For the unlighted, the idea of creating a blog and background can be incomprehensible. The first and last post for those interested:
The idea and the cult of hacking is described in the book by Stephen Levy -
Hackers: Heroes of the Computer Revolution (web version
http://linfoline.homedns.org/hackgerrev/levi_hakeriy_geroi_kompyuternoyi_revolyucii.html ).
A couple of quotes:
')
"... the project or product being developed, created not only to achieve some constructive goal, but also to retire and get simple pleasure from the process itself, was called a hack. The last term may have been an ancient slang term in MIT The word “hack” has long been used to describe mischievous student jokes that MIT students regularly invented: for example, a covering with a reflective foil of a dome that rose above the campus. But when used in TMRC, it was implied serious respect for the subject under discussion. Someone could call the tricky connection between the two relays "just a hack", however, everyone understood that, in order for this to be really a hack, the work must contain innovation, have a style, and done with technical virtuosity. Even if someone self-deprecatingly said that he “hacked Sistema” (meaning that he was, according to his own understanding, did it as artlessly as a person holding an ax in his hands, chopping firewood), skill was recognized as very essential, from ko That was actually all done. The most productive members of the Signals and Nutrition group called themselves “hackers” with great pride ... ”
"... Hacking locks" was a skillful solution to the problem of physical locks on doors, closets or vaults. To a certain extent, this was the MIT tradition, especially TMRC. But, united with Hacker Ethics, hacking of locks was more a crusade than just a game, although a worthy challenge in the form of overcoming artificial obstacles was a kind of contribution to supporting the popularity of this activity
For the hacker, the closed door was a bang, and the doors to the lock made them furious. As well as information should be clearly and clearly transmitted inside the computer, as software should be distributed freely, hackers believed that people should be provided with unhindered access to tools and things that can help hackers in their constant search for ways to understand the world and how to improve it. When a hacker needs something that can help him in creation, research or repair, he doesn’t care much about such frivolous things as property rights ... "
The book is small and informative (for those interested in the history of the development of Apple will be interesting).
The first post on the topic I propose to consider the post
formazon comrade - "
Lift 2.0 ". It showed a link to
interesting things about intercoms .