Relay-Version: version B 2.10 5/3/83; site utzoo.UUCP
Path: utzoo!mnetor!uunet!seismo!rutgers!mtune!codas!dlm
From: dlm@codas.ATT.COM (Don_L_Million)
Newsgroups: comp.misc
Subject: Re: Hacker Scholarship
Message-ID: <1139@codas.ATT.COM>
Date: Mon, 13-Jul-87 08:47:34 EDT
Article-I.D.: codas.1139
Posted: Mon Jul 13 08:47:34 1987
Date-Received: Tue, 14-Jul-87 03:04:57 EDT
References: <2757@mtgzz.UUCP> <345@genesis.UUCP> <2318@hoptoad.uucp> <234@wrs.UUCP>
Organization: AT&T, Altamonte Springs, FL
Lines: 15
Summary: Once more, with feeling

In article <234@wrs.UUCP>, dg@wrs.UUCP (David Goodenough) writes:
> 
> ... phreak is the term that should be used to describe people that
> attempt malicious damage or theft. I use the term hacker to describe
> someone like myself who writes a 90% full implementation of rogue on
> a Z80, .. NOTHING I have done while wearing my hacker hat has ever 
> constituted theft or malicious damage.
> 
OK, as long as you're hacking away on your own machine, I have nothing
but respect for your ingenuity.  As soon as you intentionally break into
someone else's machine YOU ARE A CRIMINAL!  I don't care whether you damage
anything or not!  Just like you wouldn't care whether or not I found some-
thing to take; if I broke into your house, you'd want me prosecuted.

BTW this may sound like a flame, but it's not intended as such.