Tuesday, April 5, 2011

Who is a HACKER ??

Hacker Defination 


In the media the word "hacker" is often used, for what I would call a "cracker", someone that breaks into systems to damage it, or for the purpose of getting illegitimate access to resources. A definition for hacker is found in The Hacker FAQ by Peter Seebs.
Ari Lukumies wrote:
    As far as my terminology serves, crackers are those who give hackers a bad name (because most of the people cannot distinguish the two). Somebody who breaks into other's computer systems, or digs into their code (in order to make a copy-protected program run, for example) is a cracker. Then, someone who's really good at what he does with computers, is called a hacker. A hack, in software circles, is a quickly written short piece of code that makes something work. It may not be beautiful to look at, but it makes things function.
     Hacker ethics
    .1 The belief that information-sharing is a powerful positive good, and that it is an ethical duty of hackers to share their expertise by writing open-source code and facilitating access to information and to computing resources wherever possible.

    2. The belief that system-cracking for fun and exploration is ethically OK as long as the cracker commits no theft, vandalism, or breach of confidentiality.
    Both of these normative ethical principles are widely, but by no means universally, accepted among hackers. Most hackers subscribe to the hacker ethic in sense 1, and many act on it by writing and giving away open-source software. A few go further and assert that all information should be free and any proprietary control of it is bad; this is the philosophy behind the GNU project.
    Sense 2 is more controversial: some people consider the act of cracking itself to be unethical, like breaking and entering. But the belief that ‘ethical’ cracking excludes destruction at least moderates the behavior of people who see themselves as ‘benign’ crackers (see also samurai, gray hat). On this view, it may be one of the highest forms of hackerly courtesy to (a) break into a system, and then (b) explain to the sysop, preferably by email from a superuser account, exactly how it was done and how the hole can be plugged — acting as an unpaid (and unsolicited) tiger team.
    The most reliable manifestation of either version of the hacker ethic is that almost all hackers are actively willing to share technical tricks, software, and (where possible) computing resources with other hackers. Huge cooperative networks such as Usenet, FidoNet and the Internet itself can function without central control because of this trait; they both rely on and reinforce a sense of community that may be hackerdom's most valuable intangible asset.


    Example of  Hacker :
    In the late 1970s and early 1980s, the hacker culture that Stallman thrived on began to fragment. To prevent software from being used on their competitors' computers, most manufacturers stopped distributing source code and began using copyright and restrictive software licenses to limit or prohibit copying and redistribution. Such proprietary software had existed before, and it became apparent that it would become the norm. This shift in the legal characteristics of software can be regarded as a consequence triggered by the U.S. Copyright Act of 1976, as stated by Stallman's MIT fellow Brewster Kahle.
    When Brian Reid in 1979 placed time bombs in Scribe to restrict unlicensed access to the software, Stallman proclaimed it "a crime against humanity." He clarified, years later, that it is blocking the user's freedom that he believes is a crime, not the issue of charging for the software.
    In 1980, Stallman and some other hackers at the AI Lab were refused access to the source code for the software of the first laser printer, the Xerox 9700. Stallman had modified the software on an older printer (the XGP, Xerographic Printer), so it electronically messaged a user when the person's job was printed, and would message all logged-in users when the printer was jammed. Not being able to add this feature to the Dover printer was a major inconvenience, as the printer was on a different floor from most of the users. This experience convinced Stallman of people's need to be free to modify the software they use.
    Richard Greenblatt, a fellow AI Lab hacker, founded Lisp Machines, Inc. (LMI) to market Lisp machines, which he and Tom Knight designed at the lab. Greenblatt rejected outside investment, believing that the proceeds from the construction and sale of a few machines could be profitably reinvested in the growth of the company. In contrast, the other hackers felt that the venture capital-funded approach was better. As no agreement could be reached, hackers from the latter camp founded Symbolics, with the aid of Russ Noftsker, an AI Lab administrator. Symbolics recruited most of the remaining hackers including notable hacker Bill Gosper, who then left the AI Lab. Symbolics forced Greenblatt to also resign by citing MIT policies. While both companies delivered proprietary software, Stallman believed that LMI, unlike Symbolics, had tried to avoid hurting the lab's community. For two years, from 1982 to the end of 1983, Stallman worked by himself to clone the output of the Symbolics programmers, with the aim of preventing them from gaining a monopoly on the lab's computers.
    Stallman argues that software users should have the freedom to share with their neighbor and to be able to study and make changes to the software that they use. He maintains that attempts by proprietary software vendors to prohibit these acts are antisocial and unethical.The phrase "software wants to be free" is often incorrectly attributed to him, and Stallman argues that this is a misstatement of his philosophy. He argues that freedom is vital for the sake of users and society as a moral value, and not merely for pragmatic reasons such as possibly developing technically superior software.
    In February 1984, Stallman quit his job at MIT to work full-time on the GNU project, which he had announced in September 1983.

    Syed Ashruf
    AE09b025

    4 comments:

    Unknown said...

    packers and movers delhi
    packers and movers in pune
    packers and movers in hyderabad

    Unknown said...

    www.mixresult.com, a new-generation Mix education result news portal, publishes update result news from a highly interactive platform.
    www.mixresult.com

    Unknown said...

    weight loss tips
    weight loss tips

    Call Girls in Dubai said...

    If you are eager to spend a special romantic time with Dubai Escorts +971552300726 so now you have a good chance meet sexy, stylish and experienced Indian Escorts in Dubai. Because our Top Escorts Dubai agency have huge collection of escorts in Dubai which are modish, stunning, chic and young. Just call and Let us know your needs and wishes. We make you sure that you will really enjoy with our call girls in Dubai which are available 24/7 both in call and out call whole Dubai &Abu Dhabi.

    Post a Comment

    Twitter Delicious Facebook Digg Stumbleupon Favorites More

     
    Powered by Blogger | Printable Coupons