| 
  • If you are citizen of an European Union member nation, you may not use this service unless you are at least 16 years old.

  • You already know Dokkio is an AI-powered assistant to organize & manage your digital files & messages. Very soon, Dokkio will support Outlook as well as One Drive. Check it out today!

View
 

_all_about_hackers_en

Page history last edited by paolo_del_bene 8 years, 8 months ago

IETF 87 Berlin, Germany July 28 August 2013

 

IETF 87 Berlin, Germany July 28 August 2013

GNU Hackers Meeting 2013 22-25 August -- Paris, France 

Tech Model Railroad Club, (TMRC) Hackers

Reference info related to TMRC

Steven Levy

 

Hackers

Richard D. Greenblatt

Ralph William Gosper

Lee Felsenstein

John D. Harris                      

Richard Matthew Stallman  (Developer of GNU/GCC; GNU/GDB; GNU/EMACS; GNU/MAKE;

                                             Founder of GNU'S Not Unix Project; Free Software Foundation)

Linus Benedict Torvalds      (Developer of linux kernel, based on GNU'S Not Unix Project's

                                             Richard Matthew Stallman)

 

Authors of Books

Richard Matthew Stallman  

Steven Levy                          

Manuel Castells                    

Michael Bruce Sterling  

Lawrence Lessig                   (Director of the Edmond J. Safra Center for Ethics at Harvard      

                                              University and was a Professor of Law at Stanford Law School)

Linus Benedict  Torvalds         

Pekka Himanen                    (Philosopher, researcher, counselor....)

Wark McKenzie                     (Professor of Media and Cultural Studies)

Clifford Stoll                          (American astronomer and author)

 

Organization

IETF                                      (Internet Engineering Task Force)

 

User Glossary

Internet User Glossary

 

terms

hacker

cracker

 

IETF 87 - Berlin, Germany July 28 August, 2013

 

http://www.ietf.org/meeting/87/index.html

 

IETF 87 - Berlin, Germany

 

July 28 - August,  2013

 

Meeting Venue:
InterContinental Berlin
Budapester Str. 2
10787 Berlin, Germany
Tel: +49 30 26020

 

 

IETF Meetings start Monday morning and run through Friday afternoon (13:30), with late scheduling changes.

 

Newcomers training and technical tutorials take place the previous Sunday afternoon.

 

Participants should plan their travel accordingly.

 

Please note that new information is being added to this page continually; please check back here for the most up-to-date information about IETF 87.

 

GNU Hackers Meeting 2013 22-25 August -- Paris, France

 

http://www.gnu.org

 

 

 

Tech Model Railroad Club, (TMRC) Hackers

 

http://tmrc.mit.edu/hackers-ref.html

 

We at TMRC use the term "hacker" only in its original meaning, someone who applies ingenuity to create a clever result, called a "hack".

The essence of a "hack" is that it is done quickly, and is usually inelegant.

It accomplishes the desired goal without changing the design of the system it is embedded in.

Despite often being at odds with the design of the larger system, a hack is generally quite clever and effective.

This original benevolent meaning stands in stark contrast to the later and more commonly used meaning of a "hacker", typically as a person who breaks into computer networks in order to steal or vandalize.

Here at TMRC, where the words "hack" and "hacker" originated and have been used proudly since the late 1950s, we resent the misapplication of the word to mean the committing of illegal acts.

People who do those things are better described by expressions such as "thieves", "password crackers". or "computer vandals".

 

They are certainly not true hackers, as they do not understand the hacker ethic.


Also see the definition of "hacker" in the on-line version of the New Hacker's Dictionary.

 

Reference info related to TMRC

 

This section lists books and other major publications that reference TMRC.

 

The Tech Model Railroad Club is featured as the first chapter of Hackers, by Steven Levy (New York: Anchor Press/Doubleday, 1984).

 

It is credited as one (possibly the primary) source of the Hacker Culture the book describes.

 

Several entries in The New Hacker's Dictionary, (Second Edition, edited by Eric S. Raymond (MIT Press, 1993); ISBN 0-262-68079-3) are derived from Abridged Dictionary of the TMRC Language.

