Entry
Reader's guide
Entries A-Z
Subject index
Hacking and Hacktivism
Hacking is generally defined as the unauthorized use or entry into a computer or computer system. Hacktivism bridges computer-hacking techniques with political or social protest action. Such actions are sometimes referred to as electronic civil disobedience (ECD). In hacktivism, the hacker is not interested in personal gain but in the dissemination of a particular message. That message may be directed at a particular organization, such as the case in which an anti-fur activist hacked the Website of a furrier, or the Website itself may be inconsequential, serving only as a means of reaching viewers. There are many means by which hacktivism takes place. Common methods include Website defacement, e-mail bombs, and electronic sit-ins or denial-of-service attacks, but these techniques are not universally accepted as ethical within the hacker community.
A programmer scans code to determine the location of a system virus. Hackers and hacktivists enter into others' computer systems and perform Website defacement, send e-mail bombs, or cause denial-of-service attacks to demonstrate civil disobedience or to make a statement that information should be free and that authority should not be trusted.

Website Defacement
In Website defacement, the goal is to break into the system and upload a new version of the page that has been modified by the hackers. However, there is sometimes more to this effort than simply uploading a new web page. If the hackers gain complete access to the system (or “root”) they may be able to alter user identification codes and passwords such that the page cannot be taken down until the system administrators are able to break into their own system. This prolongs viewer exposure to the modified page. There are varying degrees of sophistication within the hacker community, and this is reflected in Website defacements. Many defacements are simple messages consisting of the hacker's name and a short note or perhaps a graphic. These are often mass defacements, done by simply scanning networks for servers with open ports or looking for unpatched systems. These hackers seem more interested in disseminating their message as widely as possible, with little consideration of the site itself. On the other hand, some defacements are clearly targeted to send a message to the owner of the Website.
Denial-of-Service Attacks and Electronic Sit-Ins
As the name implies, electronic sit-ins are similar to physical sit-ins: Both seek to deny access by occupying space. Rather than occupying space physically, as in a traditional sit-in, electronic sit-ins occupy space in the form of connections and bandwidth. Servers can handle only as many connections as bandwidth allows. When this connection limit is exceeded, others attempting to access material on that server will be denied access until those who are already connected are no longer accessing material. This is why these kinds of actions are called denial-of-service (DOS) or distributed-denial-of-service (DDOS) attacks. Such attacks are simple to implement and require little skill to enact; some groups, such as Electronic Disturbance Theater, have even automated the process. At its most basic level, a DOS attack can be enacted merely by going to a Web page and continually hitting the refresh button. Most servers can handle this kind of action, but if hundreds or thousands of computers do this, even powerful servers may be brought down.
...
- Barthes, Roland
- Berger, John
- Bordo, Susan
- Boyd, Danah
- Doane, Mary Ann
- Douglas, Susan J.
- Ellul, Jacques
- Fiske, John
- Gamson, Joshua
- Giroux, Henry
- Guerrilla Girls
- Hall, Stuart
- Hanna, Kathleen
- hooks, bell
- Jenkins, Henry
- Jervis, Lisa
- Jhally, Sut
- Kellner, Douglas
- Kilbourne, Jean
- Kruger, Barbara
- Lasn, Kalle
- McChesney, Robert
- McLuhan, Marshall
- Miller, Mark Crispin
- Moyers, Bill
- Mulvey, Laura
- Radway, Janice
- Rushkoff, Douglas
- Steinem, Gloria
- Cognitive Script Theory
- Critical Theory
