Authors:
  • Don’t damage computer systems you break into (including crashing them); don’t change the information in those systems (except for altering logs to cover your tracks); and share information.

    Suelette Dreyfus, Julian Assange (2012). “Underground: Tales of Hacking, Madness and Obsession on the Electronic Frontier”, p.45, Canongate Books
Cite this Page: Citation