Jump to content

Hacker: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
No edit summary
Line 1: Line 1:
HAHAHAHHAHAHAHAHHAHAHAH JUSTIN PIGA & KANE WAS HERE!!!!!!
{{dablink|For other uses, see [[Hacker (disambiguation)]].}}
[[Image:Al Sheedakim, Hacker and Programmer.JPG|thumb|right|Hackers are sometimes portrayed as mysterious and strange.]] A '''hacker''' is a person who creates and modifies [[computer software]] and [[computer hardware]], including computer programming, administration, and security-related items. The term usually bears strong connotations, but may be either favorable or denigrating depending on cultural context (see the [[Hacker definition controversy]]). Common definitions include:

*In [[computer programming]], a hacker is a programmer who hacks or reaches a goal by employing a series of modifications to [[exploit]] or extend existing [[source code|code]] or resources. For some, "hacker" has a negative connotation and refers to a person who "[[Hack (technology slang)|hack]]s" or uses [[kludge]]s to accomplish programming tasks that are ugly, inelegant, and inefficient. This negative form of the noun "hack" is even used among users of the positive sense of "hacker".

*In [[computer security]], a hacker is a person who specializes in work with the security mechanisms for computer and network systems. While including those who endeavor to strengthen such mechanisms, it more often is used, especially in the [[mass media]], to refer to those who seek access despite them.

*In other technical fields, hacker is extended to mean a person who makes things work beyond perceived limits through their own technical skill, such as a [[hardware hacker]], or [[reality hacker]].

*In [[hacker culture]], a hacker is a person who has attained a certain social status and is recognized among members of the culture for commitment to the culture's values and a certain amount of technical knowledge.

== Categories of hacker ==
<!-- [[Image:Glider.svg|right|A glider from [[Conway's Game of Life]].]] -->

The hacker community, the set of people who would describe themselves as hackers or described by others as hackers, falls into at least four partially overlapping categories. Sometimes alternate terms such as "cracker" are used in an attempt to more exactly distinguish which category of hacker is intended, or when attempting to put a contextual distance between the categories due to the [[Hacker definition controversy]].

=== Hacker: Highly skilled programmer ===
The positive usage of ''hacker'' is one who knows a (sometimes specified) set of programming interfaces well enough to program rapidly and expertly. This type of hacker is well-respected (although the term still carries some of the meaning of ''hack''), and is capable of developing programs without adequate planning or where pre-planning is difficult or impossible to achieve. This ''[[zugzwang]]'' gives freedom and the ability to be creative against methodical careful progress. At their best, hackers can be very productive. The technical downside of hacker productivity is often in maintainability, documentation, and completion. Very talented hackers may become bored with a project once they have figured out all of the hard parts, and be unwilling to finish off the "details". This attitude can cause friction in environments where other programmers are expected to pick up the half finished work, decipher the structures and ideas, and bullet-proof the code. In other cases, where a hacker is willing to maintain their own code, a company may be unable to find anyone else who is capable or willing to dig through code to maintain the program if the original programmer moves on to a new job.

Additionally, there is sometimes a social downside associated with hacking. The stereotype of a hacker as having gained technical ability at a cost in social ability has historical basis in an uncomfortable amount of factual foundation in many individuals. While not universal, nor even restricted to hackers, the difficulty in relating to others and the often abrasive personalities of some hackers makes some of them difficult to work with or to organize into teams. On the other hand, it is not uncommon for hackers to thrive on social interaction.

=== '''Hacker''': Computer and [[network security]] expert ===
{{main|Hacker (computer security) }}

In the networking sense, a ''hacker'' is one who specializes in work with the access control mechanisms for computer and [[computer networking|network]] systems. This includes individuals who work toward maintaining and improving the integrity of such mechanisms. However, the most common usage of ''hacker'' in this respect refers to someone who exploits systems or gains unauthorized access by means of clever tactics and detailed knowledge, while taking advantage of any carelessness or ignorance on the part of system operators. This use of hacker as intruder (frequent in the media) generally has a strong negative connotation, and is disparaged and discouraged within the computer community, resulting in the modern [[Hacker definition controversy]].

For such hackers specializing in intrusion, the highly derogatory term [[script kiddies]] is often used to indicate those who either claim to have far more skill than they actually have, or who exclusively use programs developed by others to achieve a successful [[Exploit (computer security)|security exploit]].

