Odyssey Magazine #01
05 марта 1997

History - The classification of hackers.

<b>History</b> - The classification of hackers.
  Igor Moiseenko
 article is reprinted
 with the reduction of
 Journal Computerra "
 No # 43 (170)


 Music by Shov



   Analogue of the English word "hacker" in the
Russian language there. The closest related
- Prikolschik "that is, a person who is capable of Nonsense 
(English - Khaki). And the more wittier and subtle joke, the 
more this person a hacker. And who the most generous in the 
fun? That's right, students. Young Americans who studied at 
Caltech in the early sixties, understood by hack or some very 
smart or very Bizarre acts committed using a computer or 
without it.  The second most important source and part of the 
hacking was phreakers (or freaks). Fame frikerstvo

received after the appearance in 1972
magazine "Esquire" article about the success of Captain Crunch 
(Cap'n Crunch) - "father frikerstva. Under that name was 
hiding, John T. Draper - the inventor of the generator, which 
is modeled commanding tones of telephone lines and allowed its 
creator Swan's free.



   Let's go back a little back and talk about the history of 
the emergence of hacking. 


   A magic wand that turned volatile mix of students with 
frikerstvom in Genie on behalf of the attacker, was a computer.

For the first time the term "hacking" for
in activities related to computers,
appeared in the late 50's. Various sources
agree that the birthplace
this term is more likely to
can be regarded as the Massachusetts Institute of Technology 
(MIT), one of the first to obtain the most

Computer. At that time, computers were produced
single samples, were very expensive, were huge and slow (on
today's standards), and the prospects of their application 
seemed rather vague. Limited capacity of the computer and lack 
of allocated computing time led to a separation of students 
into those who was a computer on the "you", and those for whom 
she and left the thing in itself. First, following

best student traditions, began to help the second, causing them 
sacred awe and respect. The highest expression

appreciation was the second assignment
the first honorary among students
rank hackers. In this context, the attacker
meant unorthodox, talented
programmer.
 Among hackers, there were certain
standards and views on the relationship with
colleagues. So, for example, was not considered
unethical to make changes to the program,
written by a comrade to bring it
to perfection (in their own understanding), or learn from the 
more talented colleagues. In this case, no one cares about

own priorities in the invention of the
or other original techniques or solutions, no one stole the 
program to selling them, no one insisted on the observance of 
copyright law and did not try to conceal their products. There 
is nothing surprising in such a relationship was not: ordinary 
student fraternity was its new incarnation, in addition, work

was basically a collective built
on trust.
 These rules of conduct embodied in the
kind of ethical code hacker, also attributed to the students at 
MIT. Code more or less fully presented by Stephen

Levy in his book "Hackers", published in 1984
year. Here is a brief of its main provisions:

   1. Computers - a tool for the masses.
They should not belong only to the wealthy
and used only for their benefit.

   2. Information belongs to everyone. The main task - to 
create and distribute knowledge, rather than keep them secret.


   3. The code - common property.
Good code should use all
bad code should be corrected. Programs should not be protected 
by copyright or be supplied with copy protection. 

   4. Programming - is an art.
Perfection is achieved when
program that performs its function only takes a few lines, when 
one program does what it can not do

another, when some programs may intrude into the other, when 
the program can manipulate files in ways previously thought 
impossible. Perfect program, the individual techniques 
programming algorithms can be successful to be collectible and 
reverence. 

   5. Computer - a living organism. For
computer needs care, they should be cherished.

   In his book on social
Challenges of Cyberspace, journalists
Katie Hafner and John Markof wrote about
times of the early hacking:
 "In the 60's and 70's meant to be a computer hacker around the 
same as in the Middle Ages - Be numbered with the knightly 
order. Awarded the title of hacker intellectually restless soul 
seeking improve any program as long as it will be impossible to 
improve on. This meant dedication to computers that to the 
uninitiated seem fanatical, but is the essence of the then 
hacking. "  Thus, even at the dawn of the hacking

clearly defining its characteristics. First of all, computer 
hacking - a constant process of learning about the world 
through the prism of computer technology, and ideally - is 
process for the sake of the process ("the purpose - nothing 
motion - all "). Negative phenomena accompanying hacking (for 
example, the disclosure of confidential information, industrial 
espionage and the like), to the true hacking relations do not 
have. Consequently, the "apostates", having lost the true path 
to slippery slope of personal benefits, automatically lose 
their right to be called hackers how brilliant they are.


