layout | subheadline | title | teaser | categories | tags | header | image | last_modified_at | permalink | directory | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
page-fullwidth |
Read Stephen Levy |
Hacking and Hacker Culture. |
MIT AI Intelligence Lab, the Hacker Ethic and Beyond. |
|
|
false |
|
2020-02-02 13:22:33 -2300 |
/history/early-internet/hacker-culture/ |
2019-12-16-hacking-culture.md |
- Thesis - Section II: Historical background on the phenomenon
Section II Historical Background On The Phenomenon Using context to understand why hackers set out to build digital currency systems. “Corporations have neither bodies to be punished, nor souls to be condemned; they therefore do as they li..
- Christopher Lemmer Webber (@dustyweb)
New episode of @librelounge is out! Episode 3: Hacker Culture, Past, Belonging and Inclusion Tricky things discussed in this episode... is it possible to have FOSS heritage connected to subcultures without being exclusionary to those outside of th...
- A genealogy of hacking
Abstract: Hacking is now a widely discussed and known phenomenon, but remains difficult to define and empirically identify because it has come to refer to many different, sometimes incompatible, material practices. This paper proposes genealogy as a framework for understanding hacking by briefly revisiting Foucault’s concept of genealogy and interpreting its perspectival stance through the feminist materialist concept of the situated observer. Using genealogy as a theoretical frame a history of hacking will be proposed in four phases. The first phase is the ‘prehistory’ of hacking in which four core practices were developed. The second phase is the ‘golden age of cracking’ in which hacking becomes a self-conscious identity and community and is for many identified with breaking into computers, even while non-cracking practices such as free software mature. The third phase sees hacking divide into a number of new practices even while old practices continue, including the rise of serious cybercrime, hacktivism, the division of Open Source and Free Software and hacking as an ethic of business and work. The final phase sees broad consciousness of state-sponsored hacking, the re-rise of hardware hacking in maker labs and hack spaces and the diffusion of hacking into a broad ‘clever’ practice. In conclusion it will be argued that hacking consists across all the practices surveyed of an interrogation of the rationality of information techno-cultures enacted by each hacker practice situating itself within a particular techno-culture and then using that techno-culture to change itself, both in changing potential actions that can be taken and changing the nature of the techno-culture itself.
- A HACKER PRIMER Matt Devost - April 5, 1997
An introduction to the document is followed by an examination of hacker organizational and social considerations to include a detailed listing of hacker communication mechanisms and listings of high profile hacker groups. Subsequent sections identify hacker targets and off-line techniques hackers use to supplement their intrusion capabilities, provide a descriptive listing of common hacker tools with Internet reference points, and furnish a listing of hacker references to include WWW sites, related books, magazines and movies.
- hacks.mit.edu/
Welcome to the IHTFP Gallery!
- Hacks, tomfoolery & pranks - MIT Admissions
At MIT Admissions, we recruit and enroll a talented and diverse class of undergraduates who will learn to use science, technology, and other areas of scholarship to serve the nation and the world in the 21st century.
- Hacks at the Massachusetts Institute of Technology
Hacks at the Massachusetts Institute of Technology are practical jokes and pranks meant to prominently demonstrate technical aptitude and cleverness, or to commemorate popular culture and historical topics. The pranks are anonymously installed at night by hackers, usually, bu...
- A Brief History of Hacker Culture
The annual Harvard-Yale football game doesn’t really excite many college football fans, played as it is between two schools known more for intellectual than athletic prowess. So on November 30, 1982, during the 2nd quarter of the 99th meeting of the two teams, it was largely students and alumni of those two Ivy League colleges in the stands watching.
As the teams faced off after Harvard’s second touchdown, a strange noise drew the crowd’s attention to the sideline at midfield. Springing out of the turf and slowly growing was a black balloon. As it continued to inflate, stopping the game, a set of letters became clearly visible. “MIT” read the balloon, before it exploded with a bang and a swirl of white vapor.
The Harvard-Yale game had just been hacked.
- What the Hack? Tracing the Origins of Hacker Culture and the Hacker Ethic
It is difficult to associate open source with "hacker culture" or "the hacker ethic." Instead, open source values, and projects such as Linux, can be traced to academia.
