School Violence Essay, Research Paper
I went up to a college this summer to look around, see if it was where I
wanted to travel and whatnot. The usher asked me about my involvements, and when I
said computing machines, he started inquiring me about what systems I had, etc. And when
all that was done, the first thing he asked me was & # 8220 ; Are you a hacker? & # 8221 ;
Well, that inquiry has been teasing me of all time since. Just what precisely
is a hacker? A Real hacker?
For those who don & # 8217 ; t cognize better, the intelligence media ( and even amusing strips )
have blown it manner out of proportion & # 8230 ; A hacker, by wrong-definition, can be
anything from a computer-user to person who destroys everything they can acquire
their immorality terminuss into.
And the crackbrained shmucks of the universe who get a Commodore Vic-20 and a
300 baud modem ( heh, and a tape thrust! ) for Christmas haven & # 8217 ; t helped hackers & # 8217 ;
reputes a damn spot. They somehow acquire entree to a truly cool system and
happen some files on choping & # 8230 ; Or maybe a friendly but not-too-cautious
hacker helps the also-ran out, gives him a few Numberss, etc. The schmuck gets
onto a system someplace, lucks up and gets in to some truly cool information
or plans, and deletes them. Or some of the more avaricious 1s gaining control it,
delete it, and seek to sell it to Libya or something. Who gets the incrimination?
The true hackers & # 8230 ; that & # 8217 ; s who. So what is a true hacker?
First, some people may non believe I am wholly qualified to state,
chiefly because I don & # 8217 ; t see myself a hacker yet. I & # 8217 ; m still larning the
ropes about it, but I think I have a reasonably damn good thought of what a true
hacker is. If I & # 8217 ; m incorrect, allow one rectify me & # 8230 ;
True hackers are intelligent, they have to be. Either they do truly
great in school because they have nil better to make, or they don & # 8217 ; t do so
good because school is awfully deadening. And the 1s who are bored aren & # 8217 ; T that
manner because they don & # 8217 ; t give a *censored* about larning anything. A true hacker wants
to cognize everything. They & # 8217 ; rhenium bored because schools teach the same dulll things
over and over and over, nil new, nil challenging.
True hackers are funny and patient. If you aren & # 8217 ; T, how can you work
so really difficult choping off at a individual system for even one little PEEK at what
may be on it?
A true hacker DOESN & # 8217 ; T acquire into the system to kill everything or to sell
what he gets to person else. True hackers want to larn, or
privation to fulfill
their wonder, that & # 8217 ; s why they get into the system. To seek around inside
of a topographic point they & # 8217 ; ve ne’er been, to research all the small nooks and crevices
of a universe so unlike the deadening cess-pool we live in. Why destroy something
and take away the pleasance you had from person else? Why conveying down the
whole universe on the few true hackers who aren & # 8217 ; t cruising the phone lines with
malicious purpose?
True hackers are disgusted at the manner things are in this universe. All the
fantastic engineering of the universe costs three weaponries and four legs to acquire these
yearss. It costs a luck to name up a board in an adjoining province! So why
wage for it? To borrow something from a file I will call subsequently, why wage for
what could be & # 8220 ; soil cheap if it wasn & # 8217 ; t run by profiteering gourmands & # 8221 ; ?
Why be forced, due to miss of the hellacious hard currency flow it would necessitate to
name all the great topographic points, to remain around a clump of schmuck also-rans in your
place town? Naming out and come ining a system you & # 8217 ; ve ne’er seen before are
two of the most exhilirating experiences known to adult male, but it is a pleasance
that could non be enjoyed were it non for the ability to phreak & # 8230 ;
True hackers are quiet. I don & # 8217 ; t mean they talk at approximately.5 dubnium, I mean
they keep their oral cavities shut and wear & # 8217 ; t crow. The figure one slayer of those
the media would hold us name hackers is boasting. You tell a friend, & # 8221 ; or you
run your oral cavity on a board, and sooner or subsequently people in power will happen out
what you did, who you are, and you & # 8217 ; re gone & # 8230 ;
I candidly don & # 8217 ; t cognize what aim this file will function, possibly person
someplace will read it, and know the truth about hackers. Not the prevarications that
the nescient spread. To the true hackers out at that place, I hope I am portraying
what you are in this file & # 8230 ; If I am non, so I at least am stating what I
believe a true hacker should be. And to those wanna-be & # 8217 ; s out at that place who like
the label of & # 8220 ; HACKER & # 8221 ; being tacked onto them, turn up, would ya?
Oh yeah, the file I quoted from & # 8230 ; It has been done ( at least ) two
times. & # 8220 ; The Hacker & # 8217 ; s Manifesto & # 8221 ; or & # 8220 ; Conscience of a Hacker & # 8221 ; are the two
names I & # 8217 ; ve seen it given. ( A file by itself, and portion of an issue of Phrack )
Either manner, it was written by The Mentor, and it is perfectly the best thing
of all time written on the topic of hackers. Read it, it could alter your life.
Spread it around, but don & # 8217 ; t alter anything please. . .