Spectrofon #23
20 июля 1997

From the world of bat - "From the satellite to the Mitnick - the typology of Hacker.

<b>From the world of bat</b> -
   We bring to your attention a reprint
of electronic journal Zhurnal.ru, dwelling in the Internet 
today. We believe that the published article significantly 
complement our long-standing dispute and debate about hackers, 
and some key moments, we think, to dot the i.

So, the word author.



(C), Mirza Babayev
(C) Zhurnal.ru


         From the satellite to Mitnick,

                   or

            Typology hackers


                       Michael A. Yakubov,

            who taught me a lot ...


      Tehnolingvisticheskie paradoxes



   Russian word "Sputnik" was incorporated in
1958 in English, was crossed with
with the word "beat" - and there were beatniks. On
shift "beat generation" were the carefree "flower children". 
Most of the hippies a negative attitude to computers, seeing 
they merely a means of centralized control. Those few who saw 
in them powerful force capable of transforming the world

according to the ideals of artistic freedom and
non-hierarchical, uncensored no

Censorship of communication began to work on this
transformation. Hippies are gone, and their
ideals in the future, laying the philosophical basis of cyber 
revolution. At the scene of history came a new breed of 
non-conformists: hackers.



   The word "hacker" can not be adequately translated into 
Russian - the first in because of its ambiguity. On the one 
hand, hacker - a criminal who illegally penetrating

in computer systems to steal or
modify the information contained therein. C
another hacker - it's just an expert on
computers and computer communications, for which his work - 
both hobby and work. Thus, the word "hacker"

combines at least two values ​​(one meticulous hacker counted 
as many as 69) - one painted a negative ("intruder"), the other 
- neutral or even hvalitelnoe ("ACC", "master"). 


   Sometimes these two values ​​are trying to breed, calling 
malicious hackers special word - "crackers." Let me explain 
this difference Example: If you watched the movie "Network"

the hacker is out there is Angela
Bennett, while "Praetorians" - the most that neither is on 
crackers. (Of course, it would be correct to write "cracker", 
but you have to maintain parallelism: the word "Hacker" has 
penetrated into the Russian language, as in time "sputnik" - in 
English, in addition, wants to avoid unwanted associations with 
a certain kind of cookie). 


   Flow lingvotehnologicheskih metamorphosis
(As is characteristic of any transformations)
closes on itself like a snake biting its tail. At a conference 
on computer security in March 1995 in Berlingame Cary Heckman 
likened challenge experts on security hacker Kevin

Mitnick, a situation which proved to be the United States after
Russian launch its satellite.


          Apology and debunking



   Thus, the verb "to hack" in relation to
Cases computer can mean two opposite things: to hack the system 
and repair it, "patch" it. Both of these actions suggest a 
common framework: understanding as the system is built, the 
ability to handle the huge array of program data. No 
coincidence that many sysops (system operators) - former hacker 
(in the second, "lomatelnom" sense). 


   The ambiguity of the term (or pseudo-word) "hacker" leads to 
paradoxes. "Hacker" - is a hero and a bully, and calculating 
the offender; master kiberrealnosti and the threat of a 
computerized society. Hence - the extremes in the assessment: 
hackers are either full of idealization (in

writings themselves hackers) or complete
stigmatization (in the writings of journalists, parasites of 
obsessive phobias layman). 


   Reality, as always - in the middle.
Roughly speaking, a "hacker in general" does not exist. There 
are real people playing with computers in a very different 
game. Motives for the game, its rules and results to which it 
leads, not reducible to any single formula, but constitute a 
vast field opportunities.



       Hacker - the engine of progress



   In 1984, Steven Levy, in his famous book "Hackers: Heroes of 
the Computer Revolution has formulated the principles of 
"hacker ethic", 

"Access to computers should be unlimited and total."

"All information should be free."

"Do not believe the authorities - the fight for 
decentralization. 

"You can create computer art and beauty."

"Computers can change your life for the
the better. "


   These statements go back, no doubt,
to communalism and freedom hippovskih
communes of the 60's (which also goes philosophy
hippie - ask Andrew Madison).


  Levy spoke about three generations of hackers



   The first arose in the sixties and early
seventieth in departments of computer
sciences in the universities. Using the technique
"Timesharing" These guys transformed the "public computer"
(Mainframes) into a virtual personal
computers, significantly expanded, thus, access to computers.


   Then in the late 70's, the second generation
takes the next step - the invention and
production of personal computers. These
Non-academic hackers were outstanding representatives of the 
counter-culture. For example, Steve Jobs, hippies, Beatles 
fans, who dropped out of college, when he was tired of 
learning, or Steve Wozniak, an engineer at Hewlett-Pakards. 
First, than to succeed in the "Apple", both of Steve's doing 
that collected and sold so-called "blue boxes" - devices 
allowing free phone calls. And their friend and collaborator in 
the early stages Lee Felsenshtayn, who developed the first 
portable computer, called Osborne-1 "was ever a radical of the" 
new Left "and his" subversive "articles for the famous 
underground newspaper" Berkeley Barb ". 