=== Hacker: Hardware modifier ===
{{main|Hardware hacker}}
Another type of hacker is one who creates novel hardware modifications. At the most basic end of this spectrum are those who make frequent changes to the hardware in their computers using standard components, or make semi-cosmetic themed modifications to the appearance of the machine. This type of Hacker modifes his/her computer for performance needs and/or aesthetics. These changes often include adding memory, storage or LEDs and cold cathode tubes for light effects. These people often show off their talents in contests, and many enjoy [[LAN party|LAN parties]]. At the more advanced end of the hardware hackers are those who modify hardware (not limited to computers) to expand capabilities; this group blurs into the culture of hobbyist [[inventor]]s and professional electronics engineering. An example of such modification includes the addition of [[Internet protocol suite|TCP/IP]] [[Internet]] capabilities to a number of [[vending machine]]s and [[coffee]] makers during the late 1980s and early 1990s.

Hackers who have the ability to write circuit-level code, [[device driver]]s, [[firmware]], low-level networking, (and even more impressively, using these techniques to make devices do things outside of their spec sheets), are typically in very high regard among hacker communities. This is primarily due to the enormous difficulty, complexity and specialized domain knowledge required for this type of work, as well as the electrical engineering expertise that plays a large role. Such hackers are rare, and almost always considered to be wizards or gurus of a very high degree.

== Hacker stereotypes ==
There are theoretical types of hackers who are considered to possess an atypical level of skill beyond that of other meanings of the positive form of "hacker", which include the '''Guru''' and the '''Wizard'''.

In some portions of the computer community, a Wizard is one who can do anything a hacker can, but elegantly; while a Guru not only can do so elegantly, but instruct those who do not know how. In other sub-communities, a Guru is one with a very broad degree of expertise, while a Wizard is expert in a very narrow field. In practice, such exact distinction are usually more at home in a [[Role-playing game|RPG]] world, and not often heard in actual conversation.

Within the mainstream media, hackers are often characterised as strange, mysterious, reclusive, and especially tricky. This may be seen as an extension of the human tendency to stigmatise what is ill-understood, which used often to be applied to natural philosophers who were often thought by superstitious neighbours to be wizards or mystics. One such example was [[Leonardo da Vinci]], who was thought to be a [[necromancer]] due to his extensive (and extraordinary at that time) knowledge of human anatomy and his study of dead bodies.

==Recognized hackers==
Due to the overlapping nature of the hacker concept space, many of these individuals could be included in more than one category. See also [[Hacker (computer security)]], which has a list of people in that category, including criminal or unethical hackers.

===Skilled programmers===
*[[Linus Torvalds]], who was a computer science student at the University of Helsinki when he began writing the [[Linux]] kernel in 1991.

*[[Mel Kaye]], the archetypal Real Programmer[http://catb.org/~esr/jargon/html/R/Real-Programmer.html], was credited with doing "the bulk of the programming" for the Royal McBee LGP-30 drum-memory computer in the 1950s. Ed Nather, another hacker, published the widely acclaimed "Story of Mel" in the 1980s.

*[[Donald Knuth]], best known for practically creating the field of [[Analysis of algorithms|algorithm analysis]], coding the [[TeX]] typesetting system, and writing [[The Art of Computer Programming]] - one of the most respected references in the field.

*[[Dan Bernstein]], the author of [[qmail]] and [[djbdns]], also a mathematician and cryptographer.

*[[John Carmack]], a widely recognized and influential game programmer. Through his work, he has made significant contributions to the field of 3D computer graphics and his games have sold in the millions. In 1999, Carmack appeared as number 10 in [[Time (magazine)|TIME]]'s list of the 50 most influential people in technology.

*[[Bill Gosper]], mathematician and programmer, and contemporary of Richard Greenblatt.

*[[Richard Greenblatt (programmer)|Richard Greenblatt]], primary designer of the MIT [[Lisp machine]] and pioneer of computerized [[chess]].

*[[Grace Hopper]], the first [[programmer]] of the [[Mark I Calculator]], also developed the first [[compiler]] for a [[computer programming language]]. [http://ei.cs.vt.edu/~history/Hopper.Danis.html] [http://www.hopper.navy.mil/grace/grace.htm]

*[[Bill Joy]], the co-founder of [[Sun Microsystems]] and author of many fundamental [[UNIX]] utilities.

*[[John McCarthy]], the inventor of the [[Lisp programming language]]. Also coined the term "[[Artificial Intelligence]]".

*[[Rob Pike]], a software engineer and author. He is best known for his work at Bell Labs, where he was a member of the Unix team and was involved in the creation of the [[Plan 9]] and [[Inferno operating system]]s.

*[[Richard Stallman]], the founder of the free software movement and the [[GNU project]], and original author of [[Emacs]] and [[GNU Compiler Collection|gcc]].

*[[Ken Thompson (computer programmer)|Ken Thompson]] and [[Dennis Ritchie]], who created Unix in 1969. Ritchie is also notable for having created the [[C programming language]], from [[Ken Thompson]] [[B_programming_language|B]].

