Hacker (programmer subculture)

From The Hidden Wiki
Jump to navigationJump to search

Template:Redirects here Template:Multiple issues

A hacker is an adherent of the subculture that originally emerged in academia in the 1960s, around the Massachusetts Institute of Technology (MIT)'s Tech Model Railroad Club (TMRC)<ref>TMRC - Hackers</ref> and MIT Artificial Intelligence Laboratory.<ref>Words to Avoid (or Use with Care) Because They Are Loaded or Confusing (gnu.org)</ref>

A hacker is one who enjoys the intellectual challenge of creatively overcoming and circumventing limitations of programming systems and who tries to extend their capabilities<ref name="Gehring 2004 43">Template:Cite book</ref> The act of engaging in activities (such as programming or other media<ref name=rms_hack>The Hacker Community and Ethics: An Interview with Richard M. Stallman, 2002 (gnu.org)</ref>) in a spirit of playfulness and exploration is termed hacking. However the defining characteristic of a hacker is not the activities performed themselves (e.g. programming), but the manner in which it is done: Hacking entails some form of excellence, for example exploring the limits of what is possible,<ref name=on_hacking>On Hacking (stallman.org)</ref> thereby doing something exciting and meaningful.<ref name=rms_hack /> Activities of playful cleverness can be said to have "hack value" and are termed hacks<ref name=on_hacking /> (examples include pranks at MIT intended to demonstrate technical aptitude and cleverness).

Richard Stallman explains about hackers who program:

Template:Quote

Hackers from this subculture tend to emphatically differentiate themselves from what they pejoratively call "crackers"; those who are generally referred to by media and members of the general public using the term "hacker", and whose primary focusTemplate:Mdashbbe it to malign or benevolent purposesTemplate:Mdashblies in exploiting weaknesses in computer security.<ref name=ESR_howto />

Definition

The Jargon File, an influential but not universally accepted compendium of hacker slang, defines hacker as "A person who enjoys exploring the details of programmable systems and stretching their capabilities, as opposed to most users, who prefer to learn only the minimum necessary."<ref name="J_F_hacker">Template:Cite book</ref> The Request for Comments (RFC) 1392, the Internet Users' Glossary, amplifies this meaning as "A person who delights in having an intimate understanding of the internal workings of a system, computers and computer networks in particular."<ref>Internet Users' Glossary (Request for Comments 1392), January 1993</ref>

As documented in the Jargon File, these hackers are disappointed by the mass media and general public's usage of the word hacker to refer to security breakers, calling them "crackers" instead. This includes both "good" crackers ("white hat hackers") who use their computer security related skills and knowledge to learn more about how systems and networks work and to help to discover and fix security holes, as well as those more "evil" crackers ("black hat hackers") who use the same skills to author harmful software (like viruses, trojans, etc.) and illegally infiltrate secure systems with the intention of doing harm to the system.<ref name="jargoncracker">[1] Definition of "Cracker" in the Jargon File</ref> The programmer subculture of hackers, in contrast to the cracker community, generally sees computer security related activities as contrary to the ideals of the original and true meaning of the hacker term that instead related to playful cleverness.<ref name="jargoncracker"/>

History

Template:Unreferenced section

The word "hacker" derives from the seven*****th century word of a "lusty laborer" who harvested fields by dogged and rough swings of his hoe. Although the idea of "hacking" has existed long before the term "hacker"Template:Mdashbwith the most notable example of Lightning Ellsworth, it was not a word that the first programmers used to describe themselves. In fact, many of the first programmers were oftentimes from the engineering or physics background. "But from about 1945 onward (and especially during the creation of the first ENIAC computer) some programmers realized that their expertise in computer software and technology had evolved not just into a profession, but into a passion" (46).<ref name="Gehring 2004 43"/>

It was not until the 1960s that the term hackers began to be used to describe proficient computer programmers. Therefore, the fundamental characteristic that links all who identify themselves as hackers are ones who enjoy "…the intellectual challenge of creatively overcoming and circumventing limitations of programming systems and who tries to extend their capabilities" (47).<ref name="Gehring 2004 43"/> With this definition in mind, it can be clear where the negative implications of the word "hacker" and the subculture of "hackers" came from.

Some common nicknames among this culture include "crackers" who are unskilled thieves who mainly rely on luck. Others include "phreak"Template:Mdashbwhich refers to a type of skilled crackers and "warez d00dz"Template:Mdashbwhich is a kind of cracker that acquires reproductions of copyrighted software. Within all hackers are tiers of hackers such as the "samurai" who are hackers that hire themselves out for legal electronic locksmith work. Furthermore, there are other hackers that are hired to test security which are called "sneakers" or "tiger teams".

Before communications between computers and computer users were as networked as they are now, there were multiple independent and parallel hacker subcultures, often unaware or only partially aware of each other's existence. All of these had certain important traits in common:

  • Creating software and sharing it with each other
  • Placing a high value on freedom of inquiry
  • Hostility to secrecy
  • Information-sharing as both an ideal and a practical strategy
  • Upholding the right to fork
  • Emphasis on rationality
  • Distaste for authority
  • Playful cleverness, taking the serious humorously and the humor seriously

These sorts of subcultures were commonly found at academic settings such as college campuses. The MIT Artificial Intelligence Laboratory, the University of California, Berkeley and Carnegie Mellon University were particularly well-known hotbeds of early hacker culture. They evolved in parallel, and largely unconsciously, until the Internet, where a legendary PDP-10 machine at MIT, called AI, that was running ITS, provided an early meeting point of the hacker community. This and other developments such as the rise of the free software movement and community drew together a critically large population and encouraged the spread of a conscious, common, and systematic ethos. Symptomatic of this evolution were an increasing adoption of common slang and a shared view of history, similar to the way in which other occupational groups have professionalized themselves but without the formal credentialing process characteristic of most professional groups.Template:Citation needed

