Quantcast
Channel: Discussion on Hackers: From innocent curiosity to illegal activity
Browsing latest articles
Browse All 22 View Live

Watch this TED talk by Sir Ken Robinson on Education for the solution

I wrote earlier in this thread about the schools I sent my children to in Canada, and I contrasted them with the psychopathic policies of most public schools in the US (and Canada to a much lesser...

View Article



I wish all of our kids could be as smart as the Girl with the Dragon Tattoo

In both the books and the films, the Girl with the Dragon Tattoo operated on the far side of the law, but because of her personal ethical sense, she brought down corruption and wreaked vengeance...

View Article

Anonymous Speaks on CBC Radio

I learned about the role that Anonymous Canada had in reopening the Amanda Todd case this week when a spokesperson for Anonymous was granted an extensive interview on our public radio network here in...

View Article

Ethical Hacking?

Such students need:(1) Information and legal challenges(2) MentoringSuch brilliance could be employed in Ethical Hacking.

View Article

The real malicious hackers are those who do it for commercial interests!

The article misses the point as to who are the malicious hackers. There is very little wrong with students hacking, as long as it is not destructive, and it usually is not. The real problems is those...

View Article


Beware what you wish for

Fighting cyber bullying is vital, but beware what you wish for and how easy it is for tyrants to use it as a pretext to deprive ALL citizens of their freedom of expression with the exact opposite...

View Article

More proof the warantless online spying bill is based on fearmongering

from http://www.michaelgeist.ca/content/view/6681/125/ :"The Canadian Association of Chiefs of Police renewed its call for Internet surveillance legislation [and said:]"Criminal bullying is extremely...

View Article

Not at all, Michael

I suspect you missed what the researchers and I were trying to say. The young hackers are converting into the ones you refer to in your comment.

View Article


I think...

... it's great that everyone has all of these ideas. But is anyone willing to help with the implementation?

View Article


Agreed

In fact, I find the opposite to be true. Those arrogant people who point the fingers at others are the ones who believe that only they are the ones who are "pure" and they push their new religions of...

View Article

Yeah, Bush North is a bully, too.

The two young girls in question were both victims of sexual molestation, in addition to cyber-bullying, so if we had a just society, hackers wouldn't need to rise to their defence, with or without the...

View Article

Evil does have a foothold...

...and you are a foot soldier for that evil. Begone with your hate mongering.Techrepublic; why are you allowing political nonsense like this? It's becoming more prevalent. If you are going to turn into...

View Article

Try being a conservative poster on CBC forums...

...then tell me there is no political partisanship at CBC.

View Article


Hacking legality?

Maybe a 'moral breach' but certainly not against the law - but then I don't think you are a professional hacker.

View Article

Hacking Ethics

You are quite right. Trouble is, that today that most people can't spell 'ethics' much less understand its implications. One only has to consider the un-ethical decisions of so-called 'ethics...

View Article


Right on target about the teachers

Even as far back as my high school years (84-89), we were taught by teachers who were terrified of students touching floppy disks anywhere besides the labels. Meanwhile, half of us were "double-siding"...

View Article

but family values often don't include writing code

Often those who turn to hacking for gain have little interaction from parents or parental figures...they are either ignored by thier parents, or the parents are so busy busting their butts to keep...

View Article


Zero tolerance? I think this is the easy way to resolve this.

Catch the hacker and jail him. I think this is a simplistic point of view .We must teach a strong ethic and give the the boy or girl the tools to avoid tempation to fall in the illegality. I think this...

View Article

Don't get what you mean by book.

There was more to life before computer technology than books. There were files, ledgers, recordings. A pre-computer hacker need only pick the lock to change someone's grades or read another's medical...

View Article

Abundance of software vulnerabilities

I think the number one enabler is the lack of security and the abundance of software vulnerabilities...

View Article
Browsing latest articles
Browse All 22 View Live




Latest Images