Permalink
Cannot retrieve contributors at this time
Name already in use
A tag already exists with the provided branch name. Many Git commands accept both tag and branch names, so creating this branch may cause unexpected behavior. Are you sure you want to create this branch?
DADA/Articles/st22_computer_misuse.md
Go to fileThis commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
22 lines (18 sloc)
903 Bytes
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
--- | |
title: Computer Misuse | |
--- | |
# Introduction | |
In this section, we will look at some examples of the people that hack | |
and those that have been hacked. The terms "hack" and "hacker" or, of | |
course, open to a lot of interpretation. Many computer scientists, for | |
example, would call themselves a hacker if they enjoyed working with | |
technology and trying to find new ways to use it. This is the older | |
meanig of the term. We also hear about people "hacking" into | |
voicemail, which in some cases turned out to be no more than calling | |
the network provider and asking for access - bad behaviour, for sure, | |
but not the same techniques as someone who takes control of a remote | |
computer. | |
When we talk about hacking in the illegal sense, we mean people who | |
use their knowledge and skill with computers to perform unauthorised | |
actions on a system, for whatever reason. This is properly called | |
"computer misuse". | |