Relay-Version: version B 2.10 5/3/83; site utzoo.UUCP
Posting-Version: version B 2.10.2 9/18/84 (Fortune 01.1b1); site graffiti.UUCP
Path: utzoo!linus!philabs!cmcl2!seismo!ut-sally!ut-ngp!shell!graffiti!peter
From: peter@graffiti.UUCP (Peter da Silva)
Newsgroups: net.micro
Subject: Re: Definition of hacker (argument)
Message-ID: <207@graffiti.UUCP>
Date: Tue, 17-Sep-85 07:50:58 EDT
Article-I.D.: graffiti.207
Posted: Tue Sep 17 07:50:58 1985
Date-Received: Sun, 22-Sep-85 16:22:44 EDT
References: <787@brl-tgr.ARPA> <788@dataio.UUCP> <137@graffiti.UUCP> <798@dataio.UUCP>
Organization: The Power Elite, Houston, TX
Lines: 9

> There are always articles about "Hackers break into DODs computer, Read top
> secret documents", etc.  Furthermore, there are a number of books out like:
> "Out of the Inner Circle: Confessions of a Hacker".  These definitions
> will override anything that we would like to use.

I see, in much the same way that the British press made "yankee" a term of
approbium around the time of the American Rebellion. Well, with that sort of
precedent I guess we better just give up & let the high-school modem-freakers
have the term.