Knowledge (XXG)

Hacker culture

Source đź“ť

1266:" derives from the everyday English sense "to cut or shape by or as if by crude or ruthless strokes" and is even used among users of the positive sense of "hacker" who produces "cool" or "neat" hacks. In other words, to "hack" at an original creation, as if with an axe, is to force-fit it into being usable for a task not intended by the original creator, and a "hacker" would be someone who does this habitually. (The original creator and the hacker may be the same person.) This usage is common in both programming, engineering and building. In programming, hacking in this sense appears to be tolerated and seen as a necessary compromise in many situations. Some argue that it should not be, due to this negative meaning; others argue that some kludges can, for all their ugliness and imperfection, still have "hack value". 1270:
capable of doing modifications that allow a system to work in the short term, and so has some sort of marketable skills. However, there is always the understanding that a more skillful or technical logician could have produced successful modifications that would not be considered a "hack-job". The definition is similar to other, non-computer based uses of the term "hack-job". For instance, a professional modification of a production sports car into a racing machine would not be considered a hack-job, but a cobbled together backyard mechanic's result could be. Even though the outcome of a race of the two machines could not be assumed, a quick inspection would instantly reveal the difference in the level of professionalism of the designers. The adjective associated with hacker is "hackish" (see the
1932: 1326:
shift challenges the stereotypical perception of hackers as criminals, allowing for greater emphasis on their positive contributions to cybersecurity. Ethical hacking has drastically changed the public perception of hackers. Rather than viewing persons with hacker skills as perpetrators of cybercrime, they can be viewed as part of the solution in fighting against cybercrime. The ethical hacker with knowledge and expertise stands as guardian to the digital assets, working beforehand alongside organizations to build up a more secure online landscape.
1739: 1689: 1719: 1674: 1704: 666:"), who use the same skills to author harmful software (such as viruses or trojans) and illegally infiltrate secure systems with the intention of doing harm to the system. The programmer subculture of hackers, in contrast to the cracker community, generally sees computer security-related activities as contrary to the ideals of the original and true meaning of the hacker term, that instead related to playful cleverness. 1286:(exploring undocumented or unauthorized areas in buildings). One specific example is clever pranks traditionally perpetrated by MIT students, with the perpetrator being called hacker. For example, when MIT students surreptitiously put a fake police car atop the dome on MIT's Building 10, that was a hack in this sense, and the students involved were therefore hackers. Other types of hacking are 1424:: connecting wires to different leads of the integrated circuit chips. The results of these DIY experiments range from opening up previously inaccessible features that were part of the chip design to producing the strange, dis-harmonic digital tones that became part of the techno music style. Companies take different attitudes towards such practices, ranging from open acceptance (such as 690:
identify themselves as hackers is that each is someone who enjoys "…the intellectual challenge of creatively overcoming and circumventing limitations of programming systems and who tries to extend their capabilities" (47). With this definition in mind, it can be clear where the negative implications of the word "hacker" and the subculture of "hackers" came from.
737: 1381: 1269:
In non-software engineering, the culture is less tolerant of unmaintainable solutions, even when intended to be temporary, and describing someone as a "hacker" might imply that they lack professionalism. In this sense, the term has no real positive connotations, except for the idea that the hacker is
1325:
Furthermore, the act of ethical hacking also molds the larger hacker culture. Hacking skills, traditionally associated with breaking the law, have changed dramatically with the emergence of ethical hacking. Ethical hacking helped legitimize hacking skills which can now be talked about publicly. This
1106:
Dictionary defined hack in 1959 (not yet in a computer context) as "1) an article or project without constructive end; 2) a project undertaken on bad self-advice; 3) an entropy booster; 4) to produce, or attempt to produce, a hack(3)", and "hacker" was defined as "one who hacks, or makes them". Much
1090:
The programmer subculture of hackers disassociates from the mass media's pejorative use of the word 'hacker' referring to computer security, and usually prefer the term 'cracker' for that meaning. Complaints about supposed mainstream misuse started as early as 1983, when media used "hacker" to refer
1329:
Ethical hacking is not only a proactive defense for organizations but also brings about the desired cultural revolution within the realm of the hacking fraternity. Ethical hacking, on its part through focusing on the constructive application of hacking skills, has become an integral activity in the
1114:
and applied its local model railroad slang in this computing context. Initially incomprehensible to outsiders, the slang also became popular in MIT's computing environments beyond the club. Other examples of jargon imported from the club are 'losing' ("when a piece of equipment is not working") and
616:
What they had in common was mainly love of excellence and programming. They wanted to make their programs that they used be as good as they could. They also wanted to make them do neat things. They wanted to be able to do something in a more exciting way than anyone believed possible and show "Look
1575:
Technology and art are inextricably related. Many musicians, video artists, graphic artists, and even poets who work with technology—whether designing it or using it—consider themselves to be part of the 'hacker community.' Computer artists, like non-art hackers, often find themselves on society's
1321:
Cyber-attacks can have significant financial implications for a company. In such cases, the organizations could have been saved from these gigantic financial losses by identifying and fixing the vulnerabilities discovered by an ethical hacker. Moreover, for smaller organizations, the impact can be
1639:
Cellular automata are simple rules that are applied to a grid of cells, or the pixel values of an image. The same rule is applied to every cell, to determine its next state, based on the previous state of that cell and its neighboring cells. There are many interesting cellular automata rules, and
1317:
Ethical hacking is the process of software engines running real-world cyber threats to assess the survivability of a company's digital structure. Ethical hackers play the role of cyber attackers by executing assessments, penetration tests, and modeling tactics, techniques, and procedures used by
1313:
defined ethical hacking as going into devices and computer systems belonging to an organization, with its explicit permissions, to assess and test the efficacy of the organization's cybersecurity defenses. Generally, organizations engage the services of ethical hackers either through third-party
1098:
In the programmer subculture of hackers, a computer hacker is a person who enjoys designing software and building programs with a sense for aesthetics and playful cleverness. The term hack in this sense can be traced back to "describe the elaborate college pranks that...students would regularly
1277:
In a very universal sense, hacker also means someone who makes things work beyond perceived limits in a clever way in general, without necessarily referring to computers, especially at MIT. That is, people who apply the creative attitude of software hackers in fields other than computing. This
689:
There was a growing awareness of a style of programming different from the cut and dried methods employed at first, but it was not until the 1960s that the term "hackers" began to be used to describe proficient computer programmers. Therefore, the fundamental characteristic that links all who
1077:, based on the idea that writing software and sharing the result on a voluntary basis is a good idea, and that information should be free, but that it's not up to the hacker to make it free by breaking into private computer systems. This hacker ethic was publicized and perhaps originated in 1060:
in 1984 defined "hackers" as "computer nuts". In their programmer subculture, a hacker is a person who follows a spirit of playful cleverness and loves programming. It is found in an originally academic movement unrelated to computer security and most visibly associated with
641:, an influential but not universally accepted compendium of hacker slang, defines hacker as "A person who enjoys exploring the details of programmable systems and stretching their capabilities, as opposed to most users, who prefer to learn only the minimum necessary." The 864:
The concentration of academic hacker subculture has paralleled and partly been driven by the commoditization of computer and networking technology, and has, in turn, accelerated that process. In 1975, hackerdom was scattered across several different families of
977:
An aspect of hack value is performing feats for the sake of showing that they can be done, even if others think it is difficult. Using things in a unique way outside their intended purpose is often perceived as having hack value. Examples are using a
2472:
During the time one of these machines read a card, it could execute a sequence of up to forty-eight steps. More complex sequences-within-sequences were also possible. One computer scientist later noted that this method of programming demanded
1314:
cybersecurity firms or under contract. Their main job is to identify and fix security gaps before threat-actors find them and exploit them. This proactive approach to cybersecurity testing leads to significant cost savings for organizations.