   So little or so have seen all the dawn
computer revolution. I fully share this view and believe
the only correct interpretation is a
the concept of "hacking". So humiliating position in which 
hacking (partly his own fault, but a much greater extent due to 
activities of other forces) was present.  Hacking has evolved 
along with the improvement of computer technology; its 
magnitude increases in proportion expansion of the use of 
computers. It would be better to say that progress of the 
computer industry and the evolution of hacking - are closely 
related and even interdependent processes. Very popular among 
experts is the point of view that the hackers are unless the 
engine computer progress, so one of the most significant its 
components. Moreover, many American experts argue that all U.S. 
success in the development of computing and software-only by 
hackers. Even try to substantiate the claim that all the 
successes of the U.S. development of computer technology 
related to householder. In the proof is given

the fact that successful programs, widespread, - Wordstar,
Lotus 1-2-3, Visicalc - developed by individuals or small 
groups of programmers. But the programs created by large groups 
(Visi-on, Jazz), okazalis unsuccessful and led to the 
bankruptcy of firms-developers.  And remember the computer 
donated by the world Wozniak and Jobs, in the fact that neither

a hacker age! It is known that PC
was not the brainchild of IBM, Sperry and Burroughs.
Microprocessors, which were based
first personalki, designed for
industrial robots, aircraft landing gear,
traffic lights, etc. And that hackers figured out that the 
union of these microprocessors to memory chips forms computer, 
which can be assembled at home.  Similarly we can show that

Many major computer ideas - an interactive interface, 
communication through telephone channels, BBS, network and even 
Internet - were the product of imagination and the needs of 
hackers.  Not without reason, and the assertion that

hackers are actually involved in the testing of computer 
systems, identifying their weaknesses. For example, a classic 
computer hack of the systems people are from Motorola, which in 
the mid 70's found flaws in the operating system CP-V Company 
Xerox, allows to intercept management. Following the tradition 
of hacking, they reported it to developers. However, they did 
not react to this gesture. For which he paid, because the 
hacker spirit tolerate imperfection program and indifference 
could not. Wrote two little program codenamed "Robin Hood" and 
"Friar Tuck" which, when put into Xerox, have made quite a 
stir, restarting each other again, and "talking"

together with the operator's console. And what do you think? 
CP-V was urgently finalized!


   With improvement of computers
prospects for their use becomes
clearer. The first value of computers
understood, scientists and military representatives
business, and then society as a whole.

   In the early 80's attention
received another "computer" phenomenon -
computer crime. Statistics of such crimes is from 1958.
Then below them were meant cases
damage and theft of computer equipment, theft of information; 
fraud or theft of money, committed with the use

computers; unauthorized use of computers or theft of computer 
time. Records were kept at the Stanford Research Institute and 
long time no great interest. Incidentally, in 1966, the 
computer was first used as a

instrument for bank robbery. It happened in Minnesota. In 1968, 
all United States were reported

13 crimes, in 1978 - 85, and in 1979
the institute has stopped conducting and publishing statistics, 
given the complexity of determining the reliability of the 
events, whose number was growing rapidly.  It is absurd to 
equate computer crime and hacking.

