Talk:Hacker

Contents


I've got huge problems with this page. It's just the whole seperation of hackers/cracker is just plain wrong. It's good to explain the arguement exists but don't try seperating hacker computer expers from hacker criminals. It's just not how it really is. The hacker subculture that was in it's prime in the late 80s early 90s was filled with people that many of you may call crackers or criminal hackers, but many of them (definitely not all) where also experts at what they were doing. You shouldn't try seperating this. Some people of any type do good or bad things. A hacker is someone with a love of technology that pushes it to the limit. Whether it's illegal or not has nothing to do with whether they are hacker. As for the term cracker, explain the debate and drop it. Within the hacker subculture (semi-criminal, if you will) even today the word cracker is used, but only to describe those people cracking software. You hack computers, you crack software. Anyway, that's my two cents.


??? ____

I have some problems with this new version of the article. I think that it blurs the boundaries between hackers and crackers, especially in the talk of "black hat" and "white hat" hackers (terms I have never heard before). "Black hat" hacking (as I understand it) seems to be the same thing as cracking. -- Simon J Kissane


??? ____

Black Hat Hacking is intended to be the same thing as Cracking. I'm glad the point was clear even if I didn't write that particular section. (I did rearrange the content though.) In common use there are three meanings of the word Hacker, and I was trying to cover all three. The press doesn't generally say Black Hat Hacker, they just say Hacker, but it is a common usage, and thus should be described. -- ksmathers


Well, while I admit it is a common usage, a lot of people strongly disagree with people who break into computers being called hackers, and would rather have them called crackers. And I disagree that there are three common meanings of the term. I can only count two: hacker in the sense of an expert programmer; and hacker in the sense of someone who breaks into computers. Your 'black hat'/'white hat' distinction seems to amount to little more than a 'good' cracker / 'bad' cracker distinction. And the terms 'black hat' and 'white hat' are not in common use -- the point wasn't really clear: I had to guess what you meant, and I could only do that because I am already more than familiar with what we are talking about here. So I respectfully suggest you delete this 'black hat'/'white hat' hacker discussion, and leave it just with the 'hacker'/'cracker' distinction that was there originally. - Simon J Kissane


On the contrary, Black Hat, and White Hat are very commonly used terms among the security community. Here is a random link (http://whatis.techtarget.com/definition/0,289893,sid9_gci550815,00.html) I just found. Execute a search on Google if you truly don't believe that the usage is commonplace.

I would also rather that people didn't use Hacker and Cracker interchangably. What is more I'd rather that it didn't rain on my Birthday. I can understand a certain idealistic attachment to keeping the meaning of the word secure to your own preferences, but I also have an idealistic streak. My idealistic streak is to represent without bias the actual way the world is. -- ksmathers I have recently heard of a new phrase amongst my students, (I am a computer science lecturer) which refers to hackers. It is "White Wig" hackers and refers to "Ethical hackers". The wig connection is to judges in courts of law.


def 1. fails to include hardware hackers. This should be be rewritten to be non-specific to software. (or maybe we can redefine software...)


The Description of "Guru" hacker is slightly off. The definition given in the article is more applicable to a kind of person (or hacker) known as a "Real Programmer" (sometimes people add (tm) to that.) . See the Jargon File. www.jargon.org

So what's a Guru then? Here's some suggestions, and I'll research those later when I have more time.

Generally Computer Scientists are the people that are referred to as Gurus.

Guru originally comes from iirc the india-n word for "Teacher". So, often a person might only be referred to as a guru if they actually also teach their hacking ability to others. This might only be common where I live, so YMMV

I always understood you could divide programmers up as to level of skill as in: amateur, professional, hacker, guru. Usage might only be local, YMMV.

--Kim Bruning


I checked the jargon file (as the first place to look) It defines a Guru as someone who has a "wizard" level of skill, AND is known as a person who is a knowlege resource to others.

Checking the link to wizard reveals that a wizard is someone who has extensive knowlege of a certain subject.

I think the sum of this is that a guru hacker and a computer scientist will often be the same thing, contrary to what is currently being said here.

--Kim Bruning

What was actually discussed seemed to me to be the Jargon File/open source software/etc definition of hacker, so I changed the heading to read "Hacker -- Brilliant Programmer" as guru, in hackish slang, has a different meaning entirely. -- kpearce


From the article:

A Hacker in stride can produce a couple of thousand lines of code an hour as thought translates itself directly into code.