 

There is also an online version of the book's content.

 

The cover article in Railroad Model Craftsman, July 1986 was a preview of the club for the 1986 NMRA convention held in Boston. A converted copy of the text we submitted is available online.

 

Tech Model Railroad Club of MIT

MIT Room N52-118
265 Massachusetts Avenue
Cambridge, MA 02139

 

+1 617 253-3269
x3-3269 (on campus)
Email: tmrc-web@mit.edu

Generated Thu 04 Jul 2013 06:26:49 PM EDT
in 0.0 secs

Steven Levy

Steven Levy is an American journalist who has written several books on computers, technology, cryptography, the Internet, cybersecurity, and privacy.

 

In 1984, he wrote a book called Hackers: Heroes of the Computer Revolution, in which he described a "hacker ethic", which became a guideline to understanding how computers have advanced into the machines that we know and use today.

 

He identified this Hacker Ethic to consist of key points such as that all information is free, and that this information should be used to "change life for the better".

 

Steven Levy received his bachelor's degree from Temple University and earned a Master's degree in literature from Pennsylvania State University.[2]

 

I  was first drawn to writing about hackers those computer programmers and designers who regard computing as the most important thing in the world because they were such fascinating people.

 

Though some in the field used the term “hacker” as a form of derision, implying that hackers were either nerdy social outcasts or “unprofessional” programmers who wrote dirty, “nonstandard” computer code, i found them quite different.


Beneath their often unimposing exteriors, they were adventurers, visionaries, risk-takers, artists . . . and the ones who most clearly saw why the computer was a truly revolutionary tool.

 

Among themselves, they knew how far one could go by immersion into the deep concentration of the hacking mind-set: one could go infinitely far.

 

I came to understand why true hackers consider the term an appellation of honor rather than a pejorative.

 

As i talked to these digital explorers, ranging from those who tamed multimillion-dollar machines in the 1950s to contemporary young wizards who mastered computers in their suburban bedrooms, i found a common element, a common philosophy that seemed tied to the elegantly flowing logic of the computer itself.

 

It was a philosophy of sharing, openness, decentralization, and getting your hands on machines at any cost to improve the machines and to improve the world.

 

This Hacker Ethic is their gift to us: something with value even to those of us with no interest at all

in computers.

It is an ethic seldom codified but embodied instead in the behavior of hackers themselves.

 

I would like to introduce you to these people who not only saw, but lived the magic in the computer

and worked to liberate the magic so it could benefit us all.

 

These people include the true hackers of the MIT artificial intelligence lab in the fifties and sixsties;

 

 

the populist, less sequestered hardware hackers in California in the seventies; and the young game hackers who made their mark in the personal computer of the eighties.

 

This is in no way a formal history of the computer era, or of the particular arenas i focus upon.

 

Indeed, many of the people you will meet here are not the most famous names (certainly not the
most wealthy) in the annals of computing.

 

Instead, these are the backroom geniuses who understood the machine at its most profound levels and presented us with a new kind of lifestyle and a new kind of hero.

 

Hackers like

Richard D Greenblatt

                                                                                       

Richard D. Greenblatt is an American computer programmer. Along with Ralph William Gosper, he may be considered to have founded the hacker community,[1] and holds a place of distinction in the Lisp and the MIT AI Lab communities.

 

Richard D Greenblatt enrolled in MIT in the fall of 1962, and around his second term as an undergraduate student, he found his way to MIT's famous Tech Model Railroad Club.

 

At that time, Peter Samson had written a program in Fortran for the IBM 709 series machines, to automate the tedious business of writing the intricate timetables for the Railroad Club's vast model train layout.

 

Richard D Greenblatt felt compelled to implement a Fortran compiler for the PDP-1, which did not have one at the time.

 

There was no computer time available to debug the compiler, or even to type it into the computer.

 

Years later, elements of this compiler (combined with some ideas from fellow TMRC member Steven Piner, the author of a very early PDP-4 Fortran compiler while working for Digital Equipment Corporation) were typed in and "showed signs of life".

