In five pages this paper examines computer hacking from all sides and then presents the argument that such a practice is unethical. Five sources are cited in the bibliography.