This essay Short story has a total of 995 words and 6 pages.
Lang. Arts Rich Goldman
Short Story per.7
³ You have entered the United States government mainframe. Please enter your password,² says the computer.
³ Thank you, Mr. Smith.²
³ The file of Henry OıBrien is being loaded. Please stand by.²
³ File loaded, and deleted Mr. Smith.²
For Henry OıBrien, breaking into other computers is his hobby and life. Ever since the computer age (the twenty-first century), Henry OıBrien has been a computer artist. There isnıt a computer he canıt break into, even government mainframes. The only problem for him is that in his society if he is found hacking, heıll be banished. This is why Henry and other hackers like him must be very careful. The man they fear most is a federal agent named Mr.Smith who was known for catching hackers like Henry.
Henryıs society is run by computers and robots. Computers do everything from ordering out food to being a thinking, personal secretary. Robots do everything else the computer canıt do from cooking dinner to helping kids with homework. The only flaw to this society is that people like Henry can tap into and control the computers, robots and other electronics.
³ Thank you, Mr. Smith,² replies the computer. ³ The file of Henry OıBrien has been deleted. Please enter another file.²
³ Computer, how and when was this file deleted?² asks Mr. Smith.
³ The file was deleted at 11:58 pm today by an outside computer. Would you like me to trace the command?² asks the computer.
³ Hey maybe this new program will actually work,² says Mr. Smith
³ The command came from 8546 Macintosh Road.²
³ At last, I think we caught ourselves a hacker!²
Shortly after, Henry was breaking into a televisionıs circuits for fun and was switching the channels which probably caused confusion among the viewers. Suddenly, the door slams open, and fifteen men come in with assault rifles pointed at him.
³ Put your hands in the air, now!² screams one of the men.
³ So Henry, what are you up to, breaking into the CIA?² asks Mr.Smith jokingly. ³ Either way, you wonıt be hacking for a while because you wonıt have a computer after youıre banished!²
After being taken to the government building by the soldiers, Henry is questioned by officers and sentenced without trial to be banished from society. All records of his life are to be deleted.
³ How can you do this? I didnıt even have a trial,² shouts Henry.
³ We donıt want this thing blown up anymore than it already is,² says Mr.Smith.
³ You will be exiled tomorrow at 1:00 pm. Have a nice day Henry.²
³ I swear if its the last thing I do, Iım going to destroy all the technology, so youıll wish you never messed with Henry Oı Brien!²
³ Put him in his cell. I want five guards there around the clock!²
The next day at 1:00 pm, Henry is taken by five soldiers with guns into a van. Henry has no idea where they were taking him. He has no idea whether he is to be murdered or g-d knows what. Then the van stops, and the doors open.
³ Put your hands where I can see them!² shouts a soldier.
Henry got out of the van with his hands over his head and is ordered to kneel. He does so knowing his life was probably about to end. He heard the cocking of the gun and closes his eyes. Just then gun shots fly. When he opens his eyes, he sees the soldiers lying on the ground. He looks up and canıt believe it. On a nearby hill, stands Henryıs old friend Joe McDonald.
³ How did you know they were taking me here?² yells Henry.
³ The stupid government made a file of what they were doing with you. It was a good thing I found it. They were about to put it on disc, and then I would have never known,² replies Joe.
³ Well Iım glad you did, but now I got some business to attend to.²
³ First come back to my place. After all, I did save your life.²
³ Okay, maybe I can do my business on your computer.²
At Joeıs place, Henry and Joe enjoy some drinks and talk about old memories.
