Essays24.com - Term Papers and Free Essays
Search

Hacking

Essay by   •  November 9, 2010  •  1,612 Words (7 Pages)  •  1,203 Views

Essay Preview: Hacking

Report this essay
Page 1 of 7

There is a community, a shared culture, of expert programmers and networking wizards that traces its history back through decades to the first time-sharing minicomputers and the earliest ARPAnet experiments. The members of this culture originated the term 'hacker'. Hackers built the Internet. Hackers made the Unix operating system what it is today. Hackers run Usenet. Hackers make the World Wide Web work. If you are part of this culture, if you have contributed to it and other people in it know who you are and call you a hacker, you're a hacker. The hacker mind-set is not confined to this software-hacker culture. There are people who apply the hacker attitude to other things, like electronics or music -- actually, you can find it at the highest levels of any science or art. Software hackers recognize these kindred spirits elsewhere and may call them 'hackers' too -- and some claim that the hacker nature is really independent of the particular medium the hacker works in. But in the rest of this document we will focus on the skills and attitudes of software hackers, and the traditions of the shared culture that originated the term 'hacker'.

Hacking is a form of art for some people. Hackers have formed groups and even have conferences together to share their knowledge and abilities. Hackers started with gaining access to free telephone calls through different sources and learning more about the internal workings of the nation's phone system and radios in the mid 1950's. When computers were introduced, hackers found a new communication system to learn more about (Jamsa, 2002 p 15).

This is generally of interest to teenagers and young adults. Self-taught hackers are generally more accepted in their "society" more openly than educated hackers. Some famous hackers have gone on to create computer systems, such as Dennis Ritchie and Ken Thompson creating UNIX operating system. Other kinds of hackers, known as crackers, have found their ways into federal prison for their work.

There is another group of people who loudly call themselves hackers, but aren't. These are people who get a kick out of breaking into computers and phreaking the phone system. Real hackers call these people 'crackers' and want nothing to do with them. Real hackers mostly think crackers are lazy, irresponsible, and not very bright, and object that being able to break security doesn't make you a hacker any more than being able to hotwire cars makes you an automotive engineer. Unfortunately, many journalists and writers have been fooled into using the word 'hacker' to describe crackers; this irritates real hackers no end. Creative brains are a valuable, limited resource. They shouldn't be wasted on re-inventing the wheel when there are so many fascinating new problems waiting out there.

To behave like a hacker, you have to believe that the thinking time of other hackers is precious -- so much so that it's almost a moral duty for you to share information, solve problems and then give the solutions away just so other hackers can solve new problems instead of having to perpetually re-address old ones. Note, however, that "No problem should ever have to be solved twice." does not imply that you have to consider all existing solutions sacred, or that there is only one right solution to any given problem. Often, we learn a lot about the problem that we didn't know before by studying the first cut at a solution. It's OK, and often necessary, to decide that we can do better. What's not OK is artificial technical, legal, or institutional barriers that prevent a good solution from being re-used and force people to re-invent wheels.

To be a hacker, you have to develop some of these attitudes. But copping an attitude alone won't make you a hacker, any more than it will make you a champion athlete or a rock star. Becoming a hacker will take intelligence, practice, dedication, and hard work. Therefore, you have to learn to distrust attitude and respect competence of every kind. Hackers won't let posers waste their time, but they worship competence -- especially competence at hacking, but competence at anything is valued. Competence at demanding skills that few can master is especially good, and competence at demanding skills that involve mental acuteness, craft, and concentration is best. If you revere competence, you'll enjoy developing it in yourself -- the hard work and dedication will become a kind of intense play rather than drudgery. That attitude is vital to becoming a hacker.

Hackers are naturally anti-authoritarian. Anyone who can give you orders can stop you from solving whatever problem you're being fascinated by -- and, given the way authoritarian minds work, will generally find some appallingly stupid reason to do so. So the authoritarian attitude has to be fought wherever you find it, lest it smother you and other hackers.

This isn't the same as fighting all authority. Children need to be guided and criminals restrained. A hacker may agree to accept some kinds of authority in order to get something he wants more than the time he spends following orders. But that's a limited, conscious bargain; the kind of personal surrender authoritarians want is not on offer.

Authoritarians thrive on censorship and secrecy. And they distrust voluntary cooperation and information-sharing -- they only like 'cooperation' that they control. So to behave like a hacker, you have to develop an instinctive hostility to censorship, secrecy, and the use of force or deception to compel responsible adults. And you have to be willing to act on that belief.

One fraudulent act that is illegal in some ways and helpful in others is hacking. Hacking is basically knowing programmable systems and how they work. Some agencies hire hackers to show them the downfalls in their security system so they can improve it against hackers that want information or access into the computer for other reasons.

Hacking is a form of art for some people. Hackers have formed groups and even have conferences together to share their knowledge and abilities. Hackers started with gaining access to free telephone calls through different sources and learning more about the internal workings of the nation's

...

...

Download as:   txt (9.6 Kb)   pdf (117.3 Kb)   docx (12.3 Kb)  
Continue for 6 more pages »
Only available on Essays24.com
Citation Generator

(2010, 11). Hacking. Essays24.com. Retrieved 11, 2010, from https://www.essays24.com/essay/Hacking/9671.html

"Hacking" Essays24.com. 11 2010. 2010. 11 2010 <https://www.essays24.com/essay/Hacking/9671.html>.

"Hacking." Essays24.com. Essays24.com, 11 2010. Web. 11 2010. <https://www.essays24.com/essay/Hacking/9671.html>.

"Hacking." Essays24.com. 11, 2010. Accessed 11, 2010. https://www.essays24.com/essay/Hacking/9671.html.