Um, no? - Lament

That's a pretty serious exaggeration, isn't it? I'll change it to "a few hundred" for now. Don't be shy about fixing that if you don't think it's realistic. - kpearce

Does Metaprogramming count? If it does, you could probably think up (extremely rare and probably pathological) situations where millions of lines of code could be generated in under an hour. An average production of 1000s of lines per hour in certain limited situations can be realistic then. --Kim Bruning


Anonymous user 63.224.75.138 is claiming his/her additions are correct. I don't know, but as I've just seen this user being rather annoying on the Afghan bits I'm not inclined to believe what s/he has to say. BUT as I don't know I'm not editing further, I'm just leaving this note to explain why I reverted his/her edit in the first place. -- poco poco 21:34 19 Jul 2003 (UTC)


The PDP-1 comment is wrong, see the first chapter in Levy - TMRC people fiddled with 704 and TX-0 before PDP-1 appeared. Not sure how best to phrase tho. Stan 23:18 25 Jul 2003 (UTC)

You are quite right, but I left it as the PDP-1 since that was the computer where the hacker culture really got going (although I suppose it was going pretty good with the TX-0). Also, TMRC didn't own the PDP-1 (or TX-0); computers were too expensive back then. I think they both belonged to RLE, but that might be wrong. Noel 16:28, 8 Sep 2003 (UTC)

Removed from article:

"The term hacker should not be used indiscriminately, as those who have proven themselves as adept understanders of modern technology are increasingly few and far between."

Objections:

  • Wikipedia ought not to give advice like this; it should just state facts
  • "hacker" does not equal "adept understanders of modern technology": how many hackers could explain modern technology in all its facets?
  • presumably, the author meant "modern computer technology", but what is the source of the assertion that such people are increasingly few and far between?

--Cyan 09:24, 19 Sep 2003 (UTC)


I added a definition of h4x0r, but I dont' feel entirely comfortable about it. What do you guys think? Please modify it to make it more accurate. I was only able to give my own perceived definition of the term. Tjdw 02:28, 5 Oct 2003 (UTC)


I expect my comments to be somewhat controversial, striking at the heart of a matter near and dear to, likely, much of the crowd likely to be following the backstairs of this topic. I'm not by any means certain of the explanation, but it does seem to fit the facts as I perceive them, and I hope I couched the language appropriately. As the summary says, discuss if you can, edit if you must. I *do* think it might fit just as aptly somewhere else -- or perhaps I've merely deprived the following graf of it's lead... -- Baylink 00:45, 16 Dec 2003 (UTC)


I keep looking at "as thought translates directly into code" and hmm, that might not be quite NPOV, might it?

Using known patterns, using code to generate more code, and doing some careful planning ahead are probably what gives a hacker most of his/her speed. It's not even nescesarily true that code written by expert programmers is hard to read. See a typical scheme interpreter or the linux kernel. Sometimes automated code generation can go astray though, see a Sendmail.mc after you run it through m4 :-P.

People who observe hackers sometimes do see them typing at quite a rate of speed. Usually a good programmer will remember many common patterns (see also : Design Patterns. In practice a programmer will often use simpler patterns than those published ones as well.) , and what you are seeing is the programmer just entering a sequence of patterns with minor variations, so (s)he can just do that by rote. If you're lucky most of your programme consists of those patterns, and you can just keep thinking on the pattern level, which can be many times faster than you can type :-)

 -- Kim Bruning

In the PDP-1 days, Peter Deutsch appeared to be capable of typing PDP-1 assembly language continuously at a speed of around 5 characters per second at a sustained rate over big fractions of an hour, but whether this meant that he was programming at this speed or whether he was expressing programming thoughts that he had built up over days, I don't know. (It might not be impossible to ask him). I am very uneasy at the comments about the speed at which hackers program, though. It reminds me of all the guff about how Edison only needed two hours' sleep a day, or how [insert favorite CEO, statesman, etc.] was so brilliant and energetic that it took a team of secretaries just to write down all the thoughts he came up with, etc. etc. And I don't much like the suggestions that you can program at fantastic speeds by using metaprogramming/design patterns/flow charts/insert methodology-flavor-of-the-month here.

It is said that Mozart, a music hacker of the first order, could, on occasion, compose an entire symphony from first note to last in complete detail in his head in a single instant. Nevertheless, his lifetime rate of production averaged just over one symphony per year. By this metric, Haydn did somewhat better, Beethoven somewhat worse. Perhaps Beethoven could have done better if had been a more brilliant hacker, or if he had made better use of Grady-Booch diagrams. No doubt the productivity of these gentleman was enhanced by their use of familiar musical design patterns such as sonata-allegro form... Dpbsmith 17:30, 6 Jan 2004 (UTC)

Hmmm, did someone use the term metaprogramming for some other definition than I'm aware of?

