By Topic

Harry and Georgie

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

1 Author(s)
Grier, D.A. ; George Washington Univ., Washington, DC

Hacking might occupy a special position-that gray area between the darkness and the light-because it touches not only on ethical issues but also on the very nature of computing itself. Beyond the topics under discussion, all of which concerned how to exploit the flaws of commercial software, the conference strayed from its more conventional cousins in the exhibits room. The hacking community, for good or ill, is generally not perceived as inventors puttering in their workshops, individuals who accomplish their ends by working on the edge of society. Hackers do expose software vulnerabilities, but in doing so, they can put the public at risk. They have made vendors account for their actions, but they have also extorted unwarranted concessions from firms. They indeed serve as regulators, but as regulators they are accountable to no one but themselves.

Published in:

Computer  (Volume:41 ,  Issue: 7 )