- Cultivation Theory
- Desensitization Effect
- Discourse Analysis
- Encoding and Decoding
- Feminism
- Feminist Theory: Liberal
- Feminist Theory: Marxist
- Feminist Theory: Postcolonial
- Feminist Theory: Second Wave
- Feminist Theory: Socialist
- Feminist Theory: Third Wave
- Feminist Theory: Women-of-Color and Multiracial Perspectives
- Gender Schema Theory
- Hegemony
- Ideology
- Male Gaze
- Mass Media
- Media Convergence
- Media Ethnography
- Media Globalization
- Media Rhetoric
- Mediation
- Patriarchy
- Polysemic Text
- Postfeminism
- Postmodernism
- Post-Structuralism
- Quantitative Content Analysis
- Queer Theory
- Reception Theory
- Scopophilia
- Semiotics
- Simulacra
- Social Comparison Theory
- Social Construction of Gender
- Social Learning Theory
- Televisuality
- Textual Analysis
- Transgender Studies
- Transsexuality
- Beauty and Body Image: Beauty Myths
- Beauty and Body Image: Eating Disorders
- Class Privilege
- Heterosexism
- Homophobia
- Identity
- Intersectionality
- Minority Rights
- Misogyny
- Prejudice
- Racism
- Sexism
- Sexuality
- Stereotypes
- Violence and Aggression
- Avatar
- Blogs and Blogging
- Cyberdating
- Cyberpunk
- Cyberspace and Cyberculture
- Cyborg
- Electronic Media and Social Inequality
- E-Zines: Third Wave Feminist
- Hacking and Hacktivism
- Hypermedia
- Massively Multiplayer Online Role-Playing Games
- Multi-User Dimensions
- Online New Media: GLBTQ Identity
- Online New Media: Transgender Identity
- Social Inequality
- Social Media
- Social Networking Sites: Facebook
- Social Networking Sites: Myspace
- Viral Advertising and Marketing
- Virtual Community
- Virtual Sex
- Virtuality
- Web 2.0
- Wiki
- YouTube
- Audiences: Producers of New Media
- Audiences: Reception and Injection Models
- Fairness Doctrine
- Federal Communications Commission
- Media Consolidation
- Network News Anchor Desk
- New Media
- Telecommunications Act of 1996
- Workforce
- Advertising
- Children's Programming: Cartoons
- Children's Programming: Disney and Pixar
- Comics
- E-Zines: Riot Grrrl
- Film: Hollywood
- Film: Horror
- Film: Independent
- Graphic Novels
- Men's Magazines: Lad Magazines
- Men's Magazines: Lifestyle and Health
- Music: Underrepresentation of Women Artists
- Music Videos: Representations of Men
- Music Videos: Representations of Women
- Music Videos: Tropes
- Newsrooms
- Pornification of Everyday Life
- Pornography: Gay and Lesbian
- Pornography: Heterosexual
- Pornography: Internet
- Radio
- Radio: Pirate
- Reality-Based Television: America's Next Top Model
- Reality-Based Television: Makeover Shows
- Reality-Based Television: Wedding Shows
- Romance Novels
- Sitcoms
- Soap Operas
- Sports Media: Extreme Sports and Masculinity
- Sports Media: Olympics
- Sports Media: Transgender
- Talk Shows
- Textbooks
- Toys and Games: Gender Socialization
- Toys and Games: Racial Stereotypes and Identity
- Tropes
- Tween Magazines
- Video Gaming: Representations of Femininity
- Video Gaming: Representations of Masculinity
- Video Gaming: Violence
- Women's Magazines: Fashion
- Women's Magazines: Feminist Magazines
- Women's Magazines: Lifestyle and Health
- Gay and Lesbian Portrayals on Television
- Gender and Femininity: Motherhood
- Gender and Femininity: Single/Independent Girl
- Gender and Masculinity: Black Masculinity
- Gender and Masculinity: Fatherhood
- Gender and Masculinity: Metrosexual Male
- Gender and Masculinity: White Masculinity
- Gender Embodiment
- Heroes: Action and Super Heroes
- Television
- Affirmative Action
- Cultural Politics
- Culture Jamming
- Diversity
- Empowerment
- Equal Employment Opportunity Commission
- Gender Media Monitoring
- Media Literacy
- Loading...
Get a 30 day FREE TRIAL
-
Watch videos from a variety of sources bringing classroom topics to life
-
Read modern, diverse business cases
-
Explore hundreds of books and reference titles
Sage Recommends
We found other relevant content for you on other Sage platforms.
Have you created a personal profile? Login or create a profile so that you can save clips, playlists and searches