Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Find Out What the Word “Hack” and Medieval Horses Have In Common

b2ap3_thumbnail_hacker_attacker_400.jpgIn today’s society, we throw the word “hack,” around without a second thought. This is especially true in the realm of cyber security for businesses. Have you ever taken a moment to think about why the term “hacker” was chosen as the title for those who partake in sketchy online activity? What exactly makes a hacker, a hacker?

As it turns out, there are a ton of uses for the word “hack,” and almost none of them have anything to do with technology in any way. This might sound surprising, especially because the term is used so frequently. According to WIRED magazine, the term originally surfaced in the Middle English period (somewhere between the early 12th and 16th Century). In this sense it had three different meanings:

  • Hack is a shortened version of “hackney,” which is a term used to describe an ordinary horse for ordinary purposes. As such, nothing great is expected from it, unlike other horses used for war.
  • Hack can be a term used to cut something, most likely in the sense of a lumberjack cutting wood. These kind of cuts are jagged, which brings on the appearance of messiness.
  • A hack is also a rack used to feed cattle or falcons.

Obviously, these aren’t the definitions we’re looking for. In terms of technology, the root of the word hack originated from the MIT Tech Model Railroad Club in 1955, where it was used as a term for tinkering around with the electrical system. From there, the rest is history. Throughout the years, it was used in MIT’s student newspaper, and is now well-known on the university as a term for pranks or moments of ingenuity.

According to the Jargon File, a resource documenting hacker slang and tradition, cites that none of the traditional definitions matter at all to how we should look at hacking. The true nature of the term is explained:

Hacking might be characterized as ‘an appropriate application of ingenuity’. Whether the result is a quick-and-dirty patchwork job or a carefully crafted work of art, you have to admire the cleverness that went into it.

Of course, this doesn’t change the fact that hacking has generally taken on a negative connotation over the past 30-or-so years, especially in the wake of so much criminal activity as of late. With that said, some organizations are even attempting to use hacking in order to improve cyber security and discover new ways to block out the real dangers. In fact, Facebook holds an annual event called Hacktober, where they attempt to compromise each other’s systems in order to improve overall security for the company. There are even hacking conferences where cyber security authorities present their findings to the world and ways to fix vulnerabilities.

For businesses, this is called Penetration Testing. This is where your IT consultant reviews your network for vulnerabilities by thinking like a hacker.