685:"But from about 1945 onward (and especially during the creation of the first ENIAC computer) some programmers realized that their expertise in computer software and technology had evolved not just into a profession, but into a passion" (46). 1344:
In yet another context, a hacker is a computer hobbyist who pushes the limits of software or hardware. The home computer hacking subculture relates to the hobbyist home computing of the late 1970s, beginning with the availability of
1360:
A large overlaps between hobbyist hackers and the programmer subculture hackers existed during the Homebrew Club's days, but the interests and values of both communities somewhat diverged. Today, the hobbyists focus on commercial
1099:
devise" (Levy, 1984 p. 10). To be considered a 'hack' was an honor among like-minded peers as "to qualify as a hack, the feat must be imbued with innovation, style and technical virtuosity" (Levy, 1984 p. 10) The
1634:
computer program, generates objects which randomly bump into each other and in turn create more objects and designs, similar to a lava lamp, except that the parts change color and form through interaction. Hopkins Says:
2295:
Okpa, John Thompson; Ugwuoke, Christopher Uchechukwu; Ajah, Benjamin Okorie; Eshioste, Emmanuel; Igbe, Joseph Egidi; Ajor, Ogar James; Okoi, Ofem, Nnana; Eteng, Mary Juachi; Nnamani, Rebecca Ginikanwa (2022-09-05).
1318:
threat-actors. This careful examination provides an organization with the identification of weaknesses in its security systems, enabling the organization to employ necessary measures towards fortifying its defense.
645:(RFC) 1392, the Internet Users' Glossary, amplifies this meaning as "A person who delights in having an intimate understanding of the internal workings of a system, computers and computer networks in particular." 1576:
fringes, developing strange, innovative uses of existing technology. There is an empathetic relationship between those, for example, who design experimental music software and hackers who write communications
1467:), a "hack" refers to an extension of the operating system which provides additional functionality. Term also refers to those people who cheat on video games using special software. This can also refer to the 806:
Over time, the academic hacker subculture has tended to become more conscious, more cohesive, and better organized. The most important consciousness-raising moments have included the composition of the first
802:
and a shared view of history, similar to the way in which other occupational groups have professionalized themselves, but without the formal credentialing process characteristic of most professional groups.
1673: 582:), but how it is done and whether it is exciting and meaningful. Activities of playful cleverness can be said to have "hack value" and therefore the term "hacks" came about, with early examples including 662:"), who use their computer security-related skills and knowledge to learn more about how systems and networks work and to help to discover and fix security holes, as well as those more "evil" crackers (" 704:
as they are now, there were multiple independent and parallel hacker subcultures, often unaware or only partially aware of each other's existence. All of these had certain important traits in common:
1126:
workstations to prospective members because they wanted residents who were interested in people, not computers, with one fraternity member stating that "We were worried about the hacker subculture".
625:"; those who are generally referred to by media and members of the general public using the term "hacker", and whose primary focus‍—‌be it to malign or for malevolent purposes‍—‌lies in 1703: 1688: 1025:
to refer to someone who enjoys playful cleverness is most often applied to computer programmers, it is sometimes used for people who apply the same attitude to other fields. For example,
974:
Hack value is the notion used by hackers to express that something is worth doing or is interesting. This is something that hackers often feel intuitively about a problem or solution.
1144:
Hackers were influenced by and absorbed many ideas of key technological developments and the people associated with them. Most notable is the technical culture of the pioneers of the
1839: 1254:
Within the computer programmer subculture of hackers, the term hacker is also used for a programmer who reaches a goal by employing a series of modifications to extend existing
798:
drew together a critically large population and encouraged the spread of a conscious, common, and systematic ethos. Symptomatic of this evolution were an increasing adoption of
1459:
that (sometimes illegally) modifies another program, often a video game, giving the user access to features otherwise inaccessible to them. As an example of this use, for
599: 583: 2460: 2987: 693:
Some common nicknames among this culture include "crackers", who are considered to be unskilled thieves who mainly rely on luck, and "phreaks", which refers to skilled
2345: 570:), to achieve novel and clever outcomes. The act of engaging in activities (such as programming or other media) in a spirit of playfulness and exploration is termed 2429: 1718: 1119: 697:
and "warez d00dz" (crackers who acquire reproductions of copyrighted software). Hackers who are hired to test security are called "pentesters" or "tiger teams".
681:, it was not a word that the first programmers used to describe themselves. In fact, many of the first programmers were from engineering or physics backgrounds. 1262:
to accomplish programming tasks that are quick, but ugly, inelegant, difficult to extend, hard to maintain and inefficient. This derogatory form of the noun "
3023: 1916: 1171:
Many programmers have been labeled "great hackers", but the specifics of who that label applies to is a matter of opinion. Certainly major contributors to
967:
that these principles have evolved from the known Protestant ethics and incorporates the spirits of capitalism, as introduced in the early 20th century by
3263: 1083: 921: 523: 1412:
for a notorious example) to expose or add functionality to a device that was unintended for use by end users by the company who created it. A number of
1845: 1860: 1738: 586:
done by students to demonstrate their technical aptitude and cleverness. The hacker culture originally emerged in academia in the 1960s around the
2974:
has had a role in acculturating hackers since its origins in 1975. These academic and literary works helped shape the academic hacker subculture:
1851: 1396:
Electronics hobbyists working on machines other than computers also fall into this category. This includes people who do simple modifications to
1156:
operating system and connected to the ARPANET, provided an early hacker meeting point. After 1980 the subculture coalesced with the culture of
767: 595: 2721: 1648:
Some hacker artists create art by writing computer code, and others, by developing hardware. Some create with existing software tools such as
2423: 2178: 1906: 1310: 1100: 587: 353: 3458: 1937: 1890: 677:
Although the idea of "hacking", in the modern sense, existed long before the modern term "hacker"‍—‌with the most notable example of
2927: 2656: 674:
The word "hacker" derives from the Late Middle English words hackere, hakker, or hakkere - one who cuts wood, woodchopper, or woodcutter.
1667:, which hackers have further enhanced, often producing detailed and intricate graphics and animations from simple mathematical formulas. 558:
of individuals who enjoy—often in collective effort—the intellectual challenge of creatively overcoming the limitations of
2948: 1949: 1192: 1013:
does not. Hacking is not using process of elimination to find a solution; it's the process of finding a clever solution to a problem.
842: 771: 47: 1596:
structures towards a different end, to get inside cultural systems on the net and make them do things they were never intended to do.
3372: 3325: 3301: 3277: 3249: 3225: 3197: 3165: 3141: 3113: 3095: 3085: 3061: 3037: 3001: 2772: 2581: 2556: 2156: 1796: 799: 2126: 2693: 2810: 2621: 2600: 2518: 2450: 1357:
enthusiasts. The amateur radio slang referred to creatively tinkering to improve performance as "hacking" already in the 1950s.
3390: 3239: 2241: 1881: 1339: 1153: 787: 243: 64: 3443: 3357: 3342: 2860: 2475:
the kind of detailed design of parallel subsequencing that one sees nowadays at the microprogramming level of some computers.
2011: 1653: 1373:). Also of interest to some members of this group is the modification of computer hardware and other electronic devices, see 778:
were particularly well-known hotbeds of early hacker culture. They evolved in parallel, and largely unconsciously, until the
516: 3404: 2362: 929:
Access to computers-and anything that might teach you something about the way the world works-should be unlimited and total.
1900: 2390: 2065: 2030: 1108: 904: 648:
As documented in the Jargon File, these hackers are disappointed by the mass media and general public's usage of the word
456: 253: 136: 126: 2492: 2203: 3291: 2742: 1682:
was created using watercolors, then scanned into a computer. Colors were then manipulated using a software imaging tool.
1240: 821: 163: 151: 1133:, the Open Source and Free Software hacker subculture developed in the 1960s among 'academic hackers' working on early 1211:. People primarily known for their contributions to the consciousness of the programmer subculture of hackers include 953:
Hacker ethics are concerned primarily with sharing, openness, collaboration, and engaging in the hands-on imperative.
