Hi,

--- On Thu, Oct 25, 2012 at 5:10 PM, Shantanu Gupta <[email protected]> wrote:
| but there are infact so many flaws in it which can be
| used for purposes like changing device IMEI, crashing the cell tower GSM
| stack etc but the astonishing part is that it's SO easy after you find out
| the flaws that you're tempted into using them for your advantage not
| realising they're bad things or maybe someone could even end up luring you
| to do that for him/her using greed.
\--

Such people are 'crackers'. Hackers will provide detailed
documentation on the flaws with solutions. As and when people misuse
the term, it is our duty and responsibility to correct them.

There exists a 'culture' and 'methodology' in the way hackers work.
Understanding and applying them will alone help them be part of the
free/open source ecosystem.

SK

-- 
Shakthi Kannan
http://www.shakthimaan.com

-- 
Mailing list guidelines and other related articles: http://lug-iitd.org/Footer

Reply via email to