I was curious too about the difference and Donna does raise an interesting point so I did some background reading to unpeel Hacking vs Cracking. I'll openly acknowledge that it is a hot language debate going on with malicious connotations floating about in this brew.<br>
<br>From what I can read, a hacker is one who hacks, in the context of a computer this can be by circumventing its security system. Not entirely evil if we read up about the work by "white hats" and the more obscure "grey hats". There are others who enjoy making innovative customizations or combinations of retail electronic
and computer equipment. This is also described as hacking and it doesnt have to involve bypassing security codes, installing mod chips etc. Crikey, my adaptation of a wiimote to play a game (still rather badly) on my computer or its adaptation as an interactive whiteboard tool is hacking .. so is the RACV chap who "hacked" into my car to recover my keys. His work was godly, worthy of a thousands blessings and a beer.<br>
<br>We all know the great job that the media does to educate and inform the public (tongue firmly pressed in cheek) that the public is hugely unaware that different meanings exist. Considering that computer security experts embrace all these different uses of the word "hackers", we should similarly disassociate security
breakers as "crackers", a term that is analogous to a safecracker. I don't mince words. As I remind my students:<br><ul><li>Glance into my open lunchbox? You were probably just curious. I should have closed it and you should immediately tell me when you noticed that it was open.<br>
</li><li>Steal my lunch without my knowledge or permission? You are a thief!<br></li><li>I will share a slice with anybody who is hungry but only if they ask me nicely FIRST!</li></ul>Regards Roland<br><br><div class="gmail_quote">
On 26 March 2010 10:19, Adrian Janson <span dir="ltr"><<a href="mailto:janson.adrian.a@edumail.vic.gov.au">janson.adrian.a@edumail.vic.gov.au</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin: 0pt 0pt 0pt 0.8ex; border-left: 1px solid rgb(204, 204, 204); padding-left: 1ex;">
>From your link:<br>
<br>
"In common usage, a hacker is a person who breaks into computers"<br>
<br>
Therefore hacker.<br>
<div><div></div><div class="h5"><br>
-----Original Message-----<br>
From: <a href="mailto:itapps-bounces@edulists.com.au">itapps-bounces@edulists.com.au</a> [mailto:<a href="mailto:itapps-bounces@edulists.com.au">itapps-bounces@edulists.com.au</a>] On Behalf Of Donna Benjamin<br>
Sent: Friday, 26 March 2010 10:09 AM<br>
To: Year 12 IT Applications Teachers' Mailing List<br>
Subject: Re: [Year 12 IT Apps] TJX Hacker Gets 20 Years in Prison<br>
<br>
<br>
Cracker please. Not Hacker.<br>
<br>
<a href="http://en.wikipedia.org/wiki/Hacker_%28computer_security%29" target="_blank">http://en.wikipedia.org/wiki/Hacker_%28computer_security%29</a><br>
<br>
On Fri, 2010-03-26 at 08:13 +1100, Mark KELLY wrote:<br>
> BOSTON — Convicted TJX hacker Albert Gonzalez was sentenced to 20<br>
> years in prison on Thursday for leading a gang of cyberthieves who<br>
> stole more than 90 million credit and debit card numbers from TJX and<br>
> other retailers. The sentence for the largest computer-crime case<br>
> ever prosecuted is the lengthiest ever imposed in the United States<br>
> for hacking or identity-theft.<br>
><br>
> Read More<br>
> <a href="http://www.wired.com/threatlevel/2010/03/tjx-sentencing/#ixzz0jE1QpB3a" target="_blank">http://www.wired.com/threatlevel/2010/03/tjx-sentencing/#ixzz0jE1QpB3a</a><br>
><br>
><br>
><br>
> <a href="http://www.wired.com/threatlevel/2010/03/tjx-sentencing/" target="_blank">http://www.wired.com/threatlevel/2010/03/tjx-sentencing/</a><br>