Yes, Charles Simonyi of Microsoft. According to http://www.theage.com.au/articles/2002/09/18/1032054855232.html,
Simonyi, 54, introduced the concept of metaprogramming at Microsoft, turning it into what people sometimes referred to as a software factory. This was something on which he had written a thesis. The metaprogramming concept did not work out in practice but Simonyi set technical strategy at Microsoft for years.
Robert X. Cringeley wrote "Simonyi's dissertation was an attempt to describe a more efficient method of organizing programmers to write software... the metaprogrammer was the designer, decision maker, and communication controller in a software development group.... individual progammers were allowed to make no design decisions about the project. All they did was write the code as described by the metaprogrammer.... A programmer with a problem or a question would take it to the metaprogrammer, who could come up with an answer or transfer the question to another programmer... the alternative was to allow free discussion of the problem, which might involve many programmers working in parallel on the problem, using up too much of the group's time.... It was clear after less than three months that metaprogramming was a failure." (Accidental Empires, 1992)
And it's even been added to metaprogramming Thanks! :-) -- KB

As I understand it, metaprogramming is the use of code to generate more code as a kind of bootstrap process, which has been done for quite a long time. If you define it that way, you could go on to claim that compilers evolved from early attempts at metaprogramming. Not really a "methodology-flavor of the month" I think.

I do agree design patterns is also the name of a modern methodology. Even so, programmers were probably using some kinds of patterns to organise their thoughts before the advent of the methodology, I'm sure!

"Building up programming thoughts over several days" is a good start at elaborating on "careful planning."

    --Kim Bruning

I've added a (trivial) example where a programmer can generate exactly 1000 lines of code in under 10 minutes at metaprogramming. I'd be interested to see if people can provide a simple nontrivial example too! -- Kim Bruning


What sort of image, if any, would improve the Hacker page? I've added a new page for the (proposed) Hacker Emblem and listed it under "See Also". Lacking another image, does anyone think including that emblem would improve this page? Or is it too political or unrecognized? Ds13 20:14, 2004 Feb 22 (UTC)

I'm not sure about the emblem - it is only one person's idea, and I'm not sure it would be fair to claim it symbolizes an entire culture, or set of cultures. Perhaps something from the MIT Gallery of Hacks (http://hacks.mit.edu/Hacks/), if permission can be obtained? NMcCoy 22:48, Mar 23, 2004 (UTC)


This sentence: "Whether this is good (white hat) or bad (black hat) may depend on whether you are the US Government or not, but is generally considered by the computing community to be a white hat type of activity." needs to be supported better, to remain within NPOV.

The example of disassembling MS code is at best 'grey hat' type of activity because it was clearly disassembling proprietary code, and clearly circumventing laws. White hat must retain a reputation for perfect legality, and a high standard of ethics if it is to mean something. Thus, this was a grey matter. Please use 'white hat' to refer to Larry Wall, or open source hacking, or closed-source disassembling which has some universally undeniable virtue like it clearly saves lives, or proves election fraud, not simply gets around cryptography exportation laws.

I, too, do not think the emblem is universally hacker: it's only one person's idea, and it is silly to claim it symbolizes an entire culture, or set of cultures, especially one generally antiposed to marketing strategies like emblems. An emblem strikes me as a cool script-kiddie way of looking at hacking, and carries none of the quiet unobtrusiveness which typifies the hacker. Yet I like ESR's other contributions.


Moved from the "Hacker: Computer criminal" section of the article:

  • "What makes someone a "hacker", a "computer criminal", or just a regular computer user? Once these details are known, the proper word (or combination) can be accurately applied."

What word is "proper" is POV, in my opinion.

  • "If a locksmith used his skills to break into a building, few would debate that he had crossed into the criminal world and there would be no need to invent a word to define criminal or malicious locksmiths. The reason hackers face these kinds of problems is because the mass media tends to believe anyone who says they are a hacker - and people say they are hackers because of the mass media's sensationalist portrayals. This deceptive cycle will probably only come to an end with the education of reporters and the general public on what constitutes a hacker and what does not. A group known as the "Hacker Antidefamation League" has this goal."

Characterizing media as sensationalist, speculation as to people's motives -> POV

  • "But, indeed, it's likely that the confusion and dissonance exists precisely because "hacking" describes a skill set -- akin to picking locks -- whose tools can be used both ethically and unethically, by both people who are basically ethical, and those who are not (these are two related, but separate distinctions -- what long-time system administrator has not violated a company policy by breaking into some company facility for an authorized user in order that that person can complete an important project?) This may well be the crux of the argument, in fact: so-called 'white-hat' hackers are uncomfortable at the exposure of the darker side of their skill-set, notwithstanding the fact that, like comic-book superheroes, they only utilize those skills for Good."

This seems to be largely speculation. The parenthetical question doesn't have any place in an encyclopedia, nor does an "argument" without context. The comparison with comic-book superheroes seems silly. Wmahan 05:17, 2 Apr 2004 (UTC)


Some people here discuss the idea by some hackers that hackers who break a law while hacking are not hackers. Which is fine. So we have a distinction that these people want to make: legal hackers and illegal hackers. OK. I would say though that if this distinction would be made, some of the people in the latter group would also be interested in an internal distinction within the latter group - between those that break the law but do things which they feel are harmless or even positive, and people who break the law and do things which are either self-serving (stealing money for their own personal use) or malicious in a misanthropic sense (trying to derail trains by computer out of a sense of misanthropy, or shutting down the 911 fire/ambulance system to try to kill people).