 

However, the perceived need for a Fortran compiler had evaporated by then, so the compiler was not pursued further.

 

This and other experiences at TMRC, especially the influence of Alan Kotok, who worked at DEC and was the junior partner of the design team for the PDP-6 computer, led Greenblatt to the AI Lab, where he proceeded to become a "hacker's hacker" noted for his programming acumen as described in Steven Levy's Hackers: Heroes of the Computer Revolution, and as acknowledged by Gerald Jay Sussman and Harold Abelson when they said they were fortunate to have been apprentice programmers at the feet of Ralph William Gosper and Richard Greenblatt [3]

 

Indeed, he spent so much time programming the PDP machines there he failed out of MIT as a first-term junior and had to take a job at the Charles Adams Associates firm until the AI Lab hired him about 6 months later.

 

Ralph William Gosper

Ralph William Gosper, Jr.  is an American mathematician and programmer from Pennsauken Township, New Jersey.[1] Along with Richard Greenblatt, he may be considered to have founded the hacker community, and he holds a place of pride in the Lisp community.

 

In high school, Ralp William Gosper was interested in model rockets until one of his friends was injured in a rocketry accident and contracted a fatal brain infection.[2]

 

Ralph William Gosper enrolled in MIT in 1961, and he received his bachelor's degree in mathematics from MIT in 1965 despite becoming disaffected from the mathematics department because of their anti-computer attitude.[2]

 

In his second year at MIT, Ralph William Gosper took a programming course from John McCarthy and became affiliated with the MIT AI Lab.

 

In 1974, he moved to Stanford University, where he worked with Donald Knuth.[2]

 

Eventually he also worked for Xerox PARC, Macsyma and others.

 

His contributions to computational mathematics include HAKMEM and the MIT Maclisp system.

 

He made major contributions to the Macsyma, Project MAC's computer algebra system.

 

Ralph William Gosper later worked with Symbolics and Macsyma, Inc. on commercial versions of Macsyma.

 

Lee Felsenstein

                                                                                       

Lee Felsenstein is an American computer engineer who played a central role in the development of the personal computer.

 

He was one of the original members of the Homebrew Computer Club and the designer of the Osborne 1, the first mass-produced portable computer.

 

Before the Osborne, Felsenstein designed the Intel 8080 based "SOL"[1] computer from Processor Technology, the PennyWhistle[2][3]modem, and other early "S-100 bus" era designs.

 

His shared-memory alphanumeric video display design, the Processor Technology VDM-1 video display module board, was widely copied and became the basis for the standard display architecture of personal computers.

 

Many of his designs were leaders in reducing costs of computer technologies for the purpose of making them available to large markets.

 

His work featured a concern for the social impact of technology and was influenced by the philosophy of Ivan Illich.

 

Lee Felsenstein was the engineer for the Community Memory project, one of the earliest attempts to place networked computer terminals in public places to facilitate social interactions among individuals, in the era before the commercial Internet.

 

As a young man, Lee Felsenstein was a New Left radical.

 

From October through December 1964, he was a participant in the Free Speech Movement and was one of 768 arrestees in the climactic "Sproul Hall Sit-In" of December 2–3, 1964.

 

He also wrote for the Berkeley Barb, one of the leading underground newspapers.

 

Lee Felsenstein received a B.S. in Electrical Engineering and Computer Science from the University of California, Berkeley in 1972.

 

He had entered UC Berkeley first in 1963, joined the Co-operative Work-Study Program in Engineering in 1964 and dropped out at the end of 1967, working as a Junior Engineer at the Ampex Corporation from 1968 through 1971, when he re-enrolled at Berkeley.

 

Lee Felsenstein has been employed at Osborne Computer Corporation from 1981–1983, at Interval Research Corporation from 1992–2000, and at Pemstar Pacific Consultants from 2001 - 2005.

 

All other times he has worked either as a free-lance consulting designer or for his own design firm.

 

Many of his designs were leaders in reducing the costs of computer technologies for the purpose of making them available to large markets.