Hacking has gone from clever pranking to posing legitimate threats, and if businesses don’t take proper steps to keep their networks and data secure from hackers, they could be in a whole new world of hurt, nobody will be laughing when your network is compromised. If you’re ready to keep your business as secure as possible from impending dangers, give Voyage Technology a call at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 22 March 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Privacy Workplace Tips Google Phishing Email Computer Workplace Strategy Collaboration Hosted Solutions Small Business Backup Users Ransomware Managed Service Mobile Device Productivity Microsoft Passwords Quick Tips Saving Money Communication Cybersecurity AI Smartphone Data Backup Disaster Recovery Data Recovery Android VoIP Upgrade Business Management Smartphones communications Mobile Devices Windows Social Media Browser Managed IT Services Microsoft Office Network Current Events Tech Term Remote Internet of Things Facebook Information Miscellaneous Holiday Artificial Intelligence Automation Compliance Cloud Computing Gadgets Training Covid-19 Remote Work Server Outsourced IT Managed Service Provider IT Support Employee/Employer Relationship Encryption Spam Office Windows 10 Data Management Government Business Continuity Wi-Fi Windows 10 Blockchain Virtualization Bandwidth Business Technology Mobile Office Managed Services Data Security Two-factor Authentication Vendor Apps Tip of the week Apple App Networking Mobile Device Management Voice over Internet Protocol Gmail WiFi BYOD Chrome Employer-Employee Relationship Budget Hacker Conferencing Avoiding Downtime Marketing Managed IT Services How To BDR Computing Information Technology HIPAA Office 365 Physical Security Applications Access Control Bring Your Own Device Computers Retail 2FA Website Operating System Healthcare Risk Management Router Big Data Analytics Office Tips Virtual Private Network Augmented Reality Health Storage Help Desk Password Customer Service Document Management Windows 11 Managed IT Service Telephone Scam Going Green Excel Data loss Cooperation Remote Workers Cybercrime Firewall Patch Management Save Money Remote Monitoring End of Support Vulnerability The Internet of Things Vendor Management Free Resource Project Management Windows 7 Social Display Microsoft 365 Printer Paperless Office Solutions Infrastructure Monitoring Mouse Machine Learning Hacking Saving Time Presentation Administration Holidays Wireless Technology Maintenance Data Storage Downloads Supply Chain Antivirus Video Conferencing Managed Services Provider Licensing Virtual Machines Professional Services Settings Wireless Entertainment Printing Word Content Filtering YouTube Robot Cryptocurrency iPhone Telephone System Cost Management Safety Vulnerabilities Data Privacy Virtual Desktop LiFi IT Management Data storage Images 101 Meetings VPN Multi-Factor Authentication Mobility Outlook Modem User Tip Processor Computer Repair Mobile Security Money Humor Customer Relationship Management Employees Smart Technology Integration Sports Education SharePoint Addiction Electronic Medical Records Language Managing Costs Amazon Chatbots eCommerce SSID Management Lenovo Screen Reader Surveillance Writing Distributed Denial of Service Mobile Computing Virtual Assistant Outsource IT Virtual Machine Environment Media Search Service Level Agreement Virtual Reality Computing Infrastructure User Reviews Private Cloud Identity Best Practice Medical IT Server Management Superfish Bookmark Identity Theft Smart Tech Development Transportation Small Businesses Buisness Hypervisor Displays IT solutions Download IP Address Twitter Alerts Legal Shopping Error Optimization Business Growth PowerPoint Browsers Connectivity Social Engineering Break Fix Employer/Employee Relationships Outsourcing Navigation Cortana Upload PCI DSS Remote Computing Recovery Gig Economy Hard Drives Multi-Factor Security Alt Codes Workplace Social Network Tablet IoT Domains Internet Service Provider Dark Web Teamwork Hiring/Firing Downtime Hosted Solution Evernote Paperless Trends Regulations Compliance Alert File Sharing Regulations Refrigeration Memes Dark Data Google Calendar Typing Co-managed IT Managed IT Customer Resource management Data Analysis Star Wars Public Speaking Net Neutrality How To Microsoft Excel SQL Server Technology Care History Business Communications Knowledge Gamification Lithium-ion battery Financial Data Notifications Staff Google Drive Smartwatch Travel Social Networking IT Legislation Entrepreneur Scams 5G Techology Fileless Malware Google Maps Procurement Azure Hybrid Work Cyber security Unified Communications Tech Human Resources Experience Content Telework Wearable Technology Google Docs CES Unified Threat Management Motherboard Undo Communitications Comparison Bitcoin Cables Running Cable Health IT Unified Threat Management Directions Assessment Supply Chain Management Permissions Google Wallet Term Google Apps FinTech IT Assessment Network Congestion Specifications Windows 8 IT Maintenance Laptop User Error Microchip Internet Exlporer Flexibility Fraud Drones Value Business Intelligence Application Shortcuts Username Organization Digital Security Cameras Point of Sale Smart Devices Black Friday Ransmoware Halloween Database IBM Remote Working Memory Vendors Data Breach Google Play Be Proactive Network Management Tech Support IT Technicians Videos Cookies Electronic Health Records Monitors Cyber Monday Hacks Workforce Scary Stories Proxy Server Fun Tactics Hotspot Wasting Time Threats Trend Micro Deep Learning Security Cameras Workplace Strategies Websites Mirgation Nanotechnology Competition Software as a Service Meta

Blog Archive