Give at least two different definitions of hacking presented in the
paper.
What is a phone phreak?
What technical resources are required to hack?
Why does the author believe that hacking is a legitimate activity?
What are the principles of hacking?