens up to you through a keyboard and your redbox. In short you know nothing. You are brain dead, but you see your self as a master mind criminal. You brag about you hacking factices. You make it up as you go along. You lie over any and all the BBS you can.

Dose any of this sound like you? If so you are not a hacker. You are a little child. It is thanks to you morons that get bested whilst destroying everything you can get your evil terminals into that the established order (governments, companions, the mass Media etcetera) assume all hackers are like you, malicious, vandalising, thieving, terrorist out to take over the computers of the world for personal gain or are devious teenagers who have nothing better to do than crash every available computer. Nothing could be feather from the truth!

You enrage the real hackers when you cause damage or compromise resources. You do not understand the damage you inflect When you bring down a system you take away from everyone the chance to succeed in getting in, you take away that which all real hackers have come to love more that live itself!.

Hacking is about looking for knowledge. It is about learning. That's why hackers hack, to search around inside a place they have never been. To explore all the little nooks and crannies of a world so unlike the boring cess-pool they live in. To increase the flow of information and knowledge, so that Everyone can learn and benefit.

WHAT IS A HACKER?

More times that I can remember, someone has asked me the question "Just what exactly is a hacker?"

For those who don't know better. A hacker can be anything from someone who makes furniture with an axe; (by wrong-definition) A computer-user; An expert at a particular programme; An expert or enthusiast of any kind; but the most wide spread application of the term is to describe someone who destroys everything into which he/she can get their evil terminals. This is true to such an extent that if I were to say to just about anyone (that has not being leaving on the moon since 1982) "I am a hacker", it would immediately be assumed that I am a criminal, a malicious, vandalising, a thieving terrorist, a little shit out to take over the computers of the world for personal gain, or some thing along those lines. For this we have the wanabes and the mass Maida to blame!

What I consider a hacker to be is a person who is self motivated and besotted with exploring the details of programmable systems, a person who loves the intellectual challenge of creatively overcoming or circumventing limitations, and uses that knowledge to continue the fight for freedom of knowledge and information, a person who wants to know everything and most importantly a *real* hacker lives by the "hacker ethic" (the belief that information-sharing is a powerful positive and good thing), and whom follows an ethical code of practice (that typically includes things such as, Leave a system in the state it was found; Do not intentionally destroy or modify anyone else's data; Do not cause any legitimate user problems with computer resources; Do not access emergency services computers; etcetera)

Their motivations for hacking (the activities of a hacker) are generally to learn more about any think that can help them understand more about the way the would works, fore example how computer systems work by making them do things they were never intended to do and/or to challenge security measures.

This is my own definition of what the "normative" boundary markers of *real* hackers are. All real hackers tend to meat the majority of these criteria. However, this is by no means universal, like plants, there are many breads of hacker, most of which are out to achieve that same ends, the ones that do not meat any, or the ones the do all the above, but are intent on destruction are *NOT* hackers, most likely they are the wanabes. See my FAQ "ARE YOU A HACKER?" for more about them.

Now, who are the *real* hackers, whatever their motives they tend to share an, unbridled intimacy and total affinity for their life stilly, they are the ones who are so deeply consumed by learning computer science, cacking, programming, social engineering, boxing, scanning, etcetera, that it means more to them than the feeling that they experienced at the flash point of their first love, for some it is the ultimate buzz like heroin, for many to hack, to get access to a system and escape into the binary world, is to engage in sexual intercourse.

Again this is by no means universal, there are those that merely enjoy it, and the ones that find it a pain. The people that do not in *ANY* *WAY* reflect the above may be real hackers, but finding an elite hacker whom dose not is rare.

If you are a real hacker, like it or not, you are a revolutionary and know it or not every thing you do is in some way connected to your search for the truth, because although to be a hacker is to question things hacking its not about asking questions. It is simply about finding the truth because they must be able to choose for themselves, what ever the consequences, it is their right to have some say it their fate.

No one can be told what the truth is, as it is different for everyone, it is an idea, it is simply sufficient information and experience to allow a person to tell for min/her self. It is not an answer that hackers seek but rather the truth is learnt from the path that each hacker takes to gain experience, which is simply the search for knowledge.

I genuinely do not know what the purpose of this file is, maybe someone somewhere will read it, and know more about the truth concerning hackers. Not the lies of the ignorant!

I am the website administrator of the The Wandle Industrial Museum (http://www.wandle.org). Established in 1983 by local people determined to ensure that the history of the valley was no longer neglected but enhanced awareness its heritage for the use and benefits of the community.

In The News:

This RSS feed URL is deprecated, please update. New URLs can be found in the footers at https://news.google.com/news

New York Times

EPA Chief's Spending on Security: Nearly Double His Predecessors'
New York Times
Scott Pruitt, the head of the Environmental Protection Agency, spent roughly $3.5 million in taxpayer funds on his personal security detail during his first year in office, 1.7 times what his predecessors spent each year on average, according to ...
EPA spent $3.5 million to protect Scott Pruitt, nearly twice the typical security costCNBC
Scott Pruitt's security detail cost nearly $3.5 million his first year, agency reportsWashington Post
EPA spent nearly $3.5M on Pruitt securityCNN
Reuters -CBS News -Politico -EPA
all 131 news articles »

Barron's

GDPR Inc.: Profiting From Strict New Security Rules
Barron's
The strict European Union–mandated online security law—which affects how companies gather and handle information about Europeans—has “helped us grow our company significantly,” says Hilary Wandall, chief data governance officer at TrustArc, ...


