What Is Your Opinion Of The Legality Of Hacking Vs Cracking?

Author: admin  //  Category: Site News

Many people believe hacking is perfectly ethical and legal, while cracking is malicious by nature, so is justifyably unethical and illegal. If you believe hacking is not criminal, would you object to someone breaking into your house at night and “just looking around” without touching or taking anything?

Tags: , , , , ,

4 Responses to “What Is Your Opinion Of The Legality Of Hacking Vs Cracking?”

  1. davidina Says:

    Any unauthorized access to a network is illegal, no matter what you call it or how you feel about it or what you are ‘doing’ in there.
    If you break into someone’s house and just look around, is that still breaking and entering? Of course it is.
    Also, hacking is usually network-related, where cracking is related to breaking the code or protection of software….

  2. Anonymous Says:

    Depends on how you view the connotation of hacking. I do believe that hacking servers and pcs for malicious intent is wrong, but that hacking hardware to make it work more efficiently or unlock features the manufacturer doesnt want you to have (custom firmware on a PSP for example) is a good thing. Now on cracking, well I have mixed views about that. Security cracking can be either a good or bad thing. Game cracking is almost always a bad case. But if you want to be on the safe side, dont do either

  3. Niklaus Pfirsig Says:

    First of all hacking is not breaking into someones computer and looking around. Hacking is modding you own system and learning the details about how software and hardware works. The entire computer industry exists because of hacking. Microsoft wants the public to think that hacking encompasses all illegal forms of computer and network abuse, because Microsoft doesn’t want anyone to learn to program at the system level. This can lead to programmer that compete directly with Microsoft. (Linux is a good example)
    Cracking is bypassing security measures on a program or computer even if the computer is legitimately yours. This is analogous to picking a lock or climbing in a window. While this is usually done by a would be thief, it has legitimate uses as well. Have you ever gotten locked out of your own house?
    Accessing unauthorized data on a networked computer is “touring”, which may or may not involve cracking. This is the cyberspace form of trespassing. System administrators in most companies are encouraged to tour the companies data files and even read emails. This is considered legal because the courts have ruled that the email belongs to the company and not the employee.
    Destroying data or intefering with services is crashing. this activity equates to several illegal activities in the real world from vandalism to arson. This is what is usually called hacking by the media.
    The use of worms, harvesters, netbots, spybots and other software is espionage. plain and simple. You may be interested to know that a lot of corporations do this to gather personal information and demographics for data mining.
    Everything you do may be tracked in a data base. Most newer cable boxes record your channel changes, and report that to the cable company. In many cases you isp may sell log files that list all the web pages you visit and when. If you use the barcoded discount card at the grocery store, an entire list of what you buy gets tagged with when, and where and you name and address.
    By crossreferencing all these databases using your name and address a detailed description of you activities can be deduced. Some of these deduction may be wrong.
    So tell me. How does it feel to know that someone is always looking over your shoulder, and they are not considered criminal, because the government allow them to peep in your windows all the time so they can make more money by selling “photos” of what they see?

  4. Colinc Says:

    The term hacking is used in the industry to describe modifying programme operation to obtain a different result when it runs. This is a good thing if you are administering a server, where it may be used to automate repetitive tasks. A good example of hacking is that the majority of mail servers have an option in configuration to turn on a hack which eliminates problems with badly implemented client software, the free giveaway on all your Windows PCs is one such client. Imagine running the server to strict RFC mail rules and crashing the client 3 out of every 4 attempts to connect. The hack prevents that. So hacking can be carried out on a machine you are responsible for. This does not involve breaking in. The term cracker has gained popularity as a way to distinguish between legitimate hacking as above, and illegal hacking, which does involve destructive changes to someone else’s machine. I do not want any burglar ‘looking around’, I don’t mind my family or friends ‘looking around’ when invited in. I would actually object to a friend breaking in to ‘look around’.

Leave a Reply