But that is exactly what has been done. Attendants
Themis, faced with the need to
something to do with a new type of crime,
Without going into details of new technologies,
put the question squarely: "Who's there with us
able to gain unauthorized access
to computer systems and due to this
to commit crimes? Hackers? So they
all to blame! "It will take a long time before the specialists 
do not point to the fact that receiving unauthorized access and

use it for criminal purposes - not the same thing.
 Inability (or unwillingness) to thoroughly understand the 
essence of the events played once with a U.S. lawyer a very bad 
joke. This story, known called the Great satellite hop has 
become a shining example of how the blind adherence to 
conventional wisdom puts serious and respected people in an 
extremely awkward position. What is happening in following: in 
July 1985, Attorney New Jersey has announced the court that he 
has proof that the group local hackers can change the orbit

space satellites. His words immediately
hit the newspapers and television news
around the world, and pseudoscientific comments even 
accompanied by a schedule that shows how hackers could operate 
the spacecraft.  But the truth was simpler. In fact,

really one of federal agents did not understand
contents of several files on the BBS and decided
revealed that a secret organization, with more in their ranks 
more than 600 people, and found in the phone address

NASA, served as the basis for charges
hackers in an attempt to secret intervention in the
U.S. space program. The investigation continues for several 
months, but the evidence certainly could not collect. The 
confiscated equipment was returned, and was recognized as a 
sysop guilty to the manufacture of the similarity of predatory 
tool - a small program for Applecat-modem. Court of New Jersey, 
to its credit, has concluded that BBS contain material not 
unlike a certain kind of books and magazines for teenagers, or 
fallen into Childhood persons.

 Alas, this incident, the relationship of lawyers with
hackers have not been exhausted. Undoubtedly,
case with the Great satellite hop has become
One of the reasons for the adoption of the following,
1986, the year of the famous Act of abuse and fraud using 
computers. Thus the American Themis marked their positions, 
standing on that She intends to talk with newly appeared 
fraudulent, and in their Isla and hackers.  The case did not 
wait. Nov. 2 In 1988 there was an event called

specialists from the largest ever
breach of security of U.S. computer systems. 23-year-old
a graduate student at Cornell
Robert Tappan Morris University has launched a computer network 
ARPAnet program is a rare type of computer viruses, the 
so-called "worms." As a result of the attack was completely or 
partially blocked several national networks. Among them -

CSnet, NSFnet, BITnet, already referred to ARPAnet and its 
military component of the unclassified Milnet. Total one way or 
another affected approximately 6,200 computer systems including 
systems of major universities, government laboratories, private

companies, military bases, hospitals, NASA, the agency
national security, etc. Total
damage reached by some estimates 100
million dollarov.Eta full of drama
History discussed so far and is
a classic example of what can
happen if neglected issues
information security. By an irony
the fate of his father Robert Morris at the time was chief 
supervisor of the National Center for computer security.  
"Virus" Morris has been a difficult 60-KB program that can open 
passwords, and masquerade as legitimate users of the problem. 
Specialists netralizovavshie and disassemble the program, 
unanimously noted the outstanding Morris skill as a programmer 
and exceptional knowledge of the target architecture networks.

 During the trial it became clear that the "virus" was 
conceived and developed as isledovatelskoy work, and if not for 
an unfortunate mistake in the mechanism of reproduction, then 
the incident would not happened. Conclusively proved that the 
defendant had no criminal intent. The goal was not blocking 
network, and identify the extent of the global network 
infrastructure. 

   The impact of this incident on the development of
computer industry and hacking hard
overestimated. So, at the suggestion of the Pentagon group has 
been established experts in the field of computers (the famous 
CERT - Computer Emergency Responce Team), which would be 
capable of emergency quickly take appropriate measures. But 
most importantly - the world saw how dangerous not prepared 
carefully Experiments with computer systems.

