17
tHe hAcKeR pErSpEcTiVe… …hacked by Juliet Taylor http://en.wikipedia.org/wiki/ Hacker_ethic http://www.hackronomicon.com/images/ HackerInside.png http://home.flash.net/~rayearle/ Hfiles/Hacker.png

The Hacker Perspective

  • Upload
    jjtay

  • View
    1.136

  • Download
    0

Embed Size (px)

DESCRIPTION

 

Citation preview

Page 1: The Hacker Perspective

tHe hAcKeR pErSpEcTiVe…

…hacked by Juliet Taylorhttp://en.wikipedia.org/wiki/Hacker_ethic

http://www.hackronomicon.com/images/HackerInside.png

http://home.flash.net/~rayearle/Hfiles/Hacker.png

Page 2: The Hacker Perspective

Jonathan James

Adrian Lamo

Kevin MitnickKevin Poulsen

Linus Torvalds

Tim-Berners LeeSteve Wozniak

Famous Hackers…

-10 Most Famous Hackers of All Time

Page 3: The Hacker Perspective

No limits to Creativity…

-Bre Prettis

Page 4: The Hacker Perspective

“It's the thought processes, more than anything else, that sets a hacker apart from most people. It's the ability to look critically at a problem,

when everyone says "it CAN'T work like that", when the hacker knows the logic of the situation says it can.” –Richard Cheshire

Page 5: The Hacker Perspective

“Based on hackers’ self-reports, we assume a sort of intrinsic motivation is characteristic for hackers—at least for many of them.” –Tom Chance

Page 6: The Hacker Perspective

Hacker work is, in the words of the hacker Linus Torvalds, "interesting, exciting, and joyous", "intrinsically interesting and challenging.”–Tom Chance

Page 7: The Hacker Perspective

Hackers see the world from a different angle…

Page 8: The Hacker Perspective

“In contemporary society we maintain a distinction between work and leisure, and are acutely aware of when work erodes the time we usually dedicate to leisure. To hackers, the distinction is nonexistent.”

–Tom Chance

Page 9: The Hacker Perspective

Hacking is about taking something ordinary and making it into art!

Page 10: The Hacker Perspective

“To hack is to dedicate yourself to realizing your full human potential; to take an essentially active, rather than passive stance towards your

environment.” –Tom Chance

Page 11: The Hacker Perspective

The word ``hacker'' has taken on many different meanings ranging from 1) ``a person who enjoys learning the details of computer systems

and how to stretch their capabilities'' to 2) ``a malicious orinquisitive meddler who tries to discover information by poking around

.. possibly by deceptive or illegal means ...'' –Dorothy Denning

Page 12: The Hacker Perspective

“I’m always excited when hacktivists say, ‘No, break the warranty, open the box, mod your Xbox, don’t obey what company tells you to do with your technology.”

-Anna Newitz

Page 13: The Hacker Perspective

“Reverse engineering is the process of discovering the technological principles of a device, object or system through analysis of its structure, function and operation. It often involves taking something apart

and analyzing its workings in detail to be used in maintenance, or to try to make a new device or program that does the same thing without copying anything from the original.” -Wikipedia

Page 14: The Hacker Perspective

“We often say that breaking into a system implies a lack of caring for the system's owner and authorized users. But, one hacker says that the ease of breaking into a system reveals a lack of caring on the part of the system manager to protect user and company assets, or failure on the part of vendors to warn managers about the vulnerabilities of their systems.”

-Dorothy Denning

Page 15: The Hacker Perspective

Hacking is about turning things upside down…

Page 16: The Hacker Perspective

“Hacking could involve theheartfelt conviction that beauty can be found in

computers, that the fine aesthetic in a perfect programcan liberate the mind and spirit”. –Tom Chance

Page 17: The Hacker Perspective

Works Cited

Prettis, Bre. "The Hacker Perspective." 2600 Magazine Dec. 2008-2009: 26-28. 23 Apr. 2009 <http://la2600.com/pix/HackerPerspective_BrePettis_2600_Winter2008-2009small.pdf>.

"Top 10 Most Famous Hackers of All Time." IT Security. 2009. Tippit Incorporated. 1 May 2009 <http://www.itsecurity.com/features/top-10-famous-hackers-042407/>.

Cheshire, Richard. "Hacker Perspective." 2600 Magazine Spring 2006. 18 Apr. 2009 <http://cheshirecatalyst.com/perspective.html>.

Chance, Tom. "Dissertation on the Hacker Ethic and Meaningful Work." Tom Chance's Website. 3 Aug. 2005. 4 May 2009 <http://tom.acrewoods.net/research/hackerethic/ dissertation#SECTION00030000000000000000>.

Voiskounsky, Alexander E. "Flow-Based Model of Computer Hackers' Motivation." CyberPsychology and Behavior 6.2 (2003): 171-174. 21 Apr. 2009 <http://web.ebscohost.com.libproxy.trinity.edu/ehost/ 71a00b35-3774-4571-a988-05da67079c15%40sessionmgr108>.

Denning, Dorothy. "Concerning Hackers Who Break into Computer Systems." WindowSecurity. 19 Apr. 2000. 3 May 2009 <http://www.windowsecurity.com/uplarticle/16/Hackers-NCSC.txt>.

Newitz , Annalee (2007) "Capitalist monsters,RFID and Internet tubes," Hack This Zine, v. 5.