-
Essay / A History of Hacking - 1326
Pirates have a very rich history, although they are most often linked to the latest technological advances. They have improved many everyday gadgets that a majority of the population owns and uses today. Not only have they become a household name in computers today, but almost every technology we know today can be linked to them. They have advanced greatly in both their knowledge of computers and their morality regarding what to do with their information, causing a division of both righteous and sinister behavior within their groups. Throughout history, as their knowledge of the mechanisms of operation continued to grow, hackers have advanced entire societies by leaps and bounds with their gift for understanding and using electronics to their fullest potential. their abilities, which allowed them to continue to expand on how people can use them even to this day. With the definition of a hack, according to Joe Grand's article, being "a new and novel creation or method of solving a problem, usually in an unorthodox way." almost every invention, even before the digital age, can be considered a hack if looked at from this perspective, meaning that since the creation of electronic technology that we know today, such as televisions, radios and phones, hackers helped shape them into what they are today. Without hackers, all of these gadgets would look exactly the same as the day they were made, or wouldn't even exist at all, because there was no need to develop and push them. Television may never have been invented or developed from silent films because the technology to capture moving images would never have been advanced and the desire to easily deliver films into homes with paper.. ....ue to make an impact far into the future.Works CitedEzekiel, Alan W. "Hackers, Spies, And Stolen Secrets: Protecting Law Firms From Data Theft." Harvard Journal of Law and Technology 26.2 (2013): 649-668. Academic research completed. Internet. April 28, 2014. Gold, Steve. “Understand the psychology of hackers. » Engineering and Technology (17509637) 9.1 (2014): 76-80. Academic research completed. Internet. May 1, 2014.Great, Joe. “A Brief History of Hardware Hacking.” Communications of the ACM 49.6 (2006): 49. Academic research completed. Internet. April 30, 2014. “History of the Internet, from ARPANET to broadband. » Congress Summary 86.2 (2007): 35-64. Academic research completed. Internet. April 30, 2014. Pultarova, Tereza, James Hayes and Aasha Bodhani. “Is contact less gentle for hackers?.” Engineering and Technology (17509637) 8.11 (2013): 48-50. Academic research completed. Internet. April 29 2014.