³ So whatıs this business youıre
Topics Related to Short story
Hacker, Computer, Mr Smith
Essays Related to Short story
Revenge of the HackerRevenge of the Hacker REVENGE of the HACKER Richard was a normal looking kid, he did a lot of the same things that the other kids did, hung out with friends and talked his way out of the occasional trouble he got in, much like a lot of guys his age. Richard went to Dolton public high school and just about everyone knew him by name. He did a mediocre job and was often content with getting good grades on tests and paying no attention whatsoever to homework. Although everyone in school thought they
Short storyShort story Lang. Arts Rich Goldman Short Story per.7 ³ You have entered the United States government mainframe. Please enter your password,² says the computer. ³ Thank you, Mr. Smith.² ³ The file of Henry OıBrien is being loaded. Please stand by.² ³ File loaded, and deleted Mr. Smith.² For Henry OıBrien, breaking into other computers is his hobby and life. Ever since the computer age (the twenty-first century), Henry OıBrien has been a computer artist. There isnıt a computer he canıt break into
EbonicsEbonics INTRODUCTION This is an English exam paper prepared for the EVU2-EDB course at Niuernermik Ilinniarfik, Nuuk. The main topic of this paper is the USA, and I have chosen to concentrate on a fairly new issue, the language know as Ebonics. There have always been changes in the English language. This is how the language came about and evolved from standard British English to American English. During the last few years, as the world has become more sensitive to the rights of minorities, women
The Big ScoopThe Big Scoop Hello, my name is Jack Williams. I am a reporter you have been hearing a lot about and this is how I gathered my information for my article on Computers, Hacking, And USA\'s Citizens that has been causing so much uproar in many states and even in the government. Recently, people have claimed that I fantasized everything in the report and that I should work in the fiction field in stead of journalism, so here is the exact way I received my information for my story. I will start fr
I.T Faliure And DependenceI.T Faliure And Dependence In Todays Society we are so Dependent on I.T that the Consequences of its Failure May be Catastrophic. Discuss the Threats and Causes of Failure, and Steps Taken to Minimise it. In todays world it is impossible to run a large organisation without the aid of computers. Businesses hold massive amounts of important data, hospitals hold large amounts of confidential patient information and large scientific research projects hold important codes, formulae, and equations.
Computer HackersComputer Hackers Computer hackers in today\'s world are becoming more intelligent. They are realizing that people are constantly developing more hack-proof systems. This presents the hackers with a bigger challenge and a bigger thrill. The government is realizing this and is working on making harsher laws to, hopefully, scare the potential hackers. With the increase in hacking and hacker intelligence, governmental regulation of cyberspace hasn\'t abolished the fact that it\'s nearly impossible t
Internet SecurityInternet Security Many people today are familiar with the Internet and its use. A large number of its users however, are not aware of the security problems they face when using the Internet. Most users feel they are anonymous when on-line, yet in actuality they are not. There are some very easy ways to protect the user from future problems. The Internet has brought many advantages to its users but has also created some major problems. Most people believe that they are anonymous when they are usi
The Internet Beyond Human ControlThe Internet Beyond Human Control The Internet has started to change the way of the world during this decade. More homes, companies, and schools are getting hooked online with the Internet during the past few years. This change has started to become the new way of life present and future. The Internet system is so advanced it is ahead of our time. This system is becoming predominately used everyday, but every which way it works out this system ends up in a negative way. The Internet System has s
Steve WozniakSteve Wozniak Steve Wozniak\'s childhood had a big effect on his revolutionary developments in the computer world. Wozniak grew up in Sunnyvale California. His family lived in a development built for Lockheed engineers like his father. (Rose, 26) As a teenager he w During his high school years, Wozniak was a prankster and was once suspended for placing a metronome disguised as a bomb in a friends locker. (Brodhagen, 1) The more serious side of Wozniak loved electronics and spent one day a week w
Has The Information Revolution Benifited SocietyHas The Information Revolution Benifited Society The Revolution There is a revolution taking place all over the world. There is no blood shed in this revolution. It is the revolution of information. The information revolution has been taking place for decades, but only know do we fully realize the impact it has had and will have. The benefits of this revolution have changed how are society works, plays, and lives. These changes have brought many benefits to society and are still bringing benefit