Reuters

Apple sees steep increase in US national security requests
Reuters
Apple said it received as many as 16,249 national security requests affecting up to 8,249 accounts during the second half of 2017. The number of requests rose 20 percent compared with the first half of 2017, when Apple received 13,499 such requests.
Apple sees steep increase in US national security-related data requestsBusiness Insider
Steam Link (BETA) - Apps on Google PlayGoogle Play
Steam LinkSteam
Twitter
all 158 news articles »

Forbes

Amazon Alexa Security - - How To Stop Hacks On Voice Assistants
Forbes
Smart speakers such as the Amazon Echo have already shown themselves to be untrustworthy. Only a few months ago, consumers complained about sinister laughter coming from the Amazon Alexa assistant. The always listening devices have also been ...
An Amazon Echo recorded a family's conversation, then sent it to a random person in their contacts, report saysWashington Post
Woman says her Amazon device recorded private conversation, sent it out to random contactKIRO Seattle

all 538 news articles »

Forbes

Corporate File Systems Tell A Different Security Story
Forbes
At the same time, over the last several years, data security spending has been on a growth trajectory and is expected to reach almost $100 billion worldwide in 2018, according to Gartner. It's hopeful to think that increased investments in security ...


The Onion (satire)

Jared Kushner's Security Clearance Restored
The Onion (satire)
White House senior advisor Jared Kushner had his security clearance restored after temporarily losing it amid the uncertainty of the special counsel's ongoing investigation. What do you think? “I know I feel safer already knowing he is back at the helm.”.


WSOC Charlotte

Ramping up efforts for school security is top priority for CMS
WSOC Charlotte
Sources told Channel 9 the district will hire full-time police officers whose entire job will focus on school security. Parents are breathing a sigh of relief at CMS' effort to ramp up school safety. Friday's school shooting at a middle school in ...

and more »

IGN

E3 Lays Out Security Guidelines for This Year's Show
IGN
By Michael Koczwara Things have gotten a little more strict when it comes to security on the show floor of this year's E3. Backpacks will no longer be allowed on the show floor unless you are part of the media or an exhibitor at the show. Anyone else ...


The Hill

Homeland Security announces 15000 additional seasonal visas for companies at risk of failure
The Hill
The Department of Homeland Security (DHS) announced Friday that it would allow 15,000 more seasonal workers into the country in 2018 under the H-2B visa program, available to businesses at risk of failing without the increased workforce. In a statement ...
Homeland Security releases 15000 additional H-2B visasThe Boston Globe

all 52 news articles »

WTVD-TV

EPA has spent more than $3.5 million on Pruitt's security in first year in office
WTVD-TV
The agency says that Pruitt needed 24/7 security - more than previous administrators - in response to an "unprecedented number of threats" against him. Because of the threats, the EPA says, Pruit and his security team needed to fly first class and the ...

Google News

Hacked: Who Else Is Using Your Computer?

A friend called me one day and asked if I... Read More

New CipherSend Online Security Service Thwarts Email Address Theft And Soothes Password Fatigue

In 1997, I decided after 15 years as a practicing... Read More

Identity Theft ? Beware of Phishing Attacks!

"Dear Bank of the West customer", the message begins. I've... Read More

All About Computer Viruses

Your computer is as slow as molasses. Your mouse freezes... Read More

Everything You Need To Know About Spyware and Malware

You are at your computer, checking out software on EBay.... Read More

Why you Must Secure your Digital Product and Thank You Web Page

A couple of years back, I paid my dues the... Read More

Phishing - Learn To Identify It

Phishing: (fish'ing) (n.)This is when someone sends you an email... Read More

Parental Control - Dangers To Your Child Online & Internet Child Safety Tips

Did you know...? 1 in 5 children who use computer... Read More

3 Pervasive Phishing Scams

Scams involving email continue to plague consumers across America, indeed... Read More

Virus Prevention 101

Blaster, Welchia, Sobig, W32, Backdoor, Trojan, Melissa, Klez, Worm, Loveletter,... Read More

Free Antivirus Security Software: Download Now to Eliminate Spyware, Pop Up Ads, etc.

Adware. Spyware. Pesky pop up ads. Internet congestion. Computer malfunctions... Read More

40 Million People Hacked - YOU as Identity Theft Victim

Saturday, MasterCard blamed a vendor of ALL credit card providers... Read More

Detect Spyware Online

You can detect spyware online using free spyware cleaners and... Read More

Burning Bridges is Bad, But Firewalls are Good

When you signed up for that ultra-fast DSL or Cable... Read More

HackAttack

P C. owners are constantly at risk from attacks by... Read More

Is Your Music Player Spying On You?

In today's times spyware is a very serious issue and... Read More

Do You Know What your Kids Are Doing Online?

It's a sad statistic, but hundreds of unsuspecting kids are... Read More

Is Shopping Online For Your Horse Gifts Safe?

Shopping for horse gifts or other gift items on the... Read More

Is My PC Vulnerable on the Internet?

No longer are viruses the only threat on the internet.... Read More

How To Cover Your Tracks On The Internet

Every single time you access a website, you leave tracks.... Read More

Password Security and Safety

There is nothing more important that password security in world... Read More

The Attack of the Advertiser - Spy Mother Spy

The menacing campaigns that drive the corporate spyware and adware... Read More

Is That Free Stuff Like An iPod Or Desktop Computer Really Free?

Have you seen the web site, www.freestuff.com? Or have you... Read More

Reclaim Your PC from the Internet Spies

Viruses are, however, not the only malicious software programs out... Read More

Ransom Trojan Uses Cryptography for Malicious Purpose

Every day millions of people go online to find information,... Read More