
background and start
For the unenlightened, the idea of creating a blog and background may not be clear. The first and last post for those interested:
The idea and cult of hacking is described in the book by Stephen Levy - Hackers: Heroes of the Computer Revolution (web version http://linfoline.homedns.org/hackgerrev/levi_hakeriy_geroi_kompyuternoyi_revolyucii.html ).
A couple of quotes:
"... the project or product being developed, created not only to achieve some constructive goal, but also to stretch out and get simple pleasure from the process itself, was called a hack. The last term may have been an ancient slang word in MIT The word “hack” has long been used to describe the mischievous student jokes that MIT students regularly invented: for example, covering with a reflective foil a dome that towered over the campus, but when used in TMRC, it was implied serious respect for the subject under discussion. Someone could call the tricky connection between the two relays "just a hack", however, everyone understood that in order for this to be a real hack, the work must be innovative, have style, and should be done with technical virtuosity. Even if someone self-derogatoryly said that he “hacked the System” (assuming that he, by his own understanding, did it as artlessly as a person holding an ax, chopped firewood), the skill with which he actually it was all done. The most productive members of the Signals and Nutrition group called themselves "hackers" with great pride ... "
"..." Hacking locks "was a clever solution to the problem of physical locks on doors, cabinets or safes. To a certain extent, it was a MIT tradition, especially TMRC. But, combined with the Hacker Ethics, lock hacking was more of a crusade than just a game, although a worthy challenge in the form of overcoming artificial obstacles was a kind of contribution to supporting the popularity of this lesson
For a hacker, a closed door was a blow, and locked doors made them furious. Just as information should be clearly and clearly transmitted inside the computer, as software should be freely distributed, hackers believed that people should be provided with unhindered access to tools and things that could help hackers in their constant search for ways to learn about the world and how to improve it. When a hacker needs something that can help him with creativity, research or repair, he cares little for such frivolous things as property rights ... "
The book is small and informative (for those interested in the history of the formation of Apple it will be interesting). I
propose to consider the first post on the topic fellow formazon - Lift 2.0". It found a link to interesting things about intercoms .
The idea and cult of hacking is described in the book by Stephen Levy - Hackers: Heroes of the Computer Revolution (web version http://linfoline.homedns.org/hackgerrev/levi_hakeriy_geroi_kompyuternoyi_revolyucii.html ).
A couple of quotes:
"... the project or product being developed, created not only to achieve some constructive goal, but also to stretch out and get simple pleasure from the process itself, was called a hack. The last term may have been an ancient slang word in MIT The word “hack” has long been used to describe the mischievous student jokes that MIT students regularly invented: for example, covering with a reflective foil a dome that towered over the campus, but when used in TMRC, it was implied serious respect for the subject under discussion. Someone could call the tricky connection between the two relays "just a hack", however, everyone understood that in order for this to be a real hack, the work must be innovative, have style, and should be done with technical virtuosity. Even if someone self-derogatoryly said that he “hacked the System” (assuming that he, by his own understanding, did it as artlessly as a person holding an ax, chopped firewood), the skill with which he actually it was all done. The most productive members of the Signals and Nutrition group called themselves "hackers" with great pride ... "
"..." Hacking locks "was a clever solution to the problem of physical locks on doors, cabinets or safes. To a certain extent, it was a MIT tradition, especially TMRC. But, combined with the Hacker Ethics, lock hacking was more of a crusade than just a game, although a worthy challenge in the form of overcoming artificial obstacles was a kind of contribution to supporting the popularity of this lesson
For a hacker, a closed door was a blow, and locked doors made them furious. Just as information should be clearly and clearly transmitted inside the computer, as software should be freely distributed, hackers believed that people should be provided with unhindered access to tools and things that could help hackers in their constant search for ways to learn about the world and how to improve it. When a hacker needs something that can help him with creativity, research or repair, he cares little for such frivolous things as property rights ... "
The book is small and informative (for those interested in the history of the formation of Apple it will be interesting). I
propose to consider the first post on the topic fellow formazon - Lift 2.0". It found a link to interesting things about intercoms .