Thursday, April 14, 2011

Who is a hacker? Explain what is meant by “the hacker ethic” with the help of a contemporary example.



Hackers. We’ve heard a lot of things about them – some say they are a danger to the computing society and others see them as potentially useful citizens with bright minds. Hackers do what they do either for personal gain or to find and repair flaws in a system. Hackers, themselves, follow what they call the Hacker Ethic. Based on whether the hack is considered legal or illegal, hackers are dubbed “White Hat Hackers” and “Black Hat Hackers” respectively. Adrian Lamo, a present-day hacker, helps us understand better the terms Hacker and Hacker Ethic.
According to Levy's account, sharing was the norm and expected within the non-corporate hacker culture. The principle of sharing stemmed from the atmosphere and resources at MIT. During the early days of computers and programming, the hackers at MIT would develop a program and share it.

If the hack was particularly good, then the program might be posted on a board somewhere near one of the computers. Other programs that could be built upon and improved were saved to tapes and added to a drawer of programs—readily accessible to all the other hackers. At any time, a fellow hacker might reach into the drawer, pick out the program, and begin adding to it or "bumming" it to make it better (bumming refers to the process of making the code more concise so that more can be done in fewer instructions).

In the second generation of hackers, sharing was about sharing with the general public in addition to sharing with other hackers. A particular organization of hackers that was concerned with sharing computers with the general public was a group called Community Memory. This group of hackers and idealists put computers in public places for anyone to use. The first community computer was placed outside of Leopold's Records in Berkeley, California.

Another sharing of resources occurred when Bob Albrecht provided considerable resources for a non-profit organization called People's Computer Company (PCC). PCC opened a computer center where anyone could use the computers there for fifty cents per hour.

This second generation's sharing contributed to the battles of free and open software. In fact, when Bill Gates' version of BASIC for the Altair was shared among the hacker community, Gates claimed to have lost a considerable sum of money because few users paid for the software. As a result, Gates wrote an Open Letter to Hobbyists. This letter was published by several computer magazines and newsletters—most notably that of the Homebrew Computer Club where much of the sharing occurred.

Free and open source software is the descendant of the hacker ethics that Levy described. The hackers who hold true to this hacker ethics—especially the Hands-On Imperative—are usually supporters of free software and/or open source software. This is because free and open source software allows hackers to access the code used to create the software to improve or reuse it. In effect the free and open source software movements embody all of the hacker ethics.[citation needed] However, Levy's hacker ethic also has often been quoted out of context and misunderstood to refer to hacking as in breaking into computers, and so many sources incorrectly imply that it is describing the ideals of white-hat hackers. What Levy is talking about, however, does not have anything to do with computer security.



-
Sunaina D
EE09B037

No comments:

Post a Comment