Katana VentraIP

Hacker culture

The hacker culture is a subculture of individuals who enjoy—often in collective effort—the intellectual challenge of creatively overcoming the limitations of software systems or electronic hardware (mostly digital electronics), to achieve novel and clever outcomes.[1] The act of engaging in activities (such as programming or other media[2]) in a spirit of playfulness and exploration is termed hacking. However, the defining characteristic of a hacker is not the activities performed themselves (e.g. programming), but how it is done[3] and whether it is exciting and meaningful.[2] Activities of playful cleverness can be said to have "hack value" and therefore the term "hacks" came about,[3] with early examples including pranks at MIT done by students to demonstrate their technical aptitude and cleverness. The hacker culture originally emerged in academia in the 1960s around the Massachusetts Institute of Technology (MIT)'s Tech Model Railroad Club (TMRC)[4] and MIT Artificial Intelligence Laboratory.[5] Hacking originally involved entering restricted areas in a clever way without causing any major damage. Some famous hacks at the Massachusetts Institute of Technology were placing of a campus police cruiser on the roof of the Great Dome and converting the Great Dome into R2-D2.[6]

For the book, see Hacker Culture.

Richard Stallman explains about hackers who program:


Hackers from this subculture tend to emphatically differentiate themselves from what they pejoratively call "crackers"; those who are generally referred to by media and members of the general public using the term "hacker", and whose primary focus‍—‌be it to malign or for malevolent purposes‍—‌lies in exploiting weaknesses in computer security.[8]

Katana VentraIP

$_$_$DEEZ_NUTS#0__titleDEEZ_NUTS$_$_$

$_$_$DEEZ_NUTS#0__subtitleDEEZ_NUTS$_$_$

$_$_$DEEZ_NUTS#0__call_to_action.textDEEZ_NUTS$_$_$

Definition

The Jargon File, an influential but not universally accepted compendium of hacker slang, defines hacker as "A person who enjoys exploring the details of programmable systems and stretching their capabilities, as opposed to most users, who prefer to learn only the minimum necessary."[9] The Request for Comments (RFC) 1392, the Internet Users' Glossary, amplifies this meaning as "A person who delights in having an intimate understanding of the internal workings of a system, computers and computer networks in particular."[10]


As documented in the Jargon File, these hackers are disappointed by the mass media and general public's usage of the word hacker to refer to security breakers, calling them "crackers" instead. This includes both "good" crackers ("white hat hackers"),[11] who use their computer security-related skills and knowledge to learn more about how systems and networks work and to help to discover and fix security holes, as well as those more "evil" crackers ("black hat hackers"), who use the same skills to author harmful software (such as viruses or trojans) and illegally infiltrate secure systems with the intention of doing harm to the system.[12] The programmer subculture of hackers, in contrast to the cracker community, generally sees computer security-related activities as contrary to the ideals of the original and true meaning of the hacker term, that instead related to playful cleverness.[12]

$_$_$DEEZ_NUTS#3__descriptionDEEZ_NUTS$_$_$

$_$_$DEEZ_NUTS#2__titleDEEZ_NUTS$_$_$

$_$_$DEEZ_NUTS#2__descriptionDEEZ_NUTS$_$_$

$_$_$DEEZ_NUTS#3__titleDEEZ_NUTS$_$_$

Creating software and sharing it with each other

Placing a high value on freedom of inquiry

Hostility to secrecy

Information-sharing as both an ideal and a practical strategy

Upholding the right to

fork

Emphasis on rationality

Distaste for authority

Playful cleverness, taking the serious humorously and humor seriously

Many of the values and tenets of the free and open source software movement stem from the hacker ethics that originated at MIT[17] and at the Homebrew Computer Club. The hacker ethics were chronicled by Steven Levy in Hackers: Heroes of the Computer Revolution[18] and in other texts in which Levy formulates and summarizes general hacker attitudes:


Hacker ethics are concerned primarily with sharing, openness, collaboration, and engaging in the hands-on imperative.[18]


Linus Torvalds, one of the leaders of the open source movement (known primarily for developing the Linux kernel), has noted in the book The Hacker Ethic[19] that these principles have evolved from the known Protestant ethics and incorporates the spirits of capitalism, as introduced in the early 20th century by Max Weber.


Hack value is the notion used by hackers to express that something is worth doing or is interesting.[20] This is something that hackers often feel intuitively about a problem or solution.


An aspect of hack value is performing feats for the sake of showing that they can be done, even if others think it is difficult. Using things in a unique way outside their intended purpose is often perceived as having hack value. Examples are using a dot matrix impact printer to produce musical notes, using a flatbed scanner to take ultra-high-resolution photographs or using an optical mouse as barcode reader.


A solution or feat has "hack value" if it is done in a way that has finesse, cleverness or brilliance, which makes creativity an essential part of the meaning. For example, picking a difficult lock has hack value; smashing it does not. As another example, proving Fermat's Last Theorem by linking together most of modern mathematics has hack value; solving a combinatorial problem by exhaustively trying all possibilities does not. Hacking is not using process of elimination to find a solution; it's the process of finding a clever solution to a problem.

$_$_$DEEZ_NUTS#7__descriptionDEEZ_NUTS$_$_$

$_$_$DEEZ_NUTS#7__heading--0DEEZ_NUTS$_$_$

$_$_$DEEZ_NUTS#7__description--0DEEZ_NUTS$_$_$

The word "hacker" derives from the Late Middle English words hackere, hakker, or hakkere - one who cuts wood, woodchopper, or woodcutter.[13]


Although the idea of "hacking", in the modern sense, existed long before the modern term "hacker"‍—‌with the most notable example of Lightning Ellsworth, it was not a word that the first programmers used to describe themselves. In fact, many of the first programmers were from engineering or physics backgrounds.


There was a growing awareness of a style of programming different from the cut and dried methods employed at first,[14][15] but it was not until the 1960s that the term "hackers" began to be used to describe proficient computer programmers. Therefore, the fundamental characteristic that links all who identify themselves as hackers is that each is someone who enjoys "…the intellectual challenge of creatively overcoming and circumventing limitations of programming systems and who tries to extend their capabilities" (47).[1] With this definition in mind, it can be clear where the negative implications of the word "hacker" and the subculture of "hackers" came from.


Some common nicknames among this culture include "crackers", who are considered to be unskilled thieves who mainly rely on luck, and "phreaks", which refers to skilled crackers and "warez d00dz" (crackers who acquire reproductions of copyrighted software). Hackers who are hired to test security are called "pentesters" or "tiger teams".


Before communications between computers and computer users were as networked as they are now, there were multiple independent and parallel hacker subcultures, often unaware or only partially aware of each other's existence. All of these had certain important traits in common:


These sorts of subcultures were commonly found at academic settings such as college campuses. The MIT Artificial Intelligence Laboratory, the University of California, Berkeley and Carnegie Mellon University were particularly well-known hotbeds of early hacker culture. They evolved in parallel, and largely unconsciously, until the Internet, where a legendary PDP-10 machine at MIT, called AI, that was running ITS, provided an early meeting point of the hacker community. This and other developments such as the rise of the free software movement and community drew together a critically large population and encouraged the spread of a conscious, common, and systematic ethos. Symptomatic of this evolution were an increasing adoption of common slang and a shared view of history, similar to the way in which other occupational groups have professionalized themselves, but without the formal credentialing process characteristic of most professional groups.


Over time, the academic hacker subculture has tended to become more conscious, more cohesive, and better organized. The most important consciousness-raising moments have included the composition of the first Jargon File in 1973, the promulgation of the GNU Manifesto in 1985, and the publication of Eric Raymond's The Cathedral and the Bazaar in 1997. Correlated with this has been the gradual recognition of a set of shared culture heroes, including: Bill Joy, Donald Knuth, Dennis Ritchie, Alan Kay, Ken Thompson, Richard M. Stallman, Linus Torvalds, Larry Wall, and Guido van Rossum.


The concentration of academic hacker subculture has paralleled and partly been driven by the commoditization of computer and networking technology, and has, in turn, accelerated that process. In 1975, hackerdom was scattered across several different families of operating systems and disparate networks; today it is largely a Unix and TCP/IP phenomenon, and is concentrated around various operating systems based on free software and open-source software development.

Access to computers-and anything that might teach you something about the way the world works-should be unlimited and total.

All .

information should be free

Hackers should be judged by their hacking, not bogus criteria such as degrees, age, race, or position.

You can create and beauty on a computer.

art

Computers can change your life for the better.

$_$_$DEEZ_NUTS#6__titleDEEZ_NUTS$_$_$

$_$_$DEEZ_NUTS#6__descriptionDEEZ_NUTS$_$_$

$_$_$DEEZ_NUTS#7__titleDEEZ_NUTS$_$_$

Bubbles was created using watercolors, then scanned into a computer. Colors were then manipulated using a software imaging tool.

Bubbles was created using watercolors, then scanned into a computer. Colors were then manipulated using a software imaging tool.

Sunrise was created using pen and ink, then scanned into a computer and colored with a software imaging tool.

Sunrise was created using pen and ink, then scanned into a computer and colored with a software imaging tool.

Rolling Golden Hills of California was created using pencil, scanned, and then painted with a software imaging tool.

Rolling Golden Hills of California was created using pencil, scanned, and then painted with a software imaging tool.

Barnsley's fern, a fractal fern computed using an iterated function system

Barnsley's fern, a fractal fern computed using an iterated function system

A fractal that models the surface of a mountain

A fractal that models the surface of a mountain

: software development without the use of strict software development methodologies

Cowboy coding

Demoscene

History of free software

Maker culture

Unix philosophy

(1983). The Unix System. Reading, MA: Addison-Wesley. ISBN 9780201137910.

Bourne, Stephen R.

(1975). The Mythical Man-Month. Reading, MA: Addison-Wesley. ISBN 9780201006506.

Brooks, Fred

(2004-05-18). Hackers & Painters. Sebastopol, CA: O'Reilly Media. ISBN 9780596006624.

Graham, Paul

(1979). Gödel, Escher, Bach. New York, NY: Basic Books. ISBN 9780465026852.

Hoftstadter, Douglas

(1987). The Tao of Programming. Santa Monica, CA: InfoBooks. ISBN 9780931137075.

James, Geoffrey

; Ritchie, Dennis (January 1988). The C Programming Language. Englewood Cliffs, NJ: Prentice Hall. ISBN 9780131103702.

Kernighan, Brian W.

(1968). The Art of Computer Programming. Reading, MA: Addison-Wesley. ISBN 9780201038019.

Knuth, Donald

(1984). Hackers: Heroes of the Computer Revolution. Garden City, NY: Anchor Press / Doubleday. ISBN 9780385191951.

Levy, Steven

(1999). The Cathedral and the Bazaar. Cambridge, MA: O'Reilly Media. ISBN 9781565927247.

Raymond, Eric S.

(September 1989). The Cuckoo's Egg. New York, NY: Doubleday. ISBN 9780385249461.

Stoll, Cliff

Olson, Parmy. (05-14-2013). We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency.  0316213527.

ISBN

Coleman, Gabriella. (Nov 4, 2014). Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous. Verso Books.  1781685835.

ISBN

Shantz, Jeff; Tomblin, Jordon (2014-11-28). Cyber Disobedience: Re://Presenting Online Anarchy. John Hunt Publishing.  9781782795551.

ISBN

$_$_$DEEZ_NUTS#8__titleDEEZ_NUTS$_$_$

$_$_$DEEZ_NUTS#8__subtextDEEZ_NUTS$_$_$

$_$_$DEEZ_NUTS#8__quote--0DEEZ_NUTS$_$_$

$_$_$DEEZ_NUTS#8__name--0DEEZ_NUTS$_$_$

$_$_$DEEZ_NUTS#8__company_or_position--0DEEZ_NUTS$_$_$

$_$_$DEEZ_NUTS#8__quote--1DEEZ_NUTS$_$_$

$_$_$DEEZ_NUTS#8__name--1DEEZ_NUTS$_$_$

$_$_$DEEZ_NUTS#8__company_or_position--1DEEZ_NUTS$_$_$

$_$_$DEEZ_NUTS#8__quote--2DEEZ_NUTS$_$_$

$_$_$DEEZ_NUTS#8__name--2DEEZ_NUTS$_$_$

$_$_$DEEZ_NUTS#8__company_or_position--2DEEZ_NUTS$_$_$

$_$_$DEEZ_NUTS#8__quote--3DEEZ_NUTS$_$_$

$_$_$DEEZ_NUTS#8__name--3DEEZ_NUTS$_$_$

$_$_$DEEZ_NUTS#8__company_or_position--3DEEZ_NUTS$_$_$

$_$_$DEEZ_NUTS#8__quote--4DEEZ_NUTS$_$_$

$_$_$DEEZ_NUTS#8__name--4DEEZ_NUTS$_$_$

$_$_$DEEZ_NUTS#8__company_or_position--4DEEZ_NUTS$_$_$

$_$_$DEEZ_NUTS#8__quote--5DEEZ_NUTS$_$_$

$_$_$DEEZ_NUTS#8__name--5DEEZ_NUTS$_$_$

$_$_$DEEZ_NUTS#8__company_or_position--5DEEZ_NUTS$_$_$

$_$_$DEEZ_NUTS#8__quote--6DEEZ_NUTS$_$_$

$_$_$DEEZ_NUTS#8__name--6DEEZ_NUTS$_$_$

$_$_$DEEZ_NUTS#8__company_or_position--6DEEZ_NUTS$_$_$

$_$_$DEEZ_NUTS#8__quote--7DEEZ_NUTS$_$_$

$_$_$DEEZ_NUTS#8__name--7DEEZ_NUTS$_$_$

$_$_$DEEZ_NUTS#8__company_or_position--7DEEZ_NUTS$_$_$

$_$_$DEEZ_NUTS#8__quote--8DEEZ_NUTS$_$_$

$_$_$DEEZ_NUTS#8__name--8DEEZ_NUTS$_$_$

$_$_$DEEZ_NUTS#8__company_or_position--8DEEZ_NUTS$_$_$

$_$_$DEEZ_NUTS#8__quote--9DEEZ_NUTS$_$_$

$_$_$DEEZ_NUTS#8__name--9DEEZ_NUTS$_$_$

$_$_$DEEZ_NUTS#8__company_or_position--9DEEZ_NUTS$_$_$

$_$_$DEEZ_NUTS#8__quote--10DEEZ_NUTS$_$_$

$_$_$DEEZ_NUTS#8__name--10DEEZ_NUTS$_$_$

$_$_$DEEZ_NUTS#8__company_or_position--10DEEZ_NUTS$_$_$

$_$_$DEEZ_NUTS#8__quote--11DEEZ_NUTS$_$_$

$_$_$DEEZ_NUTS#8__name--11DEEZ_NUTS$_$_$

$_$_$DEEZ_NUTS#8__company_or_position--11DEEZ_NUTS$_$_$

$_$_$DEEZ_NUTS#8__quote--12DEEZ_NUTS$_$_$

$_$_$DEEZ_NUTS#8__name--12DEEZ_NUTS$_$_$

$_$_$DEEZ_NUTS#8__company_or_position--12DEEZ_NUTS$_$_$

$_$_$DEEZ_NUTS#8__quote--13DEEZ_NUTS$_$_$

$_$_$DEEZ_NUTS#8__name--13DEEZ_NUTS$_$_$

$_$_$DEEZ_NUTS#8__company_or_position--13DEEZ_NUTS$_$_$

$_$_$DEEZ_NUTS#8__quote--14DEEZ_NUTS$_$_$

$_$_$DEEZ_NUTS#8__name--14DEEZ_NUTS$_$_$

$_$_$DEEZ_NUTS#8__company_or_position--14DEEZ_NUTS$_$_$

