Verified Document

Hackers Hacking Has An Interesting Thesis

Here he also built his first computer from scratch, using a soldering iron, TTL gates, and M6800 processor and a television. Later, Berners-Lee worked with CERN, a nuclear research organization in Europe. Here he created a hypertext prototype system to facilitate sharing and updating information. Later, Berners-Lee combined hypertext with the Internet, and the World Wide Web was born. At MIT, he also founded the World Wide Web Consortium, or W3C.

Linus Torvalds is a white hat hacker who is credited with the creation of the Linux operating system. He began his computer career with a Commodore VIC-20, after which he worked with a Sinclair QL, which he modified extensively. In 1991, Torvalds created the Linux kernel, inspired by the Minix operating system. An interesting fact is that Torvalds only wrote about 2% of the current Linux kernel himself. He invited the public to contribute code, which culminated in the success of the system. The invention is a testament to the success of free/open source software. Torvalds currently works as a coordinator of the Linux code contributed by volunteer programmers. He is very prominent among the white hats, to the extent of having an asteroid named after him and appearing in "60 Years of Heroes" by Time Magazine.

Richard...

He founded the Project to develop a free operating system, and is therefore known as the father of free software. He did this on the principle that the computer world can grow and develop only by providing users with the ability to freely use, share, and modify software.
Today, many white hat hackers are hired by companies to investigate and modify the strength of their security systems. This type of activity is regarded as both legal and necessary. Although hacking is generally seen as a negative activity, deeper investigation reveals that this is not in fact the case. It is furthermore also encouraging to note that many former black hat hackers are now using their skills for the benefit of society. Nevertheless, negative hacking makes spectacular media material, as is evident in the many films on the subject.

Sources

Hackingalert.com. "History of Hacking." http://www.hackingalert.com/hacking-articles/history-of-hacking.php

Tippit, Inc. "Top Ten Most Famous Hackers of All Time." http://www.itsecurity.com/features/top-10-famous-hackers-042407/

Trigaux, Robert. "A History of Hacking." St. Petersburg Times. 2000. http://www.sptimes.com/Hackers/history.hacking.html

Sources used in this document:
Sources

Hackingalert.com. "History of Hacking." http://www.hackingalert.com/hacking-articles/history-of-hacking.php

Tippit, Inc. "Top Ten Most Famous Hackers of All Time." http://www.itsecurity.com/features/top-10-famous-hackers-042407/

Trigaux, Robert. "A History of Hacking." St. Petersburg Times. 2000. http://www.sptimes.com/Hackers/history.hacking.html
Cite this Document:
Copy Bibliography Citation

Related Documents

Hacktivism One Expression of the
Words: 2323 Length: 9 Document Type: Research Paper

Anonymous is one of the groups that can be seen as participating in this form of hacktivism, as is Wikileaks. Wikileaks is probably the best know hactivist site to the general public because of the sheer volume of political information that it has made public and because of the unapologetic nature of the owner of the site. This is unfortunate in many ways because it has given individuals a false

Hacker/Hacker Techniques the Hackers in
Words: 3074 Length: 8 Document Type: Term Paper

Such people may not generally take shelter under the canopy of hackers but as a result of the more serious attributes of their motivation. (Hacker Motivation) Most of the people are anxious about the probability of being an objective for exploitation by a hacker. It is quite normal that if a computer has been installed for home use and only connected to the Internet for two hours once a

Hacker Hacking, Web Usage and the Internet
Words: 459 Length: 2 Document Type: Essay

Hacker Hacking, Web Usage and the Internet Hierarchy Computer hacking is perceived as a crime and is frequently motivated by economic interests such as the stealing of personal and credit information, or by ideological interests such as the disruption of a company's service or the acquisition of classified information from government or corporate sites. However, hacking is also quite frequently used as an instrument for the expression of political, philosophical and practical frustrations.

Hacker Mitigation and Culture in the International Systems
Words: 2409 Length: 7 Document Type: Research Paper

Hacker Culture and Mitigation in the International Systems The explosion of the internet technology in the contemporary business and IT environments has assisted more than 300 million computer users to be connected through a maze of internet networks. Moreover, the network connectivity has facilitated the speed of communication among businesses and individuals. (Hampton, 2012). Despite the benefits associated with the internet and network technologies, the new technologies have opened the chance

Sony Reels From Multiple Hacker Attacks
Words: 2089 Length: 6 Document Type: Essay

Sony Reels From Multiple Hacker Attacks In the past, many organizations - from Sony to NASA to the New York Times - have fallen victim to hacking incidents. In addition to costing organizations money, data breaches have also taken a significant toll on the trust customers have on affected businesses. It is therefore important to note that as entities continue to accumulate more PII of clients, the relevance of having in

Deviant Behavior Computer Hackers and
Words: 673 Length: 2 Document Type: Term Paper

(Gunkel, 2001, p. 8) It would seem, that the line that one oversteps to become deviant is the line that demonstrates the outsmarting of another to create chaos in ones system and potentially do real damage to materials and data. Of coarse this would include any hacking that results in crime, and especially theft and fraud. Hacking in all intense and purpose is deviant behavior, that challenges the current cultural dependence

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now