This website uses cookies to ensure you have the best experience. Learn more

A Growing Hacker Community Essay

2155 words - 9 pages

AbstractThe popularity of the Internet has grown immeasurably in the past few years. Along with it the so-called 'hacker' community has grown and risen to a level where it's less of a black market scenario and more of 'A Current Affair' scenario. Misconceptions as to what a hacker is and does run rampant in everyone who thinks they understand what the Internet is after using it a few times. In the next few pages I'm going to do my best to prove the true definition of what a hacker is, how global economic electronic warfare ties into it, background on the Internet, along with a plethora of scatological material purely for your reading enjoyment. I will attempt to use the least technical computer terms I can, but in order to make my point at times I have no choice.Geoff StaffordDr. ClarkPHL 233There are many misconceptions, as to the definition, of what a hacker truly is, in all my research this is the best definition I've found:Pretend your walking down the street, the same street you have always walked down. One day, you see a big wooden or metal box with wires coming out of it sitting on the sidewalk where there had been none.Many people won't even notice. Others might say, 'Oh, a box on the street.'. A few might wonder what it does and then move on. The hacker, the true hacker, will see the box, stop, examine it, wonder about it, and spend mental time trying to figure it out. Given the proper circumstances, he might come back later to look closely at the wiring, or even be so bold as to open the box. Not maliciously, just out of curiosity. The hacker wants to know how things work.(8)Hackers truly are 'America's Most Valuable Resource,'(4:264) as ex-CIA Robert Steele has said. But if we don't stop screwing over our own countrymen, we will never be looked at as anything more than common gutter trash. Hacking computers for the sole purpose of collecting systems like space-age baseball cards is stupid and pointless; and can only lead to a quick trip up the river.Let's say that everyone was given an opportunity to hack without any worry of prosecution with free access to a safe system to hack from, with the only catch being that you could not hack certain systems. Military, government, financial, commercial and university systems would all still be fair game. Every operating system, every application, every network type all open to your curious minds.Would this be a good alternative? Could you follow a few simple guidelines for the offer of virtually unlimited hacking with no worry of governmental interference?Where am I going with this?Right now we are at war. You may not realize it, but we all feel the implications of this war, because it's a war with no allies, and enormous stakes. It's a war of economics.The very countries that shake our hands over the conference tables of NATO and the United Nations are picking our pockets. Whether it be the blatant theft of American R&D by Japanese firms, or the clandestine and governmentally-sanctioned...

Find Another Essay On A growing hacker community

Security Issues in Cyberspace Essay

1325 words - 6 pages growing graph. From the year 1988 to date, it is reported and estimated that attacks have grown so high in number [2]. The hacking act is growing day by day in great number. We then ask, what is hacking? Hacktivism and Hacker ethical issues Hacking is the act of cutting somebody or something with rough, heavy blows. It may mean to kick something roughly or without control. In computer science, hacking is to secretly find a way of looking at and/or

Hackers: Technological Wizards Essay

2170 words - 9 pages some time and shared valid information in the hacker community. Some bulletin board even require background checks an references. As new members become more trusted among peers, their level of access to sensitive information increases.(Internet Policed 125).Printed magazines and digests can also be helpful in the quest for knowledge. Numerous publications are printed each year: Phrack, 40Hex, and Chaos Digest are a just a few of the hacker

Hackers vs. Crackers

3212 words - 13 pages some of the nominees: ethical hacker, white knight hacker, code poet, technophile, geek, volunteer programmer, grokker, bithead, codesmith, and digerati. Other posters proposed trying to take back the word "hacker," the way the gay community has reclaimed the once-derogatory word "queer" (Grossman). The popular society identifies (true) hackers with criminals, but a lot of the computer community contends that (true) hackers are good, while

Cyber Hacking and Types of Hackers

984 words - 4 pages profit or they are protesting or it is just something they like to do. There is a little underground community of hackers called the computer underground. There are other uses of the word hacker for example someone who has an advanced understanding of computers and computer software, but they are rarely used in the mainstream world. People have argued over the real definition of the term “hacker”. Computer programmers have argued that someone

