Tuesday, April 5, 2011

Hacker & hacker ethics




Who is hacker?
The word “hacker” refers to someone who breaks into systems to damage it, or for the purpose of getting illegitimate access to resources.
It can also be defined as a person who enjoys exploring the details of programmable systems and how to stretch their capabilities, as opposed to most users, who prefer to learn only the minimum necessary.


The Hacker's Ethics

The idea of a "hacker ethic" is perhaps best formulated in Steven Levy's 1984 book, Hackers: Heroes of the Computer Revolution. Levy came up with six tenets:
  1. Access to computers - and anything which might teach you something about the way the world works - should be unlimited and total. Always yield to the Hands-On imperative!
  2. All information should be free.
  3. Mistrust authority - promote decentralization.
  4. Hackers should be judged by their hacking, not bogus criteria such as degress, age, race, or position.
  5. You can create art and beauty on a computer.
  6. Computers can change your life for the better.

PHRACK, recognized as the "official" hacker newsletter, expanded on this creed with a rationale that can be summarized in three principles ("Doctor Crash," 1986).
[1] First, hackers reject the notion that "businesses" are the only groups entitled to access and use of modern technology.
[2] Second, hacking is a major weapon in the fight against encroaching computer technology.
[3] Finally, the high cost of equipment is beyond the means of most hackers, which results in the perception that hacking and phreaking are the only recourse to spreading computer literacy to the masses:
"Hacking. It is a full time hobby, taking countless hours per week to learn, experiment, and execute the art of penetrating multi-user computers: Why do hackers spend a good portion of their time hacking? Some might say it is scientific curiosity, others that it is for mental stimulation. But the true roots of hacker motives run much deeper than that. In this file I will describe the underlying motives of the aware hackers, make known the connections between Hacking, Phreaking, Carding, and Anarchy, and make known the "techno-revolution" which is laying seeds in the mind of every hacker. . . .If you need a tutorial on how to perform any of the above stated methods {of hacking}, please read a {PHRACK} file on it. And whatever you do, continue the fight. Whether you know it or not, if you are a hacker, you are a revolutionary. Don't worry, you're on the right side". ("Doctor Crash," 1986)
Although hackers freely acknowledge that their activities may be occasionally illegal, considerable emphasis is placed on limiting violations only to those required to obtain access and learn a system, and they display hostility toward those who transgress beyond beyond these limits. Most experienced CU members are suspicious of young novices who are often entranced with what they perceive to be the "romance" of hacking. Elite hackers complain continuously that novices are at an increased risk of apprehension and also can "trash" accounts on which experienced hackers have gained and hidden their access.
In sum, the hacker style reflects well-defined goals, communication networks, values, and an ethos of resistance to authority. Because hacking requires a broader range of knowledge than does phreaking, and because such knowledge can be acquired only through experience, hackers tend to be both older and more knowledgeable than phreaks. In addition, despite some overlap, the goals of the two are somewhat dissimilar. As a consequence, each group constitutes a separate analytic category. 
                        
Linus Torvald:

Linu's law appears in the prologue written by Linus torvald, who is the creator of the Linux operating system and one of the world's most famous hackers.It states that all the motivations (of hackers) fall into 3 categories and progress is about going through those very simple things in process of evolution.The categories in order are Survival , Social life and Entertainment .To hackers survival is not the main thing , by the time u have comp on ur desk, its not likely that your first worry is how to get next meal or keep a roof over ur head ,Survival is still a motivation factor,but is not really a main concern.He defines a hacker as a person who has progressed beyond first category and motivated by the II and III.Linus notes that  this progress from survival to social,to entertainment goals  can only occur if survival concerns are not foremost in one's mind .

-N.HARDEV
  CH09B066




5 comments:

Unknown said...

packers and movers delhi
packers and movers in pune
packers and movers in hyderabad

Unknown said...

I am very impress about your thoughts and this post writing material.

android call recorder

Unknown said...

Fine! Articles and content in this section of the website are really amazing.
Great ideas indeed! I will surely keep these in my mind!
cleaning in brisbane

Unknown said...

Fine! Articles and content in this section of the website are really amazing. Great ideas indeed! I will surely keep these in my mind!
Vietnamese restaurants Auckland

Laboni Akter said...

best websites list | free ebooks download pdf | bangla full movies | ftp server bd

Post a Comment

Twitter Delicious Facebook Digg Stumbleupon Favorites More

 
Powered by Blogger | Printable Coupons