*[[Bjarne Stroustrup]], the creator of the [[C++]] programming language.

*[[Rasmus Lerdorf]], the creator of the [[PHP]] scripting language.

*[[Guido van Rossum]], the creator of the [[Python programming language]].

*[[Randal Schwartz]], [[Perl programming language]] pioneer, billed himself as "Just another Perl hacker (but not what the media calls "'hacker'!)" This was in reference to characterizations made during his criminal prosecution for unauthorized computer access.

*[[Wietse Venema]], best known for writing the [[Postfix]] mail system and co-creating (with [[Dan Farmer]]) the [[Security Administrator Tool for Analyzing Networks]] (SATAN), a remote vulnerability scanner.

*[[Larry Wall]], the creator of the [[Perl programming language]].<ref>{{cite book | first=Larry | last=Wall | coauthors=Tom Christiansen, Jon Orwant | year=2000 | title=Programming Perl | edition=3rd | publisher=O'Reilly | id=ISBN 0-596-00027-8 }}</ref>

*[[Steve Wozniak]], a co-founder of [[Apple Computer]] (with [[Steve Jobs]]). Got his start making devices for phone [[phreaking]], working with [[John Draper]].

*[[Theo de Raadt]], the founder of the [[OpenBSD]] project.

*[[Michael Tiemann]], a co-founder of [[Cygnus_Solutions]], president of the [[Open_Source_Initiative]]. Made many contributions to the GNU C compiler, GNU debugger, and many other GNU development tools. Author of the GNU C++ compiler.

===Security experts===
*[[Fyodor]] — Author of the open source [[Nmap|Nmap Security Scanner]], web site [http://insecure.org Insecure.Org], co-author of hacking novel [http://insecure.org/stc/ How to Own a Continent], and founding member of the [[Honeynet project|Honeynet Project]].

*[[Johan Helsingius|Johan "Julf" Helsingius]] — Operated the world's most popular anonymous remailer, the Penet remailer (called penet.fi), until he closed up shop in September 1996.

*[[Adrian Lamo]] - American hacker who gained notoriety by hacking high-profile websites using common flaws in their webpages. Hacks include [[The New York Times]], [[America Online|AOL]], [[MCI Worldcom]], [[Cingular]], [[Google]], and the [[National Security Agency|NSA]].

*[[Mark Russinovich]] - Expert on Windows architecture and programming; noted for identifying the limited differences between Windows NT Server and Workstation, and discovering the [[2005 Sony CD copy protection controversy|2005 Sony Rootkit]] software

*[[Bruce Schneier]] - Founder and [[Chief Technical Officer|CTO]] of [http://www.counterpane.com Counterpane Internet Security, Inc.]<ref>{{cite book | first=Bruce | last=Schneier | year=1994 | title=Applied Cryptography: Protocols, Algorithms, and Source Code in C | publisher=John Wiley & Sons | location=New York | id=ISBN 0-471-59756-2 }}</ref>

* [[Phil Zimmermann]] - Designer and developer of [[Pretty Good Privacy|PGP]] that brought [[public-key cryptography]] to the masses, and inadvertently upset the [[Federal government of the United States|US government]] which at the time considered [[cryptography]] to be a ''non-exportable munition''.

*[[Solar Designer]] — Founder of the [[Openwall Project]].

===Hacker media personalities===
Listed below are individuals who, while fitting in one or more of the above categories, are currently more widely famous (especially among the general public) for their media presence than their technical accomplishments.

*[[Loyd Blankenship]] (also known as [[The Mentor]]) &mdash; Former [[Legion of Doom (hacking)|LOD]] member. Author of [[Hacker Manifesto|The Conscience of a Hacker (Hacker's Manifesto)]].

*[[Eric Gorden Corley|Eric Corley]] (also known as [[Emmanuel Goldstein]]) &mdash; Long standing publisher of [[2600 The Hacker Quarterly|2600: The Hacker Quarterly]] and founder of the [[H.O.P.E.]] conferences. He has been part of the hacker community since the late '70s.

* [[Patrick K. Kroupa]] (also known as [[Lord Digital]]) &mdash; Former [[Legion of Doom (hacking)|LOD]] member, co-founder of [[MindVox]], author of Phantom Access programs, and MindVox: The Overture. Appears in over 20 books and hundreds of media and press articles.

*[[Kevin Mitnick]] &mdash; A former computer criminal who now (since his release from prison in 2000) speaks, consults, and authors books about [[social engineering]] and network security.

*[[Cult of the Dead Cow|CULT OF THE DEAD COW]] &mdash; A high profile hacker group that has both made news and been consulted by the media on numerous occasions.