It seems that not only do some "all-legal" hackers want to distinguish between legal hacking and illegal hacking (with the second you violate the authority of the government, it no longer be hacking in their eyes), they want to heap scorn on these hackers, jumbling up someone who breaks into NASA just to have a look around their computers, with someone trying to cause as much mayhem as possible out of a sense of misanthropy.

I should point out that the US government used hacking methods to blow up (and probably kill) people in some remote USSR outpost. That is why I say misanthropic - whether that was misanthropic or not is debatable, but one could argue they did it for political reasons out of philanthropy (love of humanity). Or one could argue the opposite.

So if you're going to split hackers into legal and illegal ones, please do not give the POV asserion that everything that is illegal is malicious. In the US, aiding runaway slaves used to be illegal, and smoking marijuana is currently illegal, although that doesn't mean either of these activities is necessarily malicious.

Also, the common usage of hackers who break the law is - hackers. You can note that some people dislike this, but it's common usage, and thus they should be called hackers on Wikipedia. Long John Silver 02:08, 4 Apr 2004 (UTC)


Removed for POV. Someone (probably me, when I get time...) could work information from this into the entry:

The definition below is all very modern, and its meaning is quite scattered. I believe this is because it was written by computer programmers of recent vintage. The various meanings of the term become more clearly related when one realizes that the word has its roots in centuries past.

Originally, the word was used to describe a worker who made wooden furnishings using no tool other than an axe. By extension, it came to mean one who gets quickly through a necessary job by hook, crook, skin of teeth, and desperation.

It came to be used to describe the sort of writer who wants to write a story and get it published in a magazine of similar stories. When a publisher rejects the story, the "hack" writer reconsiders his text, rewrites parts that might seem weak, and re-submits it to the same or to a different publisher. The process is reiterated until acceptance is achieved.

In London, a prospective "cabby" is required to prove, orally, that he has committed each and every street, lane, alley, and roundabout in his ancient city to memory --- after demonstrating a friendly, untroubled, phlegmatic temperament and perfect driving record. In New York City, a great many taxi drivers learn the many local traffic patterns while actually on the job. They are called "hacks". So the word and its meaning retain a similar relationship throughout these changes in its implementation.

In the 1960s, programmers supplied software for mainframes, like the venerable IBM 1401. This process invloved a lot of paper. When the worker was reasonably sure he'd filled his pages with code that would work, he got an associate or two to do a "walk-through" with him. More pages were filled with charts containing the values of all the computer's registers for each operation in the program for a given, reasonable set of data; the various values of each variable employed; and the values for possible branches, forks, etc. If they didn't notice any outstanding flaws, this peer review would be repeated with others in the department. Then it would be repeated (with a change of data set) under the more experienced eye of the manager, and maybe again with a VP. Walk-throughs were more than normal, they were required; for each run on the actual hardware was a relatively expensive action.

Then came the 1980s and Apple and IBM began the process of putting computing power onto desktops. Desktop programmers almost immediately dispensed with the walk-through entirely. The new norm involved downloading code from the mind of the programmer right into the machine.

Edit. Compile. Link. Run. Shucks! Repeat.

Now we are hacking! That's what it means! Almost all programming done, in these desktop days, is hacking. The word, in itself, should never connote illegality. Like any type of behavior, it may or may not be legal depending on the individual case. Those who assume the word always means cracking in, vandalizing, or stealing are not cognizant of the word's etymology. They are not scholars. They are intellectually non-rigorous. They are schieskopfen.

When you view this larger picture, you see that the word really didn't change much throughout this evolution. It still implies one whose work is rough, quick and dirty, and almost desperate, or barely adequate. Any good definition should fill in the connections among the various contemporary usages. I don't seek to fault or disprove most of the divers items in the definition below, yet I protest that they're all over the map! And as I've endeavored to show, "hacker history" did not "begin...in the 1950s"! Folk have been hacking for quite a long time.

Alas for this theory, the word "hacker" was well established in computers circles at MIT and other places well before "the 1980s and ... the process of putting computing power onto desktops". If nothing else, the type->compile->run debug cycle was established well before them, both by the advent of time-sharing, as well as things like BASIC, created long before the 1980s exactly to encourage that programming style.
Yes, the word certainly has a long etymology before that, but it's not at all clear that that etymology has much (any?) connection to the computer term, which I believe started at MIT. The thing is that the term "hack" at MIT appears to have pre-dated computers, meaning "a neat and clever action", usually a practical joke, and "hacker" appears to have come from that - i.e. the noun predated the verb. MIT had "hackers" in many fields, not just computers. And during the 1970s at MIT, a computer "hacker" was definitely not someone "whose work is rough, quick and dirty, and almost desperate, or barely adequate". Noel 14:18, 12 Sep 2004 (UTC)

Yet more text moved from the article: Industry standard rates of development are in the range of 6-10 lines of code (debugged, and documented) per hour. A Hacker in stride can produce a few hundred or occasionally even thousands lines of code an hour by leveraging their previous work. As a result a Hacker may be able to sketch out the full shape of a program to a level of quality that can be used for demonstrating ideas in less than a week. Thus it isn't hard to see what some companies find useful in Hacker talent.

