📄 beinghacker.html
字号:
that of judging people by what they say and think, not what they look like.
My crime is that of outsmarting you, something that you will never
forgive me for.
<P>
[...]
</BLOCKQUOTE>
In these words, you will see the frustration of living in a defective world, that deprives the individuals that wish to rise above the mediocre, of the very information and resources they desire, to know what is kept hidden, and it condemns them hypocritically as criminals.
<P>
But the desperate search of knowledge is only one of the characteristics of the hacker. Another sure one is the pursute of extreme perfection.
An interesting article, is the one that narrates the history of the first hackers, and of how they developed "Spacewar!"
(the first videogame in history, born as a demo for the TX-0, meant as a "killer application" for this computer, with all its features exploitable), is "The origin of Spacewar", written by J. M. Graetz, and published in the August, 1981 issue of Creative Computing magazine.<BR>
<BLOCKQUOTE>
One of the forces driving the dedicated hacker is the quest for elegance. It is not sufficient to write programs that work. They
must also be "elegant," either in code or in function -- both, if possible. An elegant program does its job as fast as possible, or is
as compact as possible, or is as clever as possible in taking advantage of the particular features of the machine in which it runs,
and (finally) produces its results in an aesthetically pleasing form without compromising either the results or operation of other
programs associated with it.
</BLOCKQUOTE>
But the elegance and the perfection of hackers is not always comprehensible to the average individual. A hacker can often be in ecstasy reading some code written by another hacker, admiring his ability and "tasting" his style, as if he was reading poetry.
<P>
For example, normally to exchange the content of two variables (a and b, in this case), the statement most commonly used is this, which uses a third temporary variable:
<BLOCKQUOTE>
dummy = a : a = b : b = dummy
</BLOCKQUOTE>
The following method, instead, doesn't need the third variable, because it exploits a mathematical peculiarity of the boolean operator XOR:
<BLOCKQUOTE>
a = a XOR b : b = a XOR b : a = a XOR b
</BLOCKQUOTE>
Even if this system is at least three times slower than the first one because it requires the execution of three mathematical operations, (however it allows the saving of memory that the third variable would normally occupy), a hacker will surely admire the ingeniousness and the elegance of this method, to him it assumes the taste of a Japanese <I>haiku</I>.
<P>
Talking about the perfectionism of the hackers, in "Hackers: Heroes of the Computer Revolution" written by Steven Levy in 1984, in the chapter 2 ("The Hacker Ethic"), we read:
<BLOCKQUOTE>
Hackers believe that essential lessons can be learned about the
systems--about the world--from taking things apart, seeing how
they work, and using this knowledge to create new and even more
interesting things. They resent any person, physical barrier, or
law that tries to keep them from doing this.
<P>
This is especially true when a hacker wants to fix something that
(from his point of view) is broken or needs improvement.
Imperfect systems infuriate hackers, whose primal instinct is to
debug them. This is one reason why hackers generally hate
driving cars--the system of randomly programmed red lights and
oddly laid out one-way streets causes delays which are so
goddamned UNNECESSARY that the impulse is to rearrange signs,
open up traffic-light control boxes . . .redesign the entire
system.
<P>
In a perfect hacker world, anyone pissed off enough to open up a
control box near a traffic light and take it apart to make it
work better should be perfectly welcome to make the attempt.
</BLOCKQUOTE>
It's just in the name of such principle that the Linux operating system and the Gnu C compiler have been developed, their code is open and available to be changed and modified by anyone.<BR>
Lately, many important commercial software producers also started moving in this direction, as Netscape: Netscape Communicator 5, will, in fact be the first software, originally born as a "closed" commercial product, to be developed with this type of philosophy.
<P>
A hacker is never satisfied with the default settings of a program or of the custom installations, he always has to open the configuration menu and set the options to get the maximum performance, and to make the product work as close as possible to his "way". A hacker must be able to use, to modify and to check all the possible features of a program.
<P>
But after all, what motivates hackers? Why do they create programs that exploit advanced techniques and then distribute them free? And why do they freely distribute knowledge that was incredibly difficult to obtain?<BR>
A good answer could be found in the site of the KIN (Klever Internet Nothings, <A HREF="http://www.klever.net">http://www.klever.net</A>), they
are not exactly a hacker crew, but a group of people that write programs and release them freely on the Internet:
<BLOCKQUOTE>
What makes people write software and distribute it for free? Vanity, you said? Well, maybe.. But after all, what is this business all about? Is it all about money? Ask anyone - it's not. Most people I know in the industry will tell you that.<BR>
Their idea is "just leave me alone and let me do what I love to do".
</BLOCKQUOTE>
In short, it's not about money. It's about feeling free to do what you want, and, just possibly, to find someone that appreciates your work.