Script Kiddies: The New Threat on the Internet

1250 words - 5 pages growing technology. Different Types of Hackers Initially, there are only two types of hackers, which are the white hat hacker, and the black hat hacker. As the name suggests, the white hat hacker is the “good” or “ethical” hacker that works for a legal organization, security companies, and government. Their main purpose is to protect the information and data of the organization they are working for. However, the black hat hackers are completely

Hackers

1201 words - 5 pages The meaning of Hacker is one who accesses a computer, which cannot supposedly be accessed by non-authorized people of the community. Hackers may use any type of system to access this information depending on what they intend on doing in the system. Computer hackers usually start off young, thinking that it is nothing but a little harmless fun. But as they get older, they realize it has turned into an addiction. Methods, protection and major

The Exciting yet Stressful Career of Computer Programming

2064 words - 9 pages computer programming courses as well as more general computer science programs. However, college is not the only route to becoming a computer programmer; some students go to alternative schools such as Hacker School or teach themselves. Look around you and think how boring life would be if the devices around you were simply scraps of metal that did not actually do anything. Works Cited “2012-2014 Catalog.” Jamestown Community College. July

The Art of Hacking

1237 words - 5 pages The art of hacking Enedina Gloria Perez ENG 112 Professor Garza April 18, 2014 The world of hacking cannot be placed into clearly defined positive or negative categories. When people hear the word hacker they tend to think about someone that defies or breaks the law. Everything in life has two sides of it the good and the bad, that is how people can understand a subject if they see both sides. Hackers can cause havoc

The Hacker Subculture

2020 words - 8 pages Hacker subculture[1] is heavily dependent on technology. It has produced its own slang and various forms of unusual alphabet use, for example l33tspeak. Such things are usually seen as an especially silly aspect by the academic hacker subculture.[citation needed] In part due to this, the slangs of the two subcultures differ substantially.[citation needed] Political attitude usually includes views for freedom of information, freedom of speech, a

Types of hackers

988 words - 4 pages -paid network admins, programmers, and security consultants. When a software bug is found, the white-hat community will work together to solve the problem. This kind of hacker is the most respected in the internet community, and this type of hacker is welcome at HDNL.Types of HackersBlue Alien writes: Classifying hackers by the technology they deal with can be complicated. Because networking and computer technology is so vast, hackers often

Hacking as a Means of Identifying Weaknesses in Computer Security

1651 words - 7 pages technique by governments and organisations proves its wide effectiveness. In addition, the growth of spending in system security proves the growing concern of the IT business for security and the increasing number of experts required. Although there are some concerns on the authenticity of hacker ethics, one can see “ethical hacker” is nowadays a fully certified job title. Works Cited 1. Knight, William. 2009. "License to Hack". InfoSecurity 6 (6

Similar Essays

Personal Narrative Growing Up In A Bakery Community

1308 words - 6 pages bake and understood the value and the spirit of working. My family members also became closer to each other while we gathered and worked together in the kitchen. I was thankful for being born and growing up as a part of the bakery community. It gave me the passion for baking and the opportunity to know how the value of work tasted when the customers enjoy the cookies I made. What matters to me is not whether or not our Sun Bakery would on

The Big Scoop, A Story About A Reporter Looking For Insights Of The Hacker Community

1492 words - 6 pages handed me some paper and told me in a semi-happy voice to take a look at that and that it would explain everything. I threw the paper into my bag saying to my self that this guy belongs in a mental institution if he actually believed that one piece of paper could explain the whole hacker world and I walked on to the other side of the room. There was a kid standing there in the normal baggy pants and tee shirt working on a toshiba laptop. Wanting

Should You Hire A Hacker To Protect Your Computer Systems?

1305 words - 5 pages valued throughout the world. "Hacker may mean simply a person with mastery of computers; however the mass media most often uses "hacker" as synonymous with a (usually criminal) computer intruder." [2] A hacker as an individual who breaks into computer systems is a person who often has a nickname which they are known to other hackers as. The hacker community is quite enormous and is found throughout the Internet in such places as Internet Relay Chat

Ethical Hacking: The Different Types Of Hacking

1061 words - 4 pages hacking community are called, “Box Models.” One of the methods, the White box model, is where the ethical hacker is given all the information about the network and must proceed from there with the tests. In this form, users of the network become aware that a test will be performed. Another method used is the Grey box model, in which the ethical hacker is given one or two things about the network and from there, must perform the tests. This