While I appreciate the attempt at quantification, I think this is ridiculously vague. Lines of code in what language? Lines of code aren't a good measure of productivity anyway; see e.g. [1] (http://www.developer.com/java/other/article.php/988641). Finally, a program that demonstrates ideas can be anything from one line to millions of lines, so saying that a hacker can write one in a week doesn't provide much information. Wmahan. 00:22, 2004 Apr 30 (UTC)

Lines of Code are the only really handy measure we have y'know. It turns out that lines of code produced is apparently constant for any programmer, regardless of programming langauge, API or whatever. (this is a big claim made by proponents of terse programming langauges such as hmm, for instance perl.) Kim Bruning 21:20, 29 Aug 2004 (UTC)

Recent (2004-07-03) edits

I'm having difficulty accepting the writing style (too informal for encyclopedic content, in my esteem), grammatical "style" (obvious typos and punctuation issues), and content (too much assumption of hacker-as-cracker) of User:Ylbissop's recent (uncommented) edits. I was in the process of correcting the first two when I realised that the temptation to correct the third is too great. I'm therefore asking other Wikipedians to do this. Please.

I ask this because I have a strong conviction that a hacker is as defined in [2] (http://www.catb.org/~esr/jargon/html/H/hacker.html), strong enough that I question my ability to remain NPOV on this issue. I could simply fix the style/grammar issues, but I would feel dirty for having my name associated with content to which I so strongly object.

I'm simply referring to the article's preamble, by the way. I don't mind that there are sections referring to "black hats" or whatever; they're just fnords to me. :-)

Thanks in advance! —cky 14:48, 3 Jul 2004 (UTC)

Agreed, the article was a mess. The truth is that the term "hacker" is controversial and that there is no widely accepted definition, beyond that it refers to some kind of computer expert (good or bad). The article was POV because it advocated a specific definition. Personally, I don't really care what it means, but I'm quite familiar with all the discussion. I have rewritten the article for clarity and to make the fact that there is a controversy clear. --Shibboleth 00:57, 5 Jul 2004 (UTC)

Added WPI Hackers of the '70's. Many of the people listed here were instrumental in some of the technologies and practices of current systems and it seemed appropriate to show a sense of history of the genre. 01:45, 02 Aug 2004

Older Usage?

Er... this is purely anecdotal, but: My uncle and two friends of his were programmers in the late 1960s to early 1970s era, (they are all electrical engineers today). They often use the term "hacker" in a way that would seem to make it synonymous with script kiddie, as in "Oh, yeah, that guy was just a hacker, he didn't know how to do anything." I was just wondering if "hacker" as "some kind of computer expert" is perhaps only a newer definition, with an older meaning of "lacking in expertise?" AdmN 06:14, 28 Aug 2004 (UTC)

Check out the famous MIT railroad club, that's where it all started :-) Kim Bruning 20:45, 29 Aug 2004 (UTC)
Absolutely concur. I can tell you, from personal experience, that the word was in use at MIT in the 1970s to sort of mean "computer expert". I say "sort of" because it had a subtly different meaning from "wizard", which was the term we really used for a total expert. I have a hard time putting my finger exactly on the difference, but a "hacker" sort of also meant a certain emotional dedication to programming, a certain attitude, whereas "wizard" purely measured people on the skill axis. My Master, Prof. Jerry Saltzer, was clearly a wizard, but he wasn't a hacker. Noel 14:18, 12 Sep 2004 (UTC)

Disputed and POV?

I dunno, who's disputing this? You? You should dispute in talk first then, I didn't spot anything, hence the partial rv. :-)

Here's my 2 cents to the dispute for you: The two agonists (pro- and ant-) definately agree on this version of the story. In fact, since they agree (as in "I got this guy!" vs "Yeah I was stupid to go up against the other guy!"), that's hardly a dispute then. Hmm, and also in an agreement like this, usually the POV the two will reach is called "neutral", if you ask me :-).

So there you go. Have a nice day! Kim Bruning 20:45, 29 Aug 2004 (UTC)

Hi, Kim. :)

No, I am not the one, (per se), who is disputing it. Journalists who cover the computer industry have been disputing many aspects of the Mitnick case since the mid-nineties. Here are some quick links: [3] (http://antivirus.about.com/library/weekly/aa012003c.htm), [4] (http://gulker.com/ra/hack/) [5] (http://www.sfgate.com/cgi-bin/article.cgi?file=/chronicle/archive/2000/05/04/BU71498.DTL). This last one is about the movie Takedown, but it discusses the roles of Markoff and Littman... speaking of which:

You suggest that there are only two agonists ;-) involved, and that they alone can act as arbiters of the whether or not this case is deserving of the label "controversial." In fact, they are not the only "players": the authors Jonathan Littman and John Markoff both wrote books that present vastly different accounts of who did what, and why. Markoff, in particular, has been accused of helping the public to convict Mitnick before he even stepped into a court room.

