From M$’s latest 10-Q:
“Hackers develop and deploy viruses, worms, and other malicious software programs that attack our products and services and gain access to our networks and data centers. Groups of hackers may also act in a coordinated manner to launch distributed denial of service attacks, or other coordinated attacks.”
see Form 10-Q.
Hackers also innovate and try things. I consider myself a hacker and I have never written or deployed malicious software deliberately. I used to do that regularly when I ran M$’s OS because it was designed with no security whatsoever in mind and welcomed malware back in the day.
For the definitive work on “hacking” see Eric S. Raymond’s How To Become A Hacker:
“There is a community, a shared culture, of expert programmers and networking wizards that traces its history back through decades to the first time-sharing minicomputers and the earliest ARPAnet experiments. The members of this culture originated the term â€˜hackerâ€™. Hackers built the Internet. Hackers made the Unix operating system what it is today. Hackers make the World Wide Web work. If you are part of this culture, if you have contributed to it and other people in it know who you are and call you a hacker, you’re a hacker.”
I became a hacker when I was preschool. I never failed to take my toys apart even if I failed miserably to put them back together… When integrated circuits and microprocessors came along, I had already been hacking on mini-computers and main-frames so I just kept going.
My latest hacking was poking around in the code of a FLOSS application, GEBC (GNU External Ballistics Computer):
- I love its inputs and outputs. They are nearly perfect for my shooting/hunting activity.
- I wanted to reformat the fonts to be more friendly to my eyes.
- The thing uses FLTK and every corner of every box and every font-size was given in decimal numeric pixels….
- I doubled a bunch of those numbers and the programme became easier to use. I even doubled the pixels used to draw lines to make them more visible.
- I will rewrite this thing in PASCAL using scaling variables…
So, take that M$. We hackers will not be cowed by your defamation. We proudly reserve the right to explore technology and make it better.