Hacking Vs Hackers

Improved Essays
What do you think when you hear the word hacking and hackers? Despite what people may think, hacking isn’t always a problem. In the two articles I have read, the difference between good hackers and bad hackers is explained. “Hacking and Hackers” (Article 1) and “Good Hackers, Bad Hackers. What’s the Difference?:The Difference between Destruction and Protection” (Article 2) differentiate between length, the sources, and the examples each article provides, yet are similar in that they to the same central topic of hacking, and how white and black hat hackers differ, as the main objective.
In the introduction of this article, the author explains that there are good and bad hackers. He continues by explaining the three different types of hackers, the white hat hackers, the gray hat hackers, and the black hat hackers. It states in the reading, that around the 1950s, a group of model-train enthusiasts decided to tinker with the electronics within their model trains and the switches the run them, in doing so the group had improved their performance and came up with the term. Though hacking was first introduced in the 1950s, the author sticks to the more malicious acts of hacking which began around the 1980s when personal computers (PC) were first introduced. He goes on to explain, different occasions when hacking had taken place. In 1988, a man by
…show more content…
In article 1 the article is roughly 3 pages, whereas the second article is only 2. The two articles were slightly different relating to the central topic. Length doesn’t always play a huge role in a piece of work. Two articles could be a number of pages and still be able to sum up the same amount of information. Both of the articles gave a good amount of information while still remaining short. Keeping it short and to the point is best for articles, so that the reader doesn’t get bored or sidetracked and move on to something

Related Documents

  • Decent Essays

    Pros And Cons Of Hacking

    • 434 Words
    • 2 Pages

    I am going to take about how apple had wanted to refuse to unlock a app phone. But the FBI says that they need to unlock the phos so that they can know of there is going to be a fucher attack. But App says they will not because they had already unlock about nine phone. But the FbI had say “that there can be a fucher russon attack”.…

    • 434 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    IS3110 Lab Answers

    • 739 Words
    • 3 Pages

    Cybercriminals are people who carry out cybercrimes utilizing the web, a PC and the system to execute violations. 6. What sorts of Hackers are there? White-cap programmers: hacks to test your framework unprotected against demonstrate a point Dark cap programmers: hacks your framework to for illicit purposes Dim cap programmers: hacks for the sake of entertainment and to flaunt yet will offer their administrations 7.…

    • 739 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    On the second day of Monday in October, many schools all across America close down to honor the explorer who discovered the new world, Christopher Columbus. A lot of historians and authors saw Columbus as a brave explorer who did what was right. A lot of other historians thought of him as a sadistic person who doesn't deserve to be honored. This is all from the two articles with different bias, Sail On and Columbus Doesn't Deserve A Holiday. Both of the articles have some text the is common in both pieces.…

    • 224 Words
    • 1 Pages
    Improved Essays
  • Improved Essays

    Hactivism as a process has a dual-edged character. The organised activity exposes the “transparency and accountability” (Diamond 71) of global power exploitation. However, such methods are seen questionable in the accountability and transparency of their practice(s). The main concern with hactivism is the preconceived notions of its values are translated offline as vigilantism. However, the whole concept of vigilantism is based on the idea of not condoning individual action to exercise authority if there is an immediate presence enforcing it.…

    • 609 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Sydney Siege Speech

    • 664 Words
    • 3 Pages

    Since the dawn of time there's always been news and there's always been change. Is change bad? No of course not, but it depends on what it changes to. So did the change of news have a positive or negative impact on news today? That's what I'm here to discuss.…

    • 664 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Christopher Columbus Everyone knows who discovered America, Christopher Columbus of course. Many people say the saying “in 1492, Columbus sailed the ocean blue”. Many schools take off on the second Monday of october for Columbus Day. However, there are many opinions of him, negative and positive. The article “Columbus Does Not Deserve a National Holiday” is an example of a negative one.…

    • 303 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    The first article is Attack of the Man Eaters and it mainly about Colonel Paterson and is was written by Lauren Tarshis. The second article about is Lion Whisperer and mainly about Kevin Richardson and written by Susan Orlean. Keven Richardson runs a sanctuary for lions for newborn animals they live in captivity, he raised two of his favorite lions. They are his best friends he loves saving animals he takes them to the park and feeds them, he cuddles with them.…

    • 296 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Code 2600 Film Analysis

    • 391 Words
    • 2 Pages

    Technology is always constantly evolving and there are many people who play a big part in this. One of these people are known as hackers, they are usually viewed negatively in society, but despite that they have a huge part in the evolution of technology. Code 2600, directed and produced by Jeremy Zerechak is about the advancing world of technology and how ‘hackers’ are playing a big part in the advancement of technology as they push company’s to be constantly advancing and help technology become more secure. One of the prevalent themes in the documentary is that many individuals or groups that have a negative stereotype in society can play a positive role in the advancement of society. The documentary used many historical clips and news clips…

    • 391 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    In the book of Back to the Lake, there are two articles that share the same topic of education. However, both articles were written differently and have a different purpose. One of the articles titles is called “Higher Education: Not What It Used to be” is an article that discusses the problems of how universities are highly expensive for students to go to. Meanwhile, the second article, “How to Pull an All-Nighter” is a process article that discuss how to study better during the night. Both articles are too have different methods to explain their topic, but both do share a common interest.…

    • 772 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    The articles have similarities. They also have differences. One article talks about how the wolf became the dog. The other article talks about how the dog became part of the family. The two articles discuss the relationship between dogs and humans.…

    • 239 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    Today’s modern technology has provided a new platform for activists to advance their cause in a public forum. According to the Oxford dictionary, “Hacktivism” is defined as the act of a computer hacker whose goal is to promote a social or political cause. Hacktivism is the modern online version of traditional protests, rallies, and marches. Hacktivism acts reflect the same historical acts of civil disobedience that occurred during the Civil Rights Movement. Civil disobedience is the refusal to obey a law that violates an individual right, it is a state of resistance.…

    • 143 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Filling Prisons

    • 440 Words
    • 2 Pages

    Both of the articles build each other up because they both have related topics. Since they’re closely related, with some minor differences, they piggyback off on another to help bring attention to the problem. With both articles bringing information into the light, the general public can see that there is an obvious problem with out criminal justice system that needs to be solved. Since we are beginning to see a problem, we can pose policy recommendations to help deflate the…

    • 440 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    Equality The definition of equality is as follows: the quality of being the same in quantity or measure or value or status; a state of being essentially equal or equivalent; equally balanced” (Vocabulary.com). One might ponder why the definition of equality is the first sentence of this essay, especially when the general of the population already knows what the word means. Well if the general population already knows the concept of equality, then my question is this, Why has society not yet reached equality? Inequality towards minorities still happens today in America starting with youngsters, into adulthood, and there are claims to deny these prepositions.…

    • 962 Words
    • 4 Pages
    Superior Essays
  • Superior Essays

    Although there are tremendous differences in each article and the way the author composes them, they both work to prove their point and generate a solid…

    • 1737 Words
    • 7 Pages
    Superior Essays
  • Great Essays

    Things have changed drastically in the past few decades where the very notion of ‘internet’ is introduced and is simultaneously captured by a class whose interest is to control the channel from where the information flows for the sake of power and domination. It’s not just the case for internet but for platforms as well. For McKenzie Wark, the Marxist theory is not much relevant anymore because the beneficiary class knows other ways of controlling what the people should have access to, by controlling the nozzle of the medium from where the information flows. However Marxist theory can be used as source code but one needs to inject criticism to it in order to endorse a new theory which is what we are talking about, ‘Hacker Manifesto’.…

    • 1774 Words
    • 8 Pages
    Great Essays