I can live with "cocky mistake," as IMHO anyone who plays around where he shouldn't is certainly being "cocky" in some sense. The "outhacked and outsmarted" line is more problematic, as part of the issues raised by industry journalists concern the extent to which Shimomura's involvement with the arrest and trial was legal, ethical, and even competent. My biggest concern is with describing Mitnick as being the "most... malicious" computer criminal. While other computer criminals have definitely caused uncontested and wide spread damage to systems, sometimes for profit, there is very little indication that Mitnick ever deleted a single file or made a single dime from his peek-and-look cracking, (yet he is the one the FBI chose to go after first, with prompting from Shimomura).

I think it is very tempting to want to believe that this was a case of a great hero going up against an evil villian... but the reality is far more complicated than that.

In any case, this article is about defining hackers. In fact, I think the Mitnick case is an excellent one for considering what a hacker is and isn't, but I won't be making any more edits of this page. AdmN 00:08, 30 Aug 2004 (UTC)

Discrepancies

The information immediatly following this line looks like it needs to be moved elsewhere : "There are several recurring tools of the trade used by hackers to gain unauthorized access to computers:" Dustin Asby 09:39, 12 Sep 2004 (UTC)

subjective

The distribution of 'noteable' hackers into categories seems to be a repeating point of contention, and is ultimately subjective. We have people with criminal convictions in "security experts", which seems to leave open the implication that they're just there because someone likes them enough not to put them in "intruders and criminals". The article itself notes that the categories overlap.

Might it be more appropriate to do away with categories, itemize the reasons why they were previously categorized [ie, their history], and let the reader decide?

Cheers.


One of the most wanted hackers nowdays is so known Skr4tCH, not much information is provided, but he was one of first to crack the windows 2000 source

I removed this listing from the "brilliant programmer" list. First reason: I cannot find any other sources that mention him/her. Second reason: exploiting a security hole and downloading source code does not a brilliant programmer make. Sietse 06:50, 8 Oct 2004 (UTC)

Why is this article so stuck on the computer aspect of hackers as far as I see computers have little to do with what a hacker IS. urban explorers are hackers too you know. I would love to see the fact that a person dosen't need any computer experience to be a "hacker" come through in this definition. While still recognizing the media induced myth(my opinion) of hacker as having to be a computer genius/criminal. there is a hint of it kinda I guess in bringing up locksmithing but not really the way it is put. I can't deny that the two defintions set forth are true but the majority of people I know consider this much info on the debate ignorant. Still I don't know what to do with it. it seems there has been so much change to this document only the people who care to fight to keep their opinions there are not eventually filtered out.

Adrian Lamo? hacker?! All he did was scan for open proxies on large companies, he would then use them to connect to their internal network. This is talent of a scriptkid, not a hacker. He is only coined with the term hacker, because he would contact news companies and they would do a story on the "poor homeless hacker". He was homeless by choice, he wasn't forced to live on the streets. I think this entry should be removed, it will taint the meaning of the hacker definition. He was only in the game for publicity, and MANY agree with me.

"Hackers"/Crackers and security

The use of the term "hacker" in the computer-related sense starts in the late 1950's; Levy, Hackers dates it to 1959 (see pp. 11-17). Since the first computer with any technical security measures (CTSS, the first time-sharing system, first operated in 1961) post-dates this by two years, we can conclusively determine that any possible use of the term for "someone who breaks into computers" post-dates the earlier meaning "someone who was interested in computers". I personally don't recall use of the term "hacker" to describe people breaking security until roughly around 1980 (driven mostly by half-clued reporters), but it would be worth looking into some old Multics/Tenex/etc documents to see what they called people who tried to break into the system. Noel (talk) 16:28, 28 Dec 2004 (UTC)

the meaning of invaders

Hacker vs. cracker difference

/:> diff hackers crackers

Hacking is about breaking computers protection, mostly from an outside network with the use of software security flaws.
Cracking is about breaking software protection, mostly through the analysis of its assembly code (reverse engineering).

You are a hacker when you hack and a cracker when you crack. You can be of course both of them. The article statement, that hackers are good, while crackers are bad, is totally wrong. It repeats the old media trash talk. Notice, that the definition of hacking/cracking is ethically independent. It is all about the kind of protection you break, not the reason of doing it (that's the white/black hats story).

