It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Originally posted by Slugworth
You encrypted your data, and will not provide the key to law enforcement? HACKER!!!
The elite know that hackers have the ability to shut down the entire system if they wanted to.
Originally posted by roadgravel
I could see the downward spiral for the majority when a file system directory became known as a 'folder'.
We at TMRC use the term "hacker" only in its original meaning, someone who applies ingenuity to create a clever result, called a "hack". The essence of a "hack" is that it is done quickly, and is usually inelegant. It accomplishes the desired goal without changing the design of the system it is embedded in. Despite often being at odds with the design of the larger system, a hack is generally quite clever and effective.
This original benevolent meaning stands in stark contrast to the later and more commonly used meaning of a "hacker", typically as a person who breaks into computer networks in order to steal or vandalize. Here at TMRC, where the words "hack" and "hacker" originated and have been used proudly since the late 1950s, we resent the misapplication of the word to mean the committing of illegal acts. People who do those things are better described by expressions such as "thieves", "password crackers". or "computer vandals". They are certainly not true hackers, as they do not understand the hacker ethic.
This term seems to have been first adopted as a badge in the 1960s by the hacker culture surrounding TMRC (Tech Model Railroad Club) and the MIT AI Lab
...More modern definition
A person who enjoys exploring the details of programmable systems and how to stretch their capabilities, as opposed to most users, who prefer to learn only the minimum necessary. RFC1392, the Internet Users' Glossary, usefully amplifies this as: A person who delights in having an intimate understanding of the internal workings of a system, computers and computer networks in particular.