- A Short History of “Hack”
"Before Amazon, before eBay, the seminal act of e-commerce was a drug deal." What the Dormouse Said
- Full text of "New Hacker's Dictionary, The"
This is the Jargon File, a comprehensive compendium of hacker slang illuminating many aspects of hackish tradition, folklore, and humor.
This document (the Jargon File) is in the public domain, to be freely used, shared, and modified. There are (by intention) no legal restraints on what you can do with it, but there are traditions about its proper use to which many hackers are quite strongly attached.
Please extend the courtesy of proper citation when you quote the File, ideally with a version number, as it will change and grow over time. (Examples of appropriate citation form: "Jargon File 4.2.2" or "The on-line hacker Jargon File, version 4.2.2, 20 AUG 2000".)
The Jargon File is a common heritage of the hacker culture. Over the years a number of individuals have volunteered considerable time to maintaining the File and been recognized by the net at large as editors of it. Editorial responsibilities include: to collate contributions and suggestions from others; to seek out corroborating information; to cross-reference related entries; to keep the file in a consistent format; and to announce and distribute updated versions periodically. Current volunteer editors include:
Hackers – Heroes of the Computer Revolution
The book is in three parts, exploring the canonical AI hackers of MIT, the hardware hackers who invented the personal computer industry in Silicon Valley, and the third-generation game hackers in the early 1980s.
- I Like the Noise of the Computer and I will miss it
- Thesis - Section II: Historical background on the phenomenon - CryptoQuikRead_187
Section II Historical Background On The Phenomenon Using context to understand why hackers set out to build digital currency systems. “Corporations have neither bodies to be punished, nor souls to be condemned; they therefore do as they li...
- Defense One Radio: Cyberwarfare yesterday on Apple Podcasts
- Today In Infosec (@todayininfosec)
1968: The movie "Hot Millions" was released. It was the first hacker movie. Disagree? Fight me. Social engineering. Defeating security systems. Mucking with a mainframe for profit. https://t.co/iJ8jH4bmx6
- Homesteading the Noosphere - Eric Steven Raymond
- Philosophy of the GNU Project
- The GNU Operating System
- The Cathedral and the Bazaar - Eric Steven Raymond
- Revolution OS (2001) Full movie
"Revolution OS" tells the inside story of the hackers who rebelled against Microsoft and created GNU/Linux and the Open Source movement. Microsoft fears GNU/Linux, and rightly so. GNU/Linux and the Open Source & Free Software movements arguably represent the greatest threat to Microsoft's way of life.
- A Brief History of Hackerdom by Eric S. Raymond
- Xanadu.com
- w3.org/Xanadu.html
- Ted Nelson and the Xanadu Hypertext System
On June 17, 1937, American pioneer of information technology, philosopher, and sociologist Theodore Holm "Ted" Nelson was born. Nelson coined the terms hypertext and hypermedia in 1963 and publishe
- Project Xanadu
Project Xanadu was the first hypertext project, founded in 1960 by Ted Nelson. Administrators of Project Xanadu have declared it an improvement over the World Wide Web, with mission statement: "Today's popular software simulates paper. The World Wide Web (another imitation of...
Steve Blank Secret History of Silicon Valley
- A New Digital Manifesto -newsycombinator comments
- DEF CON and Stack Overflow: What Our Traffic Says About Cybersecurity - Hacker News
Today is the first day of DEF CON 27, arguably the world’s best known hacker convention. Each year, thousands of people interested in security (and/or the hacking thereof) travel to Las Vegas to learn and gather with like-minded community. Some also attend Black Hat, a related conference which is typically scheduled right before DEF CON, also in Las Vegas. Not everyone who identifies as a hacker or is part of hacker culture writes code or uses Stack Overflow, but we would expect a significant proportion to do so. Well over 25,000 people attended DEF CON in 2018, all located in Las Vegas. Can we see any differences in traffic to Stack Overflow during the days of DEF CON? What can we learn about the hacker community from traffic during that time?
- Birth of a Digital Nation
And perhaps the toughest questions of all: Can we build a new kind of politics? Can we construct a more civil society with our powerful technologies? Are we extending the evolution of freedom among human beings? Or are we nothing more than a great, wired babble pissing into the digital wind?
Where freedom is rarely mentioned in mainstream media anymore, it is ferociously defended - and exercised daily - on the Net.
{% include _improve_history.html %}
{% include list-posts entries='5' category='History' %}