721: 626: 598:. Hacking originally involved entering restricted areas in a clever way without causing any major damage. Some famous 238: 1659:
The creative process of hacker artists can be more abstract than artists using non-technological media. For example,
2298:"Cyberspace, Black-Hat Hacking and Economic Sustainability of Corporate Organizations in Cross-River State, Nigeria" 3183: 997:
A solution or feat has "hack value" if it is done in a way that has finesse, cleverness or brilliance, which makes
933: 775: 694: 655: 475: 213: 2086: 3217: 3211: 1445: 741: 509: 258: 2780: 2122: 1959: 1730: 1220: 1204: 1103: 790:, provided an early meeting point of the hacker community. This and other developments such as the rise of the 591: 434: 393: 363: 313: 1641: 1006: 3414: 825:
in 1997. Correlated with this has been the gradual recognition of a set of shared culture heroes, including:
621:
Hackers from this subculture tend to emphatically differentiate themselves from whom they pejoratively call "
3448: 3433: 3151: 1263: 1228: 795: 173: 3155: 3127: 3075: 1350: 1330:
collective effort towards fortification of cybersecurity and redefining hackers' image in the public eye.
1236: 1161: 916: 791: 428: 1857: 1047:
was used in a similar sense among radio amateurs in the 1950s, predating the software hacking community.
602:
were placing of a campus police cruiser on the roof of the Great Dome and converting the Great Dome into
3269: 2339: 1644:' is a widely known cellular automata rule, but many other lesser known rules are much more interesting. 1609: 3099: 2718: 1302:
hack, that is, a clever solution to a mathematical problem. All of these uses have spread beyond MIT.
939:
Hackers should be judged by their hacking, not bogus criteria such as degrees, age, race, or position.
3438: 3385: 2278: 1786: 1756: 1697:
was created using pen and ink, then scanned into a computer and colored with a software imaging tool.
1165: 1040: 886: 642: 579: 446: 388: 308: 3315: 2887: 2835: 2455: 2111: 1397: 1208: 1107:
of TMRC's jargon was later imported into early computing culture, because the club started using a
567: 563: 423: 248: 158: 2928:
Singing Together, Hacking Together, Plundering Together: Sonic Intellectual Property in Cybertimes
1630:
is a software hacker artist well known for his artistic cellular automata. This art, created by a
1009:
by linking together most of modern mathematics has hack value; solving a combinatorial problem by
3336:
We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency.
3175: 3123: 2983: 2902: 2327: 1601: 1401: 1248: 1010: 979: 2644: 1887: 1725: 3410: 3400: 3368: 3353: 3338: 3321: 3297: 3273: 3245: 3221: 3193: 3161: 3137: 3109: 3105: 3081: 3057: 3047: 3033: 3019: 2997: 2577: 2552: 2419: 2319: 2007: 1631: 1605: 1568: 1518: 1425: 1366: 1066: 418: 381: 348: 3453: 2678: 2648: 2413: 2309: 2268: 2114: 2057: 1868: 1468: 1464: 1456: 1405: 1212: 1172: 1138: 1056: 1026: 878: 866: 858: 846: 701: 678: 663: 659: 609: 398: 99: 2940: 3287: 3051: 2914: 2738: 2725: 2604: 2227: 2195: 1969: 1894: 1864: 1649: 1492: 1488: 1433: 1421: 1389: 1291: 1287: 1283: 1279: 1232: 1176: 1130: 749: 622: 559: 544: 178: 69: 38: 2148: 1873: 1031: 3179: 3029: 2682: 1811: 1801: 1781: 1766: 1617: 1441: 1196: 1184: 1123: 991: 956: 850: 834: 537: 487: 318: 201: 59: 2802: 2629: 1897:
Joel Ryan describes collaboration with hacker artists of Silicon Valley. 21 March 2002
1509:. This has extended the definition of the term and what it means to be a hacker. Such 3427: 3189: 3011: 2597: 2514: 2331: 1964: 1945: 1660: 1613: 1354: 1062: 987: 959:, one of the leaders of the open source movement (known primarily for developing the 925:
and in other texts in which Levy formulates and summarizes general hacker attitudes:
882: 812: 745: 650: 323: 218: 115: 3418: 3235: 3207: 1826: 1806: 1761: 1506: 1449: 1295: 1258:
or resources. In this sense, it can have a negative connotation of using inelegant
1180: 1134: 1074: 1002: 960: 943: 908: 898: 830: 816: 411: 278: 231: 86: 2856: 1160:. Since the mid-1990s, it has been largely coincident with what is now called the 2372: 1712:
was created using pencil, scanned, and then painted with a software imaging tool.
17: 3311: 3259: 3133: 3071: 2979: 2971: 2608: 2367: 2281: 2262: 2231: 1982: 1910: 1821: 1791: 1771: 1627: 1550: 1484: 1362: 1346: 1299: 1271: 1255: 1244: 1216: 1078: 983: 808: 638: 481: 368: 105: 2061: 2038: 3015: 2652: 2488: 2314: 2297: 2199: 2031:"The Hacker Community and Ethics: An Interview with Richard M. Stallman, 2002" 1927: 1562: 1546: 1502: 1417: 1370: 1036: 998: 854: 555: 338: 333: 110: 2750: 2323: 1612:. This art is made using custom computer technology, with specially designed 1322:
even more dramatic as it can potentially save the business's very existence.
2993: 2944: 1954: 1816: 1776: 1593: 1534: 1522: 1437: 1070: 968: 358: 208: 188: 93: 54: 1577: 1542: 1514: 1092: 838: 826: 779: 756: 452: 183: 131: 2115:"Words to Avoid (or Use with Care) Because They Are Loaded or Confusing" 658:, calling them "crackers" instead. This includes both "good" crackers (" 2090: 1664: 1589: 1460: 1374: 1145: 760: 440: 328: 303: 296: 168: 1640:
they all look very different, with amazing animated dynamic effects. '
2273: 1558: 1510: 1472: 1413: 1409: 1298:("hack your reputation"). In a similar vein, a "hack" may refer to a 1259: 1149: 874: 783: 763: 732:
Playful cleverness, taking the serious humorously and humor seriously
575: 494: 343: 283: 121: 2776: 1278:
includes even activities that predate computer hacking, for example
617:
how wonderful this is. I bet you didn't believe this could be done."
1380: 700:
Before communications between computers and computer users were as
1554: 1538: 1530: 1526: 1379: 1224: 1188: 1111: 1005:
has hack value; smashing it does not. As another example, proving
736: 735: 603: 2006:. Maryland: Rowman & Littlefield Publishers. pp. 43–56. 2386: 1429: 1200: 1157: 870: 3415:
Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous
3350:
Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous
1604:(mkl), who has created the 3-D light art projects entitled the 1621: 1498: 1385: 912: 717:
Information-sharing as both an ideal and a practical strategy
2415:
Introduction to Functional Programming Systems Using Haskell
1901:
Anthony Barker's Weblog on Linux, Technology and the Economy
2572:
Himanen, Pekka; Torvalds, Linus; Castells, Manuel (2001).
