Skip to content
Permalink
master
Switch branches/tags

Name already in use

A tag already exists with the provided branch name. Many Git commands accept both tag and branch names, so creating this branch may cause unexpected behavior. Are you sure you want to create this branch?
Go to file
 
 
Cannot retrieve contributors at this time
---
title: Computer Misuse
---
# Introduction
In this section, we will look at some examples of the people that hack
and those that have been hacked. The terms "hack" and "hacker" or, of
course, open to a lot of interpretation. Many computer scientists, for
example, would call themselves a hacker if they enjoyed working with
technology and trying to find new ways to use it. This is the older
meanig of the term. We also hear about people "hacking" into
voicemail, which in some cases turned out to be no more than calling
the network provider and asking for access - bad behaviour, for sure,
but not the same techniques as someone who takes control of a remote
computer.
When we talk about hacking in the illegal sense, we mean people who
use their knowledge and skill with computers to perform unauthorised
actions on a system, for whatever reason. This is properly called
"computer misuse".