You are viewing our Forum Archives. To view or take place in current topics click here.
History of the Hacker
Posted:

History of the HackerPosted:

Jellyfish
  • TTG Master
Status: Offline
Joined: Mar 27, 201113Year Member
Posts: 894
Reputation Power: 55
Status: Offline
Joined: Mar 27, 201113Year Member
Posts: 894
Reputation Power: 55
(I did not copy and paste all this is typed by hand)

In the beginning, a hacker was someone who worked passionately for the sake of curiosity and exploration. There were hardware hackers who took it upon themselves to remove the covers from computers to optimize their design (early computers were built out of discrete components, so they could be modified in meaningful ways with simple tools), and there were software hackers who labored to make the most compact and elegant code, since computational resources were scarce and slow. There were hackers who explored the in and outs of the phone system, and those who explored the roofs and tunnels of buildings of university campuses. Quite often, early hackers engaged in all of these activities. Hackers would share their findings or results (hacks) with each other freely . as their rewards were not financial, but came from satisfying their intellectual curiosity and from the enthusiasm of their peers. As a result, hackers tended to form into meritocratic groups where membership and advancement were based entirely upon a persons ability to hack.

As technology evolved and computers became faster and more integrated, hackers found that effort involved in hardware hacking was not worth the benefits. The interesting pieces of computers were quickly becoming buried deep within hermetically sealed ceramic packages, etched into silicon strictures that were difficult to see even with a good microscope. A difficult hardware hack that might double the performance of a computer was made moot within months by Moore's Law1.
1
The good news is that hardware hacking technology has been catching up with Moore's Law lately, leading to a hardware hacking renaissance, Affordable circuit board fabrication services have sprung up, and the birth of the internet has simplified the process of acquiring components.


On the other hand, software hacking was beginning to focus more on applications and less on algorithms or optimization. The compactness or elegance of a program was no longer directly important as memory and processor power became cheap and plentiful. Besides, compiler technology had also improved to the point where compiled code ran almost as fast as hand assembly. By the late 80's, the term "hacker" had grown to imply someone who could write volumes of C code in their sleep and create brilliant applications overnight. The old hardware hackers were either converting to software , or retreating to university labs and corporations that could afford to support their expensive hobbies.

The term "hacker" at the time was increasingly associate with people who cracked passwords and programs to gain access to machines and software that was otherwise off limits. Hollywood was partly responsible for this stereotype, with a slew of of movies that portrayed teenagers bringing the world to the brink of nuclear annihilation with a few keystrokes, or closet geniuses creating artificial intelligent cyber-monsters in their basements. Unfortunately the hyperbole of these movie was a lost on the general public, and this dark impression of hackers eventually became a dominant part of the hacker stereotype. The inaccuracy of of this stenotype contributed to the creation of a term for hackers that focuses primarily upon cracking systems and programs - "crackers"

The technology of computation has grown so complex that beginners are increasingly like the parable about the three blind men and the elephant. Some beginners will start their hacking journey by exploring the internet. other will start by exploring the operating system on their computer. Still others will start by looking underneath the covers of their computer. Each individual could spend a year exploring their facet, yet each will have distinctly different view about computer technology at the end of the day.

Politics and hacking:

The introduction of the digital millennium copyright act (DMCA) in 1998 took crystallography out of the hacker's domain -- the low now spells out that only researchers "engaged in legitimate course of study. is employed or is appropriately trained or experienced" are allowed to investigate cryptographic2 methods for protecting access rights to works. As a a result, Xbox hacking has been a politically charged topic. It is a battle between hackers and lawmakers to keep cryptography within the legal rights of hackers.
cryptography
[krip-tog-ruh-fee]
noun
1.
the science or study of the techniques of secret writing, especially code and cipher systems, methods, and the like. Compare cryptanalysis ( def. 2 ) .
2.
the procedures, processes, methods, etc., of making and using secret writing, as codes or ciphers.
3.
anything written in a secret code, cipher, or the like.
2

The most alarming aspect of the DMCA for hackers is that it embodies the fallacy that the only sources of innovation of benefit to society that lie within the halls of research institutions and corporations. Suddenly, is is a crime to explore, in the comfort of your own home in pursuit of your hobby, the cryptographic methods used to secure access rights.