2235: 1663:
have produced visually stunning graphic presentations of
984:
flatbed scanner to take ultra-high-resolution photographs
2881: 2831: 2149:"IHTFP Hack Gallery: Hacks on the Great Dome (Bldg. 10)" 1388:
musician probes the circuit board of a synthesizer for
1207:) are likely to be included in any such list; see also 1183:, as well as the inventors of popular software such as 1087:(1984). It contains a codification of its principles. 919:. The hacker ethics were chronicled by Steven Levy in 1420:
sampling keyboards to create unusual sounds by doing
1600:
A successful software and hardware hacker artist is
1215:, the founder of the free software movement and the 1909:Gesture and Response in Field-Based Performance by 1584:Another description is offered by Jenny Marketou: 1452:players designed to sabotage compromised players.) 3365:Cyber Disobedience: Re://Presenting Online Anarchy 1392:using a jeweler's screwdriver and alligator clips. 1118:Others did not always view hackers with approval. 1115:'munged' ("when a piece of equipment is ruined"). 1039:three-part piece "Ma Fin Est Mon Commencement" by 755:These sorts of subcultures were commonly found at 600:hacks at the Massachusetts Institute of Technology 2989:Structure and Interpretation of Computer Programs 1997: 1995: 1993: 1948:: software development without the use of strict 1043:as hacks. According to the Jargon File, the word 578:is not the activities performed themselves (e.g. 2357: 2355: 1854:"Tag – who's it?" by Ingrid Hein, July 16, 1998. 1122:in 1989 avoided advertising their sophisticated 708:Creating software and sharing it with each other 2645:"for hack ( er ) s who want to complain to CBS" 1744:A fractal that models the surface of a mountain 1637: 1586: 1573: 1001:an essential part of the meaning. For example, 877:phenomenon, and is concentrated around various 683: 614: 2857:"IHTFP Hack Gallery: CP Car on the Great Dome" 1884:Resources by Subject – Art & Design, 2001. 1436:robotics gear) to outright hostility (such as 949:Computers can change your life for the better. 869:and disparate networks; today it is largely a 517: 8: 3363:Shantz, Jeff; Tomblin, Jordon (2014-11-28). 3025:Compilers: Principles, Techniques, and Tools 2344:: CS1 maint: multiple names: authors list ( 2222: 2220: 2052: 2050: 2048: 786:machine at MIT, called AI, that was running 574:. However, the defining characteristic of a 2551:. Garden City, NY: Anchor Press/Doubleday. 2190: 2188: 1882:Canterbury Christ Church University Library 3265:Hackers: Heroes of the Computer Revolution 2549:Hackers: Heroes of the Computer Revolution 2025: 2023: 1084:Hackers: Heroes of the Computer Revolution 922:Hackers: Heroes of the Computer Revolution 711:Placing a high value on freedom of inquiry 524: 510: 29: 2418:. Cambridge University Press. p. 1. 2313: 2272: 1243:and many other essays, maintainer of the 1353:. However, its roots go back further to 2542: 2540: 2538: 2536: 2179:Hackers – Wizards of the Electronic Age 1989: 1669: 1592:hackers who manipulate existing techno- 1463:users (until the 4th iteration of this 37: 2910: 2900: 2495:from the original on 12 September 2016 2337: 1455:In this context, a "hack" refers to a 1369:and exceptional computer programming ( 1349:. An influential organization was the 1091:to the computer criminals involved in 768:MIT Artificial Intelligence Laboratory 596:MIT Artificial Intelligence Laboratory 2393:from the original on 20 November 2023 1981:This article is based in part on the 1919:"The Hackers Identity", October 2014. 1011:exhaustively trying all possibilities 903:Many of the values and tenets of the 588:Massachusetts Institute of Technology 7: 1938:Free and open-source software portal 1247:(which was previously maintained by 612:explains about hackers who program: 3348:Coleman, Gabriella. (Nov 4, 2014). 1729:, a fractal fern computed using an 1141:environments in the United States. 244:forensics-focused operating systems 3268:. Garden City, NY: Anchor Press / 1950:software development methodologies 1903:"Why Geeks Love Linux", Sept 2003. 1867:"Playing the Open Source Game" by 1710:Rolling Golden Hills of California 1416:musicians have modified 1980s-era 1035:by John Cage and the 14th-century 982:to produce musical notes, using a 772:University of California, Berkeley 25: 3296:. Cambridge, MA: O'Reilly Media. 2699:from the original on 9 April 2016 2521:from the original on 30 July 2013 1797:Experiments in Art and Technology 1428:for its graphing calculators and 1294:hackers ("hack your brain"), and 1029:describes the silent composition 811:in 1973, the promulgation of the 629:weaknesses in computer security. 2749:. Addison-Wesley. Archived from 2659:from the original on 5 June 2013 2643:Joe Wilson (19 September 1983). 2129:from the original on 3 June 2013 1985:, which is in the public domain. 1930: 1888:SuperCollider Workshop / Seminar 1737: 1717: 1702: 1687: 1672: 1571:musician Larry Polansky states: 815:in 1985, and the publication of 746:emblem of the "hacker community" 3244:. Reading, MA: Addison-Wesley. 3241:The Art of Computer Programming 3160:. Santa Monica, CA: InfoBooks. 3080:. Reading, MA: Addison-Wesley. 3056:. Reading, MA: Addison-Wesley. 2951:from the original on 2011-06-29 2890:from the original on 2015-08-06 2863:from the original on 2013-11-28 2838:from the original on 2008-11-07 2813:from the original on 2006-12-19 2783:from the original on 2015-09-06 2463:from the original on 2017-05-27 2451:"A History of Modern Computing" 2432:from the original on 2023-10-19 2244:from the original on 2017-05-28 2206:from the original on 2006-12-19 2159:from the original on 2019-08-20 2068:from the original on 2019-04-25 1340:Hacking of consumer electronics 1152:AI machine at MIT, running the 65:Hacking of consumer electronics 1565:, or any combination thereof. 1239:and writer of the famous text 1: 2859:. Hacks.mit.edu. 1994-05-09. 1235:, one of the founders of the 1229:GNU Compiler Collection (GCC) 905:free and open source software 3386:A Brief History of Hackerdom 3334:Olson, Parmy. (05-14-2013). 3293:The Cathedral and the Bazaar 2801:Eric Steven Raymond (2001). 2719:A Brief History of Hackerdom 2620:Dyer, Richard (1984-05-06). 1241:The Cathedral and the Bazaar 822:The Cathedral and the Bazaar 164:Chaos Communication Congress 3459:Hacking (computer security) 3405:The Anthropology of Hackers 3320:. New York, NY: Doubleday. 2747:The Art of Unix Programming 2683:"Students Log on to ATHENA" 2412:Antony J. T. Davie (1992). 2004:The Internet in Public Life 1227:text editor as well as the 3475: 3391:Hack, Hackers, and Hacking 3185:The C Programming Language 2598:Definition of 'hack value' 2240:(version 4.4.7 ed.). 1913:& Satinder Gill, 2005. 1588:Hacker artists operate as 1482: 1337: 1334:Home computing enthusiasts 934:information should be free 896: 776:Carnegie Mellon University 542: 535: 476:2600: The Hacker Quarterly 214:List of computer criminals 3218:Little, Brown and Company 3213:The Soul of a New Machine 2363:"Definition of "Cracker"" 2315:10.1177/21582440221122739 1842:by Gerfried Stocker 1996. 1223:and author of the famous 980:dot matrix impact printer 963:), has noted in the book 946:and beauty on a computer. 27:Subculture of individuals 3367:. John Hunt Publishing. 3188:. Englewood Cliffs, NJ: 2576:. Secker & Warburg. 2264:Internet Users' Glossary 2200:"How To Become A Hacker" 2123:Free Software Foundation 1960:History of free software 1731:iterated function system 1620:chips to manipulate the 1440:'s attempts to lock out 1363:computer and video games 1221:Free Software Foundation 1148:, starting in 1969. The 1104:Tech Model Railroad Club 1003:picking a difficult lock 592:Tech Model Railroad Club 543:Not to be confused with 394:Cloud computing security 2809:. Thyrsus Enterprises. 2202:. Thyrsus Enterprises. 2002:Gehring, Verna (2004). 907:movement stem from the 726:Emphasis on rationality 720:Upholding the right to 174:Hackers on Planet Earth 3157:The Tao of Programming 3101:Hackers & Painters 3077:The Mythical Man-Month 2832:"MIT Gallery of Hacks" 2807:How To Become A Hacker 2308:(3): 215824402211227. 1840:"Vector in Open Space" 1646: 1598: 1582: 1497:Hacker artists create 1393: 1351:Homebrew Computer Club 1237:Open Source Initiative 1205:C programming language 917:Homebrew Computer Club 792:free software movement 752: 729:Distaste for authority 687: 619: 429:Homebrew Computer Club 3444:Computing and society 2741:(19 September 2003). 2622:"Masters of the Game" 2547:Levy, Steven (1984). 2515:"The Hacker's Ethics" 1917:Hackers, Who Are They 1408:or other device (see 1383: 1007:Fermat's Last Theorem 893:Ethics and principles 739: 3124:Hoftstadter, Douglas 2941:"Cornelia Sollfrank" 2743:"Reasons to Believe" 2739:Raymond, Eric Steven 2679:Garfinkel, Simson L. 2389:. 16 November 2023. 2230:, ed. (2003-12-29). 2177:Stallman, Richard. " 2112:Stallman, Richard M. 1787:Electronic art music 1757:Burning Man Festival 1616:and programming for 1398:graphing calculators 1166:open source movement 1041:Guillaume de Machaut 887:open-source software 782:, where a legendary 714:Hostility to secrecy 643:Request for Comments 447:Masters of Deception 389:Application security 3407:The Atlantic, 2010. 3176:Kernighan, Brian W. 3129:Gödel, Escher, Bach 2984:Sussman, Gerald Jay 2803:"What Is a Hacker?" 2489:"Glider Emblem FAQ" 2456:The Washington Post 1834:Hacker art mentions 1402:video game consoles 1219:, president of the 1209:List of programmers 911:that originated at 847:Richard M. Stallman 679:Lightning Ellsworth 568:digital electronics 564:electronic hardware 424:Chaos Computer Club 159:Black Hat Briefings 33:Part of a series on 3314:(September 1989). 3104:. Sebastopol, CA: 3048:Bourne, Stephen R. 2724:2015-12-20 at the 2603:2011-08-05 at the 2387:"Hacker Etymology" 1893:2007-09-28 at the 1863:2011-07-09 at the 1610:Big Round Cubatron 1394: 1249:Guy L. Steele, Jr. 753: 536:For the book, see 254:Social engineering 3411:Gabriella Coleman 3401:Gabriella Coleman 2930:by Larry Polansky 2834:. Hacks.mit.edu. 2692:. pp. 7–10. 2690:Technology Review 2425:978-0-521-27724-2 2058:Stallman, Richard 1907:Live Art Research 1632:cellular automata 1569:Dartmouth College 1519:computer hardware 1426:Texas Instruments 1406:musical keyboards 1367:software cracking 1120:MIT living groups 879:operating systems 867:operating systems 759:settings such as 744:, proposed as an 664:black hat hackers 660:white hat hackers 656:security breakers 534: 533: 382:Computer security 349:Keystroke logging 18:Hacker (academia) 16:(Redirected from 3466: 3331: 3317:The Cuckoo's Egg 3307: 3288:Raymond, Eric S. 3283: 3255: 3231: 3203: 3182:(January 1988). 3171: 3147: 3132:. New York, NY: 3119: 3091: 3067: 3043: 3007: 2960: 2959: 2957: 2956: 2937: 2931: 2925: 2919: 2918: 2912: 2908: 2906: 2898: 2896: 2895: 2878: 2872: 2871: 2869: 2868: 2853: 2847: 2846: 2844: 2843: 2828: 2822: 2821: 2819: 2818: 2798: 2792: 2791: 2789: 2788: 2769: 2763: 2762: 2760: 2758: 2735: 2729: 2717:Eric S.Raymond: 2715: 2709: 2708: 2706: 2704: 2698: 2687: 2681:(Feb–Mar 1989). 2675: 2669: 2668: 2666: 2664: 2640: 2634: 2633: 2628:. Archived from 2626:The Boston Globe 2617: 2611: 2595: 2589: 2587: 2574:The Hacker Ethic 2569: 2563: 2562: 2544: 2531: 2530: 2528: 2526: 2511: 2505: 2504: 2502: 2500: 2485: 2479: 2478: 2469: 2468: 2447: 2441: 2440: 2438: 2437: 2409: 2403: 2402: 2400: 2398: 2383: 2377: 2376: 2371:. Archived from 2359: 2350: 2349: 2343: 2335: 2317: 2292: 2286: 2285: 2276: 2274:10.17487/RFC1392 2267:. January 1993. 2259: 2253: 2252: 2250: 2249: 2224: 2215: 2214: 2212: 2211: 2192: 2183: 2182: 2174: 2168: 2167: 2165: 2164: 2145: 2139: 2138: 2136: 2134: 2108: 2102: 2101: 2099: 2098: 2089:. Archived from 2087:"TMRC – Hackers" 2083: 2077: 2076: 2074: 2073: 2054: 2043: 2042: 2037:. Archived from 2027: 2018: 2017: 1999: 1940: 1935: 1934: 1933: 1877: 1869:Shawn Hargreaves 1741: 1721: 1706: 1691: 1676: 1465:operating system 1284:urban spelunkers 1213:Richard Stallman 1173:computer science 1139:computer science 1073:. It also has a 1057:The Boston Globe 1027:Richard Stallman 965:The Hacker Ethic 859:Guido van Rossum 610:Richard Stallman 560:software systems 526: 519: 512: 399:Network security 100:Hacker Manifesto 39:Computer hacking 30: 21: 3474: 3473: 3469: 3468: 3467: 3465: 3464: 3463: 3424: 3423: 3382: 3352:. Verso Books. 