1266:" derives from the everyday English sense "to cut or shape by or as if by crude or ruthless strokes" and is even used among users of the positive sense of "hacker" who produces "cool" or "neat" hacks. In other words, to "hack" at an original creation, as if with an axe, is to force-fit it into being usable for a task not intended by the original creator, and a "hacker" would be someone who does this habitually. (The original creator and the hacker may be the same person.) This usage is common in both programming, engineering and building. In programming, hacking in this sense appears to be tolerated and seen as a necessary compromise in many situations. Some argue that it should not be, due to this negative meaning; others argue that some kludges can, for all their ugliness and imperfection, still have "hack value".
1270:
capable of doing modifications that allow a system to work in the short term, and so has some sort of marketable skills. However, there is always the understanding that a more skillful or technical logician could have produced successful modifications that would not be considered a "hack-job". The definition is similar to other, non-computer based uses of the term "hack-job". For instance, a professional modification of a production sports car into a racing machine would not be considered a hack-job, but a cobbled together backyard mechanic's result could be. Even though the outcome of a race of the two machines could not be assumed, a quick inspection would instantly reveal the difference in the level of professionalism of the designers. The adjective associated with hacker is "hackish" (see the
1932:
1326:
shift challenges the stereotypical perception of hackers as criminals, allowing for greater emphasis on their positive contributions to cybersecurity. Ethical hacking has drastically changed the public perception of hackers. Rather than viewing persons with hacker skills as perpetrators of cybercrime, they can be viewed as part of the solution in fighting against cybercrime. The ethical hacker with knowledge and expertise stands as guardian to the digital assets, working beforehand alongside organizations to build up a more secure online landscape.
1739:
1689:
1719:
1674:
1704:
666:"), who use the same skills to author harmful software (such as viruses or trojans) and illegally infiltrate secure systems with the intention of doing harm to the system. The programmer subculture of hackers, in contrast to the cracker community, generally sees computer security-related activities as contrary to the ideals of the original and true meaning of the hacker term, that instead related to playful cleverness.
1286:(exploring undocumented or unauthorized areas in buildings). One specific example is clever pranks traditionally perpetrated by MIT students, with the perpetrator being called hacker. For example, when MIT students surreptitiously put a fake police car atop the dome on MIT's Building 10, that was a hack in this sense, and the students involved were therefore hackers. Other types of hacking are
1424:: connecting wires to different leads of the integrated circuit chips. The results of these DIY experiments range from opening up previously inaccessible features that were part of the chip design to producing the strange, dis-harmonic digital tones that became part of the techno music style. Companies take different attitudes towards such practices, ranging from open acceptance (such as
737:
1381:
690:
identify themselves as hackers is that each is someone who enjoys "…the intellectual challenge of creatively overcoming and circumventing limitations of programming systems and who tries to extend their capabilities" (47). With this definition in mind, it can be clear where the negative implications of the word "hacker" and the subculture of "hackers" came from.
1269:
In non-software engineering, the culture is less tolerant of unmaintainable solutions, even when intended to be temporary, and describing someone as a "hacker" might imply that they lack professionalism. In this sense, the term has no real positive connotations, except for the idea that the hacker is
1325:
Furthermore, the act of ethical hacking also molds the larger hacker culture. Hacking skills, traditionally associated with breaking the law, have changed dramatically with the emergence of ethical hacking. Ethical hacking helped legitimize hacking skills which can now be talked about publicly. This
1106:
Dictionary defined hack in 1959 (not yet in a computer context) as "1) an article or project without constructive end; 2) a project undertaken on bad self-advice; 3) an entropy booster; 4) to produce, or attempt to produce, a hack(3)", and "hacker" was defined as "one who hacks, or makes them". Much
1090:
The programmer subculture of hackers disassociates from the mass media's pejorative use of the word 'hacker' referring to computer security, and usually prefer the term 'cracker' for that meaning. Complaints about supposed mainstream misuse started as early as 1983, when media used "hacker" to refer
1329:
Ethical hacking is not only a proactive defense for organizations but also brings about the desired cultural revolution within the realm of the hacking fraternity. Ethical hacking, on its part through focusing on the constructive application of hacking skills, has become an integral activity in the
1114:
and applied its local model railroad slang in this computing context. Initially incomprehensible to outsiders, the slang also became popular in MIT's computing environments beyond the club. Other examples of jargon imported from the club are 'losing' ("when a piece of equipment is not working") and
616:
What they had in common was mainly love of excellence and programming. They wanted to make their programs that they used be as good as they could. They also wanted to make them do neat things. They wanted to be able to do something in a more exciting way than anyone believed possible and show "Look
1575:
Technology and art are inextricably related. Many musicians, video artists, graphic artists, and even poets who work with technology—whether designing it or using it—consider themselves to be part of the 'hacker community.' Computer artists, like non-art hackers, often find themselves on society's
1321:
Cyber-attacks can have significant financial implications for a company. In such cases, the organizations could have been saved from these gigantic financial losses by identifying and fixing the vulnerabilities discovered by an ethical hacker. Moreover, for smaller organizations, the impact can be
1639:
Cellular automata are simple rules that are applied to a grid of cells, or the pixel values of an image. The same rule is applied to every cell, to determine its next state, based on the previous state of that cell and its neighboring cells. There are many interesting cellular automata rules, and
1317:
Ethical hacking is the process of software engines running real-world cyber threats to assess the survivability of a company's digital structure. Ethical hackers play the role of cyber attackers by executing assessments, penetration tests, and modeling tactics, techniques, and procedures used by
1313:
defined ethical hacking as going into devices and computer systems belonging to an organization, with its explicit permissions, to assess and test the efficacy of the organization's cybersecurity defenses. Generally, organizations engage the services of ethical hackers either through third-party
1098:
In the programmer subculture of hackers, a computer hacker is a person who enjoys designing software and building programs with a sense for aesthetics and playful cleverness. The term hack in this sense can be traced back to "describe the elaborate college pranks that...students would regularly
1277:
In a very universal sense, hacker also means someone who makes things work beyond perceived limits in a clever way in general, without necessarily referring to computers, especially at MIT. That is, people who apply the creative attitude of software hackers in fields other than computing. This
689:
There was a growing awareness of a style of programming different from the cut and dried methods employed at first, but it was not until the 1960s that the term "hackers" began to be used to describe proficient computer programmers. Therefore, the fundamental characteristic that links all who
1077:, based on the idea that writing software and sharing the result on a voluntary basis is a good idea, and that information should be free, but that it's not up to the hacker to make it free by breaking into private computer systems. This hacker ethic was publicized and perhaps originated in
1060:
in 1984 defined "hackers" as "computer nuts". In their programmer subculture, a hacker is a person who follows a spirit of playful cleverness and loves programming. It is found in an originally academic movement unrelated to computer security and most visibly associated with
641:, an influential but not universally accepted compendium of hacker slang, defines hacker as "A person who enjoys exploring the details of programmable systems and stretching their capabilities, as opposed to most users, who prefer to learn only the minimum necessary." The
864:
The concentration of academic hacker subculture has paralleled and partly been driven by the commoditization of computer and networking technology, and has, in turn, accelerated that process. In 1975, hackerdom was scattered across several different families of
977:
An aspect of hack value is performing feats for the sake of showing that they can be done, even if others think it is difficult. Using things in a unique way outside their intended purpose is often perceived as having hack value. Examples are using a
2472:
During the time one of these machines read a card, it could execute a sequence of up to forty-eight steps. More complex sequences-within-sequences were also possible. One computer scientist later noted that this method of programming demanded
1314:
cybersecurity firms or under contract. Their main job is to identify and fix security gaps before threat-actors find them and exploit them. This proactive approach to cybersecurity testing leads to significant cost savings for organizations.
685:"But from about 1945 onward (and especially during the creation of the first ENIAC computer) some programmers realized that their expertise in computer software and technology had evolved not just into a profession, but into a passion" (46).
