📄 beinghacker.html
字号:
These are clear examples of what the real intent of a hacker is when he breaks a system. It's very close to the idea of a child that opens a toy to see how it works. The difference is that the hacker tries not to destroy the toy (aside from the fact that the toy is not his own...).
<P>
Anyway, let's see the specific definition of the "cracker", according to the Jargon File:
<BLOCKQUOTE>
:cracker: n. One who breaks security on a system. Coined ca. 1985
by hackers in defense against journalistic misuse of {hacker}
(q.v., sense 8). An earlier attempt to establish `worm' in this
sense around 1981--82 on USENET was largely a failure.
<P>
Both these neologisms reflected a strong revulsion against the
theft and vandalism perpetrated by cracking rings. While it is
expected that any real hacker will have done some playful cracking
and knows many of the basic techniques, anyone past {larval
stage} is expected to have outgrown the desire to do so.
<P>
Thus, there is far less overlap between hackerdom and crackerdom
than the {mundane} [the term "mundane" is taken from the Sci-Fi fandom and identifies everything outside the world of the computer science, or the hacking] reader misled by sensationalistic journalism
might expect. Crackers tend to gather in small, tight-knit, very
secretive groups that have little overlap with the huge, open
poly-culture this lexicon describes; though crackers often like to
describe *themselves* as hackers, most true hackers consider
them a separate and lower form of life.
<P>
Ethical considerations aside, hackers figure that anyone who can't
imagine a more interesting way to play with their computers than
breaking into someone else's has to be pretty {losing}
[on the other hand, they have the same consideration for the people who use the computer in an absolute conventional way, such as only to write documents or to play] [...]
</BLOCKQUOTE>
Furthermore, about the "cracking" itself, the Jargon File says:
<BLOCKQUOTE>
:cracking: n. The act of breaking into a computer system; what a
{cracker} does. Contrary to widespread myth, this does not
usually involve some mysterious leap of hackerly brilliance, but
rather persistence and the dogged repetition of a handful of fairly
well-known tricks that exploit common weaknesses in the security of
target systems. Accordingly, most crackers are only mediocre
hackers.
</BLOCKQUOTE>
However, This is a superficial and reductive vision. In fact, as it is easily imaginable, there exist people, that are as experienced with computers and as thirsty of knowledge, that however don't have any respect of the hacker ethic and don't hesitate to perform actions meant to damage computer systems or other people.<BR>
They are the so-called <I>Dark-side hackers</I>.
This term derives from George Lucas' "Star Wars". A Dark-side hacker, just like Darth Vader, is <CITE>"seduced by the dark side of the Force"</CITE>. It has nothing to do with the common idea of <I>"good"</I> and <I>"bad"</I>, but it's closer to the idea of <I>"legal"</I> and <I>"chaotic"</I> in Dungeons&Dragons:
In substance, the dark-side hackers are accorded the same dignity and recognized as having the ability of a hacker, but their orientation makes them a dangerous element for the community.<BR>
A more common definition, reserved for those that damage someone else's computer systems without drawing any benefit from it, (therefore for pure stupidity or evilness), it is that of <I>Malicious hackers</I>.
<P>
More recent versions of the Jargon File (in which some most obsolete terms have been removed), as the version 4.0.0, 24 JUL 1996, makes clear, not only the distinction between hacker and cracker, but also between the entire hack scenes and other parallel realities, like piracy, and the <I>"warez d00dz"</I>, who collect an impressive amount of software (games and applications, or better said <I>"gamez"</I> and <I>"appz"</I>), that they are never likely to use, and whose greatest pride is to get software, break its protections, and distribute it on their website before their rival crew, where possible, within the same day it was released (<I>"0-day warez"</I>).
<P>
One could think that the Jargon File speaks only in theory, and that it describes the hacker ethic in a fantastic and utopian way. This is not so, hackers really are attached to their principles. The following is a practical example concerning one of the most famous hacker crews, the LOD (Legions Of Doom, that takes its name from the group of baddies in the series of cartoons of Superman and his Superfriends), of which The Mentor was also a member during the years 1988-89 (the already cited author of "The conscience of a Hacker").
<P>
In "The History of LOD/H", Revision #3 May 1990, written by Lex Luthor (founder of the crew, from the name of the baddie in the movie Superman I), and published on their e-zine "The LOD/H Technical Journal", Issue #4, released on May 20, 1990 (File 06 of 10), we can read:
<BLOCKQUOTE>
Of all 38 members, only one was forcefully ejected. It was found out that
Terminal Man [member dof the LOD/H in 1985] destroyed data that was not related to covering his tracks. This
has always been unacceptable to us, regardless of what the media and law
enforcement tries to get you to think.