 

His work featured a concern for the social impact of technology.

 

The Community Memory project, begun as a project of Resource One, Inc. in 1972 and later incorporated in 1977 by Lee Felsenstein with Efrem Lipkin and Ken Colstad, was one of the earliest attempts to place networked computer terminals in such places as Berkeley supermarkets to attract casual use by persons from all walks of life passing through and facilitate social interactions among non-technical individuals, in the era before the Internet.

 

Lee Felsenstein was influenced in his philosophy by the works of Ivan Illich, particularly "Tools for Conviviality" (Harper and Row, 1973).

 

This book advocated a "convivial" approach to design which allowed users of technologies to learn about the technology by encouraging exploration, tinkering, and modification.

 

Lee Felsenstein had learned about electronics in much the same fashion, and summarized his conclusions in one of several aphorisms, to wit - "In order to survive in a public-access environment, a computer must grow a computer club around itself." Others were - "To change the rules, change the tools," and "If work is to become play, then tools must become toys."

 

Lee Felsenstein was one of the original members of the Homebrew Computer Club, which formed in 1975 in response to the appearance of the Altair 8800 computer kit.

 

With a handy yard stick, Lee Felsenstein "moderated" meetings at the SLAC Auditorium.

 

He was less a chair than a keeper of chaos.

 

In this heyday of the development of the first personal computers, Lee Felsenstein designed the Intel 8080 based "SOL"[1] computer from Processor Technology, the PennyWhistle modem,[2] and other early "S-100 bus" era designs.

 

These existed in a market space with early generation hobbyist microcomputers from Altair, IMSAI, Morrow Designs, Cromemco, and other vendors.

 

Lee Felsenstein's shared-memory alphanumeric video display design, the Processor Technology VDM-1 video display module board, was widely copied and became the basis for the standard display architecture of personal computers.

 

Lee Felsenstein was the designer of the Osborne 1, the first mass-produced portable computer.

 

In 1998, Lee Felsenstein founded the Free Speech Movement Archives as an online repository of historical information relating to that event, its antecedents and successors.

 

In 2003, while working with the Jhai Foundation of San Francisco, he designed an open-source telecommunications and computer system for installation in remote villages in the developing world.

 

This system was dubbed "the Pedal-Powered Internet" by The New York Times Magazine due to its reliance on pedal power generation.

 

Installation of the first system in Laos was unsuccessful, but the design has been tested on an Indian reservation in the US and continues in development in India. In 2003,

 

Lee Felsenstein was named a Laureate of The Tech Museum of Innovation (San Jose, California) for this work.

 

Lee Felsenstein has also been named a "Pioneer of the Electronic Frontier" in 1994 by the Electronic Frontier Foundation, and in 2007, he was named the "Editor's Choice" in the Awards for Creative Excellence made by EE Times magazine.

 

Lee Felsenstein is the Founding Sensei of the HackerDojo in Mountain View, California, and was featured on a Fox News segment in late 2009 covering the non-profit facility.[4]

 

and                                  

 

John D Harris

 

 

 

 

 

 

 

 

John D. Harris is a well-known computer programmer, hacker and author of some classic 1980s Atari computer games.

 

A lot of work carried out early in John's career is considered groundbreaking in the industry, even though his work largely consisted of taking existing games and rebuilding them for the Atari 800.

 

Hackers are the spirit and soul of computing itself.

 

I believe their story, their vision, their intimacy with the machine itself, their experiences inside their peculiar world, and their sometimes dramatic, sometimes absurd “interfaces” with the outside world
is the real story of the computer revolution.

 

 Richard Matthew Stallman

Richard Matthew Stallman often known by his initials, RMS,[1] is an American software freedom activist and computer programmer.

 

He campaigns for the freedom to use, study, distribute and modify software; software that ensures these freedoms is termed free software.

 

He is best known for launching the GNU Project, founding the Free Software Foundation, developing the GNU Compiler Collection and GNU Emacs, and writing the GNU General Public License.