$_$_$DEEZ_NUTS#5__titleDEEZ_NUTS$_$_$

$_$_$DEEZ_NUTS#5__subtextDEEZ_NUTS$_$_$

$_$_$DEEZ_NUTS#5__quote--0DEEZ_NUTS$_$_$

$_$_$DEEZ_NUTS#5__name--0DEEZ_NUTS$_$_$

$_$_$DEEZ_NUTS#5__company_or_position--0DEEZ_NUTS$_$_$

$_$_$DEEZ_NUTS#5__quote--1DEEZ_NUTS$_$_$

$_$_$DEEZ_NUTS#5__name--1DEEZ_NUTS$_$_$

$_$_$DEEZ_NUTS#5__company_or_position--1DEEZ_NUTS$_$_$

$_$_$DEEZ_NUTS#5__quote--2DEEZ_NUTS$_$_$

$_$_$DEEZ_NUTS#5__name--2DEEZ_NUTS$_$_$

$_$_$DEEZ_NUTS#5__company_or_position--2DEEZ_NUTS$_$_$

$_$_$DEEZ_NUTS#5__quote--3DEEZ_NUTS$_$_$

$_$_$DEEZ_NUTS#5__name--3DEEZ_NUTS$_$_$

$_$_$DEEZ_NUTS#5__company_or_position--3DEEZ_NUTS$_$_$

$_$_$DEEZ_NUTS#4__titleDEEZ_NUTS$_$_$

$_$_$DEEZ_NUTS#4__subtextDEEZ_NUTS$_$_$

$_$_$DEEZ_NUTS#4__quote--0DEEZ_NUTS$_$_$

$_$_$DEEZ_NUTS#4__name--0DEEZ_NUTS$_$_$

$_$_$DEEZ_NUTS#4__company_or_position--0DEEZ_NUTS$_$_$

$_$_$DEEZ_NUTS#4__quote--1DEEZ_NUTS$_$_$

$_$_$DEEZ_NUTS#4__name--1DEEZ_NUTS$_$_$

$_$_$DEEZ_NUTS#4__company_or_position--1DEEZ_NUTS$_$_$

$_$_$DEEZ_NUTS#4__quote--2DEEZ_NUTS$_$_$

$_$_$DEEZ_NUTS#4__name--2DEEZ_NUTS$_$_$

$_$_$DEEZ_NUTS#4__company_or_position--2DEEZ_NUTS$_$_$

$_$_$DEEZ_NUTS#9__titleDEEZ_NUTS$_$_$

$_$_$DEEZ_NUTS#9__subtextDEEZ_NUTS$_$_$

$_$_$DEEZ_NUTS#9__quote--0DEEZ_NUTS$_$_$

$_$_$DEEZ_NUTS#9__name--0DEEZ_NUTS$_$_$

$_$_$DEEZ_NUTS#9__company_or_position--0DEEZ_NUTS$_$_$

The Jargon File has had a role in acculturating hackers since its origins in 1975. These academic and literary works helped shape the academic hacker subculture:

$_$_$DEEZ_NUTS#1__titleDEEZ_NUTS$_$_$

$_$_$DEEZ_NUTS#1__subtextDEEZ_NUTS$_$_$

$_$_$DEEZ_NUTS#1__answer--0DEEZ_NUTS$_$_$

$_$_$DEEZ_NUTS#1__answer--1DEEZ_NUTS$_$_$

$_$_$DEEZ_NUTS#1__answer--2DEEZ_NUTS$_$_$

$_$_$DEEZ_NUTS#1__answer--3DEEZ_NUTS$_$_$

$_$_$DEEZ_NUTS#1__answer--4DEEZ_NUTS$_$_$

$_$_$DEEZ_NUTS#1__answer--5DEEZ_NUTS$_$_$

$_$_$DEEZ_NUTS#1__answer--6DEEZ_NUTS$_$_$

$_$_$DEEZ_NUTS#1__answer--7DEEZ_NUTS$_$_$

$_$_$DEEZ_NUTS#1__answer--8DEEZ_NUTS$_$_$

$_$_$DEEZ_NUTS#1__answer--9DEEZ_NUTS$_$_$

A Brief History of Hackerdom

(see Appendix A)

Hack, Hackers, and Hacking

: The Anthropology of Hackers The Atlantic, 2010.

Gabriella Coleman