- Page 1 and 2: HACKERSHeroes of the Computer Revol
- Page 3 and 4: Contents●●●●●●●●●
- Page 5 and 6: hero.Hackers like Richard Greenblat
- Page 7 and 8: Steve DompierHomebrew member who fi
- Page 9 and 10: "Uncle" John McCarthyAbsent-minded
- Page 11 and 12: Dan SokolLong-haired prankster who
- Page 13 and 14: Part OneTrue HackersCambridge:The F
- Page 15 and 16: these machines to punch holes in th
- Page 17: The clubroom was dominated by the h
- Page 21 and 22: eventually allowed to push a few bu
- Page 23 and 24: floor Research Laboratory of Electr
- Page 25 and 26: people whose curiosity bumed like a
- Page 27 and 28: the assembler that Dennis wrote, yo
- Page 29 and 30: Before beginning MIT, Saunders had
- Page 31 and 32: Inevitably, that frame of mind spil
- Page 33 and 34: world from taking things apart, see
- Page 35 and 36: What really drove the hackers crazy
- Page 37 and 38: you were being deliberately stupid
- Page 39 and 40: His grade zero. "You used a compute
- Page 41 and 42: In the monastic confines of the Mas
- Page 43 and 44: engineers had a broad knowledge of
- Page 45 and 46: worked on a translation of the Micr
- Page 47 and 48: took advantage of a hacked-up conne
- Page 49 and 50: striking game.There had been severa
- Page 51 and 52: Slug was not as driven as some of t
- Page 53 and 54: But of course that could be easily
- Page 55 and 56: after twenty minutes of protecting
- Page 57 and 58: The planners were also extremely co
- Page 59 and 60: 4Greenblatt and GosperRICKY Greenbl
- Page 61 and 62: Around Christmas time, he finally f
- Page 63 and 64: his roommate Beeler would later say
- Page 65 and 66: which might help a systems hacker k
- Page 67 and 68: sixteen registers. The instruction
- Page 69 and 70:
It was during those meals that the
- Page 71 and 72:
female hackers. "Cultural things ar
- Page 73 and 74:
used computers to seek things that
- Page 75 and 76:
Greenblatt's vision did not stop at
- Page 77 and 78:
5The Midnight Computer Wiring Socie
- Page 79 and 80:
he soon found out that by clicking
- Page 81 and 82:
Nelson would already be pushing him
- Page 83 and 84:
variations like those generated by
- Page 85 and 86:
Fredkin wanted Nelson to work on, b
- Page 87 and 88:
to fix it can't get at the seventy-
- Page 89 and 90:
On the other hand, Noftsker was in
- Page 91 and 92:
hackers. But Nelson would later say
- Page 93 and 94:
working in machine language he wrot
- Page 95 and 96:
or machines, and they would toss hi
- Page 97 and 98:
They're theorizing all these things
- Page 99 and 100:
is this object you can tell what to
- Page 101 and 102:
programs which make valiant tries b
- Page 103 and 104:
hackers were concerned), it urged y
- Page 105 and 106:
affection between them. Fredkin was
- Page 107 and 108:
up your screen and maybe start munc
- Page 109 and 110:
software design is greatly diminish
- Page 111 and 112:
A protest march that climaxed at Te
- Page 113 and 114:
...bright young men of disheveled a
- Page 115 and 116:
temporarily turned into a vegetable
- Page 117 and 118:
most desirable of these was the Sta
- Page 119 and 120:
the files, which they would read wi
- Page 121 and 122:
speed monitor made by DEC), trying
- Page 123 and 124:
Maybe it is not so surprising. In o
- Page 125 and 126:
Part TwoHardware HackersNorthern Ca
- Page 127 and 128:
gospel through, of all things, the
- Page 129 and 130:
ooks, he later said, gave him coura
- Page 131 and 132:
woman named Jude Milhon found the a
- Page 133 and 134:
works in computer forms." But unlik
- Page 135 and 136:
Albrecht used the four as "barkers"
- Page 137 and 138:
offering program listings, suggesti
- Page 139 and 140:
BASIC, which hackers considered a "
- Page 141 and 142:
systems, an expert on all phases of
- Page 143 and 144:
purity of those hackers, particular
- Page 145 and 146:
Tech Model Railroad hackers scroung
- Page 147 and 148:
So Marsh worked on his project, whi
- Page 149 and 150:
He followed up the tape with calls
- Page 151 and 152:
was alive and ticking inside. It wa
- Page 153 and 154:
He was instantly on the phone to Al
- Page 155 and 156:
octal. Hell, what did it matter. It
- Page 157 and 158:
were being bought. He thought the w
- Page 159 and 160:
10The Homebrew Computer ClubTHE fif
- Page 161 and 162:
By the fourth meeting, it was clear
- Page 163 and 164:
When the Altair finished, the silen
- Page 165 and 166:
So Garland and Melen were in busine
- Page 167 and 168:
Finally, you'd go to a local board
- Page 169 and 170:
keeping a list of everyone's phone
- Page 171 and 172:
eginning that summer with the publi
- Page 173 and 174:
that part of the Altair, and Lee wo
- Page 175 and 176:
Synergy. The increasing number of H
- Page 177 and 178:
There were two Altair programs that
- Page 179 and 180:
11Tiny BASICWHILE the hunger to bui
- Page 181 and 182:
a third to half the staff [excludin
- Page 183 and 184:
people had paid MITS for the produc
- Page 185 and 186:
People around the Homebrew Computer
- Page 187 and 188:
Intel 4004 chip, and for a time mai
- Page 189 and 190:
listening to the Christian radio st
- Page 191 and 192:
ureaucracy.If he desired a blueprin
- Page 193 and 194:
was an instant success, even though
- Page 195 and 196:
coffee, so Solomon invited them ove
- Page 197 and 198:
12WozSTEVE Wozniak did not sit near
- Page 199 and 200:
free "dial-a-joke" service from his
- Page 201 and 202:
in the breakfast cereal by that nam
- Page 203 and 204:
liberated parts, and they both lame
- Page 205 and 206:
computer to a cassette recorder, an
- Page 207 and 208:
so that, very ingeniously laid out
- Page 209 and 210:
concerned. Chris Espinosa and Randy
- Page 211 and 212:
At certain points, Woz and Jobs rel
- Page 213 and 214:
five hundred in Atlantic City, we s
- Page 215 and 216:
was a survivor, too. If he lost mon
- Page 217 and 218:
Nelson was one of the keynote speak
- Page 219 and 220:
consideration, it was easy to maint
- Page 221 and 222:
Killing that project was well in ke
- Page 223 and 224:
the company (also struggling, soon
- Page 225 and 226:
there was fear in the equation: Lee
- Page 227 and 228:
machina. You start by thinking ther
- Page 229 and 230:
company was "Adventure" games, like
- Page 231 and 232:
At first, the computer had him tota
- Page 233 and 234:
He would claim to know computer lan
- Page 235 and 236:
A small, chalk-complexioned man wit
- Page 237 and 238:
work, and he left Informatics in 19
- Page 239 and 240:
You could go on. Roberta approached
- Page 241 and 242:
software for the Apple that he did
- Page 243 and 244:
15The BrotherhoodTHE Hacker Ethic w
- Page 245 and 246:
something more lucrative. Two weeks
- Page 247 and 248:
very first Apple program he gave th
- Page 249 and 250:
Sometime later Margot stumbled acro
- Page 251 and 252:
that he did it only to put leaks in
- Page 253 and 254:
At one time, the apex of existence
- Page 255 and 256:
its competitor to the Apple. On fir
- Page 257 and 258:
his home because his father had exp
- Page 259 and 260:
and throw in the free place to live
- Page 261 and 262:
derivative functions. One day, John
- Page 263 and 264:
Atari's Home Computer Division when
- Page 265 and 266:
that if I did not play ball with th
- Page 267 and 268:
No.Atari lawyer:Do they simply sit
- Page 269 and 270:
17Summer CampKEN Williams came to r
- Page 271 and 272:
moved to the mountains with his wif
- Page 273 and 274:
game; they considered themselves "f
- Page 275 and 276:
Jeff Stephenson, who liked Bob a lo
- Page 277 and 278:
eventually outraces the rabbit.Warr
- Page 279 and 280:
almost one hundred thousand dollars
- Page 281 and 282:
needed. The snorkeling trip was lot
- Page 283 and 284:
anything On-Line had to offer on th
- Page 285 and 286:
18FroggerAS 1982 progressed and the
- Page 287 and 288:
started programming at three in the
- Page 289 and 290:
He will keep working on a project f
- Page 291 and 292:
was no small loss, because the VCS
- Page 293 and 294:
IBM did not plan to apply the Hacke
- Page 295 and 296:
someone who best represented the an
- Page 297 and 298:
attitudes had almost brought the co
- Page 299 and 300:
They were proud of their positions,
- Page 301 and 302:
and let them develop under him? Sur
- Page 303 and 304:
To Roberta Williams, it all represe
- Page 305 and 306:
19ApplefestTHE Third Generation liv
- Page 307 and 308:
Early varieties of copy-protect inv
- Page 309 and 310:
Through a friend who was working on
- Page 311 and 312:
computer good enough to handle an a
- Page 313 and 314:
●●●●●●●●●●●
- Page 315 and 316:
megalomanic Dungeonmaster, living i
- Page 317 and 318:
or 'bureaucracy.'" It promised to d
- Page 319 and 320:
current policy as a prime example.
- Page 321 and 322:
When someone at On-Line's booth gav
- Page 323 and 324:
possession, the most cherished tie
- Page 325 and 326:
seemed ill at ease being paraded on
- Page 327 and 328:
SOAP OPERA STAR: How does it feel t
- Page 329 and 330:
him how unhappy he was, but Ken was
- Page 331 and 332:
pioneers who had begun their busine
- Page 333 and 334:
would have taken his objections dir
- Page 335 and 336:
are seeing somebody else, then the
- Page 337 and 338:
meeting with Ken Williams the two f
- Page 339 and 340:
eminded that he had to get back. He
- Page 341 and 342:
EpilogueThe Lastof theTrue HackersC
- Page 343 and 344:
departments. It was a shining examp
- Page 345 and 346:
divided between the computer scienc
- Page 347 and 348:
The LISP machine was a significant
- Page 349 and 350:
ole in a company that I was involve
- Page 351 and 352:
anybody else to do so... I don't wa
- Page 353 and 354:
What Stallman did was to join a mas
- Page 355 and 356:
creative powers is ... the essence.
- Page 357 and 358:
annual event, turned out to be the
- Page 359 and 360:
lead in their fields, the energy, v
- Page 361 and 362:
AcknowledgmentsI'm indebted to many
- Page 363 and 364:
NotesThe main source of information
- Page 365 and 366:
* "...dymaxion..." See Hugh Kenner,
- Page 367:
* "that they give back all extensio