Reader Ad Slot
Reader Ad Slot placeholder
If you would like to support SpookStack without paying out of pocket, please consider allowing advertising cookies. It helps cover hosting costs and keeps the archive free to browse. You can change this choice at any time.
Adrian Lamo — Part 3
Page 247
247 / 501
Slashdot | Adrian Lamo ong Hacking @ Page 26 of 33
Re: Why do they do it? by Sycraft-fu (Score:2) Saturday September 06, @11:59AM
Re: Why do they do it? by buttahead (Score:2) Saturday September 06, @12:59PM
Re: Why do they do it? by Caeldan (Score:1) Saturday September 06, @01:28PM
Re:Why do they do it? by RzUpAnmsCwrds (Score:2) Saturday September 06,
@07:40PM
Re:Why do they do it? by eddie can read (Score:1) Sunday September 07, @04:09AM
*® 3replies beneath your current threshold.
enee
« No more bullshitting. by Henry Stern (Score:2) Saturday September 06, @11:16AM
@ Lreply beneath your current threshold.
Hacker the Gray (Score:5, Funny)
by AppHack (622902) on Saturday September 06, @11:18AM (#6887289)
So he's a gray hat hacker who has fallen into shadow. Will he come back as a white hat
hacker, more powerful than before?
[ Reply to This }
lotr jokes ... by krumms (Score:2) Saturday September 06, @12:32PM
+ MS upset at free choice?? by Martigan80 (Score:1) Saturday September 06, @11:194M.
« Re:MS upset at fiee choice?? by Hatta (Score:2) Saturday September 06, @12:35PM.
« Run. Just get out of here... by Jerk City Troll (Score:1) Saturday September 06, @11:20AM
Dialectic (Score:5, Insightful)
by Henry V_.009 (518000) <marstrail AT hotmail DOT com> on Saturday September
06, @11:22AM (#6887313)
(http://thrasymachus.typepad.comy/thras/ | Last Journal: Monday August 11, @12:39PM)
Everyone enjoys comparing hacking to breaking into someone's house or trespassing
on private property. It is not. You cannot be ‘inside’ someone else's server. (It is doubly
impossible given the girth of most hackers.) The physical definitions fall apart. And
the metaphorical analogies do not mesh physical property and Turing machines so
well.
We can begin with what we do know for sure about hacking. A hacking incident is
when someone sends packets of information (in some form and by some medium)
from a computer or computers to someone else's computer or computers. Which
packets are illegal and which are not? Any exact definition raises problems. You can
say that any packets that change the functioning of the target system in an unintended
way is hacking. So the ignorance of the owner becomes the limit of what is or is not
hacking. Faking an email address on a badly designed sign up page (or using
mailinator) might be hacking under that definition. Other definitions are similarly
problematic. Currently our legal system tends to defauit (once it actually gets to jury
trial) to the above definition, but (in effect) adds that the act must be highly technical
and use specialized tools. (Other definitions exist, and J am of course willing to bust
holes in any particular one you cate to suggest--so go ahead and suggest them.)
FBI(19-cv-1495)-1918
hitp://slashdot.org/articles/03/09/06/1325221 shiml?tid=123 &tid=126 &tid=172&tid=99 9/8/2003
Reveal the original PDF page, then click a word to highlight the OCR text.
Community corrections
No user corrections yet.
Comments
No comments on this document yet.
Bottom Reader Ad Slot
Bottom Reader Ad Slot placeholder
If you would like to support SpookStack without paying out of pocket, please consider allowing advertising cookies. It helps cover hosting costs and keeps the archive free to browse. You can change this choice at any time.
Continue Exploring
Agency Collection
Explore This Archive Cluster
Broad Topic Hub
Topic Hub
letter
bureau
Related subtopics
Subtopic
Subtopic
Subtopic
Subtopic
Subtopic
Subtopic