11.07.2015 Views

Encyclopedia of Computer Science and Technology

Encyclopedia of Computer Science and Technology

Encyclopedia of Computer Science and Technology

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Hhackers <strong>and</strong> hackingStarting in the late 1950s, in computer facilities at MIT,Stanford, <strong>and</strong> other research universities people began toencounter persons who had both unusual programmingskill <strong>and</strong> an obsession with the inner workings <strong>of</strong> themachine. While ordinary users viewed the computer simplyas a tool for solving particular problems, this peculiarbreed <strong>of</strong> programmers reveled in extending the capabilities<strong>of</strong> the system <strong>and</strong> creating tools such as program editorsthat would make it easier to create even more powerfulprograms. The movement from mainframes that could runonly one program at a time to machines that could simultaneouslyserve many users created a kind <strong>of</strong> environmentalniche in which these self-described hackers could flourish.Indeed, while administrators sometimes complained thathackers took up too much <strong>of</strong> the available computer time,they <strong>of</strong>ten depended on them to fix the bugs that infestedthe first versions <strong>of</strong> time-sharing operating systems. Hackersalso tended to work in the wee hours <strong>of</strong> the night whilenormal users slept.Early hackers had a number <strong>of</strong> distinctive characteristics<strong>and</strong> tended to share a common philosophy, even if itwas not always well articulated:• <strong>Computer</strong>s should be freely accessible, without arbitrarylimits on their use (the “h<strong>and</strong>s-on imperative”).• “Information wants to be free” so that it can reach itsfull potential. Conversely, government or corporateauthorities that want to restrict information accessshould be resisted or circumvented.• The only thing that matters is the quality <strong>of</strong> the“hack”—the cleverness <strong>and</strong> utility <strong>of</strong> the code <strong>and</strong>what it lets computers do that they could not dobefore.• As a corollary to the above, the reputation <strong>of</strong> a hackerdepends on his (it was nearly always a male) work—not on age, experience, academic attainment, or anythingelse.• Ultimately, programming was a search for truth <strong>and</strong>beauty <strong>and</strong> even a redemptive quality—coupled withthe belief that technology can change the world.Hackers were relatively tolerated by universities <strong>and</strong>sometimes prized for their skills by computer companiesneeding to develop sophisticated s<strong>of</strong>tware. However, as thecomputer industry grew, it became more concerned withstaking out, protecting, <strong>and</strong> exploiting intellectual property.To the hacker, however, intellectual property was abarrier to the unfettered exploration <strong>and</strong> exploitation <strong>of</strong> thecomputer. Hackers tended to freely copy <strong>and</strong> distribute notonly their own work but also commercial systems s<strong>of</strong>tware<strong>and</strong> utilities.During the late 1970s <strong>and</strong> 1980s, the microcomputer createda mass consumer s<strong>of</strong>tware market, <strong>and</strong> a new generation<strong>of</strong> hackers struggled to get the most out <strong>of</strong> machines that hada tiny amount <strong>of</strong> memory <strong>and</strong> only rudimentary graphics<strong>and</strong> sound capabilities. Some became successful game programmers.At the same time a new term entered the lexicon,s<strong>of</strong>tware piracy (see s<strong>of</strong>tware privacy <strong>and</strong> counterfeiting).Pirate hackers cracked the copy protection on games219

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!