Send the link below via email or IMCopy
Present to your audienceStart remote presentation
- Invited audience members will follow you as you navigate and present
- People invited to a presentation do not need a Prezi account
- This link expires 10 minutes after you close the presentation
- A maximum of 30 users can follow your presentation
- Learn more about this feature in our knowledge base article
Do you really want to delete this prezi?
Neither you, nor the coeditors you shared it with will be able to recover it again.
Make your likes visible on Facebook?
Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.
Transcript of Hacker culture
Sources and references:
"Hackers culture" by Dmitry Pobivanets - 011, MPM107
“The hacker explores the intersection of art and science in an insatiable quest to understand and shape the world around him.”
By Dmitry Pobivanets
- People committed to computing and security.
The MIT Artificial Intelligence Laboratory, the University of California, Berkeley and Carnegie Mellon University well-known hotbeds of early hacker culture.
• Creating software and sharing it with each other
• Placing a high value on freedom of inquiry
• Emphasis on rationality
• Distaste for authority
• Playful cleverness, taking the serious humorously and their humor seriously
Jargon File in 1973
GNU Manifesto in 1985
Eric Raymond's The Cathedral and the Bazaar in 1997
- The hobbyist home computing community from late 1970s. (Steve Jobs, Steve Wozniak, Bill Gates, Paul Allen)
"Homebrew Computer Club"
open source software movement
excellence, exploring the limits
encouraged by challenge and curiosity
White hats - fixing security problems
“A person who enjoys exploring the details of programmable systems and stretching their capabilities, as opposed to most users, who prefer to learn only the minimum necessary."
"A person who delights in having an intimate understanding of the internal workings of a system, computers and computer networks in particular."
Grey hats - combination of a black hat and a white hat hacker
Black hats - perform unauthorized remote computer break-ins
both sides support open source software (Linux, Mozilla, Apache)