Relay-Version: version B 2.10 5/3/83; site utzoo.UUCP Posting-Version: version B 2.10.2 9/18/84 (Fortune 01.1b1); site graffiti.UUCP Path: utzoo!linus!philabs!cmcl2!seismo!ut-sally!ut-ngp!shell!graffiti!peter From: peter@graffiti.UUCP (Peter da Silva) Newsgroups: net.micro Subject: Re: Definition of hacker (argument) Message-ID: <207@graffiti.UUCP> Date: Tue, 17-Sep-85 07:50:58 EDT Article-I.D.: graffiti.207 Posted: Tue Sep 17 07:50:58 1985 Date-Received: Sun, 22-Sep-85 16:22:44 EDT References: <787@brl-tgr.ARPA> <788@dataio.UUCP> <137@graffiti.UUCP> <798@dataio.UUCP> Organization: The Power Elite, Houston, TX Lines: 9 > There are always articles about "Hackers break into DODs computer, Read top > secret documents", etc. Furthermore, there are a number of books out like: > "Out of the Inner Circle: Confessions of a Hacker". These definitions > will override anything that we would like to use. I see, in much the same way that the British press made "yankee" a term of approbium around the time of the American Rebellion. Well, with that sort of precedent I guess we better just give up & let the high-school modem-freakers have the term. Brought to you by Super Global Mega Corp .com