Etymology of the term "Hacker"

Hey, I just wanted to compliment the article on it's great etymology. This is the internet at its best...I had been searching for hours for a good etymology of the word "Hacker" and here it is, all laid out. This will definitely help my essay! I'll probably expand on what's here based on my findings at the OED and such. --pie4all88 02:34, 15 Feb 2005 (UTC)

Hacker/Cracker

Can we clear this up once and for all and seperate the articles with a very clear (and possibly lengthy) explanation on the hacker page saying to refer to cracker? Explanations of popular usage should also be included. Just because it's popular does not make it correct. Once we do this, it will allow Blackhat to redirect to Cracker (software) or Cracker, (computing). I know this is a touchy subject with many opinions, so this is mine. Avochelm 08:14, 8 Mar 2005 (UTC)

Yes. Yes. Please sort this out now. These articles are in a real mess.

Regardless of whether we decide to use the traditional or journalistic meaning of hacker, this article describes two different concepts at the moment and an article should only describe one concept—not two that just happen to be homonyms. An encyclopedia is supposed to describe and disambiguate concepts, as opposed to inciting more confusion by confusing them in its own articles.

Please split this article. I suggest splitting it into crackers and hackers (traditional sense) as these are the most common terms used to distinguish the two.

Obviously, the traditional sense of hacker has different definitions and usages too (as do, to some extent, cracker and the sense of hacker that is synymous with cracker), but they all describe roughly the same concept.

--Joe Llywelyn Griffith Blakesley talk contrib 15:42, 2005 Mar 26 (UTC)

Hackney

According to the article, French haquenee is the origin of hackney and later hack. However, the Diccionario Crítico Etimológico Castellano e Hispánico by Joan Corominas and José A. Pascual gives in the etimology of Spanish jaca ("mare") the contrary: jaca comes from French haque which comes from English hack which comes from Middle English hakeney (which also gives French haquenée and Spanish hacanea), derived from the village Hackney North from London, with famous grazing terrain and the main horse market in the London area. They give 1367 for haquenée and 1457 for haque, circa 1400 for faca, and 1292 for hakeney. They quote Skeat (Etym. Dict. s.v. y suplemente; Rom. XXXVII, 164): Hackney (Hakeneya, Hakeney) in Middlesex is an horse grazing area near Smithfield, the most famous horse market in the London area. Hackney would mean "property of Haca by a river".

Hack only appears in English in 1687 (according to NED).

The DRAE maintains this same etimology (http://buscon.rae.es/draeI/SrvltGUIBusUsual?LEMA=hacanea&TIPO_HTML=2&FORMATO=ampliado). --Error 00:58, 15 Mar 2005 (UTC)

Other meanings

I removed the below section, as there are no articles on the topics. If anyone wants to make an article on them, they should make a disambiguation page for hacker. Neonumbers 01:52, 29 Mar 2005 (UTC)

== Other meanings of the word "hacker" ==
New York street sign, c. 1963
Enlarge
New York street sign, c. 1963
Hacker (and Hack) are also terms for a taxicab driver (because a taxicab can be called a hack, a shortened form of hackney carriage).
A hacker, in golf, means a duffer, a mediocre player who enjoys playing but makes no serious effort to improve his skill.
Also, Hacker is the name of the Russian cyberculture journal XAKEP.

definition of hacker from an old programmer

My commercial programming experience started in 1972, so some of you have experience pre-dating mine, but this is my understanding of the term "hacker" when used in a programmer context.

Some programmers take pride in the logical elegance of their code. When they saw some programmer who relied on persistence and 'brute force' to accomplish (or not) his tasks, he was referred to as a 'hacker'. Imagine someone cutting down a tree with a dull axe. He hacks at it until he succeeds although his work is ugly to behold.

When security of systems became a concern, the term 'hacker' was also used to refer to someone who, not knowing the designed method of gaining access, tried numerous techniques to find flaws in the system that would allow him access. i.e. he would 'hack' at it until it broke.

When computers came out of the air-conditioned, raised-floor, keycode-protected rooms and into popular culture of the office desk and dining room table, a hacker who could break into a computer system was viewed as an expert.

So, now we have conflicting meanings of the term 'hacker' representing 2 sides of the programming knowledge fence; a programmer without finesse, and a skilful intruder of computer systems.

leet

I have a problem with the comment that leet is not used often, and that it is mainly only for the gaming community. I see people using leet all the time, and the neutrality of that statement seems disrupted. leet is used largely in public discussionf orums of all kinds, web design sites, blogs, and games. This should either be changed or removed. --Zeerus 01:31, Apr 13, 2005 (UTC)

But those people are a tiny minority Proto 14:04, 21 Apr 2005 (UTC)

Stephen Levy; Stewart Brand

Was Stephen Levy's 1984 book "Hackers: Heroes of the Computer Revolution" the first book to use the phrase "Hacker Ethic" and to codify it? His codification was:

  • Access to computers—and anything which might teach you something about the way the world works—should be unlimited and total. Always yield to the Hands-on Imperative!
  • All information should be free.
  • Mistrust authority—promote decentralizatioin.
  • Hackers should be judged by their hacking, not bogus criteria such as degrees, age, race or position.
  • You can create art and beauty on a computer.
  • Computers can change your life for the better.

