Relay-Version: version B 2.10 5/3/83; site utzoo.UUCP Path: utzoo!mnetor!uunet!seismo!mcnc!gatech!rutgers!mtune!codas!cpsc6a!rtech!wrs!dg From: dg@wrs.UUCP (David Goodenough) Newsgroups: comp.misc Subject: Re: Hacker Scholarship Message-ID: <241@wrs.UUCP> Date: Tue, 14-Jul-87 14:27:51 EDT Article-I.D.: wrs.241 Posted: Tue Jul 14 14:27:51 1987 Date-Received: Fri, 17-Jul-87 07:33:24 EDT References: <2757@mtgzz.UUCP> <345@genesis.UUCP> <2318@hoptoad.uucp> <234@wrs.UUCP> <1139@codas.ATT.COM> Reply-To: dg@wrs.UUCP (David Goodenough) Organization: Wind River Systems, Emeryville, CA Lines: 41 Summary: Hackers vs. Phreaks In article <1139@codas.ATT.COM> dlm@codas.ATT.COM (Don_L_Million) writes: >In article <234@wrs.UUCP>, dg@wrs.UUCP (David Goodenough) writes: >> >> ... phreak is the term that should be used to describe people that >> attempt malicious damage or theft. I use the term hacker to describe >> someone like myself who writes a 90% full implementation of rogue on >> a Z80, .. NOTHING I have done while wearing my hacker hat has ever >> constituted theft or malicious damage. >> >OK, as long as you're hacking away on your own machine, I have nothing >but respect for your ingenuity. As soon as you intentionally break into ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ >someone else's machine YOU ARE A CRIMINAL! I don't care whether you damage ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ >anything or not! >BTW this may sound like a flame, but it's not intended as such. ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Thanks! Exactly my point: people seem to think that anyone who programs computers as a hobby (oops - it's out - don't tell my boss I'm getting paid $26000 / annum for working on my hobby) will automatically delight in breaking into someone elses computer and nuking the password file; or creating the All-American compiler for mess-dos that really formats any hard discs it can find. It just isn't so. Sadly there are twisted mentalities out there that are like that, but I can assure you that we aren't all like that. I for one was very glad to see a program in the IBM SIG P.D. library which does the same basic job as strings. As far as I know in the Seattle area (where I used to live) it was responsible for spotting at least three trojans. Any one who wants C source (MY OWN, NOT STOLEN from AT&T or UCB or anywhere) for a similar program is welcome to ask. As for anyone who still holds onto the notion that a hacker, by definition should not be let out of sight with a terminal and a modem, Well my flamethrower is full of gas, and warmed up and ready... - the correct term here is phreak. -- dg@wrs.UUCP - David Goodenough +---+ | +-+-+ +-+-+ | +---+