*[[Eric S. Raymond]] &mdash; One of the founders of the [[Open Source Initiative]]. He wrote the famous text [[The Cathedral and the Bazaar]] and many other essays. He also maintains the [[Jargon File]] for the [[Hacker culture]], which was previously maintained by [[Guy L. Steele, Jr.]].

*[[Bruce Perens]] &mdash; Also one of the founders of the [[Open Source Initiative]]. He was the former [[Debian GNU/Linux]] Project Leader, and is the primary author of the [[Open Source Definition]].

*[[The 414s]] and Neal Patrick, subjects of brief but widespread media coverage in [[1983]], as the United States media was becoming aware of hackers

*[[Gary McKinnon]], accused of hacking into 97 [[Military of the United States|United States military]] and [[NASA]] computers in [[2001]] and [[2002]]. [http://news.bbc.co.uk/1/hi/technology/4757375.stm]

==See also==
*'''General'''
**[[Hacker culture]]
**[[Hacker ethic]]
**[[Computer crime]]
**[[Computer security]]
**[[Life hacking]]
**[[Hacker Emblem]]
**[[Hacker Manifesto]]
**[[Biohacker]]
**[[Reality hacker]]
**[[Wetware hacker]]
**[[Information wants to be free]]
**[[Video hacker]]

*'''Related'''
**[[Quick-and-dirty]]
**[[The Hacker Test]]
**The [[IBM 1130/snoopy calendar|Snoopy Calendar]] program is the classic Fortran program referenced in the Hacker Test
**[[Hackathon]]

*'''Lists'''
**[[List of fictional hackers]]

== References ==
<References/>

== Related books ==
<div class="references-small">
* {{cite book | authorlink = Steven Levy | last = Levy | first = Steven | title = [[Hackers: Heroes of the Computer Revolution]] | year = 1984 | id = ISBN 0-385-19195-2 | publisher = Doubleday }}
* {{cite book | authorlink = Bruce Sterling | last = Sterling | first = Bruce | url = http://www.mit.edu/hacker/hacker.html | title = The Hacker Crackdown | year = 1992 | id = ISBN 0-553-08058-X | publisher = Bantam }}
* {{cite book | last = Slatalla | first = Michelle | coauthors = Joshua Quittner | title = [[Masters of Deception]]: The Gang That Ruled Cyberspace | year = 1995 | id = ISBN 0-06-017030-1 | publisher = HarperCollins }}
* {{cite book | last = Dreyfus | first = Suelette | url = http://www.underground-book.com/ | title = Underground: Tales of Hacking, Madness and Obsession on the Electronic Frontier | year = 1997 | id = ISBN 1-86330-595-5 | publisher = Mandarin }}
* {{cite book | last = Verton | first = Dan | title = The Hacker Diaries : Confessions of Teenage Hackers | year = 2002 | id = ISBN 0-07-222364-2 | publisher = McGraw-Hill Osborne Media }}
</div>

==External links==
{{Sisterlinks|Hacker}}
*[http://www.catb.org/~esr/jargon The Jargon File]
*[http://wikihost.org/wikis/newjargonfile/ The New Jargon File]: An effort to establish an open hacker culture document, in the tradition of the [[Jargon File]]
*[http://www.catb.org/~esr/faqs/hacker-howto.html How To Become A Hacker] by [[Eric S. Raymond]]
*[http://stallman.org/articles/on-hacking.html On Hacking] by [[Richard Stallman|Richard M. Stallman]]
*[http://hacks.mit.edu/ The MIT Gallery of Hacks]
*[http://www.wpi.edu/~trb/hacker70s.html WPI Hackers of the '70s]
*[http://manifest.net.ru/manifest_en.html New "Hacker Manifesto"]

[[Category:Computer hacking]]
[[Category:Computing culture]]

[[ar:Hacker]]
[[bs:Hacker]]
[[ca:Hacker]]
[[cs:Hacker]]
[[da:Hacker]]
[[de:Hacker]]
[[es:Hacker]]
[[eu:Hacker]]
[[fr:Hacker]]
[[gl:Hacker]]
[[ko:해커]]
[[id:Hacker]]
[[it:Hacker]]
[[he:האקר]]
[[lt:Hakeris]]
[[hu:Hacker]]
[[nl:Hacker]]
[[ja:ハッカー]]
[[no:Hacker]]
[[pl:Haker]]
[[pt:Hacker]]
[[ru:Хакер]]
[[simple:Hacker]]
[[sl:Heker]]
[[fi:Hakkeri]]
[[sv:Hackare]]
[[th:แฮกเกอร์]]
[[tr:Hacker]]
[[zh:駭客]]

Revision as of 12:08, 4 October 2006

HAHAHAHHAHAHAHAHHAHAHAH JUSTIN PIGA & KANE WAS HERE!!!!!!