-
Essay / Hackers: Information Warefare - 2205
Hackers: Information WarefareThe popularity of the Internet has increased significantly in recent years. At the same time, the so-called “hacker” community has grown and reached a level where it is less important. black market storyline and more from "A Current Affair" storyline. Misconceptions about what and what a hacker is are common among everyone who thinks they understand what the Internet is after using it a few times. In the next few pages, I will do my best to prove the true definition of what a hacker is, how global economic electronic warfare relates to it, the context of the Internet, as well as a plethora of scatological material only for your reading pleasure. I'll try to use the least technical IT terms possible, but to make my point I sometimes have no choice. There are many misconceptions about the definition of what a hacker actually is. best definition I found: pretend you are walking down the street, the same street you have always taken. One day you see a large wooden or metal box with wires coming out of it, lying on the sidewalk where there were none. Many people won't even notice it. Others might say, “Oh, a club on the street. ". A few might wonder what it feels like and then move on. The hacker, the real hacker, will see the box, stop, examine it, wonder, and spend mental time trying to understand it. Under appropriate circumstances, he might return later to closely examine the wiring, or even have the temerity to open the box. Not maliciously, just out of curiosity. The hacker wants to know how things work. (8) Hackers are truly "America's most valuable resource" (4:264), as former CIA director Robert Steele said. But if we don't stop attacking our own countrymen, we will never be seen as anything other than gutter trash. Hacking computers for the sole purpose of collecting systems like space-age baseball cards is stupid and pointless; and can only lead to a quick trip up the river. Let's say everyone was given the opportunity to hack without any worry of prosecution with free access to a safe system to hack from, the only problem being that you can't hack certain systems. The military, government, financial, commercial and academic systems would all remain a fair target. Every operating system, every application, every type of network opens to your curious mind. Would this be a good alternative? Could you follow some simple guidelines to