Disclaimers: I did not write this but I did have to type every word, there was not copy and paste.
This is an excerpt from "Hacking the Xbox - and introduction to reverse engineering" by Andrew Huang
I got the book off ebay and it is very good so far. Lots of good information.

Links to what was mentioned in the post:
[ Register or Signin to view external links. ]

[ Register or Signin to view external links. ]

[ Register or Signin to view external links. ]


Last edited by Jellyfish ; edited 6 times in total

The following 3 users thanked Jellyfish for this useful post:

-JT- (05-27-2011), G7G7S7 (05-27-2011), Caucasian (05-27-2011)
#2. Posted:
Caucasian
  • TTG Natural
Status: Offline
Joined: Sep 01, 200914Year Member
Posts: 921
Reputation Power: 51
Status: Offline
Joined: Sep 01, 200914Year Member
Posts: 921
Reputation Power: 51
Holy,,,, nice post dude i Really liked it.
#3. Posted:
Jellyfish
  • TTG Master
Status: Offline
Joined: Mar 27, 201113Year Member
Posts: 894
Reputation Power: 55
Status: Offline
Joined: Mar 27, 201113Year Member
Posts: 894
Reputation Power: 55
xxmatty911xx wrote Holy,,,, nice post dude i Really liked it.

thanks, took me like 2 hours to type XD
#4. Posted:
G7G7S7
  • TTG Senior
Status: Offline
Joined: May 29, 201013Year Member
Posts: 1,796
Reputation Power: 75
Status: Offline
Joined: May 29, 201013Year Member
Posts: 1,796
Reputation Power: 75
i think i'm a hacker because i like to modify simple electronic stuff out of curiosity
#5. Posted:
Jellyfish
  • TTG Master
Status: Offline
Joined: Mar 27, 201113Year Member
Posts: 894
Reputation Power: 55
Status: Offline
Joined: Mar 27, 201113Year Member
Posts: 894
Reputation Power: 55
G7G7S7 wrote i think i'm a hacker because i like to modify simple electronic stuff out of curiosity

haha yea thats spot on
#6. Posted:
TTG-Chillz
  • TTG Senior
Status: Offline
Joined: Sep 04, 201013Year Member
Posts: 1,079
Reputation Power: 44
Status: Offline
Joined: Sep 04, 201013Year Member
Posts: 1,079
Reputation Power: 44
nice man just fun to read
#7. Posted:
Jellyfish
  • TTG Master
Status: Offline
Joined: Mar 27, 201113Year Member
Posts: 894
Reputation Power: 55
Status: Offline
Joined: Mar 27, 201113Year Member
Posts: 894
Reputation Power: 55
TTG-Chillz wrote nice man just fun to read

Yea, the problem is most 12 year olds on this is site don't have the ability to read long posts because it makes their wee little brains hurt.
#8. Posted:
Set
  • TTG Addict
Status: Offline
Joined: Feb 06, 201113Year Member
Posts: 2,874
Reputation Power: 126
Status: Offline
Joined: Feb 06, 201113Year Member
Posts: 2,874
Reputation Power: 126
[size=24]Good Job Keep Up The Good Work[/size]
#9. Posted:
Jellyfish
  • TTG Master
Status: Offline
Joined: Mar 27, 201113Year Member
Posts: 894
Reputation Power: 55
Status: Offline
Joined: Mar 27, 201113Year Member
Posts: 894
Reputation Power: 55
TTGProMoDzzXD wrote [size=24]Good Job Keep Up The Good Work[/size]


thanks, keep up the good work as well
#10. Posted:
-KrypTon-
  • Wise One
Status: Offline
Joined: Jun 12, 200914Year Member
Posts: 578
Reputation Power: 21
Status: Offline
Joined: Jun 12, 200914Year Member
Posts: 578
Reputation Power: 21
copy/paste

202020202jk20
Jump to:
You are viewing our Forum Archives. To view or take place in current topics click here.