Spectrofon #23
20 июля 1997 |
|
From the world of bat - "From the satellite to the Mitnick - the typology of Hacker.
We bring to your attention a reprint of electronic journal Zhurnal.ru, dwelling in the Internet today. We believe that the published article significantly complement our long-standing dispute and debate about hackers, and some key moments, we think, to dot the i. So, the word author. (C), Mirza Babayev (C) Zhurnal.ru From the satellite to Mitnick, or Typology hackers Michael A. Yakubov, who taught me a lot ... Tehnolingvisticheskie paradoxes Russian word "Sputnik" was incorporated in 1958 in English, was crossed with with the word "beat" - and there were beatniks. On shift "beat generation" were the carefree "flower children". Most of the hippies a negative attitude to computers, seeing they merely a means of centralized control. Those few who saw in them powerful force capable of transforming the world according to the ideals of artistic freedom and non-hierarchical, uncensored no Censorship of communication began to work on this transformation. Hippies are gone, and their ideals in the future, laying the philosophical basis of cyber revolution. At the scene of history came a new breed of non-conformists: hackers. The word "hacker" can not be adequately translated into Russian - the first in because of its ambiguity. On the one hand, hacker - a criminal who illegally penetrating in computer systems to steal or modify the information contained therein. C another hacker - it's just an expert on computers and computer communications, for which his work - both hobby and work. Thus, the word "hacker" combines at least two values (one meticulous hacker counted as many as 69) - one painted a negative ("intruder"), the other - neutral or even hvalitelnoe ("ACC", "master"). Sometimes these two values are trying to breed, calling malicious hackers special word - "crackers." Let me explain this difference Example: If you watched the movie "Network" the hacker is out there is Angela Bennett, while "Praetorians" - the most that neither is on crackers. (Of course, it would be correct to write "cracker", but you have to maintain parallelism: the word "Hacker" has penetrated into the Russian language, as in time "sputnik" - in English, in addition, wants to avoid unwanted associations with a certain kind of cookie). Flow lingvotehnologicheskih metamorphosis (As is characteristic of any transformations) closes on itself like a snake biting its tail. At a conference on computer security in March 1995 in Berlingame Cary Heckman likened challenge experts on security hacker Kevin Mitnick, a situation which proved to be the United States after Russian launch its satellite. Apology and debunking Thus, the verb "to hack" in relation to Cases computer can mean two opposite things: to hack the system and repair it, "patch" it. Both of these actions suggest a common framework: understanding as the system is built, the ability to handle the huge array of program data. No coincidence that many sysops (system operators) - former hacker (in the second, "lomatelnom" sense). The ambiguity of the term (or pseudo-word) "hacker" leads to paradoxes. "Hacker" - is a hero and a bully, and calculating the offender; master kiberrealnosti and the threat of a computerized society. Hence - the extremes in the assessment: hackers are either full of idealization (in writings themselves hackers) or complete stigmatization (in the writings of journalists, parasites of obsessive phobias layman). Reality, as always - in the middle. Roughly speaking, a "hacker in general" does not exist. There are real people playing with computers in a very different game. Motives for the game, its rules and results to which it leads, not reducible to any single formula, but constitute a vast field opportunities. Hacker - the engine of progress In 1984, Steven Levy, in his famous book "Hackers: Heroes of the Computer Revolution has formulated the principles of "hacker ethic", "Access to computers should be unlimited and total." "All information should be free." "Do not believe the authorities - the fight for decentralization. "You can create computer art and beauty." "Computers can change your life for the the better. " These statements go back, no doubt, to communalism and freedom hippovskih communes of the 60's (which also goes philosophy hippie - ask Andrew Madison). Levy spoke about three generations of hackers The first arose in the sixties and early seventieth in departments of computer sciences in the universities. Using the technique "Timesharing" These guys transformed the "public computer" (Mainframes) into a