 Attitude towards hackers changed - and not for the better. In 
spring and summer 1990, the U.S. seized by something like a 
hacker hysteria: It was conducted over thirty raids against 
computer users, and a few months

followed by a second wave of search and arrest. More than 150 
federal agents were sent to New York, Chicago, Los Angeles, 
Phoenix and a dozen other cities countries to eliminate the 
alleged criminal organization allegedly engaged in the illegal 
penetration into the corporate mainframe, software theft, 
unauthorized use of credit card numbers and codes, telephone, 
and manipulation of computer records in ekstennoy with 
gospitolyami and police. The reason for the investigation 
served as a "huge wave of complaints," business people and 
organizations whose information systems were attacked. Was 
searched 40 homes and businesses confiscated 273,000 floppy 
disks, 42 microcomputer, not to mention modems, answering 
machines, telephones, faxes and even a stereo and a soldering 
iron. Each search is usually performed

six armed agents, in one of
such cases had been wounded teenager who hid from the shower.
 This operation was affectionate name -
"Sunshine". So what? Nothing. Was
arrested all four suspects,
Two of them - for possession of weapons and drugs. In the end, 
the government accused of violating federal law 1986 Computer 
Fraud and abuse of a 19-year Neudorf Craig (Craig Neidorf), 
which got access to the telephone company Bell South, covering 
nine states; copied a program serving 911 (Ambulance), edit it 
and put in hacker e-newsletter "Phreack", which was co-editor.

In the aggregate Neudorf could get 65
years in prison and more than a million dollars
fine. However, the charge was withdrawn shortly after the 
defense proved that published information could be obtained 
from other sources. 

   Such a result, we have zilch, caused,
however, a number of speeches in defense of the hackers.
Among the speakers were very well-known
person, for example, oosnovatel Apple Computer, Steve Wozniak 
and founder of Lotus, Jim Manzi. These people knew full well 
what they say. Therefore, does not seem unfounded their fears 
that the legislation and legal initiatives may take

prohibitive, able to stifle cyberspace.


     Continued in the next issue.





Other articles:

Entry - About the authors of the magazine and the magazine.

Entry - About the authors of the journal

Entry - Guide to the shell of the magazine.

a rest - GLODING PROGRAMMING (Programming upwards diagonally)

Assembler - How to calculate the sine assemlere.

System - IBM: On algaritme compression Lempel-Ziw Welch and its implementation for format GIF.

Miscellaneous - about computer problems: PROS and Scorpio, IBM ...

a rest - "Fun with the parties."

Demorynok - Hit Parade music demonstrations.

History - Hackers - art "it" - about the history of the emergence of hacking.

History - The classification of hackers.

a rest - "How to break down half?".

Letters - Reviews the readers of the magazine.

Contest - Competition for the best puzzle!

Assembler - A quick calculation of the address by two coordinates.

IS DOS - Problems and Solutions

News - news of city.

Demolition - Game Description THE DOOBLE.

Demolition - Game Description BLOOD WYCH.

Review - New games: RETURN TO HOME 4, CITADEL, KLADEMINER, BRIDGE PLAYER, CRUSHER, AMERICAN TURBO KING, RAD RAMP RACER, KUNG FU MASTER, CHOY LEE, SIDERAL WAR, ARKARUM, DIRT TRACK RACER, DOUBLE DRAGON 2, NIGHT BREED, THE CYCLES, MOONTORC, KOMMANDO 2.

System - Description of system software: UNIVERSAL SPRATE STUDIO (USS)

Guests - Old friends: On the history of the Krasnodar group UNIT-5

System - Description of system software: ACCEPT PROTECTION SYSTEM V1.0.


Темы: Игры, Программное обеспечение, Пресса, Аппаратное обеспечение, Сеть, Демосцена, Люди, Программирование

Similar articles:
Review - Overview of new products ON: TWILIGHT, BOOVIE, TOWDIE, ORION, SHERWOOD, WACKY RACES, MYSTICAL, JMENO, RUZE, SUPER CARS, LAST NINJA2, CHACK YEAGER-S, ADVANCED FLIGHT TRAINER, THE RAVERS PARADISE, TRITON MIX, TWIN WORLD, DUCK MANIA.
Advertising - Ppodam, buying, exchanging ppogpammy for the ZX Spectrum.
Expertise - The debut of the Polish game Towdie.

В этот день...   21 November