LT   EN   RU  
2024 г. март 28 д., четверг Straipsniai.lt - Информационный портал
  
  Компьютеры > Компьютерные технологии > Хакеры
Lankomumo reitingas Версия для печати Spausdinti
Hackers Heroes of the Computer Revolution

'Hackers Heroes of the Computer Revolution' is a book by Steven Levy about the hacker culture. It was published in 1984 in Garden City , New York by Anchor Press / Doubleday.

Preface

Levy decides to write about the subject of hackers because he thought they were fascinating people. He also wanted to present a more accurate view of hackers than the one most people had. Levy found them to be ?turers, visionaries, risk-takers, and? artists?er than ? social outcasts or 'unprofessional' programmer s who wrote dirty, 'nonstandard' computer code.?For this book, Levy talked to many different hackers, from the 1950s until the 1980s .

Who's Who

At the beginning, Levy introduces many important hacker figures and machines. Among the people are John Draper ( aka Captain Crunch) infamous phone phreaker , Bill Gates Harvard dropout, ? wizard?wrote Altair BASIC , Richard Greenblatt the ?r's hacker? href="getdefn.jsp?keywords=Steven_Jobs">Steven Jobs visionary, Marvin Minsky ?ul and brilliant MIT professor who headed the AI lab, Richard Stallman The Last of the Hackers, and many, many others. And among the machines mentioned are the Altair 8800 , Apple II , Atari 800 , IBM PC , PDP-1 , TX-0 , and other ones.

Part One: True Hackers

1.The Tech Model Railroad Club or the TMRC was a club at MIT that build sophisticated railroad and trains models. These were among the first hackers. Key figures of the club were Peter Samson , Alan Kotok , Jack Dennis , and Bob Saunders . The club was composed of two groups, those who were interested in the modeling and landscaping, and those who created the Signals and Power Subcommittee who created the circuits that made the trains run. The latter would be among the ones who popularized the term hacker among many other slang terms, and who eventually moved on to computers and programming . They were initially drawn to the IBM 704 , the multimillion-dollar mainframe that was operated at Building 26, but access and time to the mainframe was restricted to more important people. The group really began being involved with computers when the Jack Dennis, a former member, introduced them to the TX-0, a three-million-dollar computer on long-term-loan to MIT from from Lincoln Lab . The would usually stake out the place where the TX-0 was housed until late in the night in hopes that someone who had signed up for computer time did not show up.

2.The Hacker Ethic was a set of concepts, beliefs, and mores that came out of a symbiosis relationship between the hackers and the machines. It was not something that was written up as a manifesto, but a commonly, silently, agreed upon creed that simply came to be. The Ethic basically consisted of allowing all information to be free in order to learn about how the world worked; using the already available knowledge to create more knowledge. Anything that prevented them from this knowledge was resented. The best system was an open one that could be debugged and improved upon by anyone, and bureaucracy was the bane of open systems and the IBM culture at the time was its epitome. The worth of a hacker should only be judged by looking at his hacking, not on other criteria such as education, age, race, or position, and anything a hacker creates on a computer could be considered artistic and beautiful just like anything else. The most beautiful computer code was one that was aesthetic, innovative and did not waste memory space. The practice of making program s use less space was known as ?ng.?her belief was that computers can enhance your life, even if you are not a hacker. At the time computers were not well understood and hackers had to convince others, including their professors, of this belief.

3.Spacewar: Many of the hackers were also fascinated by the telephone companies and their exchange systems and would often go on tours the companies offered to learn as much about them as possible. Alan Kotok, who had acquired some prestige with his skills with the TX-0 and also worked for Western Electric (a phone company), would read as much as he could about the technical details of the telephone system and then explore or fingerprint the network. In September of 1961 , DEC donated to MIT's RLE lab the second PDP-1 that it had produced. The machine was a dream to hackers. Six of them, including Kotok, Samson, Saunders, and Wagner, spent a a total of two hundred and fifty man-hours one weekend to rewrite the TX-0 compiler for the PDP-1 because they did not like the first choice. They were paid five hundred dollars for their feat, but the finished product that had come of the Hacker Ethic, was its own reward for the hackers. Steve ? Russell was another PDP-1 hacker that came up with a 2D game called Spacewars in which two space ships, controlled by toggle switches on the PDP-1, would fly around the screen and shoot torpedoes at each other. His programs was further improved by the other hackers. Samson, for example, changed the random dots that represented the stars to look like the real constellations and he made the screen scroll as the ships moved in space. Dan Edwards, another programmer, added a sun and the effect of gravitational pull. Kotok and Saunders even created the first computer joystick out of TMRC parts to aid with the playing. The game and the compiler were readily and freely available to anyone. Eventually two programs were started to make computers usable by more than one person at a time, a concept that was called time-sharing . One was started by Jack Dennis for the PDP-1, and one was started by a professor named F.J. Cobart?the IBM 7090 . MIT would eventually be paid three million dollars a year by ARPA to develop time-sharing through Project MAC headed by Dennis with the involvement of Minsky who would focus on Artificial Intelligence .

