Hacker: Difference between revisions

From Citizendium
Jump to navigation Jump to search
imported>Howard C. Berkowitz
No edit summary
mNo edit summary
 
(12 intermediate revisions by 4 users not shown)
Line 1: Line 1:
{{subpages}}
{{PropDel}}<br><br>{{subpages}}
{{TOC|right}}
{{TOC|right}}
In society, the term '''hacker''' has been used as both a compliment and a derogatory term. In its original sense, it is used to describe one who is an expert, a problem solver, and generally a brilliant programmer. In the media and in society, however, the term has come to mean criminals who illegally break into [[Computer network|computer networks]] and systems.<ref>{{cite web
In society, the term '''hacker''' has been used as both a compliment and a derogatory term. In its original sense, it is used to describe one who is an expert, a problem solver, and generally a brilliant programmer. In the media and in society, however, the term has come to mean criminals who illegally break into [[Computer network|computer networks]] and systems.<ref>{{cite web
Line 7: Line 7:
| accessdate=2007-04-18
| accessdate=2007-04-18
}}</ref>
}}</ref>
==Precursors and hacker ethic==
==Precursors and the hacker ethic==
The term originated at the [[Massachusetts Institute of Technology]] (MIT), certainly before computers were available, and probably from the Tech Model Railroad Club. In its original MIT form, it primarily referred to practical jokes that:
The term originated at the [[Massachusetts Institute of Technology]] (MIT), certainly before computers were available, and probably from the Tech Model Railroad Club. In its original MIT form, it primarily referred to practical jokes that:


* are safe
* are safe
* do not damage anything
* do not damage anything
* do not not damage anyone, either physically, mentally or emotionally
* do not damage anyone, either physically, mentally or emotionally
* are funny, at least to most of the people who experience it
* are funny, at least to most of the people who experience it


Line 32: Line 32:
* Computers can change your life for the better.
* Computers can change your life for the better.


"Ethical hacking" has emerged, including some of the principles in the first list essentially saying "do no harm". One of the most controversial points of the Levy list is "all information should be free."  Many owners of personal computers do not believe their personal correspondence or financial records should be free. Organizations may have legal and arguably moral information to protect such things as [[HIPAA|personal health information]], information on criminal investigations in progress, personnel files, and such things as the detailed design of [[nuclear weapon]]s. The most ethical hacker is not omniscient, and has no way of knowing that the act of access may have unintended consequences. It is true that such things as electrical power grid [[SCADA]] controls, and medical radiation therapy machines, should never be accessible from the outside, but, if they are somehow reached, there is real danger from innocent exploration.
"Ethical hacking" has emerged, including some of the principles in the first list essentially saying "do no harm". One of the most controversial points of the Levy list is "all information should be free."  Many owners of personal computers do not believe their personal correspondence or financial records should be free. Organizations may have legal and arguably moral information to protect such things as [[HIPAA|personal health information]], information on criminal investigations in progress, personnel files, and such things as the detailed design of nuclear weapons. The most ethical hacker is not omniscient, and has no way of knowing that the act of access may have unintended consequences. It is true that such things as electrical power grid [[SCADA]] controls, and medical radiation therapy machines, should never be accessible from the outside, but, if they are somehow reached, there is real danger from innocent exploration.


Most system and network administrators, once they know there has been access by an unauthorized person, cannot assume that the intruder is ethical, and, as a matter of safety, close the entry point, and possibly shut down legitimate access until the computer(s) return to a known stable state.  
Most system and network administrators, once they know there has been access by an unauthorized person, cannot assume that the intruder is ethical, and, as a matter of safety, close the entry point, and possibly shut down legitimate access until the computer(s) return to a known stable state.


==Two sides of the Coin==
==Two sides of the Coin==
===Hackers as criminals===
The term "hacker" has at least two meanings.
The media have generally painted hackers as [[computer security]] [[criminals]]. Some proponents of the original meaning of the term "hacker" (knowledge seekers) call these people crackers, to specifically point out these people "crack security."