1344:
In yet another context, a hacker is a computer hobbyist who pushes the limits of software or hardware. The home computer hacking subculture relates to the hobbyist home computing of the late 1970s, beginning with the availability of
1360:
A large overlaps between hobbyist hackers and the programmer subculture hackers existed during the
Homebrew Club's days, but the interests and values of both communities somewhat diverged. Today, the hobbyists focus on commercial
1099:
devise" (Levy, 1984 p. 10). To be considered a 'hack' was an honor among like-minded peers as "to qualify as a hack, the feat must be imbued with innovation, style and technical virtuosity" (Levy, 1984 p. 10) The
1634:
computer program, generates objects which randomly bump into each other and in turn create more objects and designs, similar to a lava lamp, except that the parts change color and form through interaction. Hopkins Says:
2295:
Okpa, John
Thompson; Ugwuoke, Christopher Uchechukwu; Ajah, Benjamin Okorie; Eshioste, Emmanuel; Igbe, Joseph Egidi; Ajor, Ogar James; Okoi, Ofem, Nnana; Eteng, Mary Juachi; Nnamani, Rebecca Ginikanwa (2022-09-05).
1318:
threat-actors. This careful examination provides an organization with the identification of weaknesses in its security systems, enabling the organization to employ necessary measures towards fortifying its defense.
645:(RFC) 1392, the Internet Users' Glossary, amplifies this meaning as "A person who delights in having an intimate understanding of the internal workings of a system, computers and computer networks in particular."
1576:
fringes, developing strange, innovative uses of existing technology. There is an empathetic relationship between those, for example, who design experimental music software and hackers who write communications
1467:), a "hack" refers to an extension of the operating system which provides additional functionality. Term also refers to those people who cheat on video games using special software. This can also refer to the
806:
Over time, the academic hacker subculture has tended to become more conscious, more cohesive, and better organized. The most important consciousness-raising moments have included the composition of the first
802:
and a shared view of history, similar to the way in which other occupational groups have professionalized themselves, but without the formal credentialing process characteristic of most professional groups.
582:), but how it is done and whether it is exciting and meaningful. Activities of playful cleverness can be said to have "hack value" and therefore the term "hacks" came about, with early examples including
662:"), who use their computer security-related skills and knowledge to learn more about how systems and networks work and to help to discover and fix security holes, as well as those more "evil" crackers ("
704:
as they are now, there were multiple independent and parallel hacker subcultures, often unaware or only partially aware of each other's existence. All of these had certain important traits in common:
1126:
workstations to prospective members because they wanted residents who were interested in people, not computers, with one fraternity member stating that "We were worried about the hacker subculture".
625:"; those who are generally referred to by media and members of the general public using the term "hacker", and whose primary focus‍—‌be it to malign or for malevolent purposes‍—‌lies in
1673:
1025:
to refer to someone who enjoys playful cleverness is most often applied to computer programmers, it is sometimes used for people who apply the same attitude to other fields. For example,
974:
Hack value is the notion used by hackers to express that something is worth doing or is interesting. This is something that hackers often feel intuitively about a problem or solution.
1703:
1144:
Hackers were influenced by and absorbed many ideas of key technological developments and the people associated with them. Most notable is the technical culture of the pioneers of the
1688:
1839:
1254:
Within the computer programmer subculture of hackers, the term hacker is also used for a programmer who reaches a goal by employing a series of modifications to extend existing
798:
drew together a critically large population and encouraged the spread of a conscious, common, and systematic ethos. Symptomatic of this evolution were an increasing adoption of
1459:
that (sometimes illegally) modifies another program, often a video game, giving the user access to features otherwise inaccessible to them. As an example of this use, for
2460:
693:
Some common nicknames among this culture include "crackers", who are considered to be unskilled thieves who mainly rely on luck, and "phreaks", which refers to skilled
570:), to achieve novel and clever outcomes. The act of engaging in activities (such as programming or other media) in a spirit of playfulness and exploration is termed
2429:
697:
and "warez d00dz" (crackers who acquire reproductions of copyrighted software). Hackers who are hired to test security are called "pentesters" or "tiger teams".
681:, it was not a word that the first programmers used to describe themselves. In fact, many of the first programmers were from engineering or physics backgrounds.
1262:
to accomplish programming tasks that are quick, but ugly, inelegant, difficult to extend, hard to maintain and inefficient. This derogatory form of the noun "
1916:
1609:
1171:
Many programmers have been labeled "great hackers", but the specifics of who that label applies to is a matter of opinion. Certainly major contributors to
967:
that these principles have evolved from the known
Protestant ethics and incorporates the spirits of capitalism, as introduced in the early 20th century by
1718:
1412:
for a notorious example) to expose or add functionality to a device that was unintended for use by end users by the company who created it. A number of
599:
583:
1845:
2987:
243:
1860:
2345:
586:
done by students to demonstrate their technical aptitude and cleverness. The hacker culture originally emerged in academia in the 1960s around the
2974:
has had a role in acculturating hackers since its origins in 1975. These academic and literary works helped shape the academic hacker subculture:
1851:
1396:
Electronics hobbyists working on machines other than computers also fall into this category. This includes people who do simple modifications to
1156:
operating system and connected to the ARPANET, provided an early hacker meeting point. After 1980 the subculture coalesced with the culture of
1119:
17:
2721:
1648:
Some hacker artists create art by writing computer code, and others, by developing hardware. Some create with existing software tools such as
1906:
1601:
1310:
3023:
1890:
677:
Although the idea of "hacking", in the modern sense, existed long before the modern term "hacker"‍—‌with the most notable example of
2927:
2656:
674:
The word "hacker" derives from the Late Middle
English words hackere, hakker, or hakkere - one who cuts wood, woodchopper, or woodcutter.
1667:, which hackers have further enhanced, often producing detailed and intricate graphics and animations from simple mathematical formulas.
3263:
1605:
1083:
921:
558:
of individuals who enjoy—often in collective effort—the intellectual challenge of creatively overcoming the limitations of
523:
2948:
1013:
does not. Hacking is not using process of elimination to find a solution; it's the process of finding a clever solution to a problem.
1596:
structures towards a different end, to get inside cultural systems on the net and make them do things they were never intended to do.
2156:
1738:
2126:
2693:
2810:
2621:
2600:
2518:
2450:
1357:
enthusiasts. The amateur radio slang referred to creatively tinkering to improve performance as "hacking" already in the 1950s.
3390:
2241:
1881:
767:
595:
2860:
2475:
the kind of detailed design of parallel subsequencing that one sees nowadays at the microprogramming level of some computers.
2423:
2178:
1373:). Also of interest to some members of this group is the modification of computer hardware and other electronic devices, see
1100:
778:
were particularly well-known hotbeds of early hacker culture. They evolved in parallel, and largely unconsciously, until the
587:
353:
3404:
2362:
929:
Access to computers-and anything that might teach you something about the way the world works-should be unlimited and total.
3458:
1937:
1900:
2390:
2065:
2030:
648:
As documented in the Jargon File, these hackers are disappointed by the mass media and general public's usage of the word
2492:
2203:
2742:
1682:
was created using watercolors, then scanned into a computer. Colors were then manipulated using a software imaging tool.
1949:
1192:
1133:, the Open Source and Free Software hacker subculture developed in the 1960s among 'academic hackers' working on early
842:
771:
47:
1211:. People primarily known for their contributions to the consciousness of the programmer subculture of hackers include
953:
Hacker ethics are concerned primarily with sharing, openness, collaboration, and engaging in the hands-on imperative.