3328: 3310: 3304: 3286: 3280: 3258: 3252: 3234: 3228: 3206: 3200: 3180:Ritchie, Dennis 3174: 3168: 3152:James, Geoffrey 3150: 3144: 3122: 3116: 3094: 3088: 3070: 3064: 3053:The Unix System 3046: 3040: 3028:. Reading, MA: 3010: 3004: 2978: 2968: 2966:Further reading 2963: 2954: 2952: 2939: 2938: 2934: 2926: 2922: 2909: 2899: 2893: 2891: 2880: 2879: 2875: 2866: 2864: 2855: 2854: 2850: 2841: 2839: 2830: 2829: 2825: 2816: 2814: 2800: 2799: 2795: 2786: 2784: 2777:"Great Hackers" 2771: 2770: 2766: 2756: 2754: 2753:on 18 July 2008 2737: 2736: 2732: 2726:Wayback Machine 2716: 2712: 2702: 2700: 2696: 2685: 2677: 2676: 2672: 2662: 2660: 2642: 2641: 2637: 2619: 2618: 2614: 2605:Wayback Machine 2596: 2592: 2584: 2571: 2570: 2566: 2559: 2546: 2545: 2534: 2524: 2522: 2513: 2512: 2508: 2498: 2496: 2491:. 22 May 2014. 2487: 2486: 2482: 2466: 2464: 2449: 2448: 2444: 2435: 2433: 2426: 2411: 2410: 2406: 2396: 2394: 2385: 2384: 2380: 2361: 2360: 2353: 2336: 2294: 2293: 2289: 2261: 2260: 2256: 2247: 2245: 2226: 2225: 2218: 2209: 2207: 2194: 2193: 2186: 2176: 2175: 2171: 2162: 2160: 2147: 2146: 2142: 2132: 2130: 2110: 2109: 2105: 2096: 2094: 2085: 2084: 2080: 2071: 2069: 2056: 2055: 2046: 2029: 2028: 2021: 2014: 2001: 2000: 1991: 1978: 1970:Unix philosophy 1936: 1931: 1929: 1926: 1895:Wayback Machine 1871: 1865:Wayback Machine 1836: 1831: 1752: 1745: 1742: 1733: 1726:Barnsley's fern 1722: 1713: 1707: 1698: 1692: 1683: 1677: 1650:Adobe Photoshop 1557:systems, text, 1507:artistic medium 1495: 1493:interactive art 1489:algorithmic art 1481: 1444:hackers or the 1434:Lego Mindstorms 1422:circuit bending 1342: 1336: 1308: 1306:Ethical Hacking 1288:reality hackers 1280:reality hackers 1233:Eric S. Raymond 1177:Edsger Dijkstra 1131:Eric S. Raymond 1053: 1019: 942:You can create 901: 895: 750:Eric S. Raymond 672: 635: 548: 545:Security hacker 541: 530: 501: 500: 470: 462: 461: 414: 404: 403: 384: 374: 373: 299: 289: 288: 274: 264: 263: 234: 224: 223: 204: 194: 193: 179:Security BSides 154: 144: 143: 89: 75: 74: 70:List of hackers 50: 28: 23: 22: 15: 12: 11: 5: 3472: 3470: 3462: 3461: 3456: 3451: 3449:Do it yourself 3446: 3441: 3436: 3434:Hacker culture 3426: 3425: 3422: 3421: 3408: 3398: 3388: 3381: 3380:External links 3378: 3377: 3376: 3361: 3346: 3332: 3326: 3308: 3302: 3284: 3278: 3256: 3250: 3232: 3226: 3216:. Boston, MA: 3204: 3198: 3172: 3166: 3148: 3142: 3120: 3114: 3106:O'Reilly Media 3098:(2004-05-18). 3092: 3086: 3068: 3062: 3044: 3038: 3030:Addison-Wesley 3008: 3002: 2967: 2964: 2962: 2961: 2947:. 2000-07-25. 2932: 2920: 2873: 2848: 2823: 2793: 2764: 2730: 2710: 2670: 2635: 2632:on 1997-06-07. 2612: 2590: 2582: 2564: 2557: 2532: 2506: 2480: 2476: 2442: 2424: 2404: 2378: 2375:on 2011-08-05. 2351: 2287: 2254: 2216: 2198:(2008-01-08). 2184: 2181:" (Interview). 2169: 2140: 2103: 2078: 2044: 2041:on 2021-03-07. 2019: 2012: 1988: 1977: 1974: 1973: 1972: 1967: 1962: 1957: 1952: 1942: 1941: 1925: 1922: 1921: 1920: 1914: 1904: 1898: 1885: 1879: 1878:, Jul 5, 1999. 1855: 1849: 1846:Switch|Journal 1843: 1835: 1832: 1830: 1829: 1824: 1819: 1814: 1812:Maker movement 1809: 1804: 1802:Generative art 1799: 1794: 1789: 1784: 1782:Electronic art 1779: 1774: 1769: 1767:Computer music 1764: 1759: 1753: 1751: 1748: 1747: 1746: 1743: 1736: 1734: 1723: 1716: 1714: 1708: 1701: 1699: 1693: 1686: 1684: 1678: 1671: 1661:mathematicians 1618:microprocessor 1614:circuit boards 1513:may work with 1501:by hacking on 1480: 1479:Hacker artists 1477: 1338:Main article: 1335: 1332: 1307: 1304: 1197:Dennis Ritchie 1185:Linus Torvalds 1124:Project Athena 1052: 1049: 1018: 1015: 992:barcode reader 957:Linus Torvalds 951: 950: 947: 940: 937: 930: 897:Main article: 894: 891: 851:Linus Torvalds 835:Dennis Ritchie 734: 733: 730: 727: 724: 718: 715: 712: 709: 671: 668: 634: 631: 552:hacker culture 538:Hacker Culture 532: 531: 529: 528: 521: 514: 506: 503: 502: 499: 498: 491: 488:Nuts and Volts 484: 479: 471: 468: 467: 464: 463: 460: 459: 450: 444: 438: 435:Legion of Doom 432: 426: 421: 415: 410: 409: 406: 405: 402: 401: 396: 391: 385: 380: 379: 376: 375: 372: 371: 366: 361: 356: 351: 346: 341: 336: 331: 326: 321: 316: 311: 306: 300: 295: 294: 291: 290: 287: 286: 281: 275: 272:Practice sites 270: 269: 266: 265: 262: 261: 256: 251: 246: 241: 235: 230: 229: 226: 225: 222: 221: 216: 211: 205: 202:Computer crime 200: 199: 196: 195: 192: 191: 186: 181: 176: 171: 166: 161: 155: 150: 149: 146: 145: 142: 141: 140: 139: 134: 129: 118: 113: 108: 103: 96: 90: 83:Hacker culture 81: 80: 77: 76: 73: 72: 67: 62: 60:Cryptovirology 57: 51: 46: 45: 42: 41: 35: 34: 26: 24: 14: 13: 10: 9: 6: 4: 3: 2: 3471: 3460: 3457: 3455: 3452: 3450: 3447: 3445: 3442: 3440: 3437: 3435: 3432: 3431: 3429: 3420: 3416: 3412: 3409: 3406: 3402: 3399: 3396: 3392: 3389: 3387: 3384: 3383: 3379: 3374: 3373:9781782795551 3370: 3366: 3362: 3359: 3355: 3351: 3347: 3344: 3340: 3337: 3333: 3329: 3327:9780385249461 3323: 3319: 3318: 3313: 3309: 3305: 3303:9781565927247 3299: 3295: 3294: 3289: 3285: 3281: 3279:9780385191951 3275: 3271: 3267: 3266: 3261: 3257: 3253: 3251:9780201038019 3247: 3243: 3242: 3237: 3236:Knuth, Donald 3233: 3229: 3227:9780316491709 3223: 3219: 3215: 3214: 3209: 3208:Kidder, Tracy 3205: 3201: 3199:9780131103702 3195: 3191: 3190:Prentice Hall 3187: 3186: 3181: 3177: 3173: 3169: 3167:9780931137075 3163: 3159: 3158: 3153: 3149: 3145: 3143:9780465026852 3139: 3135: 3131: 3130: 3125: 3121: 3117: 3115:9780596006624 3111: 3107: 3103: 3102: 3097: 3093: 3089: 3087:9780201006506 3083: 3079: 3078: 3073: 3069: 3065: 3063:9780201137910 3059: 3055: 3054: 3049: 3045: 3041: 3039:9780201100884 3035: 3031: 3027: 3026: 3021: 3017: 3013: 3009: 3005: 3003:9780070004849 2999: 2995: 2991: 2990: 2985: 2981: 2977: 2976: 2975: 2973: 2965: 2950: 2946: 2942: 2936: 2933: 2929: 2924: 2921: 2916: 2904: 2889: 2885: 2884: 2877: 2874: 2862: 2858: 2852: 2849: 2837: 2833: 