</BLOCKQUOTE>
Yet, not all agree upon the same principles, and there are some "grey areas": for example, taking possession of objects that allow you to access information, or pursuing a personal purpose, can be considered "ethical" by some. A specific example could be <I>"grabbing"</I>: the theft of things like keys, magnetic cards, manuals or technical schemes, anyway this is a debatable activity, since a hacker prefers to copy rather to subtract, not only to not damage the "victim", but also to avoid leaving traces of his intrusion. A more acceptable and legal variant is <I>"trashing"</I>, that consists in looking inside the garbage of the subject, searching for objects and/or useful information.
<P>
But breaking into computer systems is only a small activity amongst the many things that hackers are involved in, and the aversion against the virtual vandal actions are a small part of the hacker ethic.<BR>
The hacker ethic is something greater, almost mystic, and draws its origins from the first hackers, those that programmed the TX-0, using the first available computers in the big American universities like MIT or Stanford.<BR>
From the already cited "Hackers, Heroes of the Computer Revolution" by Steven Levy:
<BLOCKQUOTE>
Something new was coalescing around the TX-0: a new way of life,
with a philosophy, an ethic, and a dream.
<P>
There was no one moment when it started to dawn on the TX-0
hackers that by devoting their technical abilities to computing
with a devotion rarely seen outside of monasteries they were the
vanguard of a daring symbiosis between man and machine. With a
fervor like that of young hot-rodders fixated on souping up
engines, they came to take their almost unique surroundings for
granted, Even as the elements of a culture were forming, as
legends began to accrue, as their mastery of programming started
to surpass any previous recorded levels of skill, the dozen or so
hackers were reluctant to acknowledge that their tiny society, on
intimate terms with the TX-0, had been slowly and implicitly
piecing together a body of concepts, beliefs, and mores.
<P>
The precepts of this revolutionary Hacker Ethic were not so much
debated and discussed as silently agreed upon. No manifestos
were issued ["The Mentor"'s one, very polemic, was written only about twenty years later]. No missionaries tried to gather converts. The
computer did the converting [...]
</BLOCKQUOTE>
Shortly, Steven Levy sums up the "hacker ethic" this way:
<BLOCKQUOTE>
Access to computers -- and anything which might teach you something about the way the world works -- should be unlimited and total. Always yield to the Hands-On imperative.
<P>
All information should be free.
<P>
Mistrust Authority. Promote Decentralization.
<P>
Hackers should be judged by their hacking, not bogus criteria such as degrees, age, race, or position.
<P>
You can create art and beauty on a computer.
<P>
Computers can change your life for the better.
<P>
LIKE ALADDIN'S LAMP, YOU COULD GET IT [THE COMPUTER] TO DO YOUR BIDDING.
</BLOCKQUOTE>
<P><BR>
<B>THE LAMER</B>
<P>
From "The Hacker Crackdown - Law and Disorder on the Electronic Frontier" by Bruce Sterling, Bantam Books, 1992.
(ISBN 0-553-08058-X, paperback: ISBN 0-553-56370-X, released as free electronic text for non-commercial purposes)
<BLOCKQUOTE>
There are hackers today who
fiercely and publicly resist any besmirching of the noble
title of hacker. Naturally and understandably, they
deeply resent the attack on their values implicit in using
the word "hacker" as a synonym for computer-criminal.
<P>
[...]
<P>
The term "hacking" is used routinely today by
almost all law enforcement officials with any professional
interest in computer fraud and abuse. American police
describe almost any crime committed with, by, through, or
against a computer as hacking.
</BLOCKQUOTE>
If the differentiation between hacker, cracker and dark-side hacker can result a very tiny distinction for the ones who live outside of the computer scene, nobody, especially a journalist, should confuse a hacker with the poor idiot that was locked up for using, with no thought to the consequences, programs that he found somewhere. (even if using the term "hacker" does sell more newspapers... The difference between hackers and journalists is that the aforementioned have ethics, the latter, not even a sense of modesty... but this is often simply mere ignorance).
<P>
Let's take as an example the following article published on the Italian newspaper "L'Unione Sarda" (<A HREF="http://www.unionesarda.it/">http://www.unionesarda.it/</A>), by Luigi Almiento (<A HREF="mailto:almiento@unionesarda.it">almiento@unionesarda.it</A>).
<BLOCKQUOTE>
<P ALIGN=CENTER>
<B>
POLICE.
<BR><BR>
The arrested hacker is a surveyor, aged 25
<BR><BR>
Files were stolen from the computers of internet "navigators", with the aid of a virus<BR>
spread on the Internet<BR>
</B>
<P>
Many people from different national service providers, recently learned to their own detriment, that it is better not to stay and chat to strangers on the <I>chat-lines</I> of the Internet.
This occured when a <I>hacker</I> aged 25, obtained the user names and passwords of their dial up accounts, while they were on-line.
<P>
[...]
<P>
"Harris", explains the lieutenant Saverio Spoto, commander of the Police Station [actually they are "Carabinieri", not the normal Police, because in Italy there are two different polices, don't ask why],
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -