Hackers: Heroes of the Computer Revolution
Rate it:
Open Preview
Read between June 15 - August 1, 2013
3%
Flag icon
The most productive people working on S&P called themselves “hackers” with great pride.
5%
Flag icon
strays—science-mad people whose curiosity burned like a hunger, who like Peter Samson would be exploring the uncharted maze of laboratories at MIT.
6%
Flag icon
he shared the common hacker experience of seeing his grades suffer from missed classes.
6%
Flag icon
the hackers would exploit every possible thread of parliamentary procedure to create a meeting as convoluted as the programs they were hacking on the TX-0.
7%
Flag icon
Access to computers—and anything that might teach you something about the way the world works—should be unlimited and total. Always yield to the Hands-On Imperative!
7%
Flag icon
In a perfect hacker world, anyone pissed off enough to open up a control box near a traffic light and take it apart to make it work better should be perfectly welcome to make the attempt.
7%
Flag icon
What was a computer but something that benefited from a free flow of information?
7%
Flag icon
The best way to promote this free exchange of information is to have an open system, something that presents no boundaries between a hacker and a piece of information or an item of equipment that he needs in his quest for knowledge, improvement, and time online.
7%
Flag icon
Hackers should be judged by their hacking, not bogus criteria such as degrees, age, race, or position.
8%
Flag icon
Hackers felt otherwise: anything that seemed interesting or fun was fodder for computing—and using interactive computers, with no one looking over your shoulder and demanding clearance for your specific project, you could act on that belief.
9%
Flag icon
If everyone could interact with computers with the same innocent, productive, creative impulse that hackers did, the Hacker Ethic might spread through society like a benevolent ripple, and computers would
9%
Flag icon
The TX-0 hackers had become accustomed to the most advanced interactive software anywhere, a dazzling set of systems programs, written by hackers themselves and implicitly tailored to their relentless demands for control of the machine.
10%
Flag icon
Anyway, people shouldn’t have to pay for software—information should be free!
10%
Flag icon
He had that breathless chipmunk speech pattern so common among hackers, along with thick glasses, modest height, and a fanatic taste for computers, bad movies, and pulp science fiction.
11%
Flag icon
They loved smooth-running systems and reliable tools, so the fact that they would be stuck with something that didn’t work right drove them crazy.
12%
Flag icon
Hacker Ethic: an urge to get inside the workings of the thing and make it better had led to measurable improvement.
16%
Flag icon
“Women, even today, are considered grossly unpredictable,” one PDP-6 hacker noted, almost two decades later.
17%
Flag icon
The Right Thing to do was to make sure that any good program got the fullest exposure possible, because information was free and the world would only be improved by its accelerated flow.
17%
Flag icon
there was not much he could do to slow Stew Nelson’s eternal quest for systems knowledge.
18%
Flag icon
wanting to find out what might happen was the ultimate justification, stronger than self-defense or temporary insanity.
18%
Flag icon
Nelson was displaying an extension of the Hacker Ethic—if we all acted on our drive to discover, we’d discover more, produce more, be in control of more.
18%
Flag icon
The more he programmed, the better he got, and the better he got, the more he wanted to program.
18%
Flag icon
Dan Edwards thought was of even less concern: his position of authority, like that of most bureaucrats, was deemed an accident.
23%
Flag icon
Because to hackers, passwords were even more odious than locked doors.
24%
Flag icon
In their view, hacking would be better served by using the best system possible.
24%
Flag icon
but by and large ITS proved that the best security was no security at all.
24%
Flag icon
Systems are organic, living creations: if people stop working on them and improving them, they die.
27%
Flag icon
This was no small feat, since hackers were generally opposed to the requirements of California life, particularly driving and recreational exposure to the sun.
31%
Flag icon
For the first time in my life I was reading things which had not been approved by the Prophet’s censors, and the impact on my mind was devastating. Sometimes I would glance over my shoulder to see who was watching me, frightened in spite of myself. I began to sense faintly that secrecy is the keystone of all tyranny. (from Revolt in 2100)
38%
Flag icon
What would come out of these systems was not as important as the act of understanding, exploring, and changing the systems
40%
Flag icon
Dompier got over four hundred calls like that. There were a lot more hackers out there than anyone imagined.
43%
Flag icon
in keeping with the Hacker Ethic, no artificial boundaries were maintained.
43%
Flag icon
She noted the lack of female hardware hackers, and was enraged at the male hacker obsession with technological play and power.
44%
Flag icon
central tenets of the Hacker Ethic: the free flow of information, particularly information that helped fellow hackers understand, explore, and build systems.
45%
Flag icon
There is nothing more frustrating to a hacker than to see an extension to a system and not be able to keep hands-on.
50%
Flag icon
Every problem has a better solution when you start thinking about it differently than the normal way.
61%
Flag icon
But mostly people hacked Tools to Make Tools. Or games. And they would come into computer stores to show off their hacks.
63%
Flag icon
and a tendency to take offense at an inefficient, suboptimal way of doing things.
63%
Flag icon
He became determined to discover its secrets, the mysteries of its system, the better to extend it and control it.
64%
Flag icon
To a hacker, translating a useful or fun program from one machine to another was inherently good.
73%
Flag icon
From their point of view, it seemed to indicate another hacker sin—inefficiency.
75%
Flag icon
Crucial to the Hacker Ethic was the fact that computers, by nature, do not consider information proprietary.
75%
Flag icon
To hackers, a program was an organic entity that had a life independent from that of its author.
78%
Flag icon
the Hacker Ethic, which instructs you to keep working until your hack tops previous efforts.
85%
Flag icon
‘But wait a minute—Stallman doesn’t have anybody to argue with all night over there. He’s working alone! It’s incredible anyone could do this alone!’”
86%
Flag icon
to absorb, explore, and expand the intricacies of those bewitching systems;
86%
Flag icon
I think that hackers—dedicated, innovative, irreverent computer programmers—are the most interesting and effective body of intellectuals since the framers of the U.S. Constitution . . . No other group that I know of has set out to liberate a technology and succeeded. They not only did so against the active disinterest of corporate America, their success forced corporate America to adopt their style in the end. In reorganizing the Information Age around the individual, via personal computers, the hackers may well have saved the American economy . . . The quietest of all the ’60s sub-subcultures ...more