2827: 2824: 2812: 2808: 2804: 2797: 2794: 2782: 2778: 2774: 2768: 2765: 2752: 2748: 2744: 2740: 2734: 2731: 2727: 2723: 2720: 2714: 2711: 2695: 2691: 2684: 2680: 2674: 2671: 2658: 2654: 2650: 2646: 2639: 2636: 2631: 2627: 2623: 2616: 2613: 2610: 2606: 2602: 2599: 2594: 2591: 2585: 2583:0-436-20550-5 2579: 2575: 2568: 2565: 2560: 2558:0-385-19195-2 2554: 2550: 2543: 2541: 2539: 2537: 2533: 2520: 2516: 2510: 2507: 2494: 2490: 2484: 2481: 2477: 2474: 2462: 2458: 2457: 2452: 2446: 2443: 2431: 2427: 2421: 2417: 2416: 2408: 2405: 2392: 2388: 2382: 2379: 2374: 2370: 2369: 2364: 2358: 2356: 2352: 2347: 2341: 2333: 2329: 2325: 2321: 2316: 2311: 2307: 2303: 2299: 2291: 2288: 2283: 2280: 2275: 2270: 2266: 2265: 2258: 2255: 2243: 2239: 2238: 2233: 2229: 2228:Raymond, Eric 2223: 2221: 2217: 2205: 2201: 2197: 2196:Raymond, Eric 2191: 2189: 2185: 2180: 2173: 2170: 2158: 2154: 2153:hacks.mit.edu 2150: 2144: 2141: 2128: 2124: 2120: 2116: 2113: 2107: 2104: 2093:on 2006-05-03 2092: 2088: 2082: 2079: 2067: 2063: 2059: 2053: 2051: 2049: 2045: 2040: 2036: 2032: 2026: 2024: 2020: 2015: 2009: 2005: 1998: 1996: 1994: 1990: 1987: 1986: 1984: 1975: 1971: 1968: 1966: 1965:Maker culture 1963: 1961: 1958: 1956: 1953: 1951: 1947: 1946:Cowboy coding 1944: 1943: 1939: 1928: 1923: 1918: 1915: 1912: 1908: 1905: 1902: 1899: 1896: 1892: 1889: 1886: 1883: 1880: 1875: 1870: 1866: 1862: 1859: 1856: 1853: 1850: 1847: 1844: 1841: 1838: 1837: 1833: 1828: 1825: 1823: 1820: 1818: 1815: 1813: 1810: 1808: 1805: 1803: 1800: 1798: 1795: 1793: 1790: 1788: 1785: 1783: 1780: 1778: 1775: 1773: 1770: 1768: 1765: 1763: 1760: 1758: 1755: 1754: 1749: 1740: 1735: 1732: 1728: 1727: 1720: 1715: 1711: 1705: 1700: 1696: 1690: 1685: 1681: 1675: 1670: 1668: 1666: 1662: 1657: 1655: 1651: 1645: 1643: 1636: 1633: 1629: 1625: 1623: 1619: 1615: 1611: 1607: 1603: 1597: 1595: 1591: 1585: 1581: 1579: 1572: 1570: 1566: 1564: 1560: 1556: 1552: 1548: 1544: 1540: 1536: 1532: 1528: 1524: 1520: 1516: 1512: 1508: 1504: 1500: 1494: 1490: 1486: 1478: 1476: 1474: 1470: 1466: 1462: 1458: 1453: 1451: 1447: 1443: 1439: 1435: 1431: 1427: 1423: 1419: 1415: 1411: 1407: 1404:, electronic 1403: 1399: 1391: 1387: 1382: 1378: 1376: 1372: 1368: 1364: 1358: 1356: 1355:amateur radio 1352: 1348: 1341: 1333: 1331: 1327: 1323: 1319: 1315: 1312: 1305: 1303: 1301: 1297: 1296:media hackers 1293: 1289: 1285: 1281: 1275: 1273: 1267: 1265: 1261: 1257: 1252: 1250: 1246: 1242: 1238: 1234: 1230: 1226: 1222: 1218: 1214: 1210: 1206: 1202: 1198: 1194: 1190: 1186: 1182: 1178: 1174: 1169: 1167: 1163: 1162:free software 1159: 1155: 1151: 1147: 1142: 1140: 1136: 1135:minicomputers 1132: 1129:According to 1127: 1125: 1121: 1116: 1113: 1110: 1105: 1102: 1096: 1094: 1088: 1086: 1085: 1080: 1076: 1072: 1068: 1064: 1063:free software 1059: 1058: 1050: 1048: 1046: 1042: 1038: 1034: 1033: 1028: 1024: 1016: 1014: 1012: 1008: 1004: 1000: 995: 993: 989: 988:optical mouse 985: 981: 975: 972: 970: 966: 962: 958: 954: 948: 945: 941: 938: 935: 931: 928: 927: 926: 924: 923: 918: 914: 910: 909:hacker ethics 906: 900: 892: 890: 889:development. 888: 884: 883:free software 880: 876: 872: 868: 862: 860: 856: 852: 848: 844: 840: 836: 832: 828: 824: 823: 818: 814: 813:GNU Manifesto 810: 804: 801: 797: 793: 789: 785: 781: 777: 773: 769: 765: 762: 758: 751: 747: 743: 738: 731: 728: 725: 723: 719: 716: 713: 710: 707: 706: 705: 703: 698: 696: 691: 686: 682: 680: 675: 669: 667: 665: 661: 657: 653: 652: 646: 644: 640: 632: 630: 628: 624: 618: 613: 611: 607: 605: 601: 597: 593: 589: 585: 584:pranks at MIT 581: 577: 573: 569: 565: 561: 557: 553: 546: 539: 527: 522: 520: 515: 513: 508: 507: 505: 504: 497: 496: 492: 490: 489: 485: 483: 480: 478: 477: 473: 472: 466: 465: 458: 454: 451: 448: 445: 442: 439: 436: 433: 430: 427: 425: 422: 420: 417: 416: 413: 408: 407: 400: 397: 395: 392: 390: 387: 386: 383: 378: 377: 370: 367: 365: 362: 360: 357: 355: 352: 350: 347: 345: 342: 340: 337: 335: 332: 330: 327: 325: 322: 320: 317: 315: 312: 310: 307: 305: 302: 301: 298: 293: 292: 285: 282: 280: 277: 276: 273: 268: 267: 260: 259:Vulnerability 257: 255: 252: 250: 247: 245: 242: 240: 237: 236: 233: 232:Hacking tools 228: 227: 220: 219:Script kiddie 217: 215: 212: 210: 207: 206: 203: 198: 197: 190: 187: 185: 182: 180: 177: 175: 172: 170: 167: 165: 162: 160: 157: 156: 153: 148: 147: 138: 135: 133: 130: 128: 125: 124: 123: 119: 117: 116:Maker culture 114: 112: 109: 107: 104: 102: 101: 97: 95: 92: 91: 88: 84: 79: 78: 71: 68: 66: 63: 61: 58: 56: 53: 52: 49: 44: 43: 40: 36: 32: 31: 19: 3419:Open Library 3394: 3364: 3349: 3335: 3316: 3312:Stoll, Cliff 3292: 3264: 3260:Levy, Steven 3240: 3212: 3184: 3156: 3128: 3100: 3096:Graham, Paul 3076: 3072:Brooks, Fred 3052: 3024: 2988: 2980:Abelson, Hal 2969: 2953:. Retrieved 2935: 2923: 2892:. Retrieved 2882: 2876: 2865:. Retrieved 2851: 2840:. Retrieved 2826: 2815:. Retrieved 2806: 2796: 2785:. Retrieved 2773:Graham, Paul 2767: 2755:. Retrieved 2751:the original 2746: 2733: 2713: 2701:. Retrieved 2689: 2673: 2661:. Retrieved 2638: 2630:the original 2625: 2615: 2593: 2573: 2567: 2548: 2523:. Retrieved 2509: 2499:20 September 2497:. Retrieved 2483: 2471: 2465:. Retrieved 2454: 2445: 2434:. Retrieved 2414: 2407: 2395:. Retrieved 2381: 2373:the original 2366: 2340:cite journal 2305: 2301: 2290: 2263: 2257: 2246:. Retrieved 2236: 2208:. Retrieved 2172: 2161:. Retrieved 2152: 2143: 2131:. Retrieved 2118: 2106: 2095:. Retrieved 2091:the original 2081: 2070:. Retrieved 2062:"On Hacking" 2039:the original 2034: 2003: 1980: 1979: 1848:Jun 14 1998. 