Relay-Version: version B 2.10 5/3/83; site utzoo.UUCP Path: utzoo!mnetor!uunet!seismo!rutgers!mtune!codas!dlm From: dlm@codas.ATT.COM (Don_L_Million) Newsgroups: comp.misc Subject: Re: Hacker Scholarship Message-ID: <1139@codas.ATT.COM> Date: Mon, 13-Jul-87 08:47:34 EDT Article-I.D.: codas.1139 Posted: Mon Jul 13 08:47:34 1987 Date-Received: Tue, 14-Jul-87 03:04:57 EDT References: <2757@mtgzz.UUCP> <345@genesis.UUCP> <2318@hoptoad.uucp> <234@wrs.UUCP> Organization: AT&T, Altamonte Springs, FL Lines: 15 Summary: Once more, with feeling In article <234@wrs.UUCP>, dg@wrs.UUCP (David Goodenough) writes: > > ... phreak is the term that should be used to describe people that > attempt malicious damage or theft. I use the term hacker to describe > someone like myself who writes a 90% full implementation of rogue on > a Z80, .. NOTHING I have done while wearing my hacker hat has ever > constituted theft or malicious damage. > OK, as long as you're hacking away on your own machine, I have nothing but respect for your ingenuity. As soon as you intentionally break into someone else's machine YOU ARE A CRIMINAL! I don't care whether you damage anything or not! Just like you wouldn't care whether or not I found some- thing to take; if I broke into your house, you'd want me prosecuted. BTW this may sound like a flame, but it's not intended as such.