stallman 谈黑客

2016-01-29 18:50 5 1 收藏

stallman 谈黑客,stallman 谈黑客

【 tulaoshi.com - Linux 】

It is hard to write a simple definition of something as varied ashacking, but I think what these activities have in common isplayfulness, cleverness, and exploration. Thus, hacking meansexploring the limits of what is possible, in a spirit of playfulcleverness. Activities that display playful cleverness have "hackvalue".
Hackers typically had little respect for the silly rules thatadministrators like to impose, so they looked for ways around. Forinstance, when computers at MIT started to have "security" (that is,restrictions on what users could do), some hackers found clever waysto bypass the security, partly so they could use the computers freely,and partly just for the sake of cleverness (hacking does not need tobe useful). However, only some hackers did this--many were occupiedwith other kinds of cleverness, such as placing some amusing object ontop of MIT's great dome (**),finding a way to do a certain computation with only 5 instructionswhen the shortest known program required 6, writing a program to printnumbers in roman numerals, or writing a program to understandquestions in English.

Meanwhile, another group of hackers at MIT found a different solutionto the problem of computer security: they designed the Incompatible Timesharing System without security "features". In the hacker'sparadise, the glory days of the Artificial Intelligence Lab, there wasno security breaking, because there was no security to break. It wasthere, in that environment, that I learned to be a hacker, though Ihad shown the inclination previously. We had plenty of other domainsin which to be playfully clever, without building artificial securityobstacles which then had to be overcome.
Yet when I say I am a hacker, people often think I am making a naughtyadmission, presenting myself specifically as a security breaker. Howdid this confusion develop?
Around 1980, when the news media took notice of hackers, they fixatedon one narrow aspect of real hacking: the security breaking which somehackers occasionally did. They ignored all the rest of hacking, andtook the term to mean breaking security, no more and no less. The media have since spread that definition, disregarding our attempts tocorrect them. As a result, most people have a mistaken idea of whatwe hackers actually do and what we think.
You can help correct the misunderstanding simply by making adistinction between security breaking and hacking--by using the term"cracking" for security breaking. The people who do it are"crackers". Some of them may also be hackers, just as some of themmay be chess players or golfers; most of them are not.

来源:https://www.tulaoshi.com/n/20160129/1507462.html

延伸阅读
标签: 电脑入门
    前两天看到一篇文章,说的是网民利用谷歌搜索引擎可以搜索到QQ密码,而本人对文中的观点要进行一下纠正。接触过网络安全的人应该都知道,那样搜索到的QQ密码的页面其实就是一些所谓的黑客在配置QQ木马时候所填写的接收QQ密码的页面。QQ木马有两种方式接收盗来的QQ密码,一个是邮箱,一个是空间,而空间接收是最直接也是最保...
标签: 电脑入门
摘要:QQ想必是大家使用最多的即时通讯软件,在国内有着数量庞大的使用者。然而关于QQ的黑客事件却从来没有停止过。从QQ开始推出第一个版本到现在数年内,针对QQ的黑客软件不计其数,因此也专门诞生了一批对QQ绝对热衷的“QQ黑客”。那么作为菜鸟的我们,面对如此频繁的QQ攻击事件,又该如何防范呢?本文将向大家介绍关于QQ的各种攻击方法,并...
《黑客战队》游戏联机方法 因为是source做的游戏,所以联机其实很简单建立房间 只要在游戏进入后选择create server,并注意把lan only取消掉 房间建好了后需要加入的话按"~"键呼出控制台,在命令行里打上"connect空格ip地址"例如"connect 192.168.220.73"就可以加入游戏了 我们群里连的是vlan,登录后只要在里...
标签: 电脑入门
    近一个月来,经常会听到有人叹息:“我的QQ被盗了”。QQ密码被盗,给QQ一族的业余生活或正常工作带来烦恼。本文简要介绍记者调查到的几种QQ号码丢失情况,并请有关业内精英简要介绍黑客窃取QQ号码的途径,同时说说如何防范QQ密码被盗。以期QQ一族在开心聊天的同时也不忘“安全”。     A事例   &nb...
标签: PS PS教程
本文由中国合作伙伴印象特别供稿,转载必须取得 授权 1.新建一个大小为500X300,RGB模式,白色背景的文件。 2.用文字输入工具随意输入一窜01代码,并按CTRL+T把它垂直旋转过来放,并多复制几个拉成不等大小,随意摆放几个(图1)。还有一种方法,是用滤镜,也可以达到很不错的效果。就是菜单-滤镜-纹理-颗粒,把强度和对比度都调至100,颗粒...

经验教程

615

收藏

86

精华推荐

防范木马和黑客保护QQ安全

防范木马和黑客保护QQ安全

xcjvh

用VB学做“黑客”程序

用VB学做“黑客”程序

asd4722739

黑客与设计师精神

黑客与设计师精神

太多重名的账号

热门标签

微博分享 QQ分享 QQ空间 手机页面 收藏网站 回到头部