Paper
Creative Writing: The Big Scoop
Hello, my name is Jack Williams. I am a reporter you have been hearing a lot
about and this is how I gathered my information for my article on “Computers,
Hacking, And USA’s Citizens” that has been causing so much uproar in many states
and even in the government. Recently, people have claimed that I fantasized
everything in the report and that I should work in the fiction field in stead of
journalism, so here is the exact way I received my information for my story. I
will start from the top and I will try not to miss a detail so you can fully
understand me. It was the first Friday of July and it was like any typical
midsummer evening at 6:00pm. The sun was still out shining down, just turning
red for sunset. It was not especially hot, but it was still tee-shirt weather.
I walked down the rather clean street towards the Citicorp building, thinking
excitedly about what was going to happen at the meeting and about what
information I could receive from this expierence. It was not long before I was
standing in front of the modern Citicorp building. The building exterior
consisted of mainly large glass windows which provided a very vivid reflection
of the neighboring buildings, almost camouflaging its presence on the block. I
thought of how the buildings appearence is suiting for what is happening inside
at that moment. I casually walked into the revolving glass doors that stood at
the base of the building. There were plenty of stores to my left and right.
They ranged from candy stores selling snickers bars and almond joy to fast food
restaurants selling burgers and french fries and all of the had people inside of
them, spending the money they just withdrew from the nearby ATM machines and the
tellers upstairs. It was the tipical gimick to make people spend their money,
let them have easy access to it, so it was nothing surprising to me. I continued
to walk towards the back of the building looking at all the stores to my sides
until I reached the very back of the building, right in front of Barnes & Nobles.
I saw a crowd of people standing there, all of mixed ages and nationality.
None were alike. These were not the normal people you would picture as vivid
computer lovers or people who liked to hack. People exchanged disks everywhere
in sight. There were all types of people sharing information about everything
from the latest computer security weakness or newest computer virii to what new
programs were released today. Forty year old men and women in suits and ties
standing, talking, and exchanging information with kids age ten to fifteen who
were dressed in skater outfits. In other places people from foreign countries
spoke with Americans overlooking their differences. They all shared the same
interest in hacking and computer technology. They live in their own world where
dollars mean nothing and disks mean everything. I casually walked into the
crowd towards a man who seemed rather interesting to me. He was a tall man,
about 30. The man was wearing Levis jeans, a clean white tee-shirt that said
“duh?” in large straight black letters, and a large red and black side bag full
of printed papers. He handed me some paper and told me in a semi-happy voice to
take a look at that and that it would explain everything. I threw the paper
into my bag saying to my self that this guy belongs in a mental institution if
he actually believed that one piece of paper could explain the whole hacker
world and I walked on to the other side of the room. There was a kid standing
there in the normal baggy pants and tee shirt working on a toshiba laptop.
Wanting to get the information I needed for my story, I walked over to the kid
and asked him what he was up to and to my surprise he asked me in a deep voice
if I was affiliated with any law enforcement agencies such as the F.B.I. or the
C.I.A.. I said to myself why would I be with a law enforcement agency, but to
get information, I tried to play it out very casually and said told him no, but
if I was, I don’t think I would tell him. He said to me that by law, I would
be required to tell him the truth on that question if I was a member of a law
enforcement agency. I was shocked becuase I did not know about that. He asked
me again if I was a member of a law enforcement agency, and I replied that I
wasn’t. He said that he didn’t think I was but he is always better safe than
sorry. At this point I thought this guy was off the wall crazy or a really well
informed kid, but again I reminded myself about the story I was writing. I
asked him what he was doing in a nonchalant voice and his response astounded me.
He said he was trying to hack a computer server. It was not so much the idea of
hacking a server, because I knew everyone in the meeting was looking to do that
or to learn how to do that, but it was the way he said it. The way it flowed
was as if it was nothing special, nothing that did not happen everyday. This
kid seemed to be my story standing live in front of me. I played as what
hackers, phreakers (people who play with telephone companies), and software
pirates call a lamer, which is someone who is a complete computer idiot or knows
very little. I asked him if he tried to break into computer systems often and
he replied everyday and that he was usually successful on all of them. He just
continued typing his unix commands which went way over my computer training. I
figured that he was entranced enough with his hacking that I would be able to
ask him a few more questions. I proceeded to ask him about how many American
kids and adult like to hack and or phreak, what percentage of hackers were kids
and how many were adults and the like. The responses were astounding and I
checked with other people on these answers and they turned out to be
frighteningly correct. When I asked him, why hackers do what they do, he
grabbed my bag and pulled out the paper the man had given me earlier and rudely
said that I should read that and leave him alone. I could tell that I had
outlived my short welcome being a lamer, so off I went into a secluded corner
and read the document which the man had given me. It was written by a hacker
called the mentor just a few days before he was sentenced to a jail term, I
believe it was a fifty year term so he entitled it The Mentor’s Last Words. It
told me about what goes on in a hacker’s mind and why they do it. It also
showed me what hackers really are; they are not really criminals, at least not
all of them. They are curious and seek knowledge. According to them and this
document the true hacker never destroys, just looks. That is the essence of the
United States Hacker. He is neither male nor female. He does not age nor does
he have a nationality. People must realize most of these people will never meet
anywhere except in a virtual chat room and will never hear each others voice.
They have no choice but to judge people by what they do and not what they look
like or by their age.
The Citizen’s view of hackers is completely distorted. All you see is what the
government wants you to see and by know even the most sheltered of American
citizens know how deranged the governemt can be. We are afraid of hackers
becuase we don’t understand them and I don’t blame you becuase that is human
nature to fear what you can not explain. What my article was trying to present
was the truth about hackers because the amount that you know is a joke, plain
and simple. This is where I received my story from. Yes it is depressing that
more and more people like to hack and phreak, but in a way, it is also good.
Now quite frankly I don’t care if you believe me or not and probably if you do
believe me you will say you don’t because you are scared to believe me, but that
is a battle I can’t put to words as a story nor can I fight it for you. So,
having finished my explanation, I say good night and thank you for coming and
listening.
! |
Как писать рефераты Практические рекомендации по написанию студенческих рефератов. |
! | План реферата Краткий список разделов, отражающий структура и порядок работы над будующим рефератом. |
! | Введение реферата Вводная часть работы, в которой отражается цель и обозначается список задач. |
! | Заключение реферата В заключении подводятся итоги, описывается была ли достигнута поставленная цель, каковы результаты. |
! | Оформление рефератов Методические рекомендации по грамотному оформлению работы по ГОСТ. |
→ | Виды рефератов Какими бывают рефераты по своему назначению и структуре. |
Реферат | Політичні партії сутність функції типологія |
Реферат | Банковский учет и характеристика |
Реферат | Банки в современной экономической структуре |
Реферат | Социальная терапия Ознакомление с |
Реферат | Древняя Греция – колыбель европейской культуры |
Реферат | Экзаменационные билеты по "Информатике |
Реферат | A Tunnel Of Light Essay Research Paper |
Реферат | Вельтман Александр Фомич |
Реферат | Экология родного края |
Реферат | Правовая охрана озонового слоя |
Реферат | Сущность, виды, функции денег в экономике |
Реферат | Расчет усилителя на биполярном транзисторе |
Реферат | Управление и связь |
Реферат | «томский политехнический университет» |
Реферат | Технология публичного выступления |