   "Ask not what your country can
do for you. Better to do something
himself, "- told the then young people, to paraphrase the 
slogan of the John F. Kennedy." Do your it "is easily 
translated as" Start Your Own 

business. "hated by wide circles of the establishment, the 
hippies were readily accepted into the world of small business. 
With them they bring honesty and ease in communication,

which proved to be attractive for both sellers and buyers. 
However, success in business, which brought many of them wealth 
and power at a young age, not necessarily accompanied by 
"escalating" their counter-cultural values.



   The third generation of cyber-revolutionaries,
Hackers early 80's, have created many
applied, educational and game programs for
personal computers. A typical figure
here - Mitch Kapor, a former teacher of transcendental 
meditation, who created the program "Lotus 1-2-3", which 
facilitated the success of a very IBM-PC-native. Like most 
computer pioneers, Kapor is still active. Foundation Electronic 
Frontier "(Electronic Frontier Foundation), founded by him in 
conjunction with lyricist of "Grateful Dead" successfully


impact on Washington's policy in respect of
civil rights in cyberspace.


   Over the years since the publication of the book Levy
came to power the fourth generation of revolutionaries, which 
depicts the achievements of Time Magazine Stewart Brand. They

transformed militaristic ARPAnet -
network, funded by the U.S. Department of Defense, the "total 
digital epidemic, now known as the Internet. Creating a 
non-hierarchical communication system, called Usenet and 
countless "boards ad "(BBS) - also to their credit. Following 
the same" hacker ethic "that and previous generations, they 
oppose commercialization of the Internet, creating

programs that are immediately accessible to anyone who they 
wish - so-called "freeware" or "shareware", vividly Recalling 
the "Diggers" 60, "undermines the capitalism, "free handing 
their property and goods. 


   Of course, - writes brand - not
everyone on the electronic frontier feels his
continuity with the Conroe cultural roots of the 60's. Can 
hardly be called a hippie Nicholas Negroponte, chief of the 
Laboratory of Mass Communications at the Massachusetts 
Institute of Technology (MIT) or a tycoon, "microsoft" Bill 
Gates. Nevertheless, the philosophy of the 60's keeps alive the 
creativity. Virtual reality - computerized sensory immersion - 
has received its name and was equipped with a primary 
technological base Dzheyronom Lanier, who grew up in New Mexico 
in the "geodesic yurt (Buckminster Fuller's invention, popular 
among the hippies), earned money playing the flute in the New 
York subway and up still wears long rastafarovskie

pigtails. The latest generation of supercomputers, allowing 
enormous amount of simultaneous connections, has been developed

and launches a brilliant
Hairy Nillisom Dunn, who set out to build a machine, "which

could we be proud of. "cryptography system called PGP (Pretty 
Good Privacy), which provides privacy for each user - the 
brainchild of a pacifist from the Boulder patlatogo Philip 
Zimmermann (Incidentally, for what he gave up his invention of 
the Internet, the U.S. authorities he wanted to solder term - 
there is a law prohibiting the export of strong cryptographic 
methods), and the sensational program "SATAN", allowing to 
identify holes in the protection of computer systems - the 
creation of an anarchist peevish Dan Farmer. 


   These are the "good hackers" driving the technological 
advances and use their knowledge and skills for the benefit of 
mankind. Them As usual, oppose the "bad" - who read other 
people's letters, stealing other people's programs and all 
available means harm the progressive mankind. About them

We'll talk next time.


               ■ ■ ■

>





Other articles:

From the world of bat - "From the satellite to the Mitnick - the typology of Hacker.

From the world of bat - an article about the "bad" hakepah.

Encyclopaedia - the history of Codemasters: creators of the famous series of games about Dizzy + softografiya firm.

Fantasy - "A virtual Sindpom (tpagikomichesky faps).

Premiere - music editor of a new generation of Fast Tracker, assembler ZASM 3.10, font editor BYTEX Font Editor, adventyurnaya game "Pluto."

Mirror - an interview with the organizer of the Novgorod Digital Reality - Arty.

Globe - "Five years Hewson Consultants" history of the company.

Cache - Pokes and the cheat's for a variety of games, including to UFO-2, Kwik Snax, ELITE.

Opinion - the results of an opinion poll in April to the result of our ehokonfepentsii "ZX.SPECTRUM".

Advertising - advertising and announcements.


Темы: Игры, Программное обеспечение, Пресса, Аппаратное обеспечение, Сеть, Демосцена, Люди, Программирование

Similar articles:
List BBS - A list of running BBS.
Our competition - Competition of the best games. Top Ten games.
Miscellaneous - report of Rob F. with the Ukrainian hangouts SpeXtream'2004.
Events 2 - an interview with the sting / hoax group (sg) and steep / x-time. (Ste), who was chief organayzerom ascii demoparty 2oo2.

В этот день...   4 May