4.Greenblatt and Gosper: Ricky Greenblatt was a born hacker, although when asked whether a hacker is born or made, he said, ?ckers are born, then they're going to get made, and if they're made into it, they were born.?as an intelligent child, and used to play chess and make electrical devices at an early age. When he first got into MIT he was intent on making the Dean's list , but by his sophomore year he flunked out, because he was spending too much time hacking relay circuits at the TMRC and programming for the PDP-1. He even programmed a FORTRAN compiler for the PDP-1. Bill Gosper was a math genius. He took a programming course with John McCarthy, and Minsky's course on artificial intelligence. The hackers enjoyed Chinese food , and they would order anything that seemed interesting to their exploratory minds. Most did not have much of a social life outside of hacking, and some such as Greenblatt were notorious for their lack of personal hygiene. Gosper managed to graduate, but he had to work to pay back his tuition money that the Navy had paid in return for working for them. Gosper did not like the Navy culture which did not allow programmers near the computers, and he hated the Univac computer that they used since he considered it erroneous in its very design. He managed to work for a private company and later for the Project MAC. Greenblatt decided to write a better chess program because he found Kotok's version to be lacking in strategy. The program was good enough to defeat an academic named Herbert Dreyfus who had proclaimed that no chess program would be good enough to beat a ten-year-old. Although the hackers proved the skeptic wrong, their Hacker Ethic concluded that convincing the outside world of the merits of computers was not as interesting as hacking them.

5.The Midnight Computer Wiring Society

6.Winners and Losers

7.LIFE

Part Two: Hardware Hackers

8.Revolt in 2100

9.Every Man a God

10.The Homebrew Computer Club

11.Tiny BASIC

12.Woz

13.Secrets

Part Three: Game Hackers

14.The Wizard and the Princess

15.The Brotherhood

16.The Third Generation

17.Summer Camp

18.Frogger

19.Applefest

20.Wizard vs. Wizard

         

Lankomumo reitingas

Oбсудить на форуме - Oбсудить на форуме

Версия для печати - Версия для печати

Назад
Случайные теги:    Мобильная связь (5)    Комплектующие (18)    Право человека (8)    Казино (9)    Книги (2)    Спорт (40)    Драконы (12)    Физкультура (3)    Открытый код (2)    Мотоциклы (2)    Фильмы (10)    Еврейи (10)    Сканеры (2)    Компьютерные игры (26)    Математика (2)    Лов рыбы (11)    Литература (4)    Дельфины (4)    Культура (88)    Английский язык (2)    География (4)    Египет (5)    Гостья из будущего (35)    Наука (90)    Прогр. обеспечение (15)    Бизнес и финансы (20)    Латинский язык (7)    НЛО (24)    Криптография (17)    Пиво (29)    Воспитания (3)    Безопасность (43)    Наркопсихотерапия (2)    Психиатрия (13)    Вирусы (25)    Аквариумы (10)    Экология (18)    Накопители (2)    Животные (31)    Процессоры (7)    Ислам (3)    Астрология (13)    Настольные игры (17)    Йога (9)    Технологий (4)    Религия (32)    Транспорт (11)    Туризм (25)    Боевые искусства (10)    Операционные системы (8)
1. Марокканские хакеры воюют с Израилем
2. Банкам предложена система защиты от онлайн-грабежей
3. Турецкие хакеры взломали французский сайт Microsoft
4. Шотландский университет начинает готовить дипломированных хакеров
5. Microsoft выпускает защитные программы под новым брендом
6. Венесуэлец украл телефонного трафика на 1 млн долларов
7. Швеция расследует атаку на правительственный сайт
8. Российский бэкдор распространяется через сайт американской торговой сети
9. Microsoft рекомендует использовать Word в безопасном режиме
10. В университете Огайо в течение года не замечали взлома сервера
1. Wi-Fi побеждает Ethernet в домашних сетях
2. Foundstone выпустила SiteDigger - программу для поиска уязвимостей на сайтах
3. iWork против Microsoft Office
4. Обход каталога в phpBB Attachment Mod
5. Новый хакерский инструмент: шоколадка
6. Билл Гейтс и другие коммунисты
7. Toshiba вводит в практику квантовую криптографию
8. Кто сказал, что безопасность должна оставаться несбыточной мечтой?
9. Корпорации беззащитны перед внутренними угрозами
10. P2P-пираты - полезные члены сообщества
Map