<P><BR>
<B>THE HACKER ETHIC</B>
<P>
The true hacker doesn't have morals, and he would never censor information or ideas of any kind. An initiative of the Italian priest Don Fortunato di Noto, (<A HREF="mailto:fortunad@sistemia.it">fortunad@sistemia.it,</A>) who in January of 1998 formed the "Committee of resistance against the Pedophiles", and who asked for the help of the hacker community to unmask, capture and close the sites of the pedophiles on the Internet, failed miserably as it was only supported by self-acclaimed hackers without any skill.<BR>
Besides, hackers are tolerant by nature, and rarely get angry, but they are irritated by people and tasks perceived to be wasting their time.<BR>
There are however, some things that hackers can be intolerant of. One of these is when lies are told, to, or about them, you can say that hackers are imbeciles (it's an opinion, after all), but you can not say that they steal chickens. And yet, it would still be unusual that hackers would hack a site to remove the lies propogated about them. It would be more typical that they would create another site, refuting the lies against them.<BR>
Hacking can be used like as a form of protest, breaking into and modifying the websites of very well known societies and government or military corporate entities, can be a way to make public certain injustices (especially attacks to the liberty of information or expression) or violations of human rights. The hacks, of the websites of the CIA (that became Central Stupidity Agency) and of the Department of Justice, are famous for being hacked with this intention in mind.<BR>
In the article "Hacking for Human Rights?" by Arik Hesseldahl (<A HREF="mailto:ahess@reporters.net">ahess@reporters.net</A>) published on the online magazine Wired (<A HREF="http://www.wired.com">http://www.wired.com</A>) dated 14.Jul.98 9:15am, the hacker Bondie Wong, (a dissident Chinese astrophysicist who lives in Canada, that temporarily disabled a Chinese satellite in 1997), a member of the famous hacker crew, Cult of the Dead Cow (which in the beginning of 1999 released the Back Orifice trojan) threatened to attack the computer networks of foreign companies that did business with China, causing them serious damages and huge financial losses.<BR>
In an interview conducted by Oxblood Ruffin, a former United Nations consultant, and published on Wired, Blondie Wong says:
<CITE>"Human rights is an international issue, so I don't
have a problem with businesses that profit from
our suffering paying part of the bill"</CITE>.
<P>
Contrary to the complete lack of moral judgement (but, above all, of moralism) of hackers, lies a deep ethical sense, that is something allmost "religious" in most hackers.<BR>
About this point, we can go back to the Jargon File:
<BLOCKQUOTE>
:hacker ethic, the: n.<BR>
1. The belief that information-sharing
is a powerful positive good, and that it is an ethical duty of
hackers to share their expertise by writing free software and
facilitating access to information and to computing resources
wherever possible.<BR>
2. The belief that system-cracking for fun
and exploration is ethically OK as long as the cracker commits
no theft, vandalism, or breach of confidentiality.
<P>
Both of these normative ethical principles are widely, but by no
means universally) accepted among hackers. Most hackers subscribe
to the hacker ethic in sense 1, and many act on it by writing and
giving away free software. A few go further and assert that
*all* information should be free and *any* proprietary
control of it is bad [...]
<P>
Sense 2 is more controversial: some people consider the act of
cracking itself to be unethical [...]<BR>
But this principle at least moderates the behavior of people who
see themselves as `benign' crackers (see also {samurai}). On
this view, it is one of the highest forms of hackerly courtesy
to (a) break into a system, and then (b) explain to the sysop,
preferably by email from a {superuser} account, exactly how it
was done and how the hole can be plugged --- acting as an
unpaid (and unsolicited) {tiger team}
[The "tiger team" derives from the U.S. military jargon.
These people are paid professionals who do
hacker-type tricks, e.g., leave cardboard signs saying "bomb" in
critical defense installations, hand-lettered notes saying "Your
codebooks have been stolen" (they usually haven't been) inside
safes, etc.
Serious
successes of tiger teams sometimes lead to early retirement for
base commanders and security officers].
<P>
[...]
</BLOCKQUOTE>
Breaking into a system is not seen by the hacker as a criminal action, but like a challenge. The idea is not to damage the "victim", but to find a way to penetrate its defenses. It's the intellectual challenge, the curiosity, the will to experiment and to explore, this is what moves the hacker, not the will to damage someone or something, and not even to obtain personal profit.
<P>
In another writing of The Mentor, "A Novice's Guide to Hacking- 1989 edition", dated December 1988, the author opens the essay with a call to the ethics of the category, to which follows a list of
<CITE>"suggestions for guidelines to follow to
ensure that not only you stay out of trouble, but you pursue your craft without
damaging the computers you hack into or the companies who own them"</CITE>:
<BLOCKQUOTE>
As long as there have been computers, there have been hackers. In the 50's
at the Massachusets Institute of Technology (MIT), students devoted much time
and energy to ingenious exploration of the computers. Rules and the law were
disregarded in their pursuit for the 'hack'. Just as they were enthralled with
their pursuit of information, so are we. The thrill of the hack is not in
breaking the law, it's in the pursuit and capture of knowledge.
</BLOCKQUOTE>
In a file titled "The Hotmail Hack" written by Digital Assassin of the "United Underground" (or "U2", for short), in which a weakness of the HotMail system is illustrated, through which it is possible to enter into the mailbox of another person, the author, at a certain point interrupts the explanation with these words:
<BLOCKQUOTE>
....but before I tell you how to use that line, I'm going to side
track for a little theory behind this hack. Because there's NO point in a hack, if you
don't know how it works. That is the whole idea of hacking, to find out how systems work.
</BLOCKQUOTE>
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -