350 likes | 756 Views
Hacker Ethic. By: Patrick Goergen Date: 2/26/08. Outline. What is a Hacker? Hacker vs. Cracker Linus's Law Start of Hackers and Jargon File Hacker Culture Hacker Ethic. What is a Hacker?. What is a Hacker?.
E N D
Hacker Ethic By: Patrick Goergen Date: 2/26/08
Outline • What is a Hacker? • Hacker vs. Cracker • Linus's Law • Start of Hackers and Jargon File • Hacker Culture • Hacker Ethic
What is a Hacker? ”People who 'program enthusiastically' and who believe that 'information-sharing is a powerful good, and that it is an ethical duty of hackers to share their expertise by writing free software and facilitating access to information and to computing resources wherever possible.' ” Jargon File
Hacker vs. Cracker • 1980's the name got a bad reputation. • Hackers do not consider information intruders and malware writers to be Hackers. • Hackers came up with Cracker. • Media is to blame: • My Favorite: War Games (1983)
Linus's Law • 3 Categories • Survival • Social Life • Entertainment • ”Progress is about going through those,” categories. http://en.wikipedia.org/wiki/Image:Tux.svg
Examples of Linus's Law • Sex
Examples of Linus's Law • Sex • Survival: To Procreate
Examples of Linus's Law • Sex • Survival: To Procreate • Social Ties: Marriage
Examples of Linus's Law • Sex • Survival: To Procreate • Social Ties: Marriage • Entertainment: Porn
Examples of Linus's Law • Sex • Survival: To Procreate • Social Ties: Marriage • Entertainment: Porn • Eating and Drinking
Examples of Linus's Law • Sex • Survival: To Procreate • Social Ties: Marriage • Entertainment: Porn • Eating and Drinking • Survival: Basic Body Needs
Examples of Linus's Law • Sex • Survival: To Procreate • Social Ties: Marriage • Entertainment: Porn • Eating and Drinking • Survival: Basic Body Needs • Social Ties: Dates and Dinner Parties
Examples of Linus's Law • Sex • Survival: To Procreate • Social Ties: Marriage • Entertainment: Porn • Eating and Drinking • Survival: Basic Body Needs • Social Ties: Dates and Dinner Parties • Entertainment: Mashed Potatoe Scuptures
Examples of Linus's Law • War
Examples of Linus's Law • War • Survival: To Defend Lives
Examples of Linus's Law • War • Survival: To Defend Lives • Social Ties: International Relations or Lack There Of
Examples of Linus's Law • War • Survival: To Defend Lives • Social Ties: International Relations or Lack There Of • Entertainment: ”Maybe war is not quite there but CNN is doing its best to get it to that final stage.”
Examples of Linus's Law • War • Survival: To Defend Lives • Social Ties: International Relations or Lack There Of • Entertainment: ”Maybe war is not quite there but CNN is doing its best to get it to that final stage.” • Hackering
Examples of Linus's Law • War • Survival: To Defend Lives • Social Ties: International Relations or Lack There Of • Entertainment: ”Maybe war is not quite there but CNN is doing its best to get it to that final stage.” • Hackering • Survival: Not a BIG Issue
Examples of Linus's Law • War • Survival: To Defend Lives • Social Ties: International Relations or Lack There Of • Entertainment: ”Maybe war is not quite there but CNN is doing its best to get it to that final stage.” • Hackering • Survival: Not a BIG Issue • Social Ties: E-mail and Net
Examples of Linus's Law • War • Survival: To Defend Lives • Social Ties: International Relations or Lack There Of • Entertainment: ”Maybe war is not quite there but CNN is doing its best to get it to that final stage.” • Hackering • Survival: Not a BIG Issue • Social Ties: E-mail and Net • Entertainment: The Computer
Hackers outside Computers • Linus points out that a person does not need to be a programmer to share hacker qualities. • There are hackers in all fields • Example: • Roy Underhill – The Woodwrights Shop http://www.pbs.org/wws/wwit/index.html
Start of the Hacker • MIT AI LAB • 1960's • First Hackers • Who were they?
Jargon File • 1970's • ”This Document is a collection of slang terms used by various subcultures of computer hacker.” • Low and High Context • Hackerdom
Hacker Culture • ”Individual must choose by action to join.” • Portrait of J. Random Hacker • ”Intelligent. Scruffy. ... Tans are rare.” • T-shirt, Jeans, Tennis Shoes • Open Source and Freedom of information. • Only 50 years old and rich in folk lore.
Hacker Ethic • The Hacker Ethic by: Pekka Himanen, Linus Torvalds and Manuel Castells • Work Ethic • Money Ethic • Nethic (Net Ethic)
Work Ethic • Protestant Work Ethic is Prominent • Hacker more related to Pre-Protestant • Friday vs. Sunday • Creativity is not 9-5 • Taking back Sunday • Work more efficiently so one can play
Money Ethic • GNU General Public License (Copyleft) • Motives • Better future • Linus's Law • Related Closely to Maslow's Motivation • Happiness as Motivation – Steve Wozniak • H = F^3 (Food, Fun, Friends)
Money Ethic • Protestant Work Ethic • Goal is to gain as much money as one can. • Second to doing ones work for the sake of it being work. http://www.mademind.com/
Nethic • Net Ethic (Nethic) • Not only Internet Ethics • Deals with Community in general. • Electronic Frontier Foundation (EFF) – Wozniak, John Gilmore, Stewart Brand • Protected against Communication Decency Act • Fought for strong encryption – DES Cracker
Nethic • Example of Nethic • Mitch Kapor • Founder of Lotus Development Corporation • With money started a global health organization • Chair of Open Source Applications Foundation
Reading • From: The Gospel According To Tux
Homework 1) Define a Hacker. 2) What are the 3 parts of the Hacker Ethic?
References • Himanen, Pekka. The Hacker Ethic. 2001. Random House. New York. • Jargon File. Version 4.4.7. http://catb.org/jargon/html/index.html • Wikipedia. http://en.wikipedia.org/wiki/Image:Tux.svg • Made Mind. www.mademind.com • PBS. The Woodwrights Shop. http://www.pbs.org/wws/wwit/index.html