 

Richard Matthew Stallman launched the GNU Project in September 1983 to create a Unix-like computer operating system composed entirely of free software.[2]

 

With this, he also launched the free software movement.

 

He has been the GNU project's lead architect and organizer, and developed a number of pieces of widely used GNU software including, among others, the GNU Compiler Collection,[3] the GNU Debugger[4] and the GNU Emacs text editor.[5] In October 1985[6] he founded the Free Software Foundation.

 

Richard Matthew Stallman pioneered the concept of copyleft, which uses the principles of copyright law to preserve the right to use, modify and distribute free software, and is the main author of free software licenses which describe those terms, most notably the GNU General Public License (GPL), the most widely used free software license.[7]

 

In 1989 he co-founded the League for Programming Freedom.

 

Since the mid-1990s, Richard Matthew Stallman has spent most of his time advocating for free software, as well as campaigning against software patents, digital rights management, and other legal and technical systems which he sees as taking away users' freedoms, including software license agreements, non-disclosure agreements, activation keys, dongles, copy restriction, proprietary formats and binary executables without source code.

 

He has received fourteen honorary doctorates and professorships for this work.

 

His first experience with computers was at the IBM New York Scientific Center when he was in high school.

 

He was hired for the summer to write a numerical analysis program in Fortran.

 

He completed the task after a couple of weeks and spent the rest of the summer writing a text editor in APL.[9]

 

Richard Matthew Stallman spent the summer after his high-school graduation writing another program, a preprocessor for the PL/I programming language on the IBM System/360.[8]

 

During this time, Richard Matthew Stallman was also a volunteer laboratory assistant in the biology department at Rockefeller University.

 

Although he was already moving toward a career in mathematics or physics, his teaching professor at Rockefeller thought he would have a future as a biologist.[10]

 

As a first-year student at Harvard University, Richard Matthew Stallman was known for his strong performance in Math 55.[11]

 

In 1971 he became a programmer at the MIT Artificial Intelligence Laboratory, and became a regular in the hacker community, where he was usually known by his initials, rms (which was the name of his computer accounts).[1]

 

Richard Matthew Stallman graduated from Harvard magna cum laude earning an AB in Physics in 1974.[12]

 

Richard Matthew Stallman enrolled as a graduate student at MIT, but then ended his pursuit of a doctorate in physics to focus on his programming at the MIT AI Laboratory.

 

While a graduate student at MIT, Richard Matthew Stallman published a paper with Gerald Jay Sussman on an AI truth maintenance system, called dependency-directed backtracking.[13]

 

This paper was an early work on the problem of intelligent backtracking in constraint satisfaction problems.

 

As of 2003, the technique Stallman and Sussman introduced is still the most general and powerful form of intelligent backtracking.[14]

 

The technique of constraint recording, wherein partial results of a search are recorded for later reuse, was also introduced in this paper.[14]

 

As a hacker in MIT's AI laboratory, Richard Matthhew Stallman worked on software projects such as TECO, Emacs, and the Lisp machine operating system.

 

He would become an ardent critic of restricted computer access in the lab, which at that time was funded primarily by the Defense Advanced Research Projects Agency.

 

When MIT's Laboratory for Computer Science (LCS) installed a password control system in 1977, Richard Matthew Stallman found a way to decrypt the passwords and sent users messages containing their decoded password, with a suggestion to change it to the empty string (that is, no password) instead, to re-enable anonymous access to the systems.

 

Around 20% of the users followed his advice at the time, although passwords ultimately prevailed. Richard Matthew Stallman boasted of the success of his campaign for many years afterward.[15]

 

"If am i a hacker ?

 

Yes i am, and i have been a hacker precisely since the 70s but you've probably been misinformed about the meaning of this word.

 

At MIT in 1970 to be a hacker meant to be someone who liked to plan intelligently who liked to solve problems such as create a shorter program of all existing ones to do a job, or create programs that do something for the sole purpose of entertaining or funny as they were printed Roman numerals.

 

This is something that was done by a hacker and had only importance to hackers because was not at all practical, and it was just for fun.

 

So if you know how to program in that way, you were considered a hacker.

Later i generalized and reinterpreted the term a little bit today and my definition of hacker is:

"Someone who likes to play in a smart way".

 

Book Bundle

 

GNU Press is proud to offer a special holiday sale on Free as in Freedom(2.0) faif-2.0.pdf and Free Software Free Society: Selected Essays of Richard Stallman (2nd Edition)fsfs-ii-2.pdf Get 10% off when you buy both books at the same time.

 

In 2002, Sam Williams wrote Free as in Freedom, a biography of Richard Matthew Stallman. In its epilogue, Williams expressed hope that choosing to distribute his book under the GNU Free Documentation License would enable and encourage others to share corrections and their own perspectives through modifications to his work.

 

Free as in Freedom (2.0) is Richard Matthew Stallman's revision of the original biography.

 

While preserving Williams's viewpoint, it includes factual corrections and extensive new commentary by Richard Matthew Stallman, as well as new prefaces by both authors written for the occasion.

 

It is a rare kind of biography, where the reader has the benefit of both the biographer's original words and the subject's response

 

From the foreword of Free Software Free Society: Selected Essays of Richard Stallman (2nd Edition):

 

This book collects the writing of Richard Stallman in a manner that will make its subtlety and power clear.

 

The essays span a wide range, from copyright to the history of the free software movement.

 

They include many arguments not well known, and among these, an especially insightful account of the changed circumstances that render copyright in the digital world suspect.

 

They will serve as a resource for those who seek to understand the thought of this most powerful man--powerful in his ideas, his passion, and his integrity, even if powerless in every other way.

 

They will inspire other who would take these ideas, and build upon them.

 

 

-- Lawrence Lessig

http://en.wikipedia.org/wiki/Lawrence_Lessig

 

Lawrence Lessig
Lawrence Lessig, is an American academic and political activist.  
He is a proponent of reduced legal restrictions on CopyRight, trademark, and radio frequency spectrum, particularly in technology applications, and he has called for state-based activism to promote substantive reform of government with a Second Constitutional Convention.[1]

 

He is director of the Edmond J. Safra Center for Ethics at Harvard University and the Roy L. Furman Professor of Law at Harvard Law School.

 

Previously, he was a professor of law at Stanford Law School and founder of the Center for Internet and Society.  

 

Lawrence Lessig is a founding board member of Creative Commons and the founder of Rootstrikers, and is on the board of MapLight.[2]

 

He is on the advisory boards of the Democracy Café,[3]Sunlight Foundation[4] and Americans Elect.[5]

 

He is a former board member of the Free Software Foundation, Software Freedom Law Center and the Electronic Frontier Foundation.[6]  http://ftp.gnu.org/video/fsf-2009-Lawrence_Lessig.ogv

 

Michael Bruce Sterling

 

 

 

 

 

 

 

Michael Bruce Sterling is an American science fiction author who is best known for his novels and his work on the Mirrorshades anthology.

 

This work helped to define the cyberpunk genre.[1]

 

"The term 'hacker' has an unfortunate history.

Even this book, Hackers Crackdown, has little to say on hacking has little to say in its most subtle and original.

The term can identify the free-wheeling intellectual exploration of the highest and deepest potential of computer systems, or the decision to make access to computers and information as free and open as possible.

It can involve the heartfelt conviction that the computers can find the beauty, the aesthetic end of a perfect program can liberate the mind and spirit.

This is the hacking as it was defined in an appreciated pioneering environmental history of computers written by Steven Levy Hackers and published in 1984.

 

Pekka Himanen

 

Pekka Himanen defines himself as a philosopher and a public intellectual. He studied philosophy (and computer science as a minor) at the University of Helsinki.

 

In 1994, with his thesis on the philosophy of religion, The challenge of Bertrand Russell, he received his Ph.D. in philosophy from the same university, thus becoming the youngest Ph.D. in Finland.

 

He has done research work in Finland (University of Helsinki), the United Kingdom, and the United States (Stanford University, University of California, Berkeley) and has done field work in India, China and Japan.

 

At UC Berkeley, Himanen directed the Berkeley Center for the Information Society, a research group under Berkeley's International Computer Science Institute.

 

The Center was active from September 2002 until 2005 [3].

 

Pekka Himanen has also been a counselor to the president of Finland, Finnish government (including the Ministry of Education) and Finnish parliament, in the field of information society.[citation needed]

 

He has been a Visiting Professor at the Oxford Internet Institute (based at Oxford University) from September 2005 to July 2006.

 

In The Hacker Ethic and the Spirit of the Information AgeThe_Hacker_Ethic_and_the_Spirit_of_the_Information_Age.pdf Pekka Himanen

is trying to understand the core of informationalism, the post-industrialist paradigm, extending the ideas of Manuel Castells Information Age.[citation needed]

 

Manuel Castells 

 

As an alternative to the industrial-capitalist protestant work ethic he proposes a hacker ethic as something like a cyber communitarianism.

 

The structure of the information society is a web, which in contemporary business world manifests itself, for instance, in dynamic outsourcing and even cooperation with one's competitors.

 

Author of different books, one of more important is: Manuel Castells: "The Internet Galaxy Reflections on the Internet, Business and Society" Manuel Castells: "The Internet Galaxy Reflections on the Internet, Business and Society".pdf

 

The "knots" of such a web get activated according to the needs and opportunities.

 

According to Pekka Himanen,

 

the three main features of hacker ethic are:

  • enthusiastic, passionate attitude to the work that is enjoyed
  • creativity, wish to realise oneself and one's ability, often in teams that are formed spontaneously (project orientation)
  • wish to share one's skills with a community having common goals, along with the need to acquire recognition from one's "tribe"; one is motivated by inner zeal rather than external awards: the fruits of one's work are donated to everybody for their advances and further developments

 

According to Pekka Himanen the social hackerism begins from such things as vegetarianism, whereas the opposite of it is represented by Microsoft and the licensing of computer programs. [citation needed

 

Pekka Himanen  thinks that in the information society we need a radical lack of prejudice, such as he has met in philosophy lessons to children.[citation needed]

 

A critical challenge of the Internet era is the ability to meet the other human being.

 

Wark McKenzie

 

Wark McKenzie is a writer and scholar.

 

He works mainly on media theory, critical theory and new media.

 

His best known works are A Hacker Manifesto and Gamer Theory.

 

 

He is currently Professor of Media and Cultural Studies at The New School in New York City.

 

In 2004 Wark McKenzie published his best known work, A Hacker Manifesto.

 

Here Wark McKenzie argues that the rise of intellectual property creates a new class division, between those who produce it, who he calls the hacker class, and those who come to own it, the vectoralist class.

 

Wark McKenzie argues that these vectoralists have imposed the concept of property on all physical fields (thus having scarcity), but now the new vectoralists lay claim to intellectual property, a field that is not bound by scarcity.[2]

 

By the concept of intellectual property these vectoralists attempt to institute an imposed scarcity in an immaterial field.

 

Wark McKenzie argues that the vectoral class cannot control the intellectual (property) world but only it in its commodified form, they only control the information in the objectified form but not its overall application or use.[3]

     

 

[093] Hacker history hacks out of  appearances, and returns to the productive classes, their own experience of the containment of their free productive energy in successive property forms.

 

From the direct subjection to an individual owner that is slavery, to the patchwork of local lordships and spiritualized subjection that is feudalism, to the abstract and universalizing private property of the commodified economy, in every era hitherto, a ruling class extracts a surplus from the free capacity of the productive classes.

 

Hacker history not only represents to the productive classes what they have lost, it expresses what they may yet gain—the return of their own productive capacity in and for itself.

 

A_Hacker_Manifesto.pdf

 

 

Clifford Stoll

Is an American astronomer and author.

 

He is best known for his pursuit of hacker Markus Hess in 1986 and the subsequent 1989 book,

The Cuckoo's Egg, which details his investigation.

 

Clifford Stoll received his Ph.D. from University of Arizona in 1980.

