Jump to content

Hacker: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
add see also section
Line 49: Line 49:


The hobby hacking subculture relates to hobbyist home computing of the early 80s. The parts that didn't fuse with the academic hacker subculture focus mainly on commercial [[Video game|computer and video games]], [[software cracking]] and exceptional computer programming ([[demo scene]]), but also to the modification of computer hardware and other electronic devices, see [[modding]]
The hobby hacking subculture relates to hobbyist home computing of the early 80s. The parts that didn't fuse with the academic hacker subculture focus mainly on commercial [[Video game|computer and video games]], [[software cracking]] and exceptional computer programming ([[demo scene]]), but also to the modification of computer hardware and other electronic devices, see [[modding]]

== See also ==

* [[Timeline of hacker history]]
* [[Hack (technology)]]
* [[:Category:Computer hacking]]


== References ==
== References ==

Revision as of 05:13, 7 June 2007

A hacker is a person using computers as objects of study rather than merely as instruments that facilitate work. The more specific definition of the term is subject to the hacker definition controversy; people from at least three major subcultures[1] centered around different aspects of computers use the term to refer to themselves. By the mass media and in popular culture, it is most prominently used to mean a person who focuses on breaking security mechanisms of computer and network systems. This use is contrasted by the different understanding of the word as a person who, in a broad sense, adheres to a spirit of playful cleverness and, in a more specific sense, loves programming. It is found in an originally academic movement unrelated to computer security and most visibly associated with free software and open source. In a third meaning, the term refers to home computer hobbyists putting software or hardware of their system to the extreme.

Computer security hackers

In computer security, a hacker is a person who specializes in work with the security mechanisms for computer and network systems. While including those who endeavor to strengthen such mechanisms, it is more often used by the mass media and popular culture to refer to those who seek access despite these security measures. Accordingly, the term bears strong connotations that may be favorable or pejorative.

The subculture of computer security hackers is also termed network hacker subculture or computer underground and primarily developed in the context of phreaking during the 1960s and the microcomputer BBS scene of the 1980s. It is implicated with 2600: The Hacker Quarterly and the alt.2600 newsgroup.

Personalities

  • CULT OF THE DEAD COW — A high profile hacker group that has both made news and been consulted by the media on numerous occasions.
  • Patrick K. Kroupa (also known as Lord Digital) — Former LOD member, co-founder of MindVox, author of Phantom Access programs, and MindVox: The Overture. Appears in over 20 books and hundreds of media and press articles.
  • Kevin Mitnick — A former computer criminal who now (since his release from prison in 2000) speaks, consults, and authors books about social engineering and network security.
  • Neal Patrick and The 414s — teenage hackers who gained brief but widespread media coverage in 1983.
  • Steve Wozniak — Computer engineer who created the Apple I and Apple II series computers and, with Steve Jobs, founded Apple Computer (now Apple Inc.). He is known in the hacker community as "Woz" or "The other Steve." Woz came up with some ingenious hardware hacks to bring those machines to completion. Tales of his "blue box" phone calls are legendary.

Academic hackers

In the academic hacker culture, a computer hacker is a person who enjoys designing software and building programs with a sense for aesthetics and playful cleverness. A hacker may also be a programmer who reaches a goal by employing a series of modifications to extend existing code or resources. In this sense, it can have a negative connotation of using kludges to accomplish programming tasks that are ugly, inelegant, and inefficient. This derogatory form of the noun "hack" is even used among users of the positive sense of "hacker" (some argue that it should not be, due to this negative meaning; others argue that some kludges can, for all their ugliness and imperfection, still have "hack value").

The academic hacker subculture developed in the 1960s among hackers working on early minicomputers in academic computer science environments, especially at MIT. After 1969 it fused with the technical culture of the pioneers of the Internet, after 1980 with the culture of Unix, and after 1987 with elements of the early microcomputer hobbyists that themselves had connections to radio amateurs in the 1920s. Since the mid-1990s, it has been largely coincident with what is now called the free software movement and open source movement.

The main basic difference between academic and computer security hackers is that the former focus on creating new and improving existing infrastructure (especially the software environment they work with), while the latter primarily and strongly emphasize the general act of circumvention of security measures in infrastructure, with the effective use of the knowledge (which can be to report and help fixing the security bugs, or exploitation for criminal purpose) being only rather secondary.

Since the mid-1980s, there are some overlaps in ideas and members with the computer security hacking community. Nevertheless, members of the academic subculture have a tendency to look down and disassociate from these overlaps. They commonly refer disparagingly to people in the second subculture as crackers, and refuse to accept any definition of hacker that encompasses such activities (see the Hacker definition controversy). The computer security hacking subculture on the other hand tends not to distinguish between the two subcultures as harshly, instead acknowledging that they have much in common including many members, political and social goals, and a love of learning about technology. They have more a tendency to categorize people into script kiddies and black hat (for which two groups the computer security centered subculture reserves the term cracker), grey hat and white hat hackers.

Many programmers have been labeled "great hackers,"[2] but the specifics of who that label applies to is a matter of opinion. Certainly major contributors to computer science such as Edsger Dijkstra and Donald Knuth, as well as the inventors of popular software such as Linus Torvalds (Linux), and Dennis Ritchie and Ken Thompson (the C programming language) are likely to be included in any such list; see also List of programmers. People primarily known for their contributions to the consciousness of the academic hacker culture include Richard Stallman, the founder of the free software movement and the GNU project, president of the Free Software Foundation and author of the famous Emacs text editor as well as the GNU Compiler Collection (GCC), and Eric S. Raymond, one of the founders of the Open Source Initiative and writer of the famous text The Cathedral and the Bazaar and many other essays, maintainer of the Jargon File (which was previously maintained by Guy L. Steele, Jr.).

Within the academic hacker culture, the term hacker is also used for people who make things work beyond perceived limits in a clever way in general, for example reality hackers.[3]

Hobby Hackers

The hobby hacking subculture relates to hobbyist home computing of the early 80s. The parts that didn't fuse with the academic hacker subculture focus mainly on commercial computer and video games, software cracking and exceptional computer programming (demo scene), but also to the modification of computer hardware and other electronic devices, see modding

See also

References

  1. ^ http://webzone.k3.mah.se/k3jolo/HackerCultures/origins.htm
  2. ^ Graham, Paul (2004). "Great Hackers".
  3. ^ See for example the MIT Gallery of Hacks

Computer security hacking

Academic hacking

Computer security hacking

Academic hacking