School Violence Essay Research Paper I went

Free Articles

School Violence Essay, Research Paper

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

I went up to a college this summer to look around, see if it was where I

wanted to travel and whatnot. The usher asked me about my involvements, and when I

said computing machines, he started inquiring me about what systems I had, etc. And when

all that was done, the first thing he asked me was & # 8220 ; Are you a hacker? & # 8221 ;

Well, that inquiry has been teasing me of all time since. Just what precisely

is a hacker? A Real hacker?

For those who don & # 8217 ; t cognize better, the intelligence media ( and even amusing strips )

have blown it manner out of proportion & # 8230 ; A hacker, by wrong-definition, can be

anything from a computer-user to person who destroys everything they can acquire

their immorality terminuss into.

And the crackbrained shmucks of the universe who get a Commodore Vic-20 and a

300 baud modem ( heh, and a tape thrust! ) for Christmas haven & # 8217 ; t helped hackers & # 8217 ;

reputes a damn spot. They somehow acquire entree to a truly cool system and

happen some files on choping & # 8230 ; Or maybe a friendly but not-too-cautious

hacker helps the also-ran out, gives him a few Numberss, etc. The schmuck gets

onto a system someplace, lucks up and gets in to some truly cool information

or plans, and deletes them. Or some of the more avaricious 1s gaining control it,

delete it, and seek to sell it to Libya or something. Who gets the incrimination?

The true hackers & # 8230 ; that & # 8217 ; s who. So what is a true hacker?

First, some people may non believe I am wholly qualified to state,

chiefly because I don & # 8217 ; t see myself a hacker yet. I & # 8217 ; m still larning the

ropes about it, but I think I have a reasonably damn good thought of what a true

hacker is. If I & # 8217 ; m incorrect, allow one rectify me & # 8230 ;

True hackers are intelligent, they have to be. Either they do truly

great in school because they have nil better to make, or they don & # 8217 ; t do so

good because school is awfully deadening. And the 1s who are bored aren & # 8217 ; T that

manner because they don & # 8217 ; t give a *censored* about larning anything. A true hacker wants

to cognize everything. They & # 8217 ; rhenium bored because schools teach the same dulll things

over and over and over, nil new, nil challenging.

True hackers are funny and patient. If you aren & # 8217 ; T, how can you work

so really difficult choping off at a individual system for even one little PEEK at what

may be on it?

A true hacker DOESN & # 8217 ; T acquire into the system to kill everything or to sell

what he gets to person else. True hackers want to larn, or

privation to fulfill

their wonder, that & # 8217 ; s why they get into the system. To seek around inside

of a topographic point they & # 8217 ; ve ne’er been, to research all the small nooks and crevices

of a universe so unlike the deadening cess-pool we live in. Why destroy something

and take away the pleasance you had from person else? Why conveying down the

whole universe on the few true hackers who aren & # 8217 ; t cruising the phone lines with

malicious purpose?

True hackers are disgusted at the manner things are in this universe. All the

fantastic engineering of the universe costs three weaponries and four legs to acquire these

yearss. It costs a luck to name up a board in an adjoining province! So why

wage for it? To borrow something from a file I will call subsequently, why wage for

what could be & # 8220 ; soil cheap if it wasn & # 8217 ; t run by profiteering gourmands & # 8221 ; ?

Why be forced, due to miss of the hellacious hard currency flow it would necessitate to

name all the great topographic points, to remain around a clump of schmuck also-rans in your

place town? Naming out and come ining a system you & # 8217 ; ve ne’er seen before are

two of the most exhilirating experiences known to adult male, but it is a pleasance

that could non be enjoyed were it non for the ability to phreak & # 8230 ;

True hackers are quiet. I don & # 8217 ; t mean they talk at approximately.5 dubnium, I mean

they keep their oral cavities shut and wear & # 8217 ; t crow. The figure one slayer of those

the media would hold us name hackers is boasting. You tell a friend, & # 8221 ; or you

run your oral cavity on a board, and sooner or subsequently people in power will happen out

what you did, who you are, and you & # 8217 ; re gone & # 8230 ;

I candidly don & # 8217 ; t cognize what aim this file will function, possibly person

someplace will read it, and know the truth about hackers. Not the prevarications that

the nescient spread. To the true hackers out at that place, I hope I am portraying

what you are in this file & # 8230 ; If I am non, so I at least am stating what I

believe a true hacker should be. And to those wanna-be & # 8217 ; s out at that place who like

the label of & # 8220 ; HACKER & # 8221 ; being tacked onto them, turn up, would ya?

Oh yeah, the file I quoted from & # 8230 ; It has been done ( at least ) two

times. & # 8220 ; The Hacker & # 8217 ; s Manifesto & # 8221 ; or & # 8220 ; Conscience of a Hacker & # 8221 ; are the two

names I & # 8217 ; ve seen it given. ( A file by itself, and portion of an issue of Phrack )

Either manner, it was written by The Mentor, and it is perfectly the best thing

of all time written on the topic of hackers. Read it, it could alter your life.

Spread it around, but don & # 8217 ; t alter anything please. . .

Post a Comment

Your email address will not be published. Required fields are marked *

*

x

Hi!
I'm Katy

Would you like to get such a paper? How about receiving a customized one?

Check it out