Hacking
          Beginning of paper
Contents ~~~~~~~~
This file will be divided into four parts:
Part 1: What is , A Hacker's Code of Ethics, Basic  Safety
Part 2: Packet Switching Networks: Telenet- How it Works, How to Use it,
               Outdials, Network Servers, Private PADs
       Part 3: Identifying a Computer, How to Hack  ....          
Middle of paper
....  suggestions for guidelines to follow to
ensure that not only you stay out of trouble, but you pursue your craft without
damaging the computers you hack into or the companies who own them.
I.    Do not intentionally damage *any* system. II.   Do not alter any system
files other than ones needed to ensure your
      escape from detection and your future access (Trojan Horses, Altering
      Logs, and the like are all necessary to your survival for as long as
      possible.) III.  Do not leave  ....          
          ------------------
          
          Word count: 3551 
 Page count: 13 (approximately 250 words per page)