Date: Sun, 25 Feb 2007 00:39:41 +0100 From: deeptech71@gmail.com To: Matthew McDonald <mail.matt.mcdonald@gmail.com> Cc: Darren Pilgrim <phi@evilphi.com>, =?windows-1252?Q?rgrav?= <des@des.no>, =?windows-1252?Q?Dag-Erling_Sm=F8?=, chat@freebsd.org, "Jason C. Wells" <jcw@highperformance.net> Subject: Re: newspeak Message-ID: <45E0CCBD.6050409@gmail.com> In-Reply-To: <c3eae3600702232124h401b34e6l5df58c8f0b343bad@mail.gmail.com> References: <86hctds1wv.fsf@dwp.des.no> <45DF9328.8080106@highperformance.net> <45DFBC1A.8000908@evilphi.com> <c3eae3600702232124h401b34e6l5df58c8f0b343bad@mail.gmail.com>
next in thread | previous in thread | raw e-mail | index | archive | help
Matthew McDonald wrote: > Well, because if it involves hacking it's obviously not as legitimate as > anything that a corporation would do. After all, hackers are malicious by > nature. > > -Matt McDonald "The idea of hacking may conjure up stylized images of electronic vandalism, espionage, dyed hair, and body piercings. Most people associate hacking with breaking the law, therefore dubbing all those who engage in hacking activities to be criminals. Granted, there are people out there who use hacking techniques to break the law, but hacking isn't really about that. In fact, hacking is more about following the law than breaking it. The essence of hacking is finding unintended or overlooked uses for the laws and properties of a given situation and then applying them in new and inventive ways to solve a problem. The problem could be the lack of access to a computer system or figuring out a way to make old phone equipment control a model railroad system. Usually, the hacked solutions solve these problems in unique ways, unimaginable by those confined to conventional methodology. In the late 1950s, the MIT model railroad club was given a donation of parts, most of which were old telephone equipment. The members used this equipment to rig up a complex system that allowed multiple operators to control different parts of the track by dialing into the appropriate section. They called this new and inventive use of equipment "hacking", and many consider this group to be the original hackers. They moved on to programming on punchcards and ticker tape for early computers like the IBM 704 and the TX-0. While others were content with just writing programs that solved problems, the early hackers were obsessed with writing programs that solved problems well. A program that could achieve the same result using fewer punchcards was considered better, even though it did the same thing. The key difference was how the program achieved its results—elegance. Being able to reduce the number of punchcards needed for a program showed an artistic mastery over the computer, which was admired and appreciated by those who understood it. Analogously, a block of wood might solve the problem of supporting a vase, but a nicely crafted table built using refined techniques sure looks a lot better. The early hackers were transforming programming from an engineering task into an art form, which, like many forms of art, could only be appreciated by those who got it and would be misunderstood by those who didn't. This approach to programming created an informal subculture, separating those who appreciated the beauty of hacking from those who were oblivious to it. This subculture was intensely focused on learning more and gaining yet higher levels of mastery over their art. They believed that information should be free, and anything that stood in the way of that freedom should be circumvented. Such obstructions included authority figures, the bureaucracy of college classes, and discrimination. In a sea of graduation-driven students, this unofficial group of hackers defied the conventional goals of getting good grades, instead pursuing knowledge itself. This drive to continuously learn and explore transcended even the conventional boundaries drawn by discrimination, evident in the group's acceptance of 12-year-old Peter Deutsch when he demonstrated his knowledge of the TX-0 and his desire to learn. Age, race, gender, appearance, academic degrees, and social status were not primary criteria for judging another's worth—this was not because of a desire for equality, but because of a desire to advance the emerging art of hacking." THIS QUOTE WAS PIRATED FROM A COPY OF Hacking: The Art of Exploitation by Jon Erickson ISBN:1593270070 No Starch Press © 2003 ;)
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?45E0CCBD.6050409>