===Hackers as Knowledge Seekers===
===Hackers as Knowledge Seekers===
The original meaning of the term hacker was someone who had great technical knowledge. A hack was something to be proud of, usually described as pushing something beyond its design limits. People who usually "hacked on" certain projects would have descriptive names bestowed upon them, thus someone who wrote a lot of [[kernel]] [[source code|code]] would come to be called a "kernel hacker," or someone who worked on and was knowledgeable with the [[Unix]] [[operating system]] would come to be called a "Unix hacker."
The original meaning of the term hacker was someone who had great technical knowledge. A hack was something to be proud of, usually described as pushing something beyond its design limits. People who usually "hacked on" certain projects would have descriptive names bestowed upon them, thus someone who wrote a lot of [[kernel]] [[source code|code]] would come to be called a "kernel hacker," or someone who worked on and was knowledgeable with the [[Unix]] [[operating system]] would come to be called a "Unix hacker."
===Hackers as criminals===
The media have generally painted hackers as [[computer security]] criminals. Some proponents of the original meaning of the term "hacker" (knowledge seekers) call these people "crackers", to specifically point out these people "crack security." Another term, used on Citizendium, is [[miscreant]].
=== Hat colors ===
In some old Western movies the good guys have white hats and the villains have black hats. Sometimes people refer to "black hat" and "white hat" hackers; both are interested in breaking systems, but the black hats are [[miscreant]]s out for their own fun or profit while the white hats analyze attacks, or even try some attacks, in order to guide defense. [[Penetration testing]] is a white hat hacker activity. "Grey hat" is also used.


==Other Uses==
==Other Uses==
Line 47: Line 52:
At the Massachusetts Institute of Technology, the term "hack" takes on a meaning that is more analogous with a practical joke. In that vein, a hacker is someone (or a group of people), usually students, who conceive and execute a "hack." For example, placing a campus police patrol car on the dome of the MIT building<ref name="MIT Hacks">{{cite web| url=http://hacks.mit.edu/| title="MIT Hacks"| accessdate=2007-05-05}}</ref> is considered an accomplished hack, both for its technical difficulty  and the visual humor it provokes.
At the Massachusetts Institute of Technology, the term "hack" takes on a meaning that is more analogous with a practical joke. In that vein, a hacker is someone (or a group of people), usually students, who conceive and execute a "hack." For example, placing a campus police patrol car on the dome of the MIT building<ref name="MIT Hacks">{{cite web| url=http://hacks.mit.edu/| title="MIT Hacks"| accessdate=2007-05-05}}</ref> is considered an accomplished hack, both for its technical difficulty  and the visual humor it provokes.
<ref name="CP Car on the Great Dome">{{cite web| url=http://hacks.mit.edu/Hacks/by_year/1994/cp_car| title="CP Car on the Great Dome"| accessdate=2007-05-05}}</ref>
<ref name="CP Car on the Great Dome">{{cite web| url=http://hacks.mit.edu/Hacks/by_year/1994/cp_car| title="CP Car on the Great Dome"| accessdate=2007-05-05}}</ref>
 
===Jargon File Definition===
===Jargon File Definition===
The [[Jargon file]] describes a hacker as "One who enjoys the intellectual challenge of creatively overcoming or circumventing limitations."<ref name="The Jargon File: Hacker">{{cite web
The [[Jargon file]] describes a hacker as "One who enjoys the intellectual challenge of creatively overcoming or circumventing limitations."<ref name="The Jargon File: Hacker">{{cite web
| url=http://www.catb.org/jargon/html/H/hacker.html
| url=http://www.catb.org/jargon/html/H/hacker.html
Line 59: Line 65:


==References==
==References==
<references/>
{{reflist}}[[Category:Suggestion Bot Tag]]

Latest revision as of 06:00, 25 August 2024

This article may be deleted soon.
To oppose or discuss a nomination, please go to CZ:Proposed for deletion and follow the instructions.

For the monthly nomination lists, see
Category:Articles for deletion.


This article is a stub and thus not approved.
Main Article
Discussion
Related Articles  [?]
Bibliography  [?]
External Links  [?]
Citable Version  [?]
 
This editable Main Article is under development and subject to a disclaimer.