Is Your Information Safe?Is Your Information Safe? He doesn\'t wear a stocking mask over his face, and he doesn\'t break a window to get into your house. He doesn\'t hold a gun to your head, nor does he ransack your personal possessions. Just the same he\'s a thief. Although this thief is one you\'ll not only never see, but you may not even realize right away that he\'s robbed you. The thief is a computer hacker and he enters your home via your computer, accessing personal information -- such as credit card numbers --
Protecting A ComputerProtecting A Computer About two hundred years before, the word computer started to appear in the dictionary. Some people even didn\'t know what is a computer. However, most of the people today not just knowing what is a computer, but understand how to use a computer. Therefore, computer become more and more popular and important to our society. We can use computer everywhere and they are very useful and helpful to our life. The speed and accuracy of computer made people felt confident and reli
The Communications Decency ActThe Communications Decency Act The U.S. Government should not attempt to place restrictions on the internet. The Internet does not belong to the United States and it is not our responsibility to save the world, so why are we attempting to regulate something that belongs to the world? The Telecommunications Reform Act has done exactly that, put regulations on the Internet. Edward Cavazos quotes William Gibson says, As described in Neuromancer, Cyberspace was a consensual hallucination that felt
The Future of Computer Crime in AmericaThe Future of Computer Crime in America Sociology Research Paper Sociology per. #2 10/8/96 Sociology Topics: Future Society Social Change Social and Enviromental Issues Deviant Behavior Crime/Corrections Name: Brandon Robinson Period: # 2 The proliferation of home computers, and of home computers equipped with modems, has brought about a major transformation in the way American society communicates, interacts, and receives information. All of these changes being popularized by the media and the
Censorship OnlineCensorship Online There is a section of the American populace that is slowly slithering into the spotlight after nearly two decades in clandestine. Armed with their odd netspeak, mouses, glowing monitors, and immediate access to a world of information, both serious and amateur Hackers alike have at last come out of the computer lab and into mainstream pop culture. Since I despise pleading ignorant about anything, I chose to read Mr. McDonalds article because of its minutia concerning the future
What Really is a Hacker?What Really is a Hacker? Dan Parks Julie Jackson - Instructor CIS 101 11-18-96 There is a common misconception among the general public about what constitutes a hacker and what hacking is. Hacking is defined as gaining illegal entry into a computer system, with the intent to alter, steal, or destroy data. The validity of this definition is still being debated, but most individuals would describe hacking as gaining access to information which should be free to all. Hackers generally follow some
William Gibson and The InternetWilliam Gibson and The Internet Introduction The words Internet and world wide web are becoming everyday use these days, it has exploded into the mass market of information and advertising. There are bad points about the net as well as good points, this relatively new medium is growing at such a rate that the media have to take it seriously. This new form of communication was mainly populated by small groups of communities, but now that it is getting much easier to access the web these gro
The Cuckoo's Egg: Cliff's PersistenceThe Cuckoo\'s Egg: Cliff\'s Persistence By Clifford Stoll The Cuckoo\'s Egg is a story of persistence, love for one\'s work and is just plain funny! The story starts out with Clifford Stoll being recycled to a computer analyst/webmaster. Cliff, as he is affectionately called, is a long-haired ex-hippie that works at Lawrence Berkeley Lab. He originally was an astronomer, but since his grant wore out, he became a mainframe master. He was glad that instead of throwing him out into the unemploy
HackingHacking Jenna Gray p.1 Another one got caught today, it\'s all over the papers. Teenager Areested in Computer Crime Scandal, Hacker Arrested after Bank Tampering....Damn kids. They\'re all alike. But did you , in your three-piece psychology and 1950\'s technobrain, ever take a look behind the eyes of the hacker? Did you ever wonder what made him tick, what forces shaped him, what may have molded him? I am a hacker, enter my world...Mine is a world that begins with school... I\'m in junior hi
HackingHacking Contents This file will be divided into four parts: Part 1: What is Hacking, A Hacker\'s Code of Ethics, Basic Hacking Safety Part 2: Packet Switching Networks: Telenet- How it Works, How to Use it, Outdials, Network Servers, Private PADs Part 3: Identifying a Computer, How to Hack In, Operating System Defaults Part 4: Conclusion- Final Thoughts, Books to Read, Boards to Call, Acknowledgements Part One: The Basics As long as there have been computers, there have been hackers. In the 50\'
Software PiracySoftware Piracy What is Software Piracy The PC industry is just over 20 years old. In those 20 years, both the quality and quantity of available software programs have increased dramatically. Although approximately 70% of the worldwide market is today supplied by developers in the United States, significant development work is occurring in scores of nations around the world. But in both the United States and abroad, unauthorized copying of personal computer software is a serious problem. On aver
CMIP vs. SNMP : Network ManagementCMIP vs. SNMP : Network Management Imagine yourself as a network administrator, responsible for a 2000 user network. This network reaches from California to New York, and some branches over seas. In this situation, anything can, and usually does go wrong, but it would be your job as a system administrator to resolve the problem with it arises as quickly as possible. The last thing you would want is for your boss to call you up, asking why you haven\'t done anything to fix the 2 major systems tha
Computers, Hackers, And PhreaksComputers, Hackers, And Phreaks The Internet is a wondrous place. Practically anything you could ever want is available on the Net. It\'s like a big city, it has the highly prestigious areas, and the sex-ridden slums (Mitchell). It has the upstanding citizens, and it has the criminals. On the Net, crime is more abundant than in a large city, though, mainly because of the difficulties in tracking and prosecuting offenders. Even from its beginnings, the Internet has always been a battlefield betwe
Computer CrimeComputer Crime Laws must be passed to address the increase in the number and types of computer crimes. Over the last twenty years, a technological revolution has occurred as computers are now an essential element of today\'s society. Large computers are used to track reservations for the airline industry, process billions of dollars for banks, manufacture products for industry, and conduct major transactions for businesses because more and more people now have computers at home and at the office
Computer HackersComputer Hackers Computer Hacker The meaning of Hacker is one who accesses a computer which is supposably not able to be accessed to non authorised people of the community. Hackers may use any type of system to access this information depending on what they intend on doing in the system. Methods Hackers may use a variety of ways to hack into a system. First if the hacker is experienced and smart the hacker will use telnet to access a shell on another machine so that the risk of getting caught is
The Communication Decency Act: The Fight For FreedThe Communication Decency Act: The Fight For Freedom of Speech on the Internet The Communication Decency Act is a bill which has insulted our right as American citizens. It a bill which SHOULD not pass. I\'ll share with you how Internet users are reacting to this bill, and why they say it is unconstitutional. Some individuals disagree with one part of the bill. According to http://thomas.loc.gov/cgi-bin/ query/z?c104:s.652.enr:, which has the Communications Decency Act on-line for public viewing
Evolution of computersEvolution of computers About two hundred years before, the word computer started to appear in the dictionary. Some people even didn\'t know what is a computer. However, most of the people today not just knowing what is a computer, but understand how to use a computer. Therefore, computer become more and more popular and important to our society. We can use computer everywhere and they are very useful and helpful to our life. The speed and accuracy of computer made people felt confident and relia
The InternetThe Internet The Internet: its effects and its future written by Eva Kotsi Internet, its effects in our lives and the future of the Internet: The Internet is, quite literally, a network of networks. It is comprised of ten thousands of interconnected networks spanning the globe. The computers that form the Internet range from huge mainframes in research establishments to modest PCs in people\'s homes and offices. Despite the recent hype, the Internet is not a new phenomenon. Its roots lie in a co
The internetThe internet The Internet: its effects and its future Essay written by Eva Kotsi Internet, its effects in our lives and the future of the Internet: The Internet is, quite literally, a network of networks. It is comprised of ten thousands of interconnected networks spanning the globe. The computers that form the Internet range from huge mainframes in research establishments to modest PCs in people\'s homes and offices. Despite the recent hype, the Internet is not a new phenomenon. Its roots lie i
Internet Jargon (Netspeak)Internet Jargon (Netspeak) Netspeak:An analysis of Internet jargon Approximately 30 million people world-wide use the Internet and online services daily. The Net is growing exponentially in all areas, and a rapidly increasing number of people are finding themselves working and playing on the Internet. The people on the Net are not all rocket scientists and computer programmers; they\'re graphic designers, teachers, students, artists, musicians, feminists, Rush Limbaugh-fans, and your next door n
Computer CrimeComputer Crime A young man sits illuminated only by the light of a computer screen. His fingers dance across the keyboard. While it appears that he is only word processing or playing a game, he may be committing a felony. In the state of Connecticut, computer crime is defined as: 53a-251. Computer Crime (a) Defined. A person commits computer crime when he violates any of the provisions of this section. (b) Unauthorized access to a computer system. (1) A person is guilty of the computer crime of
Security On The WebSecurity On The Web Security on the Web, By Sina How do you secure something that is changing faster than you can fix it? The Internet has had security problems since its earliest days as a pure research project. Today, after several years and orders of magnitude of growth, it still has security problems. The Internet is being used for a purpose for which it had never intended to be used for. It is somewhat ironic that the early Internet was design as a prototype for a high-availability command
My Philosophical Approach to CounselingMy Philosophical Approach to Counseling Definition of Existential Therapy One survey taken by Corey suggests a definition of Existential Therapy include two key elements: Existential Therapy is essentially an approach to counseling and therapy rather than a firm theoretical model, it stresses core human conditions. Normally, personality development is based on the uniqueness of each individual. Sense of self develops from infancy. Self determination and a tendency toward growth are control ideas
The Game of Hackysac or FootbagThe Game of Hackysac or Footbag What if I told you that in my hand I hold the secret to world harmony that diplomats have been searching for for centerys. That a toy about the size of a plumb can improve your physical and mental well being tremendously. It may sound corny, but it may even bring you at peace with the world. You may call me crazy, but I believe that this little devise can do all these things. This is the hackysac, or footbag as it is officially known, and it is the only component
Computers and CrimeComputers and Crime Computers are used to track reservations for the airline industry, process billions of dollars for banks, manufacture products for industry, and conduct major transactions for businesses because more and more people now have computers at home and at the office. People commit computer crimes because of society\'s declining ethical standards more than any economic need. According to experts, gender is the only bias. The profile of today\'s non-professional thieves crosses all r
Glory: A ReviewGlory: A Review Stephanie Beck April 9, 1997 Prof. Deutch Glory captures the heroism of Colonel Robert Gould Shaw and the first black regiment in the Civil War, the Massachusetts Fighting Fifty-fourth. An extremely talented cast and crew earned three Academy Awards (cinematography, sound and supporting actor) and five nominations for their work in Glory. The outstanding cinematography, sound, score and acting recreate the events leading up to the Union attack on Fort Wagner on July 18th 1863.
A review of GloryA review of Glory Glory captures the heroism of Colonel Robert Gould Shaw and the first black regiment in the Civil War, the Massachusetts Fighting Fifty-fourth. An extremely talented cast and crew earned three Academy Awards (cinematography, sound and supporting actor) and five nominations for their work in Glory. The outstanding cinematography, sound, score and acting recreate the events leading up to the Union attack on Fort Wagner on July 18th 1863. Matthew Broderick portrays the young Bos
Information About VirusesInformation About Viruses A growing problem in using computers is computer viruses. Viruses are pesky little programs that some hacker with too much time on his hands wrote. Viruses have been known to create annoyances from displaying messages on the screen, such as Your PC is now stoned, to completely obliterating everything that is contained on the computer\'s hard disk. Viruses are transferred from computer to computer in a number of ways. The most common way that users receive viruses at h
Computer CrimeComputer Crime Computer crimes need to be prevented and halted thought increased computer network security measures as well as tougher laws and enforcement of those laws in cyberspace: Computer crime is generally defined as any crime accomplished through special knowledge of computer technology. All that is required is a personal computer, a modem, and a phone line. Increasing instances of white-collar crime involve computers as more businesses automate and information becomes an important asset
Computer Crimes: Laws Must Be Pass To Address TheComputer Crimes: Laws Must Be Pass To Address The Increase In Computer Crimes THESIS: Laws must be passed to address the increase in the number and types of computer crimes. Over the last twenty years, a technological revolution has occurred as computers are now an essential element of today\'s society. Large computers are used to track reservations for the airline industry, process billions of dollars for banks, manufacture products for industry, and conduct major transactions for businesses be