I'm thinking this specific codification probably belongs in the article. (I'm also amazed at how well it aligns with Wikipedia...)

Stewart Brand did a lot to publicize "classic" hackers and hacking, and I am trying to recall the details, but he organized a number of conferences on hacking in the classic sense. The first might have been called "Hackers 84," the second "Hackers 2.0" or something like that. Dpbsmith (talk) 13:44, 17 Apr 2005 (UTC)

Navigation

  • Art and Cultures
    • Art (https://academickids.com/encyclopedia/index.php/Art)
    • Architecture (https://academickids.com/encyclopedia/index.php/Architecture)
    • Cultures (https://www.academickids.com/encyclopedia/index.php/Cultures)
    • Music (https://www.academickids.com/encyclopedia/index.php/Music)
    • Musical Instruments (http://academickids.com/encyclopedia/index.php/List_of_musical_instruments)
  • Biographies (http://www.academickids.com/encyclopedia/index.php/Biographies)
  • Clipart (http://www.academickids.com/encyclopedia/index.php/Clipart)
  • Geography (http://www.academickids.com/encyclopedia/index.php/Geography)
    • Countries of the World (http://www.academickids.com/encyclopedia/index.php/Countries)
    • Maps (http://www.academickids.com/encyclopedia/index.php/Maps)
    • Flags (http://www.academickids.com/encyclopedia/index.php/Flags)
    • Continents (http://www.academickids.com/encyclopedia/index.php/Continents)
  • History (http://www.academickids.com/encyclopedia/index.php/History)
    • Ancient Civilizations (http://www.academickids.com/encyclopedia/index.php/Ancient_Civilizations)
    • Industrial Revolution (http://www.academickids.com/encyclopedia/index.php/Industrial_Revolution)
    • Middle Ages (http://www.academickids.com/encyclopedia/index.php/Middle_Ages)
    • Prehistory (http://www.academickids.com/encyclopedia/index.php/Prehistory)
    • Renaissance (http://www.academickids.com/encyclopedia/index.php/Renaissance)
    • Timelines (http://www.academickids.com/encyclopedia/index.php/Timelines)
    • United States (http://www.academickids.com/encyclopedia/index.php/United_States)
    • Wars (http://www.academickids.com/encyclopedia/index.php/Wars)
    • World History (http://www.academickids.com/encyclopedia/index.php/History_of_the_world)
  • Human Body (http://www.academickids.com/encyclopedia/index.php/Human_Body)
  • Mathematics (http://www.academickids.com/encyclopedia/index.php/Mathematics)
  • Reference (http://www.academickids.com/encyclopedia/index.php/Reference)
  • Science (http://www.academickids.com/encyclopedia/index.php/Science)
    • Animals (http://www.academickids.com/encyclopedia/index.php/Animals)
    • Aviation (http://www.academickids.com/encyclopedia/index.php/Aviation)
    • Dinosaurs (http://www.academickids.com/encyclopedia/index.php/Dinosaurs)
    • Earth (http://www.academickids.com/encyclopedia/index.php/Earth)
    • Inventions (http://www.academickids.com/encyclopedia/index.php/Inventions)
    • Physical Science (http://www.academickids.com/encyclopedia/index.php/Physical_Science)
    • Plants (http://www.academickids.com/encyclopedia/index.php/Plants)
    • Scientists (http://www.academickids.com/encyclopedia/index.php/Scientists)
  • Social Studies (http://www.academickids.com/encyclopedia/index.php/Social_Studies)
    • Anthropology (http://www.academickids.com/encyclopedia/index.php/Anthropology)
    • Economics (http://www.academickids.com/encyclopedia/index.php/Economics)
    • Government (http://www.academickids.com/encyclopedia/index.php/Government)
    • Religion (http://www.academickids.com/encyclopedia/index.php/Religion)
    • Holidays (http://www.academickids.com/encyclopedia/index.php/Holidays)
  • Space and Astronomy
    • Solar System (http://www.academickids.com/encyclopedia/index.php/Solar_System)
    • Planets (http://www.academickids.com/encyclopedia/index.php/Planets)
  • Sports (http://www.academickids.com/encyclopedia/index.php/Sports)
  • Timelines (http://www.academickids.com/encyclopedia/index.php/Timelines)
  • Weather (http://www.academickids.com/encyclopedia/index.php/Weather)
  • US States (http://www.academickids.com/encyclopedia/index.php/US_States)

Information

  • Home Page (http://academickids.com/encyclopedia/index.php)
  • Contact Us (http://www.academickids.com/encyclopedia/index.php/Contactus)

  • Clip Art (http://classroomclipart.com)
Toolbox
Personal tools