 

In 1986 Clifford Stoll investigated hacker Markus Hess while employed as a systems administrator at the Lawrence Berkeley National Laboratory.

 

After identifying the intrusion he set up a honeypot for Markus Hess, eventually tracking him down and passing details to the authorities. It is recognized as one of the first examples of digital forensics.

 

At the time, gaining cooperation from law enforcement was a challenge due to the relatively new nature of the crime.[2]

 

He described the events of his investigation in The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage, and the paper "Stalking the Wily Hacker".[3]

 

Clifford Stoll's book was later chronicled in an episode of WGBH's NOVA titled "The KGB, the Computer, and Me", which aired on PBS stations in 1990.[4]

 

Clifford Stoll (1989). The Cuckoo's Egg . New York: Doubleday. ISBN 0-370-31433-6.

 

"The KGB, the Computer, and Me" full Nova episode on Youtube http://ur1.ca/fkc65

 

Are Computer Hacker Breaks-ins Ethical ?

 

Linus Benedict Torvalds

 

 

Linus Benedict Torvalds is a Finnish American[2][4]software engineer, who was the principal force behind the development of the Linux kernel.

 

He later became the chief architect of the Linux kernel, and now acts as the project's coordinator.

 

He was honored, along with Shinya Yamanaka, with the 2012 Millennium Technology Prize by the Technology Academy Finland "in recognition of his creation of a new open source operating system for computers leading to the widely used linux kernel".[5]

 

Linus Benedict Torvalds attended the University of Helsinki between 1988 and 1996, graduating with a master's degree in computer science from NODES research group.[8]

 

His academic career was interrupted after his first year of study when he joined the Finnish Army, selecting the 11-month officer training program to fulfill the mandatory military service of Finland.

 

In the army he held the rank of second lieutenant, with the role of a ballistic calculation officer.[9]

 

In 1990, he resumed his university studies, and was exposed to UNIX for the first time, in the form of a DEC MicroVAX running ULTRIX.[10] His M.Sc. thesis was titled Linux: A Portable Operating System.[11]

 

He programmed an assembly language and a text editor for the Sinclair QL, as well as a few games.[13][14]

On January 5, 1991[15] he purchased an Intel 80386-based IBM PC[16] before receiving his MINIX copy, which in turn enabled him to begin work on linux.[7][17]

 

Linus Benedict Torvalds

"In computer jargon, the hacker is a very skilled programmer."

 

According the IETF.ORG 

 

http://tools.ietf.org/html/rfc1392


                                                                                               Network Working Group G. Malkin
                                                                                                     Request for Comments: 1392
                                                                                                     Xylogics, Inc.
                                                                                                     FYI: 18
                                                                                                     T. LaQuey Parker
                                                                                                     UTexas
                                                                                                     Editors
                                                                                                      January 1993


                                                      Internet Users' Glossary

 

User Glossary Working Group                                      [Page 20]
RFC 1392                                  Internet Glossary        January 1993

hacker

A person who delights in having an intimate understanding of the internal workings of a system, computers and computer networks in particular.
 
According the IETF.ORG 

 

http://tools.ietf.org/html/rfc1392

 

                                                                                                Network Working Group G. Malkin
                                                                                                      Request for Comments: 1392
                                                                                                      Xylogics, Inc.
                                                                                                      FYI: 18
                                                                                                      T. LaQuey Parker
                                                                                                      UTexas
                                                                                                      Editors
                                                                                                       January 1993


                                                     Internet Users' Glossary

 



User Glossary Working Group                                      [Page 11]

RFC 1392                                 Internet Glossary         January 1993

http://tools.ietf.org/html/rfc1392

 

cracker
cracker is an individual who attempts to access computer systems without authorization.

These individuals are often malicious, as opposed to hackers, and have many means at their disposal

for breaking into a system.

 

Updated: Saturday 21 March 2015 at: 02:14:30 a.m.

 

Please,   you allow the improvement of the websites on a new hosting.

 

 

Comments (0)

You don't have permission to comment on this page.