Monday, December 15, 2008

I think they are about  how to response to someone when they ask you a question.
I think that this three rules are the most important of all the fifty- five rules.

Tuesday, December 9, 2008

Monday, December 8, 2008

When someone breaks into the computer of another person, company, or organization without permission, the crime is called hacking. Sometimes hackers just snoop around or make a minor change to a computer system. Often, however, the purpose of hacking is to steal information or cause damage by intentionally setting viruses which spread from one computer to another damaging files and corrupting systems. Hackers often use private gained without permission such as computer passwords or users names to get into electronic files. If security is weak on a web site, for example, hackers might gain access to credit card numbers, social security records, and bank account numbers.
Hacking is always wrong, even if a hacker just snoops around.  Think of it this way: if someone breaks into your home, it is an illegal act, even if none of your possessions are damaged or stolen. The same is true with hacking. Simply breaking into another person’s computer files is illegal.