HackingHacking Hacking By: Annonymous Computer hackers in today\'s world are becoming more intelligent. They are realizing that people are constantly developing more hack-proof systems. This presents the hackers with a bigger challenge and a bigger thrill. The government is realizing this and is working on making harsher laws to, hopefully, scare the potential hackers. With the increase in hacking and hacker intelligence, governmental regulation of cyberspace hasn\'t abolished the fact that it\'s nearl
Computer Crime: The Crime of the FutureComputer Crime: The Crime of the Future English II 6 April 1996 Explosive growth in the computer industry over the last decade has made new technologies cheaper and simpler for the average person to own. As a result, computers play an intricate part in our daily lives. The areas in which computers affect life are infinite, ranging from entertainment to finances. If anything were to happen to these precious devices, the world would be chaotic. There is a type of person that thrives on chaos, that
Computer Fraud and CrimesComputer Fraud and Crimes In the world of computers, computer fraud and computer crime are very prevalent issues facing every computer user. This ranges from system administrators to personal computer users who do work in the office or at home. Computers without any means of security are vulnerable to attacks from viruses, worms, and illegal computer hackers. If the proper steps are not taken, safe computing may become a thing of the past. Many security measures are being implemented to protect
Computer CrimesComputer Crimes It\'s the weekend, you have nothing to do so you decide to play around on your computer. You turn it on and then start up, you start calling people with your modem, connecting to another world, with people just like you at a button press away. This is all fine but what happens when you start getting into other peoples computer files. Then it becomes a crime, but what is a computer crime really, obviously it involves the use of a computer but what are these crimes. Well they are:
Electronic CrimeElectronic Crime Introduction In the past decade, computer and networking technology has seen enormous growth. It is now possible for people all over the world to communicate and share information from virtually anywhere. This growth however, has not come without a price. With the advent of the Information Highway , as it\'s coined, a new methodology in crime has been created. Electronic crime has been responsible for some of the most financially devastating victimizations in society. In the rec
Computer Crime In The 1990'sComputer Crime In The 1990\'s We\'re being ushered into the digital frontier. It\'s a cyberland with incredible promise and untold dangers. Are we prepared ? It\'s a battle between modern day computer cops and digital hackers. Essentially just think what is controlled by computer systems, virtually everything. By programming a telephone voice mail to repeat the word yes over and over again a hacker has beaten the system. The hacker of the 1990\'s is increasingly becoming more organized very clea
One Man, One Vote?One Man, One Vote? Joseph Farkas thinks that every vote cast should equal every other vote. He feels that many people are voting without knowing why they are voting for a certain person or why they aren\'t voting for another. He says that a vote cast by a person with no or very little knowledge in the election should not count as much as a vote cast by a person who knows alot about the election. The people who care about who has an important role in the government should have a bigger say in who
A HackerA Hacker A hacker is a person obsessed with computers. At the heart of the obsession is a drive master the computer. The classic hacker was simply a compulsive programmer. It is only recently that the term hacker became associated with the computerized vandalism. Great description of Hackers: Bright young men of disheveled apperance,Often with sunken, glowing eyes.Seen sitting at computer consoles, their arms tense and waitingTo fire their fingers which are already posed to strike at the buttons
Computer ProtectionComputer Protection About two hundred years before, the word computer started to appear in the dictionary. Some people even didn\'t know what is a computer. However, most of the people today not just knowing what is a computer, but understand how to use a computer. Therefore, computer become more and more popular and important to our society. We can use computer everywhere and they are very useful and helpful to our life. The speed and accuracy of computer made people felt confident and reliab
How the KKK, Anarchists, Preaks Compare to Big BroHow the KKK, Anarchists, Preaks Compare to Big Brother Many organizations today are considered bad or evil. Groups like the Ku Klux Klan, The Anarchy Organization, Supreme White Power, which are Skinheads and Neo-Nazis, and Phreaks are a few of these groups. These groups all have one thing in common......they somehow break the law. The Ku Klux Klan terrorized public officials in efforts to drive them from office and blacks in general to prevent them from voting and holding office. ( Microsof