In society, the term hacker has been used as both a compliment and a derogatory term. In its original sense, it is used to describe one who is an expert, a problem solver, and generally a brilliant programmer. In the media and in society, however, the term has come to mean criminals who illegally break into computer networks and systems.[1]

Precursors and the hacker ethic

The term originated at the Massachusetts Institute of Technology (MIT), certainly before computers were available, and probably from the Tech Model Railroad Club. In its original MIT form, it primarily referred to practical jokes that:

  • are safe
  • do not damage anything
  • do not damage anyone, either physically, mentally or emotionally
  • are funny, at least to most of the people who experience it

"There is no way of enforcing this code, but anything that directly contradicts it will probably not be considered a "hack" by most of the MIT community."[2]

As computers and networks became more common, a broader ethic emerged, with the principles:[3]

  • Access to computers should be unlimited and total.
  • Always yield to the Hands-On Imperative
  • All information should be free.
  • Mistrust authority–promote decentralization.
  • Hackers should be judged by their hacking.
  • You can create art and beauty on a computer.
  • Computers can change your life for the better.

"Ethical hacking" has emerged, including some of the principles in the first list essentially saying "do no harm". One of the most controversial points of the Levy list is "all information should be free." Many owners of personal computers do not believe their personal correspondence or financial records should be free. Organizations may have legal and arguably moral information to protect such things as personal health information, information on criminal investigations in progress, personnel files, and such things as the detailed design of nuclear weapons. The most ethical hacker is not omniscient, and has no way of knowing that the act of access may have unintended consequences. It is true that such things as electrical power grid SCADA controls, and medical radiation therapy machines, should never be accessible from the outside, but, if they are somehow reached, there is real danger from innocent exploration.

Most system and network administrators, once they know there has been access by an unauthorized person, cannot assume that the intruder is ethical, and, as a matter of safety, close the entry point, and possibly shut down legitimate access until the computer(s) return to a known stable state.

Two sides of the Coin

The term "hacker" has at least two meanings.

Hackers as Knowledge Seekers

The original meaning of the term hacker was someone who had great technical knowledge. A hack was something to be proud of, usually described as pushing something beyond its design limits. People who usually "hacked on" certain projects would have descriptive names bestowed upon them, thus someone who wrote a lot of kernel code would come to be called a "kernel hacker," or someone who worked on and was knowledgeable with the Unix operating system would come to be called a "Unix hacker."

Hackers as criminals

The media have generally painted hackers as computer security criminals. Some proponents of the original meaning of the term "hacker" (knowledge seekers) call these people "crackers", to specifically point out these people "crack security." Another term, used on Citizendium, is miscreant.

Hat colors

In some old Western movies the good guys have white hats and the villains have black hats. Sometimes people refer to "black hat" and "white hat" hackers; both are interested in breaking systems, but the black hats are miscreants out for their own fun or profit while the white hats analyze attacks, or even try some attacks, in order to guide defense. Penetration testing is a white hat hacker activity. "Grey hat" is also used.

Other Uses

MIT Hackers

At the Massachusetts Institute of Technology, the term "hack" takes on a meaning that is more analogous with a practical joke. In that vein, a hacker is someone (or a group of people), usually students, who conceive and execute a "hack." For example, placing a campus police patrol car on the dome of the MIT building[4] is considered an accomplished hack, both for its technical difficulty and the visual humor it provokes. [5]

Jargon File Definition

The Jargon file describes a hacker as "One who enjoys the intellectual challenge of creatively overcoming or circumventing limitations."[6]

External links

How To Become A Hacker by Eric S. Raymond. Describes how to become a hacker in the "traditional sense" - someone with "technical adeptness and a delight in solving problems and overcoming limits"

References

  1. Eric S. Raymond. The Cathedral and the Bazaar: Introduction. Retrieved on 2007-04-18.
  2. Interesting Hacks To Fascinate People: The MIT Gallery of Hacks, The Hacker Ethic
  3. Levy, Steven, Hackers - Heroes of the Computer Revolution
  4. "MIT Hacks". Retrieved on 2007-05-05.
  5. "CP Car on the Great Dome". Retrieved on 2007-05-05.
  6. Hacker entry in the "Jargon File". Retrieved on 2007-04-09.