598:. Hacking originally involved entering restricted areas in a clever way without causing any major damage. Some famous
3372:
3325:
3301:
3277:
3249:
3225:
3197:
3165:
3141:
3113:
3095:
3085:
3061:
3037:
3001:
2772:
2581:
2556:
1796:
1659:
The creative process of hacker artists can be more abstract than artists using non-technological media. For example,
799:
2298:"Cyberspace, Black-Hat Hacking and Economic Sustainability of Corporate Organizations in Cross-River State, Nigeria"
997:
A solution or feat has "hack value" if it is done in a way that has finesse, cleverness or brilliance, which makes
2086:
3239:
1339:
1153:
787:
64:
3443:
3357:
3342:
2780:
2011:
1653:
790:, provided an early meeting point of the hacker community. This and other developments such as the rise of the
516:
3414:
1108:
904:
825:
in 1997. Correlated with this has been the gradual recognition of a set of shared culture heroes, including:
621:
Hackers from this subculture tend to emphatically differentiate themselves from whom they pejoratively call "
456:
253:
136:
126:
3291:
1240:
821:
163:
151:
1330:
collective effort towards fortification of cybersecurity and redefining hackers' image in the public eye.
1857:
1047:
was used in a similar sense among radio amateurs in the 1950s, predating the software hacking community.
721:
626:
602:
were placing of a campus police cruiser on the roof of the Great Dome and converting the Great Dome into
238:
1644:' is a widely known cellular automata rule, but many other lesser known rules are much more interesting.
3183:
2718:
933:
775:
694:
655:
475:
213:
1302:
hack, that is, a clever solution to a mathematical problem. All of these uses have spread beyond MIT.
939:
Hackers should be judged by their hacking, not bogus criteria such as degrees, age, race, or position.
3385:
3217:
3211:
1697:
was created using pen and ink, then scanned into a computer and colored with a software imaging tool.
1445:
741:
509:
258:
2914:
2887:
2835:
2122:
1959:
1730:
1641:
1220:
1204:
1107:
of TMRC's jargon was later imported into early computing culture, because the club started using a
1103:
1006:
591:
434:
393:
363:
313:
2928:
Singing
Together, Hacking Together, Plundering Together: Sonic Intellectual Property in Cybertimes
1630:
is a software hacker artist well known for his artistic cellular automata. This art, created by a
1009:
by linking together most of modern mathematics has hack value; solving a combinatorial problem by
3448:
3433:
3336:
We Are
Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency.
3151:
1263:
1228:
795:
173:
2644:
1887:
3155:
3075:
1350:
1236:
1161:
916:
791:
428:
3127:
3269:
3099:
2339:
2413:
2114:
3438:
2940:
2278:
1786:
1756:
1165:
1040:
886:
642:
579:
446:
388:
308:
8:
3315:
2455:
2148:
2111:
1873:
1397:
1208:
567:
563:
423:
248:
158:
3175:
3123:
2983:
2902:
2682:
2327:
1725:
1401:
1248:
1010:
979:
2802:
2629:
1897:
Joel Ryan describes collaboration with hacker artists of
Silicon Valley. 21 March 2002
1509:. This has extended the definition of the term and what it means to be a hacker. Such
3410:
3400:
3368:
3353:
3338:
3321:
3297:
3273:
3245:
3221:
3193:
3161:
3137:
3109:
3105:
3081:
3057:
3047:
3033:
3019:
2997:
2597:
2577:
2552:
2514:
2419:
2331:
2319:
2007:
1631:
1568:
1518:
1425:
1366:
1066:
959:, one of the leaders of the open source movement (known primarily for developing the
925:
and in other texts in which Levy formulates and summarizes general hacker attitudes:
418:
381:
348:
3453:
2678:
2648:
2309:
2268:
2057:
1868:
1468:
1464:
1456:
1405:
1258:
or resources. In this sense, it can have a negative connotation of using inelegant
1212:
1172:
1138:
1056:
1026:
878:
866:
858:
846:
701:
678:
663:
659:
609:
398:
99:
2856:
1160:. Since the mid-1990s, it has been largely coincident with what is now called the
3287:
3051:
2738:
2725:
2604:
2372:
2227:
2195:
1969:
1894:
1864:
1712:
was created using pencil, scanned, and then painted with a software imaging tool.
1649:
1492:
1488:
1433:
1421:
1389:
1291:
1287:
1283:
1279:
1232:
1176:
1130:
749:
622:
559:
544:
178:
69:
38:
2281:
2262:
2231:
3179:
3029:
2061:
2038:
1811:
1801:
1781:
1766:
1617:
1441:
1196:
1184:
1123:
991:
956:
850:
834:
537:
487:
318:
201:
59:
2488:
2314:
2297:
2199:
2031:"The Hacker Community and Ethics: An Interview with Richard M. Stallman, 2002"
3427:
3189:
3011:
2750:
2323:
1964:
1945:
1660:
1613:
1612:. This art is made using custom computer technology, with specially designed
1354:
1322:
even more dramatic as it can potentially save the business's very existence.
1062:
1036:
1031:
987:
882:
812:
745:
650:
323:
218:
115:
3418:
3235:
3207:
1826:
1806:
1761:
1506:
1449:
1295:
1180:
1134:
1074:
1002:
960:
943:
908:
898:
830:
816:
411:
278:
231:
86:
3311:
3259:
3133:
3071:
2979:
2971:
2608:
2367:
1982:
1910:
1821:
1791:
1771:
1627:
1550:
1484:
1362:
1346:
1299:
1271:
1255:
1244:
1216:
1078:
983:
808:
638:
481:
368:
105:
2115:"Words to Avoid (or Use with Care) Because They Are Loaded or Confusing"
658:, calling them "crackers" instead. This includes both "good" crackers ("
3015:
2090:
1562:
1546:
1502:
1417:
1370:
998:
854:
555:
338:
333:
110:
2652:
1640:
they all look very different, with amazing animated dynamic effects. '
2993:
2944:
2273:
1954:
1816:
1776:
1593:
1534:
1522:
1437:
1298:("hack your reputation"). In a similar vein, a "hack" may refer to a
1070:
968:
732:
Playful cleverness, taking the serious humorously and humor seriously
358:
208:
188:
93:
54:
2776:
1278:
includes even activities that predate computer hacking, for example
617:
how wonderful this is. I bet you didn't believe this could be done."
1577:
1542:
1514:
1092:
838:
826:
779:
756:
700:
Before communications between computers and computer users were as
452:
183:
131:
1005:
has hack value; smashing it does not. As another example, proving
2006:. Maryland: Rowman & Littlefield Publishers. pp. 43–56.
1664:
1589:
1460:
1374:
1145:
760:
440:
328:
303:
296:
168:
2386:
3415:
Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of
Anonymous
3350:
Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of
Anonymous
1604:(mkl), who has created the 3-D light art projects entitled the
1558:
1510:
1472:
1413:
1409:
1259:
1149:
874:
783:
763:
575:
494:
343:
283:
121:
1554:
1538:
1530:
1526:
1224:
1188:
1111:
717:
Information-sharing as both an ideal and a practical strategy
603:
2415:
Introduction to
Functional Programming Systems Using Haskell
1901:
Anthony Barker's Weblog on Linux, Technology and the Economy
1429:
1200:
1157:
870:
2572:
Himanen, Pekka; Torvalds, Linus; Castells, Manuel (2001).
2235:
1380:
1663:
have produced visually stunning graphic presentations of
1621:
1498:
1385:
984:
flatbed scanner to take ultra-high-resolution photographs
912:
736:
2881:
2831:
2149:"IHTFP Hack Gallery: Hacks on the Great Dome (Bldg. 10)"
2571:
2294:
1388:
musician probes the circuit board of a synthesizer for
1207:) are likely to be included in any such list; see also
1183:, as well as the inventors of popular software such as
1087:(1984). It contains a codification of its principles.
919:. The hacker ethics were chronicled by Steven Levy in
1420:
sampling keyboards to create unusual sounds by doing
2677:
1927:
1600:
A successful software and hardware hacker artist is
1215:, the founder of the free software movement and the
2800:
1909:Gesture and Response in Field-Based Performance by
1584:Another description is offered by Jenny Marketou:
1452:players designed to sabotage compromised players.)
3365:Cyber Disobedience: Re://Presenting Online Anarchy
2411:
1392:using a jeweler's screwdriver and alligator clips.
