Relay-Version: version B 2.10 5/3/83; site utzoo.UUCP
Path: utzoo!mnetor!uunet!seismo!mcnc!gatech!rutgers!mtune!codas!cpsc6a!rtech!wrs!dg
From: dg@wrs.UUCP (David Goodenough)
Newsgroups: comp.misc
Subject: Re: Hacker Scholarship
Message-ID: <241@wrs.UUCP>
Date: Tue, 14-Jul-87 14:27:51 EDT
Article-I.D.: wrs.241
Posted: Tue Jul 14 14:27:51 1987
Date-Received: Fri, 17-Jul-87 07:33:24 EDT
References: <2757@mtgzz.UUCP> <345@genesis.UUCP> <2318@hoptoad.uucp> <234@wrs.UUCP> <1139@codas.ATT.COM>
Reply-To: dg@wrs.UUCP (David Goodenough)
Organization: Wind River Systems, Emeryville, CA
Lines: 41
Summary: Hackers vs. Phreaks

In article <1139@codas.ATT.COM> dlm@codas.ATT.COM (Don_L_Million) writes:
>In article <234@wrs.UUCP>, dg@wrs.UUCP (David Goodenough) writes:
>> 
>> ... phreak is the term that should be used to describe people that
>> attempt malicious damage or theft. I use the term hacker to describe
>> someone like myself who writes a 90% full implementation of rogue on
>> a Z80, .. NOTHING I have done while wearing my hacker hat has ever 
>> constituted theft or malicious damage.
>> 
>OK, as long as you're hacking away on your own machine, I have nothing
>but respect for your ingenuity. As soon as you intentionally break into
				 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
>someone else's machine YOU ARE A CRIMINAL! I don't care whether you damage
 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
>anything or not!
>BTW this may sound like a flame, but it's not intended as such.
 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Thanks!

Exactly my point: people seem to think that anyone who programs computers
as a hobby (oops - it's out - don't tell my boss I'm getting paid
$26000 / annum for working on my hobby) will automatically delight in
breaking into someone elses computer and nuking the password file; or
creating the All-American compiler for mess-dos that really formats
any hard discs it can find. It just isn't so. Sadly there are twisted
mentalities out there that are like that, but I can assure you that we
aren't all like that. I for one was very glad to see a program in the
IBM SIG P.D. library which does the same basic job as strings. As far
as I know in the Seattle area (where I used to live) it was responsible
for spotting at least three trojans. Any one who wants C source (MY OWN,
NOT STOLEN from AT&T or UCB or anywhere) for a similar program is welcome
to ask. As for anyone who still holds onto the notion that a hacker, by
definition should not be let out of sight with a terminal and a modem,
Well my flamethrower is full of gas, and warmed up and ready... - the
correct term here is phreak.
--
		dg@wrs.UUCP - David Goodenough

					+---+
					| +-+-+
					+-+-+ |
					  +---+