1827:Software art 1807:Internet art 1762:Computer art 1724: 1709: 1694: 1679: 1658: 1647: 1638: 1626: 1599: 1587: 1583: 1574: 1567: 1496: 1469:jailbreaking 1454: 1450:Blu-ray Disc 1448:routines on 1395: 1359: 1343: 1328: 1324: 1320: 1316: 1309: 1276: 1268: 1253: 1193:Ken Thompson 1181:Donald Knuth 1170: 1143: 1128: 1117: 1097: 1089: 1082: 1075:hacker ethic 1055: 1054: 1044: 1030: 1022: 1021:While using 1020: 996: 986:or using an 976: 973: 964: 961:Linux kernel 955: 952: 920: 902: 899:Hacker ethic 863: 843:Ken Thompson 831:Donald Knuth 820: 817:Eric Raymond 805: 800:common slang 754: 699: 692: 688: 684: 676: 673: 654:to refer to 649: 647: 636: 620: 615: 608: 571: 551: 549: 493: 486: 474: 469:Publications 314:Trojan horse 279:HackThisSite 271: 98: 82: 3439:Subcultures 3134:Basic Books 2972:Jargon File 2911:|work= 2757:6 September 2609:Jargon File 2397:20 November 2368:Jargon File 2237:Jargon File 2133:29 December 1983:Jargon File 1911:Sha Xin Wei 1872: [ 1858:Linux Today 1822:Robotic art 1792:Electronica 1772:Digital art 1628:Don Hopkins 1602:Mark Lottor 1553:, reactive 1551:mathematics 1547:simulations 1485:Fractal art 1347:MITS Altair 1272:Jargon file 1245:Jargon File 1217:GNU project 1079:Steven Levy 1067:open source 1051:Programming 1037:palindromic 915:and at the 809:Jargon File 639:Jargon File 594:(TMRC) and 580:programming 482:Hacker News 369:Infostealer 152:Conferences 106:Hackerspace 3428:Categories 3395:Appendix A 3358:1781685835 3343:0316213527 2992:. London: 2955:2011-07-01 2894:2008-10-18 2867:2013-11-30 2842:2013-11-30 2817:2008-10-18 2787:2015-09-06 2703:25 January 2467:2017-08-29 2436:2018-12-17 2248:2008-03-02 2210:2008-03-16 2163:2018-05-07 2097:2012-12-27 2072:2008-03-16 2013:0742542335 1976:References 1852:Eye Weekly 1608:, and the 1563:literature 1529:and other 1503:technology 1483:See also: 1418:Casio SK-1 1371:demo scene 1311:CSO Online 999:creativity 855:Larry Wall 633:Definition 627:exploiting 556:subculture 339:Logic bomb 334:Ransomware 111:Hacktivism 3270:Doubleday 2994:MIT Press 2945:Thing.net 2913:ignored ( 2903:cite book 2649:Newsgroup 2525:31 August 2332:252096635 2324:2158-2440 2302:SAGE Open 1955:Demoscene 1817:Media art 1777:Demoscene 1535:animation 1523:sculpture 1438:Microsoft 1071:demoscene 969:Max Weber 881:based on 796:community 702:networked 457:Blue team 449:(defunct) 443:(defunct) 437:(defunct) 431:(defunct) 419:Anonymous 359:Web shell 209:Crimeware 189:Summercon 137:White hat 127:Black hat 120:Types of 94:Hackathon 55:Phreaking 3290:(1999). 3262:(1984). 3238:(1968). 3210:(1981). 3154:(1987). 3126:(1979). 3074:(1975). 3050:(1983). 3022:(1986). 2986:(1984). 2949:Archived 2888:Archived 2861:Archived 2836:Archived 2811:Archived 2781:Archived 2775:(2004). 2722:Archived 2694:Archived 2657:Archived 2653:net.misc 2601:Archived 2519:Archived 2493:Archived 2461:Archived 2430:Archived 2391:Archived 2242:Archived 2232:"hacker" 2204:Archived 2157:Archived 2127:Archived 2066:Archived 2060:(2002). 1924:See also 1891:Archived 1861:Archived 1665:fractals 1624:lights. 1606:Cubatron 1594:semiotic 1578:freeware 1543:software 1515:graphics 1432:for its 1175:such as 1093:The 414s 839:Alan Kay 827:Bill Joy 780:Internet 764:campuses 757:academic 695:crackers 623:crackers 590:(MIT)'s 566:(mostly 453:Red team 309:Backdoor 184:ShmooCon 132:Grey hat 3454:Hobbies 2663:28 July 2651::  2607:in the 2119:GNU.org 2035:gnu.org 1695:Sunrise 1680:Bubbles 1590:culture 1555:sensory 1511:artists 1473:iPhones 1461:Palm OS 1457:program 1390:"bends" 1375:modding 1292:wetware 1260:kludges 1191:), and 1146:ARPANET 761:college 670:History 572:hacking 441:LulzSec 329:Spyware 304:Rootkit 297:Malware 249:Payload 239:Exploit 169:DEF CON 122:hackers 48:History 3371:  3356:  3341:  3324:  3300:  3276:  3248:  3224:  3196:  3164:  3140:  3112:  3084:  3060:  3036:  3020:Ullman 3000:  2883:hacker 2728:(2000) 2580:  2555:  2422:  2330:  2322:  2010:  1559:poetry 1505:as an 1491:, and 1414:techno 1410:CueCat 1231:, and 1150:PDP-10 1095:case. 1045:hacker 1023:hacker 875:TCP/IP 857:, and 784:PDP-10 770:, the 766:. The 742:Glider 651:hacker 576:hacker 495:Phrack 412:Groups 344:Botnet 284:Zone-H 3393:(see 3016:Sethi 2697:(PDF) 2686:(PDF) 2328:S2CID 1876:] 1539:video 1531:audio 1527:music 1225:Emacs 1189:Linux 1112:PDP-1 1032:4′33″ 604:R2-D2 554:is a 319:Virus 87:ethic 3369:ISBN 3354:ISBN 3339:ISBN 3322:ISBN 3298:ISBN 3274:ISBN 3246:ISBN 3222:ISBN 3194:ISBN 3162:ISBN 3138:ISBN 3110:ISBN 3082:ISBN 3058:ISBN 3034:ISBN 2998:ISBN 2970:The 2915:help 2759:2015 2705:2016 2665:2016 2578:ISBN 2553:ISBN 2527:2011 2501:2016 2420:ISBN 2399:2023 2346:link 2320:ISSN 2282:1392 2135:2012 2008:ISBN 1654:GIMP 1642:Life 1442:Xbox 1430:Lego 1300:math 1264:hack 1256:code 1203:and 1201:Unix 1195:and 1179:and 1164:and 1158:Unix 1069:and 1017:Uses 932:All 885:and 873:and 871:Unix 794:and 774:and 740:The 722:fork 637:The 550:The 354:HIDS 324:Worm 85:and 3417:at 3012:Aho 2310:doi 2279:RFC 2269:doi 1750:Art 1652:or 1622:LED 1499:art 1471:of 1446:DRM 1386:DIY 1282:or 1274:). 1251:). 1154:ITS 1137:in 1109:DEC 1101:MIT 1081:'s 990:as 944:art 913:MIT 819:'s 788:ITS 748:by 562:or 364:RCE 3430:: 3413:: 3403:: 3272:. 3220:. 3192:. 3178:; 3136:. 3108:. 3032:. 3018:; 3014:; 2996:. 2982:; 2943:. 2907:: 2905:}} 2901:{{ 2886:. 2805:. 2779:. 2745:. 2688:. 2655:. 2647:. 2624:. 2535:^ 2517:. 2470:. 2459:. 2453:. 2428:. 2365:. 2354:^ 2342:}} 2338:{{ 2326:. 2318:. 2306:12 2304:. 2300:. 2277:. 2234:. 2219:^ 2187:^ 2155:. 2151:. 2125:. 2121:. 2117:. 2064:. 2047:^ 2033:. 2022:^ 1992:^ 1874:pl 1656:. 1561:, 1549:, 1545:, 1541:, 1537:, 1533:, 1525:, 1521:, 1517:, 1487:, 1475:. 1400:, 1384:A 1377:. 1365:, 1290:, 1168:. 1065:, 994:. 971:. 861:. 853:, 849:, 845:, 841:, 837:, 833:, 829:, 606:. 455:/ 3397:) 3375:. 3360:. 3345:. 3330:. 3306:. 3282:. 3254:. 3230:. 3202:. 3170:. 3146:. 3118:. 3090:. 3066:. 3042:. 3006:. 2958:. 2917:) 2897:. 2870:. 2845:. 2820:. 2790:. 2761:. 2707:. 2667:. 2588:. 2586:. 2561:. 2529:. 2503:. 2439:. 2401:. 2348:) 2334:. 2312:: 2284:. 2271:: 2251:. 2213:. 2166:. 2137:. 2100:. 2075:. 2016:. 1580:. 1199:( 1187:( 936:. 547:. 540:. 525:e 518:t 511:v 20:)

Index

Hacker (academia)
Computer hacking
History
Phreaking
Cryptovirology
Hacking of consumer electronics
List of hackers
Hacker culture
ethic
Hackathon
Hacker Manifesto
Hackerspace
Hacktivism
Maker culture
hackers
Black hat
Grey hat
White hat
Conferences
Black Hat Briefings
Chaos Communication Congress
DEF CON
Hackers on Planet Earth
Security BSides
ShmooCon
Summercon
Computer crime
Crimeware
List of computer criminals
Script kiddie

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