Known by the name of Bug Hunter, the hacker said he broke into the files for the pleasure of
seeing the welcome, "Good afternoon, HRH Duke of Edinburgh."
........................
He typed 1234, which turned out to be a testing file with access to all the Prestel code numbers.
........................
Hacking started as an intellectual game among fanatical American computer enthusiasts. They
enjoyed cracking the private codes of large business computers and creating more or less
harmless chaos in their files. But now the practice has spread to computer fraud, and to the
reading of confidential information.
........................
Once a hacker has a genuine user s network identity, he can run up bills for electronic mail and
telexes, and read all the user s private mail. It is almost impossible to detect the unauthorised use
of the service.
........................
Much more serious than amateur hacking is the professional computer fraud. Millions of pounds
have been stolen from financial institutions through computer fraud, usually by the illegal transfer
of funds to foreign bank accounts.
........................
Only a fraction of such crimes are reported because companies fear the publicity would damage
customer confidence. And the publicity would be harmful.
........................
...