virtual personal computers, significantly expanded, thus, access to computers. Then in the late 70's, the second generation takes the next step - the invention and production of personal computers. These Non-academic hackers were outstanding representatives of the counter-culture. For example, Steve Jobs, hippies, Beatles fans, who dropped out of college, when he was tired of learning, or Steve Wozniak, an engineer at Hewlett-Pakards. First, than to succeed in the "Apple", both of Steve's doing that collected and sold so-called "blue boxes" - devices allowing free phone calls. And their friend and collaborator in the early stages Lee Felsenshtayn, who developed the first portable computer, called Osborne-1 "was ever a radical of the" new Left "and his" subversive "articles for the famous underground newspaper" Berkeley Barb ". "Ask not what your country can do for you. Better to do something himself, "- told the then young people, to paraphrase the slogan of the John F. Kennedy." Do your it "is easily translated as" Start Your Own business. "hated by wide circles of the establishment, the hippies were readily accepted into the world of small business. With them they bring honesty and ease in communication, which proved to be attractive for both sellers and buyers. However, success in business, which brought many of them wealth and power at a young age, not necessarily accompanied by "escalating" their counter-cultural values. The third generation of cyber-revolutionaries, Hackers early 80's, have created many applied, educational and game programs for personal computers. A typical figure here - Mitch Kapor, a former teacher of transcendental meditation, who created the program "Lotus 1-2-3", which facilitated the success of a very IBM-PC-native. Like most computer pioneers, Kapor is still active. Foundation Electronic Frontier "(Electronic Frontier Foundation), founded by him in conjunction with lyricist of "Grateful Dead" successfully impact on Washington's policy in respect of civil rights in cyberspace. Over the years since the publication of the book Levy came to power the fourth generation of revolutionaries, which depicts the achievements of Time Magazine Stewart Brand. They transformed militaristic ARPAnet - network, funded by the U.S. Department of Defense, the "total digital epidemic, now known as the Internet. Creating a non-hierarchical communication system, called Usenet and countless "boards ad "(BBS) - also to their credit. Following the same" hacker ethic "that and previous generations, they oppose commercialization of the Internet, creating programs that are immediately accessible to anyone who they wish - so-called "freeware" or "shareware", vividly Recalling the "Diggers" 60, "undermines the capitalism, "free handing their property and goods. Of course, - writes brand - not everyone on the electronic frontier feels his continuity with the Conroe cultural roots of the 60's. Can hardly be called a hippie Nicholas Negroponte, chief of the Laboratory of Mass Communications at the Massachusetts Institute of Technology (MIT) or a tycoon, "microsoft" Bill Gates. Nevertheless, the philosophy of the 60's keeps alive the creativity. Virtual reality - computerized sensory immersion - has received its name and was equipped with a primary technological base Dzheyronom Lanier, who grew up in New Mexico in the "geodesic yurt (Buckminster Fuller's invention, popular among the hippies), earned money playing the flute in the New York subway and up still wears long rastafarovskie pigtails. The latest generation of supercomputers, allowing enormous amount of simultaneous connections, has been developed and launches a brilliant Hairy Nillisom Dunn, who set out to build a machine, "which could we be proud of. "cryptography system called PGP (Pretty Good Privacy), which provides privacy for each user - the brainchild of a pacifist from the Boulder patlatogo Philip Zimmermann (Incidentally, for what he gave up his invention of the Internet, the U.S. authorities he wanted to solder term - there is a law prohibiting the export of strong cryptographic methods), and the sensational program "SATAN", allowing to identify holes in the protection of computer systems - the creation of an anarchist peevish Dan Farmer. These are the "good hackers" driving the technological advances and use their knowledge and skills for the benefit of mankind. Them As usual, oppose the "bad" - who read other people's letters, stealing other people's programs and all available means harm the progressive mankind. About them We'll talk next time. ■ ■ ■ >
Other articles:
Similar articles:
В этот день... 21 November