Over time, the academic hacker subculture has tended to become more conscious, more cohesive, and better organized. The most important consciousness-raising moments have included the composition of the first Jargon File in 1973, the promulgation of the GNU Manifesto in 1985, and the publication of Eric Raymond's The Cathedral and the Bazaar in 1997. Correlated with this has been the gradual recognition of a set of shared culture heroes, including: Bill Joy, Donald Knuth, Dennis Ritchie, Paul Graham, Alan Kay, Ken Thompson, Richard M. Stallman, Linus Torvalds, Larry Wall, and Guido Van Rossum.

The concentration of academic hacker subculture has paralleled and partly been driven by the commoditization of computer and networking technology, and has in turn accelerated that process. In 1975, hackerdom was scattered across several different families of operating systems and disparate networks; today it is largely a Unix and T*****/IP phenomenon, and is concentrated around various operating systems based on free software and open-source software development.

Ethics and principles

Template:Main

Many of the values and tenets of the free and open source software movement stem from the hacker ethics that originated at MIT<ref>Template:Cite web</ref> and at the Homebrew Computer Club. The hacker ethics were chronicled by Steven Levy in Hackers: Heroes of the Computer Revolution<ref name="Levy">Levy, S: "Hackers: Heroes of the Computer Revolution", Anchor Press/Doubleday, 1984. ISBN 0-385-19195-2</ref> and in other texts in which Levy formulates and summarizes general hacker attitudes:

  • Access to computers-and anything that might teach you something about the way the world works-should be unlimited and total.
  • All information should be free.
  • Hackers should be judged by their hacking, not bogus criteria such as degrees, age, race, or position.
  • You can create art and beauty on a computer.
  • Computers can change your life for the better.

Hacker ethics are concerned primarily with sharing, openness, collaboration, and engaging in the hands-on imperative.<ref name="Levy"/>

Linus Torvalds, one of the leaders of the open source movement (known primarily for developing the Linux kernel), has noted in the book The Hacker Ethic<ref>Himanen, Pekka; Linus Torvalds, and Manuel Castells (2001). The Hacker Ethic. Secker & Warburg. ISBN 0-436-20550-5.</ref> that these principles have evolved from the known Protestant ethics and incorporates the spirits of capitalism, as introduced in the early 20th century by Max Weber.

Use outside of computing

While using hacker to refer to someone who enjoys playful cleverness is most often applied to computer programmers, it is sometimes used for people who apply the same attitude to other fields.<ref name="ESR_howto">Template:Cite web </ref> For example, Richard Stallman describes the silent composition 4′33″ by John Cage and the 14th century palindromic three-part piece "Ma Fin Est Mon Commencement" by Guillaume de Machaut as hacks.<ref>Template:Cite web</ref> According to the Jargon File,<ref name="J_F_hacker" /> the word hacker was used in a similar sense among radio amateurs in the 1950s, predating the software hacking community.

The book Inside Narcotics, a semi-clandestine work appearing in 1990 and in its fifth English edition as of 2007 which is a compendium of scientific, historical, and cultural information about the opiates and related drugs and includes historical and scientific research on more than 150 drugs of this type, includes a discussion of the term in its Introduction. After making the above-mentioned distinction betwixt crackers and hackers ("a hacker is simply an autodidact, someone who doesn't feel satisfied with the information spoon-fed to the masses by the grey forces of mediocrity...") it goes on to say "it is therefore possible to be a phone hacker [ phreaker ], music hacker, ***** hacker, drugs hacker, politics hacker, religion hacker..."

Hack value

Template:Refimprove section Hack value is the notion used by hackers to express that something is worth doing or is interesting.<ref>Definition of 'hack value' in the Jargon File</ref> This is something that hackers often feel intuitively about a problem or solution.

An aspect of hack value is performing feats for the sake of showing that they can be done, even if others think it is difficult. Using things in a unique way outside their intended purpose is often perceived as having hack value. Examples are using a dot matrix impact printer to produce musical notes, using a flatbed scanner to take ultra-high-resolution photographs or using an optical mouse as barcode reader.

A solution or feat has "hack value" if it is done in a way that has finesse, cleverness or brilliance, which makes creativity an essential part of the meaning. For example, picking a difficult lock has hack value; smashing a lock does not. As another example, proving Fermat's last theorem by linking together most of modern mathematics has hack value; solving a combinatorial problem by exhaustively trying all possibilities does not. Hacking is not using process of elimination to find a solution; it's the process of finding a clever solution to a problem.

See also

Template:Portal

References

1 }}
     | references-column-width 
     | references-column-count references-column-count-{{#if:1|30em}} }}
   | {{#if: 
     | references-column-width }} }}" style="{{#if: 30em
   | {{#iferror: {{#ifexpr: 30em > 1 }}
     | Template:Column-width
     | Template:Column-count }}
   | {{#if: 
     | Template:Column-width }} }} list-style-type: {{#switch: 
   | upper-alpha
   | upper-roman
   | lower-alpha
   | lower-greek
   | lower-roman = {{{group}}}
   | #default = decimal}};">
<references group=""></references>

Further reading

The Jargon File has had a role in acculturating hackers since its origins in 1975.Template:Citation needed These academic and literary works helped shape the academic hacker subculture:Template:Citation needed

External links

Template:Commons category