Barney's Blog

Blog archive

Hacker Spotting 101

For parents, there's no shortage of articles on how to tell if your child is sniffing glue, drinking booze or even addicted to the Internet. For those worried about computer mischief, there's also a guide by T. Reginald Gibbons called "Is Your Child a Computer Hacker?"

I have no clue whether this is real or a put-on (if you know, tell Redmond Report readers by writing me at [email protected]), but Reginald claims he's a model parent, scrutinizing every aspects of his kids' lives and even tagging along when they go to parties to make sure there are no shenanigans (I'm pretty sure this is an Irish beer).

Reginald was unprepared for all this computer stuff, and suspected that his previously perfect son was a hacker. You may be facing a similar crisis, so here's what he says to look for:

  • If your son asks you to change from AOL to a "hacker-friendly ISP," he might be a hacker.
  • If your son plays "Quake," he might be a hacker.
  • If your son becomes a Lunix (that's how Reggie spells it) geek, he might be a hacker.
  • And if your son becomes "argumentative and surly," he might be a hacker.

Based on the last one, all my kids are hackers!

Posted by Doug Barney on November 05, 2007


Featured

  • World Map Image

    Microsoft Taps Nebius in $17B AI Infrastructure Deal To Alleviate Cloud Strain

    Microsoft has signed a five-year, $17.4 billion agreement with Amsterdam-based Nebius Group to expand its AI computing capabilities through third-party GPU infrastructure.

  • Microsoft Brings Copilot AI Into Viva Engage

    Microsoft 365 Copilot in Viva Engage is now generally available, extending Copilot's AI-powered assistant capabilities deeper into the Viva platform.

  • MIT Finds Only 1 in 20 AI Investments Translate into ROI

    Despite pouring billions into generative AI technologies, 95 percent of businesses have yet to see any measurable return on investment.

  • Report: Cost, Sustainability Drive DaaS Adoption Beyond Remote Work

    Gartner's 2025 Magic Quadrant for Desktop as a Service reveals that while secure remote access remains a key driver of DaaS adoption, a growing number of deployments now focus on broader efficiency goals.