The term hacker first originated in Massachusetts Institute of Technology “MIT” in the early 1960’s. it had nothing to do with computers when the word was first used in MIT the students made it up to describe the two types of student that they said existed the first one being a “TOOL” and the second one being a “Hacker” (Harvey). A “TOOL” was used to describe a student who will always get straight A’s and was always in class and when they where in break or out of class you can easily find them in a library. And a “HACKER” was a student who was never in class and slept all day and would rather be doing anything else at night rather than to be studying in other words the complete opposite as a “tool” they were a person who had to peruse a hobby at night and was dedicated to it (Harvey). Which in reality can sum up a hacker in this ere because he is someone who will most likely be resting in the day time and begin his hobby at night. Then in again in MIT in 1986 the term was used aging this time it was for building hackers who were people who go and access rooftops or tunnels that they were not authorized to be at (Harvey).
Now there is a hacker for almost anything that can be used electronically, for example there is a hacker for phones, cable TV boxes, people who hack ATM machines and cards, and the infamous computer hackers. The phone h...
... middle of paper ...
...t hacked because they will not know that there security defense is not good and will have to learn the hard way by getting hacked and trying to find out why it happened and how it happened. The government is also hiring hackers that have been found guilty of cyber threats like hacking into government websites like the F.B.I and also some Army base computers. And the government will hire them and pardon their charges so that they can help them beef up their security by trying to hack into their security systems and telling them how to fix it. So at the end we need hackers to help the government against threats and also to help out businesses in trying to help them get the best protection they can have so that way they wont get hacked and charged insane amounts of money by telephone hackers or hackers that take control of their systems and demand money to give it back.
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- INTRODUCTION Ethical hacking & ethical hacker are terms used to describe hacking performed by a company or individual to help identify potential threats on a computer or network. An ethical hacker attempts to bypass system security & search for any weak points that could be exploited by malicious hackers. This information is then used by the organization to improve the system security, in an effort to minimize or eliminate any potential attacks.... [tags: Computer network, Ethernet, Black hat, Hacker]
1722 words (4.9 pages)
- Myth of the Hacker The 1960s hacker, a term that was originally a referent to a good person with computer wizardry, has come full circle into the 1990s. Through media representations and the formation of hacker icons, modern hackers are mythologized as the good hacker. The original hackers of MIT belonged to a group of privileged individuals; they operated during a time when computers were not a household item. Hacking, for this generation, began as an intellectual pursuit as well as a way to pull elaborate pranks.... [tags: Hacker Hacking Computer Technology Internet]
609 words (1.7 pages)
- Hacker only has 50 years history, computer hacker crime is one of the mots dangerous crime threat at 21th century. Hacktivism is a new class of hacker has emerged, “the so-called hacktivist, who engages in hacking of computer networks and systems as a form of protest”(Hargrave,2012). Hacker crimes have use computer programming skill to make errors on your computer that control your computer to get information and change your computer system. Since in 1970s, computer hackers are called “phreaks”, which mean by phone hacker.... [tags: Computer, Computing, Computer programming, Hacker]
1189 words (3.4 pages)
- Is a Hacker a Hacker in Cyberspace. In the film Hackers computer hackers are portrayed as peculiar super-heroes in an attempt to both obliterate old stereotypes and to elevate their status. The first scene commences with F.B.I. agents equipped with large firearms who break into a house to arrest David Murphy, who is eleven years of age at the time. The negative perception of a hacker is challenged when the viewer is shown the computer nerds side of the account. By the time the motion picture ends, several stereotypes become evident relative to the portrayal of a hacker.... [tags: Hackers Internet Web Essays]
1048 words (3 pages)
- Marilyn Hacker’s Selected Poems 1965-1990 Without question, I found Selected Poems to be the most challenging book we've read for this class. Strangely enough, in my rush to finish this book, I remained certain that somewhere in this often unsettling collection Marilyn Hacker would find a way to touch a cord or demand a response. When I reached Towards Autumn, the picture finally cleared and crystallized, and I realized I had arrived. Towards Autumn Thinking of her's (the daughter) like thinking of a lover I hope will someday grow to be a friend.... [tags: Hacker Selected Poems 1965-1990]
455 words (1.3 pages)
- Marilyn Hacker's Mother-Daughter Relationship Exposed in Selected Poems 1965-1990 If Selected Poems 1965-1990 can be taken as an evenly representative sample of Marilyn Hacker's work, motherhood does not seem to be the single central focus of her life or her work. Hacker has quite a few poems about or for her daughter Iva, and Iva is mentioned in many other poems, yet much of Hacker's work focuses on other aspects of her life and interests. The fact that Hacker does not focus exclusively on her motherhood seems important in and of itself.... [tags: Hacker Selected Poems 1965-1990]
700 words (2 pages)
- Marilyn Hacker Redefines Mother, Woman, and Daughter in Selected Poems 1965-1990 Marilyn Hacker. What does she mean. What does she mean. I check with Thrall, Hibbard, and Holman who define poetry to be "a term applied to the many forms in which man has given a rhythmic expression to his most imaginative and intense perceptions of his world, himself, and the interrelationship of the two" (364). I forge ahead through hundreds of pages of poetry. Images and impressions are beginning to form in my mind.... [tags: Hacker Selected Poems 1965-1990]
711 words (2 pages)
- Analysis of Fifteen to Eighteen from Marilyn Hacker’s Selected Poems In the poem 'Fifteen to Eighteen', Marilyn Hacker uses the rebellious years of adolescence to analyze the effects an illness can have on the relationship and family roles for both parent and child. Diabetes puts the mother and daughter in opposite roles than are traditionally seen at this age. The illness which occurs at least over the last four years of this girl's childhood forces her to grow up prematurely, take on some of the mother roles, and suffer the sacrifices that accompany it.... [tags: Hacker Selected Poems 1965-1990]
580 words (1.7 pages)
- Hackers are typically defined as individuals that gain unauthorized access to another person’s computer. Although that definition is rather specific it can be broadened to include other illegal activities such as “phishing”, which can be done on its own and may be separate from hacking. The hacker community is what is contended to be an “imagined community” meaning they occupy no singular geographic location, like members of a community like Rosedale, nor have they have any set guidelines for becoming a computer hacker.... [tags: Computer Security]
2589 words (7.4 pages)
- Hacker Not again. Thought Abby as she rubbed her tired, stiff neck, and squinted at the computer monitor. ERROR ERROR ERROR flashed defiantly on the screen, as if mocking her. Every time I go near one of these things something has to go wrong, she thought sullenly. She tapped in a few more commands and then after a while gave up as the computer hummed angrily at her. She ruffled her short dark hair in frustration. Her father, Mr Hardy, a short cheerful man who always had a smile and a terrible joke up his sleeve, had bought the new computer for her and enrolled in an ICT class at the local community centre, in the hope that it would help with his daughters' schoo... [tags: Papers]
2481 words (7.1 pages)