“Corporate secrets bouncing around a computer system thats open to the world? Hey, that’s fair game and they deserve the embarrassment of its discovery. But using this knowledge to line your pockets or, worse, using insider knowledge to get the information and then calling that hacking is an affront to any of us who hack for the sake of learning.”
“Dear 2600: Please help me to learn how to become an elite one day. The first thing to learn is never to use the word elite as a noun. In fact, don’t even use it as an adjective. It’s radically lame.”
“-- it's rapidly turning into an us versus them scenario. And it's all but assured that someone is going to fall into the mass graves that corporate America is digging.”
“Dear 2600: I think my girlfriend has been cheating on me and I wanted to know if I could get her password to Hotmail and AOL. I am so desperate to find out. Any help would be appreciated. Thanks. And this is yet another popular category of letter we get. You say any help would be appreciated? Let’s find out if thats true. Do you think someone who is cheating on you might also be capable of having a mailbox you don’t know about? Do you think that even if you could get into the mailbox she uses that she would be discussing her deception there, especially if we live in a world where Hotmail and AOL passwords are so easily obtained? Finally, would you feel better if you invaded her privacy and found out that she was being totally honest with you? Whatever problems are going on in this relationship are not going to be solved with subterfuge. If you can’t communicate openly, there’s not much there to salvage.”
“Dear 2600: …So, in the interest of information gathering and because I am a subscriber, are you going to be checking me out? This would be unnecessary since we checked you out before you subscribed. That’s why we made sure you heard about us and followed the plan by subscribing. Writing this letter, however, was not part of the plan and we will be taking corrective action.”
“Dear 2600: Tell me how much one of your hackers would charge me to delete my criminal record from the Texas police database. [NAME DELETED] Well, we would start with erasing your latest crime, that of soliciting a minor to commit another crime. (Your request was read by a small child here in the office.) After you’re all paid up on that, we will send out the bill for hiding your identity by not printing your real name, which you sent us like the meathead you apparently are. After that’s all sorted, we can assemble our team of hackers, who sit around the office waiting for such lucrative opportunities as this to come along, and figure out even more ways to shake you down. It’s what we do, after all. Just ask Fox News.”
“What hackers do is figure out technology and experiment with it in ways many people never imagined. They also have a strong desire to share this information with others and to explain it to people whose only qualification may be the desire to learn.”