><br>
> --<br>
> Mark Kelly<br>
> Manager - Information Systems<br>
> McKinnon Secondary College<br>
> McKinnon Rd McKinnon 3204, Victoria, Australia<br>
> Direct line / Voicemail: 8520 9085<br>
> School Phone +613 8520 9000<br>
> School Fax +613 9578 9253<br>
> <a href="mailto:kel@mckinnonsc.vic.edu.au">kel@mckinnonsc.vic.edu.au</a><br>
><br>
> Webmaster - <a href="http://www.mckinnonsc.vic.edu.au" target="_blank">http://www.mckinnonsc.vic.edu.au</a><br>
> IT Lecture notes: <a href="http://vceit.com" target="_blank">http://vceit.com</a><br>
> Moderator: IT Applications Mailing List<br>
><br>
><br>
> _______________________________________________<br>
> <a href="http://www.edulists.com.au" target="_blank">http://www.edulists.com.au</a> - FAQ, resources, subscribe, unsubscribe<br>
> IT Applications Mailing List kindly supported by<br>
> <a href="http://www.vcaa.vic.edu.au/vce/studies/infotech/infotechindex.html" target="_blank">http://www.vcaa.vic.edu.au/vce/studies/infotech/infotechindex.html</a> -<br>
> Victorian Curriculum and Assessment Authority and<br>
> <a href="http://www.vitta.org.au" target="_blank">http://www.vitta.org.au</a> - VITTA Victorian Information Technology<br>
> Teachers Association Inc<br>
--<br>
Donna Benjamin - Executive Director<br>
Creative Contingencies - <a href="http://cc.com.au" target="_blank">http://cc.com.au</a><br>
ph +61 3 9326 9985 - mob +61 418 310 414<br>
open source - facilitation - web services<br>
<br>
_______________________________________________<br>
<a href="http://www.edulists.com.au" target="_blank">http://www.edulists.com.au</a> - FAQ, resources, subscribe, unsubscribe<br>
IT Applications Mailing List kindly supported by<br>
<a href="http://www.vcaa.vic.edu.au/vce/studies/infotech/itapplications3-4.html" target="_blank">http://www.vcaa.vic.edu.au/vce/studies/infotech/itapplications3-4.html</a> - Victorian Curriculum and Assessment Authority and<br>
<a href="http://www.vitta.org.au" target="_blank">http://www.vitta.org.au</a> - VITTA Victorian Information Technology Teachers Association Inc<br>
<br>
<br>
<br>
</div></div>Important - This email and any attachments may be confidential. If received in error, please contact us and delete all copies. Before opening or using attachments check them for viruses and defects. Regardless of any loss, damage or consequence, whether caused by the negligence of the sender or not, resulting directly or indirectly from the use of any attached files our liability is limited to resupplying any affected attachments. Any representations or opinions expressed are those of the individual sender, and not necessarily those of the Department of Education and Early Childhood Development.<br>
<div><div></div><div class="h5"><br>
_______________________________________________<br>
<a href="http://www.edulists.com.au" target="_blank">http://www.edulists.com.au</a> - FAQ, resources, subscribe, unsubscribe<br>
IT Applications Mailing List kindly supported by<br>
<a href="http://www.vcaa.vic.edu.au/vce/studies/infotech/itapplications3-4.html" target="_blank">http://www.vcaa.vic.edu.au/vce/studies/infotech/itapplications3-4.html</a> - Victorian Curriculum and Assessment Authority and<br>
<a href="http://www.vitta.org.au" target="_blank">http://www.vitta.org.au</a> - VITTA Victorian Information Technology Teachers Association Inc<br>
</div></div></blockquote></div><br><br clear="all"><br>-- <br>Roland Gesthuizen - ICT Coordinator - Westall Secondary College<br><a href="http://www.westallsc.vic.edu.au">http://www.westallsc.vic.edu.au</a><br><br>"Never doubt that a small group of thoughtful, committed citizens can change the world; indeed it is the only thing that ever has." --Margaret Mead<br>