1118:Others did not always view hackers with approval.
1115:'munged' ("when a piece of equipment is ruined").
1039:three-part piece "Ma Fin Est Mon Commencement" by
755:These sorts of subcultures were commonly found at
600:hacks at the Massachusetts Institute of Technology
2989:Structure and Interpretation of Computer Programs
2671:
1997:
1995:
1993:
1948:: software development without the use of strict
1043:as hacks. According to the Jargon File, the word
578:is not the activities performed themselves (e.g.
3425:
3174:
2357:
2355:
1854:"Tag – who's it?" by Ingrid Hein, July 16, 1998.
1122:in 1989 avoided advertising their sophisticated
708:Creating software and sharing it with each other
2645:"for hack ( er ) s who want to complain to CBS"
1744:A fractal that models the surface of a mountain
1001:an essential part of the meaning. For example,
877:phenomenon, and is concentrated around various
3010:
2978:
2857:"IHTFP Hack Gallery: CP Car on the Great Dome"
1990:
1884:Resources by Subject – Art & Design, 2001.
1436:robotics gear) to outright hostility (such as
949:Computers can change your life for the better.
869:and disparate networks; today it is largely a
2352:
1333:
517:
3363:Shantz, Jeff; Tomblin, Jordon (2014-11-28).
3025:Compilers: Principles, Techniques, and Tools
2771:
2613:
2344:: CS1 maint: multiple names: authors list (
2222:
2220:
2052:
2050:
2048:
786:machine at MIT, called AI, that was running
574:. However, the defining characteristic of a
3122:
2551:. Garden City, NY: Anchor Press/Doubleday.
2190:
2188:
1882:Canterbury Christ Church University Library
3265:Hackers: Heroes of the Computer Revolution
2642:
2549:Hackers: Heroes of the Computer Revolution
2025:
2023:
1084:Hackers: Heroes of the Computer Revolution
922:Hackers: Heroes of the Computer Revolution
711:Placing a high value on freedom of inquiry
524:
510:
2418:. Cambridge University Press. p. 1.
2313:
2272:
2217:
2045:
1243:and many other essays, maintainer of the
2185:
2056:
1379:
1353:. However, its roots go back further to
892:
735:
3286:
2794:
2737:
2542:
2540:
2538:
2536:
2226:
2194:
2179:Hackers – Wizards of the Electronic Age
2020:
2001:
1592:hackers who manipulate existing techno-
1463:users (until the 4th iteration of this
14:
3426:
3206:
3094:
3070:
3046:
2495:from the original on 12 September 2016
1833:
1455:In this context, a "hack" refers to a
1369:and exceptional computer programming (
1349:. An influential organization was the
1091:to the computer criminals involved in
768:MIT Artificial Intelligence Laboratory
596:MIT Artificial Intelligence Laboratory
3310:
3234:
3150:
2393:from the original on 20 November 2023
1981:This article is based in part on the
1919:"The Hackers Identity", October 2014.
1011:exhaustively trying all possibilities
903:Many of the values and tenets of the
588:Massachusetts Institute of Technology
3258:
2619:
2546:
2533:
2176:
2110:
1938:Free and open-source software portal
1247:(which was previously maintained by
612:explains about hackers who program:
3348:Coleman, Gabriella. (Nov 4, 2014).
1729:, a fractal fern computed using an
1141:environments in the United States.
244:forensics-focused operating systems
24:
3268:. Garden City, NY: Anchor Press /
2965:
1950:software development methodologies
1903:"Why Geeks Love Linux", Sept 2003.
1867:"Playing the Open Source Game" by
1710:Rolling Golden Hills of California
1416:musicians have modified 1980s-era
1305:
1035:by John Cage and the 14th-century
982:to produce musical notes, using a
772:University of California, Berkeley
25:
3470:
3379:
3296:. Cambridge, MA: O'Reilly Media.
2699:from the original on 9 April 2016
2521:from the original on 30 July 2013
1797:Experiments in Art and Technology
1478:
1428:for its graphing calculators and
1294:hackers ("hack your brain"), and
1029:describes the silent composition
811:in 1973, the promulgation of the
629:weaknesses in computer security.
2749:. Addison-Wesley. Archived from
2659:from the original on 5 June 2013
2643:Joe Wilson (19 September 1983).
2129:from the original on 3 June 2013
1985:, which is in the public domain.
1930:
1888:SuperCollider Workshop / Seminar
1737:
1717:
1702:
1687:
1672:
1571:musician Larry Polansky states:
815:in 1985, and the publication of
746:emblem of the "hacker community"
3244:. Reading, MA: Addison-Wesley.
3241:The Art of Computer Programming
3160:. Santa Monica, CA: InfoBooks.
3080:. Reading, MA: Addison-Wesley.
3056:. Reading, MA: Addison-Wesley.
2951:from the original on 2011-06-29
2933:
2921:
2890:from the original on 2015-08-06
2874:
2863:from the original on 2013-11-28
2849:
2838:from the original on 2008-11-07
2824:
2813:from the original on 2006-12-19
2783:from the original on 2015-09-06
2765:
2731:
2711:
2636:
2591:
2565:
2507:
2481:
2463:from the original on 2017-05-27
2451:"A History of Modern Computing"
2443:
2432:from the original on 2023-10-19
2405:
2379:
2288:
2255:
2244:from the original on 2017-05-28
2206:from the original on 2006-12-19
2159:from the original on 2019-08-20
2068:from the original on 2019-04-25
1340:Hacking of consumer electronics
1152:AI machine at MIT, running the
65:Hacking of consumer electronics
2170:
2141:
2104:
2079:
1565:, or any combination thereof.
1239:and writer of the famous text
1050:
18:Hacker (programmer subculture)
13:
1:
2859:. Hacks.mit.edu. 1994-05-09.
1975:
1235:, one of the founders of the
1229:GNU Compiler Collection (GCC)
905:free and open source software
632:
3386:A Brief History of Hackerdom
3334:Olson, Parmy. (05-14-2013).
3293:The Cathedral and the Bazaar
2801:Eric Steven Raymond (2001).
2719:A Brief History of Hackerdom
2620:Dyer, Richard (1984-05-06).
1241:The Cathedral and the Bazaar
822:The Cathedral and the Bazaar
164:Chaos Communication Congress
7:
3459:Hacking (computer security)
3405:The Anthropology of Hackers
3320:. New York, NY: Doubleday.
2747:The Art of Unix Programming
2683:"Students Log on to ATHENA"
2412:Antony J. T. Davie (1992).
2004:The Internet in Public Life
1923:
1227:text editor as well as the
10:
3475:
3391:Hack, Hackers, and Hacking
3185:The C Programming Language
2598:Definition of 'hack value'
2240:(version 4.4.7 ed.).
1913:& Satinder Gill, 2005.
1588:Hacker artists operate as
1482:
1337:
1334:Home computing enthusiasts
934:information should be free
896:
776:Carnegie Mellon University
669:
542:
535:
476:2600: The Hacker Quarterly
214:List of computer criminals
3218:Little, Brown and Company
3213:The Soul of a New Machine
2363:"Definition of "Cracker""
2315:10.1177/21582440221122739
1842:by Gerfried Stocker 1996.
1223:and author of the famous
980:dot matrix impact printer
963:), has noted in the book
946:and beauty on a computer.
27:Subculture of individuals
3367:. John Hunt Publishing.
3188:. Englewood Cliffs, NJ:
2576:. Secker & Warburg.
2264:Internet Users' Glossary
2200:"How To Become A Hacker"
2123:Free Software Foundation
1960:History of free software
1731:iterated function system
1620:chips to manipulate the
1440:'s attempts to lock out
1363:computer and video games
1221:Free Software Foundation
1148:, starting in 1969. The
1104:Tech Model Railroad Club
1003:picking a difficult lock
592:Tech Model Railroad Club
543:Not to be confused with
394:Cloud computing security
2809:. Thyrsus Enterprises.
2202:. Thyrsus Enterprises.
2002:Gehring, Verna (2004).
1016:
907:movement stem from the
726:Emphasis on rationality
720:Upholding the right to
174:Hackers on Planet Earth
3157:The Tao of Programming
3101:Hackers & Painters
3077:The Mythical Man-Month
2832:"MIT Gallery of Hacks"
2807:How To Become A Hacker
2308:(3): 215824402211227.
1840:"Vector in Open Space"
1749:
1646:
1598:
1582:
1497:Hacker artists create
1393:
1351:Homebrew Computer Club
1237:Open Source Initiative
1205:C programming language
917:Homebrew Computer Club
792:free software movement
752:
729:Distaste for authority
687:
619:
429:Homebrew Computer Club
3444:Computing and society
2741:(19 September 2003).
2622:"Masters of the Game"
2547:Levy, Steven (1984).
2515:"The Hacker's Ethics"
1917:Hackers, Who Are They
1637:
1586:
1573:
1408:or other device (see
1383:
1007:Fermat's Last Theorem
893:Ethics and principles
739:
683:
614:
3124:Hoftstadter, Douglas
2941:"Cornelia Sollfrank"
2743:"Reasons to Believe"
2739:Raymond, Eric Steven
2679:Garfinkel, Simson L.
2389:. 16 November 2023.
2230:, ed. (2003-12-29).
2177:Stallman, Richard. "
2112:Stallman, Richard M.
1787:Electronic art music
1757:Burning Man Festival
1616:and programming for
1398:graphing calculators
1166:open source movement
1041:Guillaume de Machaut
887:open-source software
782:, where a legendary
714:Hostility to secrecy
643:Request for Comments
447:Masters of Deception
389:Application security
3407:The Atlantic, 2010.
3176:Kernighan, Brian W.
3129:Gödel, Escher, Bach
2984:Sussman, Gerald Jay
2803:"What Is a Hacker?"
2489:"Glider Emblem FAQ"
2456:The Washington Post
1834:Hacker art mentions
1402:video game consoles
1219:, president of the
1209:List of programmers
911:that originated at
847:Richard M. Stallman
679:Lightning Ellsworth
568:digital electronics
564:electronic hardware
424:Chaos Computer Club
159:Black Hat Briefings
33:Part of a series on
3314:(September 1989).
3104:. Sebastopol, CA:
3048:Bourne, Stephen R.
2724:2015-12-20 at the
2603:2011-08-05 at the
2387:"Hacker Etymology"
1893:2007-09-28 at the
1863:2011-07-09 at the
1610:Big Round Cubatron
1394:
1249:Guy L. Steele, Jr.
753:
536:For the book, see
254:Social engineering
3411:Gabriella Coleman
3401:Gabriella Coleman
2930:by Larry Polansky
2834:. Hacks.mit.edu.
2692:. pp. 7–10.
2690:Technology Review
2425:978-0-521-27724-2
2058:Stallman, Richard
1907:Live Art Research
1632:cellular automata
1569:Dartmouth College
1519:computer hardware
1426:Texas Instruments
1406:musical keyboards
1367:software cracking
1120:MIT living groups
879:operating systems
867:operating systems
759:settings such as
744:, proposed as an
664:black hat hackers
660:white hat hackers
656:security breakers
534:
533:
382:Computer security
349:Keystroke logging
16:(Redirected from
3466:
3331:
3317:The Cuckoo's Egg
3307:
3288:Raymond, Eric S.
3283:
3255:
3231:
3203:
3182:(January 1988).
3171:
3147:
3132:. New York, NY:
3119:
3091:
3067:
3043:
3007:
2960:
2959:
2957:
2956:
2937:
2931:
2925:
2919:
2918:
2912:
2908:
2906:
2898:
2896:
2895:
2878:
2872:
2871:
2869:
2868:
2853:
2847:
2846:
2844:
2843:
2828:
2822:
2821:
2819:
2818:
2798:
2792:
2791:
2789:
2788:
2769:
2763:
2762:
2760:
2758:
2735:
2729:
2717:Eric S.Raymond:
2715:
2709:
2708:
2706:
2704:
2698:
2687:
2681:(Feb–Mar 1989).
2675:
2669:
2668:
2666:
2664:
2640:
2634:
2633:
2628:. Archived from
2626:The Boston Globe
2617:
2611:
2595:
2589:
2587:
2574:The Hacker Ethic
2569:
2563:
2562:
2544:
2531:
2530:
2528:
2526:
2511:
2505:
2504:
2502:
2500:
2485:
2479:
2478:
2469:
2468:
2447:
2441:
2440:
2438:
2437:
2409:
2403:
2402:
2400:
2398:
2383:
2377:
2376:
2371:. Archived from
2359:
2350:
2349:
2343:
2335:
2317:
2292:
2286:
2285:
2276:
2274:10.17487/RFC1392
2267:. January 1993.
2259:
2253:
2252:
2250:
2249:
2224:
2215:
2214:
2212:
2211:
2192:
2183:
2182:
2174:
2168:
2167:
2165:
2164:
2145:
2139:
2138:
2136:
2134:
2108:
2102:
2101:
2099:
2098:
2089:. Archived from
2087:"TMRC – Hackers"
2083:
2077:
2076:
2074:
2073:
2054:
2043:
2042:
2037:. Archived from
2027:
2018:
2017:
1999:
1940:
1935:
1934:
1933:
1877:
1869:Shawn Hargreaves
1741:
1721:
1706:
1691:
1676:
1465:operating system
1284:urban spelunkers
1213:Richard Stallman
1173:computer science
1139:computer science
1073:. It also has a
1057:The Boston Globe
1027:Richard Stallman
965:The Hacker Ethic
859:Guido van Rossum
610:Richard Stallman
560:software systems
526:
519:
512:
399:Network security
100:Hacker Manifesto
39:Computer hacking
30:
29:
21:
3474:
3473:
3469:
3468:
3467:
3465:
3464:
3463:
3424:
3423:
3382:
3352:. Verso Books.
3328:
3304:
3280:
3252:
3228:
3200:
3180:Ritchie, Dennis
3168:
3152:James, Geoffrey
3144:
3116:
3088:
3064:
3053:The Unix System
3040:
3028:. Reading, MA:
3004:
2968:
2966:Further reading
2963:
2954:
2952:
2939:
2938:
2934:
2926:
2922:
2910:
2909:
2900:
2899:
2893:
2891:
2880:
2879:
2875:
2866:
2864:
2855:
2854:
2850:
2841:
2839:
2830:
2829:
2825:
2816:
2814:
2799:
2795:
2786:
2784:
2777:"Great Hackers"
2770:
2766:
2756:
2754:
2753:on 18 July 2008
2736:
2732:
2726:Wayback Machine
2716:
2712:
2702:
2700:
2696:
2685:
2676:
2672:
2662:
2660:
2641:
2637:
2618:
2614:
2605:Wayback Machine
2596:
2592:
2584:
2570:
2566:
2559:
2545:
2534:
2524:
2522:
2513:
2512:
2508:
2498:
2496:
2491:. 22 May 2014.
2487:
2486:
2482:
2466:
2464:
2449:
2448:
2444:
2435:
2433:
2426:
2410:
2406:
2396:
2394:
2385:
2384:
2380:
2361:
2360:
2353:
2337:
2336:
2293:
2289:
2261:
2260:
2256:
2247:
2245:
2225:
2218:
2209:
2207:
2193:
2186:
2175:
2171:
2162:
2160:
2147:
2146:
2142:
2132:
2130:
2109:
2105:
2096:
2094:
2085:
2084:
2080:
2071:
2069:
2055:
2046:
2029:
2028:
2021:
2014:
2000:
1991:
1978:
1970:Unix philosophy
1936:
1931:
1929:
1926:
1895:Wayback Machine
1871:
1865:Wayback Machine
1836:
1831:
1752:
1745:
1742:
1733:
1726:Barnsley's fern
1722:
1713:
1707:
1698:
1692:
1683:
1677:
1650:Adobe Photoshop
1557:systems, text,
1507:artistic medium
1495:
1493:interactive art
1489:algorithmic art
1481:
1444:hackers or the
1434:Lego Mindstorms
1422:circuit bending
1342:
1336:
1308:
1306:Ethical Hacking
1288:reality hackers
1280:reality hackers
1233:Eric S. Raymond
1177:Edsger Dijkstra
1131:Eric S. Raymond
1053:
1019:
942:You can create
901:
895:
750:Eric S. Raymond
672:
635:
548:
545:Security hacker
541:
530:
501:
500:
470:
462:
461:
414:
404:
403:
384:
374:
373:
299:
289:
288:
274:
264:
263:
234:
224:
223:
204:
194:
193:
179:Security BSides
154:
144:
143:
89:
75:
74:
70:List of hackers
50:
28:
23:
22:
15:
12:
11:
5:
3472:
3462:
3461:
3456:
3451:
3449:Do it yourself
3446:
3441:
3436:
3434:Hacker culture
3422:
3421:
3408:
3398:
3388:
3381:
3380:External links
3378:
3377:
3376:
3361:
3346:
3332:
3326:
3308:
3302:
3284:
3278:
3256:
3250:
3232:
3226:
3216:. Boston, MA:
3204:
3198:
3172:
3166:
3148:
3142:
3120:
3114:
3106:O'Reilly Media
3098:(2004-05-18).
3092:
3086:
3068:
3062:
3044:
3038:
3030:Addison-Wesley
3008:
3002:
2967:
2964:
2962:
2961:
2947:. 2000-07-25.
2932:
2920:
2873:
2848:
2823:
2793:
2764:
2730:
2710:
2670:
2635:
2632:on 1997-06-07.
2612:
2590:
2582:
2564:
2557:
2532:
2506:
2480:
2476:
2442:
2424:
2404:
2378:
2375:on 2011-08-05.
2351:
2287:
2254:
2216:
2198:(2008-01-08).
2184:
2181:" (Interview).
2169:
2140:
2103:
2078:
2044:
2041:on 2021-03-07.
2019:
2012:
1988:
1977:
1974:
1973:
1972:
1967:
1962:
1957:
1952:
1942:
1941:
1925:
1922:
1921:
1920:
1914:
1904:
1898:
1885:
1879:
1878:, Jul 5, 1999.
1855:
1849:
1846:Switch|Journal
1843:
1835:
1832:
1830:
1829:
1824:
1819:
1814:
1812:Maker movement
1809:
1804:
1802:Generative art
1799:
1794:
1789:
1784:
1782:Electronic art
1779:
1774:
1769:
1767:Computer music
1764:
1759:
1753:
1751:
1748:
1747:
1746:
1743:
1736:
1734:
1723:
1716:
1714:
1708:
1701:
1699:
1693:
1686:
1684:
1678:
1671:
1661:mathematicians
1618:microprocessor
1614:circuit boards
1513:may work with
1501:by hacking on
1480:
1479:Hacker artists
1477:
1338:Main article:
1335:
1332:
1307:
1304:
1197:Dennis Ritchie
1185:Linus Torvalds
1124:Project Athena
1052:
1049:
1018:
1015:
992:barcode reader
957:Linus Torvalds
951:
950:
947:
940:
937:
930:
897:Main article:
894:
891:
851:Linus Torvalds
835:Dennis Ritchie
734:
733:
730:
727:
724:
718:
715:
712:
709:
671:
668:
634:
631:
552:hacker culture
538:Hacker Culture
532:
531:
529:
528:
521:
514:
506:
503:
502:
499:
498:
491:
488:Nuts and Volts
484:
479:
471:
468:
467:
464:
463:
460:
459:
450:
444:
438:
435:Legion of Doom
432:
426:
421:
415:
410:
409:
406:
405:
402:
401:
396:
391:
385:
380:
379:
376:
375:
372:
371:
366:
361:
356:
351:
346:
341:
336:
331:
326:
321:
316:
311:
306:
300:
295:
294:
291:
290:
287:
286:
281:
275:
272:Practice sites
270:
269:
266:
265:
262:
261:
256:
251:
246:
241:
235:
230:
229:
226:
225:
222:
221:
216:
211:
205:
202:Computer crime
200:
199:
196:
195:
192:
191:
186:
181:
176:
171:
166:
161:
155:
150:
149:
146:
145:
142:
141:
140:
139:
134:
129:
118:
113:
108:
103:
96:
90:
83:Hacker culture
81:
80:
77:
76:
73:
72:
67:
62:
60:Cryptovirology
57:
51:
46:
45:
42:
41:
35:
34:
26:
9:
6:
4:
3:
2:
3471:
3460:
3457:
3455:
3452:
3450:
3447:
3445:
3442:
3440:
3437:
3435:
3432:
3431:
3429:
3420:
3416:
3412:
3409:
3406:
3402:
3399:
3396:
3392:
3389:
3387:
3384:
3383:
3374:
3373:9781782795551
3370:
3366:
3362:
3359:
3355:
3351:
3347:
3344:
3340:
3337:
3333:
3329:
3327:9780385249461
3323:
3319:
3318:
3313:
3309:
3305:
3303:9781565927247
3299:
3295:
3294:
3289:
3285:
3281:
3279:9780385191951
3275:
3271:
3267:
3266:
3261:
3257:
3253:
3251:9780201038019
3247:
3243:
3242:
3237:
3236:Knuth, Donald
3233:
3229:
3227:9780316491709
3223:
3219:
3215:
3214:
3209:
3208:Kidder, Tracy
3205:
3201:
3199:9780131103702
3195:
3191:
3190:Prentice Hall
3187:
3186:
3181:
3177:
3173:
3169:
3167:9780931137075
3163:
3159:
3158:
3153:
3149:
3145:
3143:9780465026852
3139:
3135:
3131:
3130:
3125:
3121:
3117:
3115:9780596006624
3111:
3107:
3103:
3102:
3097:
3093:
3089:
3087:9780201006506
3083:
3079:
3078:
3073:
3069:
3065:
3063:9780201137910
3059:
3055:
3054:
3049:
3045:
3041:
3039:9780201100884
3035:
3031:
3027:
3026:
3021:
3017:
3013:
3009:
3005:
3003:9780070004849
2999:
2995:
2991:
2990:
2985:
2981:
2977:
2976:
2975:
2973:
2950:
2946:
2942:
2936:
2929:
2924:
2916:
2904:
2889:
2885:
2884:
2877:
2862:
2858:
2852:
2837:
2833:
2827:
2812:
2808:
2804:
2797:
2782:
2778:
2774:
2768:
2752:
2748:
2744:
2740:
2734:
2727:
2723:
2720:
2714:
2695:
2691:
2684:
2680:
2674:
2658:
2654:
2650:
2646:
2639:
2631:
2627:
2623:
2616:
2610:
2606:
2602:
2599:
2594:
2585:
2583:0-436-20550-5
2579:
2575:
2568:
2560:
2558:0-385-19195-2
2554:
2550:
2543:
2541:
2539:
2537:
2520:
2516:
2510:
2494:
2490:
2484:
2477:
2474:
2462:
2458:
2457:
2452:
2446:
2431:
2427:
2421:
2417:
2416:
2408:
2392:
2388:
2382:
2374:
2370:
2369:
2364:
2358:
2356:
2347:
2341:
2333:
2329:
2325:
2321:
2316:
2311:
2307:
2303:
2299:
2291:
2283:
2280:
2275:
2270:
2266:
2265:
2258:
2243:
2239:
2238:
2233:
2229:
2228:Raymond, Eric
2223:
2221:
2205:
2201:
2197:
2196:Raymond, Eric
2191:
2189:
2180:
2173:
2158:
2154:
2153:hacks.mit.edu
2150:
2144:
2128:
2124:
2120:
2116:
2113:
2107:
2093:on 2006-05-03
2092:
2088:
2082:
2067:
2063:
2059:
2053:
2051:
2049:
2040:
2036:
2032:
2026:
2024:
2015:
2009:
2005:
1998:
1996:
1994:
1989:
1987:
1986:
1984:
1971:
1968:
1966:
1965:Maker culture
1963:
1961:
1958:
1956:
1953:
1951:
1947:
1946:Cowboy coding
1944:
1943:
1939:
1928:
1918:
1915:
1912:
1908:
1905:
1902:
1899:
1896:
1892:
1889:
1886:
1883:
1880:
1875:
1870:
1866:
1862:
1859:
1856:
1853:
1850:
1847:
1844:
1841:
1838:
1837:
1828:
1825:
1823:
1820:
1818:
1815:
1813:
1810:
1808:
1805:
1803:
1800:
1798:
1795:
1793:
1790:
1788:
1785:
1783:
1780:
1778:
1775:
1773:
1770:
1768:
1765:
1763:
1760:
1758:
1755:
1754:
1740:
1735:
1732:
1728:
1727:
1720:
1715:
1711:
1705:
1700:
1696:
1690:
1685:
1681:
1675:
1670:
1669:
1668:
1666:
1662:
1657:
1655:
1651:
1645:
1643:
1636:
1633:
1629:
1625:
1623:
1619:
1615:
1611:
1607:
1603:
1597:
1595:
1591:
1585:
1581:
1579:
1572:
1570:
1566:
1564:
1560:
1556:
1552:
1548:
1544:
1540:
1536:
1532:
1528:
1524:
1520:
1516:
1512:
1508:
1504:
1500:
1494:
1490:
1486:
1476:
1474:
1470:
1466:
1462:
1458:
1453:
1451:
1447:
1443:
1439:
1435:
1431:
1427:
1423:
1419:
1415:
1411:
1407:
1404:, electronic
1403:
1399:
1391:
1387:
1382:
1378:
1376:
1372:
1368:
1364:
1358:
1356:
1355:amateur radio
1352:
1348:
1341:
1331:
1327:
1323:
1319:
1315:
1312:
1303:
1301:
1297:
1296:media hackers
1293:
1289:
1285:
1281:
1275:
1273:
1267:
1265:
1261:
1257:
1252:
1250:
1246:
1242:
1238:
1234:
1230:
1226:
1222:
1218:
1214:
1210:
1206:
1202:
1198:
1194:
1190:
1186:
1182:
1178:
1174:
1169:
1167:
1163:
1162:free software
1159:
1155:
1151:
1147:
1142:
1140:
1136:
1135:minicomputers
1132:
1129:According to
1127:
1125:
1121:
1116:
1113:
1110:
1105:
1102:
1096:
1094:
1088:
1086:
1085:
1080:
1076:
1072:
1068:
1064:
1063:free software
1059:
1058:
1048:
1046:
1042:
1038:
1034:
1033:
1028:
1024:
1014:
1012:
1008:
1004:
1000:
995:
993:
989:
988:optical mouse
985:
981:
975:
972:
970:
966:
962:
958:
954:
948:
945:
941:
938:
935:
931:
928:
927:
926:
924:
923:
918:
914:
910:
909:hacker ethics
906:
900:
890:
889:development.
888:
884:
883:free software
880:
876:
872:
868:
862:
860:
856:
852:
848:
844:
840:
836:
832:
828:
824:
823:
818:
814:
813:GNU Manifesto
810:
804:
801:
797:
793:
789:
785:
781:
777:
773:
769:
765:
762:
758:
751:
747:
743:
738:
731:
728:
725:
723:
719:
716:
713:
710:
707:
706:
705:
703:
698:
696:
691:
686:
682:
680:
675:
667:
665:
661:
657:
653:
652:
646:
644:
640:
630:
628:
624:
618:
613:
611:
607:
605:
601:
597:
593:
589:
585:
584:pranks at MIT
581:
577:
573:
569:
565:
561:
557:
553:
546:
539:
527:
522:
520:
515:
513:
508:
507:
505:
504:
497:
496:
492:
490:
489:
485:
483:
480:
478:
477:
473:
472:
466:
465:
458:
454:
451:
448:
445:
442:
439:
436:
433:
430:
427:
425:
422:
420:
417:
416:
413:
408:
407:
400:
397:
395:
392:
390:
387:
386:
383:
378:
377:
370:
367:
365:
362:
360:
357:
355:
352:
350:
347:
345:
342:
340:
337:
335:
332:
330:
327:
325:
322:
320:
317:
315:
312:
310:
307:
305:
302:
301:
298:
293:
292:
285:
282:
280:
277:
276:
273:
268:
267:
260:
259:Vulnerability
257:
255:
252:
250:
247:
245:
242:
240:
237:
236:
233:
232:Hacking tools
228:
227:
220:
219:Script kiddie
217:
215:
212:
210:
207:
206:
203:
198:
197:
190:
187:
185:
182:
180:
177:
175:
172:
170:
167:
165:
162:
160:
157:
156:
153:
148:
147:
138:
135:
133:
130:
128:
125:
124:
123:
119:
117:
116:Maker culture
114:
112:
109:
107:
104:
102:
101:
97:
95:
92:
91:
88:
84:
79:
78:
71:
68:
66:
63:
61:
58:
56:
53:
52:
49:
44:
43:
40:
37:
36:
32:
31:
19:
3419:Open Library
3394:
3364:
3349:
3335:
3316:
3312:Stoll, Cliff
3292:
3264:
3260:Levy, Steven
3240:
3212:
3184:
3156:
3128:
3100:
3096:Graham, Paul
3076:
3072:Brooks, Fred
3052:
3024:
2988:
2980:Abelson, Hal
2969:
2953:. Retrieved
2935:
2923:
2892:. Retrieved
2882:
2876:
2865:. Retrieved
2851:
2840:. Retrieved
2826:
2815:. Retrieved
2806:
2796:
2785:. Retrieved
2773:Graham, Paul
2767:
2755:. Retrieved
2751:the original
2746:
2733:
2713:
2701:. Retrieved
2689:
2673:
2661:. Retrieved
2638:
2630:the original
2625:
2615:
2593:
2573:
2567:
2548:
2523:. Retrieved
2509:
2499:20 September
2497:. Retrieved
2483:
2471:
2465:. Retrieved
2454:
2445:
2434:. Retrieved
2414:
2407:
2395:. Retrieved
2381:
2373:the original
2366:
2340:cite journal
2305:
2301:
2290:
2263:
2257:
2246:. Retrieved
2236:
2208:. Retrieved
2172:
2161:. Retrieved
2152:
2143:
2131:. Retrieved
2118:
2106:
2095:. Retrieved
2091:the original
2081:
2070:. Retrieved
2062:"On Hacking"
2039:the original
2034:
2003:
1980:
1979:
1848:Jun 14 1998.
1827:Software art
1807:Internet art
1762:Computer art
1724:
1709:
1694:
1679:
1658:
1647:
1638:
1626:
1599:
1587:
1583:
1574:
1567:
1496:
1469:jailbreaking
1454:
1450:Blu-ray Disc
1448:routines on
1395:
1359:
1343:
1328:
1324:
1320:
1316:
1309:
1276:
1268:
1253:
1193:Ken Thompson
1181:Donald Knuth
1170:
1143:
1128:
1117:
1097:
1089:
1082:
1075:hacker ethic
1055:
1054:
1044:
1030:
1022:
1021:While using
1020:
996:
986:or using an
976:
973:
964:
961:Linux kernel
955:
952:
920:
902:
899:Hacker ethic
863:
843:Ken Thompson
831:Donald Knuth
820:
817:Eric Raymond
805:
800:common slang
754:
699:
692:
688:
684:
676:
673:
654:to refer to
649:
647:
636:
620:
615:
608:
571:
551:
549:
493:
486:
474:
469:Publications
314:Trojan horse
279:HackThisSite
271:
98:
82:
3439:Subcultures
3134:Basic Books
2972:Jargon File
2911:|work=
2757:6 September
2609:Jargon File
2397:20 November
2368:Jargon File
2237:Jargon File
2133:29 December
1983:Jargon File
1911:Sha Xin Wei
1872: [
1858:Linux Today
1822:Robotic art
1792:Electronica
1772:Digital art
1628:Don Hopkins
1602:Mark Lottor
1553:, reactive
1551:mathematics
1547:simulations
1485:Fractal art
1347:MITS Altair
1272:Jargon file
1245:Jargon File
1217:GNU project
1079:Steven Levy
1067:open source
1051:Programming
1037:palindromic
915:and at the
809:Jargon File
639:Jargon File
594:(TMRC) and
580:programming
482:Hacker News
369:Infostealer
152:Conferences
106:Hackerspace
3428:Categories
3395:Appendix A
3358:1781685835
3343:0316213527
2992:. London:
2955:2011-07-01
2894:2008-10-18
2867:2013-11-30
2842:2013-11-30
2817:2008-10-18
2787:2015-09-06
2703:25 January
2467:2017-08-29
2436:2018-12-17
2248:2008-03-02
2210:2008-03-16
2163:2018-05-07
2097:2012-12-27
2072:2008-03-16
2013:0742542335
1976:References
1852:Eye Weekly
1608:, and the
1563:literature
1529:and other
1503:technology
1483:See also:
1418:Casio SK-1
1371:demo scene
1311:CSO Online
999:creativity
855:Larry Wall
633:Definition
627:exploiting
556:subculture
339:Logic bomb
334:Ransomware
111:Hacktivism
3270:Doubleday
2994:MIT Press
2945:Thing.net
2913:ignored (
2903:cite book
2649:Newsgroup
2525:31 August
2332:252096635
2324:2158-2440
2302:SAGE Open
1955:Demoscene
1817:Media art
1777:Demoscene
1535:animation
1523:sculpture
1438:Microsoft
1071:demoscene
969:Max Weber
881:based on
796:community
702:networked
457:Blue team
449:(defunct)
443:(defunct)
437:(defunct)
431:(defunct)
419:Anonymous
359:Web shell
209:Crimeware
189:Summercon
137:White hat
127:Black hat
120:Types of
94:Hackathon
55:Phreaking
3290:(1999).
3262:(1984).
3238:(1968).
3210:(1981).
3154:(1987).
3126:(1979).
3074:(1975).
3050:(1983).
3022:(1986).
2986:(1984).
2949:Archived
2888:Archived
2861:Archived
2836:Archived
2811:Archived
2781:Archived
2775:(2004).
2722:Archived
2694:Archived
2657:Archived
2653:net.misc
2601:Archived
2519:Archived
2493:Archived
2461:Archived
2430:Archived
2391:Archived
2242:Archived
2232:"hacker"
2204:Archived
2157:Archived
2127:Archived
2066:Archived
2060:(2002).
1924:See also
1891:Archived
1861:Archived
1665:fractals
1624:lights.
1606:Cubatron
1594:semiotic
1578:freeware
1543:software
1515:graphics
1432:for its
1175:such as
1093:The 414s
839:Alan Kay
827:Bill Joy
780:Internet
764:campuses
757:academic
695:crackers
623:crackers
590:(MIT)'s
566:(mostly
453:Red team
309:Backdoor
184:ShmooCon
132:Grey hat
3454:Hobbies
2663:28 July
2651::
2607:in the
2119:GNU.org
2035:gnu.org
1695:Sunrise
1680:Bubbles
1590:culture
1555:sensory
1511:artists
1473:iPhones
1461:Palm OS
1457:program
1390:"bends"
1375:modding
1292:wetware
1260:kludges
1191:), and
1146:ARPANET
761:college
670:History
572:hacking
441:LulzSec
329:Spyware
304:Rootkit
297:Malware
249:Payload
239:Exploit
169:DEF CON
122:hackers
48:History
3371:
3356:
3341:
3324:
3300:
3276:
3248:
3224:
3196:
3164:
3140:
3112:
3084:
3060:
3036:
3020:Ullman
3000:
2883:hacker
2728:(2000)
2580:
2555:
2422:
2330:
2322:
2010:
1559:poetry
1505:as an
1491:, and
1414:techno
1410:CueCat
1231:, and
1150:PDP-10
1095:case.
1045:hacker
1023:hacker
875:TCP/IP
857:, and
784:PDP-10
770:, the
766:. The
742:Glider
651:hacker
576:hacker
495:Phrack
412:Groups
344:Botnet
284:Zone-H
3393:(see
3016:Sethi
2697:(PDF)
2686:(PDF)
2328:S2CID
1876:]
1539:video
1531:audio
1527:music
1225:Emacs
1189:Linux
1112:PDP-1
1032:4′33″
604:R2-D2
554:is a
319:Virus
87:ethic
3369:ISBN
3354:ISBN
3339:ISBN
3322:ISBN
3298:ISBN
3274:ISBN
3246:ISBN
3222:ISBN
3194:ISBN
3162:ISBN
3138:ISBN
3110:ISBN
3082:ISBN
3058:ISBN
3034:ISBN
2998:ISBN
2970:The
2915:help
2759:2015
2705:2016
2665:2016
2578:ISBN
2553:ISBN
2527:2011
2501:2016
2420:ISBN
2399:2023
2346:link
2320:ISSN
2282:1392
2135:2012
2008:ISBN
1654:GIMP
1642:Life
1442:Xbox
1430:Lego
1300:math
1264:hack
1256:code
1203:and
1201:Unix
1195:and
1179:and
1164:and
1158:Unix
1069:and
1017:Uses
932:All
885:and
873:and
871:Unix
794:and
774:and
740:The
722:fork
637:The
550:The
354:HIDS
324:Worm
85:and
3417:at
3012:Aho
2310:doi
2279:RFC
2269:doi
1750:Art
1652:or
1622:LED
1499:art
1471:of
1446:DRM
1386:DIY
1282:or
1274:).
1251:).
1154:ITS
1137:in
1109:DEC
1101:MIT
1081:'s
990:as
944:art
913:MIT
819:'s
788:ITS
748:by
562:or
364:RCE
3430::
3413::
3403::
3272:.
3220:.
3192:.
3178:;
3136:.
3108:.
3032:.
3018:;
3014:;
2996:.
2982:;
2943:.
2907::
2905:}}
2901:{{
2886:.
2805:.
2779:.
2745:.
2688:.
2655:.
2647:.
2624:.
2535:^
2517:.
2470:.
2459:.
2453:.
2428:.
2365:.
2354:^
2342:}}
2338:{{
2326:.
2318:.
2306:12
2304:.
2300:.
2277:.
2234:.
2219:^
2187:^
2155:.
2151:.
2125:.
2121:.
2117:.
2064:.
2047:^
2033:.
2022:^
1992:^
1874:pl
1656:.
1561:,
1549:,
1545:,
1541:,
1537:,
1533:,
1525:,
1521:,
1517:,
1487:,
1475:.
1400:,
1384:A
1377:.
1365:,
1290:,
1168:.
1065:,
994:.
971:.
861:.
853:,
849:,
845:,
841:,
837:,
833:,
829:,
606:.
455:/
3397:)
3375:.
3360:.
3345:.
3330:.
3306:.
3282:.
3254:.
3230:.
3202:.
3170:.
3146:.
3118:.
3090:.
3066:.
3042:.
3006:.
2958:.
2917:)
2897:.
2870:.
2845:.
2820:.
2790:.
2761:.
2707:.
2667:.
2588:.
2586:.
2561:.
2529:.
2503:.
2439:.
2401:.
2348:)
2334:.
2312::
2284:.
2271::
2251:.
2213:.
2166:.
2137:.
2100:.
2075:.
2016:.
1580:.
1199:(
1187:(
936:.
547:.
540:.
525:e
518:t
511:v
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.