[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
RE: [cobalt-users] how do the hackers find your Raq?
- Subject: RE: [cobalt-users] how do the hackers find your Raq?
- From: "Jay Fesco" <jay@xxxxxxxxxxxx>
- Date: Thu May 31 01:50:16 2001
- List-id: Mailing list for users to share thoughts on Cobalt products. <cobalt-users.list.cobalt.com>
<snip>
I believe we have our terms a bit confused. *Hacking* is just
programming, as in "hacking away at this program I'm writing". A hacker
is a programmer. *Cracking* is the act of penetrating a system's
security measures, yada yada...
</snip>
Geez, could we confuse the original issue a little more? In context of the
original message, the question implied 'individuals wishing unauthorized
access to RaQs'. I don't see any other way to interpret the question. Your
'education' on the levels of skill and proper nomenclature only clouds the
discussion, OT as it is. We know the intent of the original question - what
we call the individuals in question does not matter here.
If I say 'my system was hacked' in THIS discussion group, you know exactly
what I mean. Distinctions between White hat, Black hat, Orange hat, l33t,
h4x0rz or whatever do not mean anything - spoken here it means 'somebody got
in, broke some stuff, installed some stuff, used some other stuff for things
I didn't intend, and I'd like to fix the situation'. We can call them Fred
for all it matters, but the results are the same.
Jay