background preloader

The Hacker's Ethics

The Hacker's Ethics
The idea of a "hacker ethic" is perhaps best formulated in Steven Levy's 1984 book, Hackers: Heroes of the Computer Revolution. Levy came up with six tenets: Access to computers - and anything which might teach you omething about the way the world works - should be unlimited and total. PHRACK, recognized as the "official" p/hacker newsletter, expanded on this creed with a rationale that can be summarized in three principles (" Doctor Crash ," 1986). [1] First, hackers reject the notion that "businesses" are the only groups entitled to access and use of modern technology. [2] Second, hacking is a major weapon in the fight against encroaching computer technology. [3] Finally, the high cost of equipment is beyond the means of most hackers, which results in the perception that hacking and phreaking are the only recourse to spreading computer literacy to the masses: " Hacking. This is from Richard Stallman, who found his way to the M.I.T. Brought to you by The Cyberpunk Project Related:  New Practicum

Nodes » Free Jeremy Hammond! Why the World Need Hackers Now: The Link Between Open Source Development & Cultural Evolution I’ve been brushing up on the work of Eric S. Raymond, an open source software advocate and author of ‘The Cathedral and the Bazaar,’ in preparation for meeting and interviewing him at next week’s Culture Conference in Philly and Boston. Raymond has written extensively about the attitudes and ethos of hackers, the mechanisms of open-source development, and the relationship between motivation and reputation in a gift economy. As I read his stuff, I see a strong parallel between how hacker culture can apply to culture hacking, and functionally accelerate personal and social evolution at scale. So let’s start with the hacker attitude: (excerpted from Raymond’s essay How to Become a Hacker) 1. This is apparently the general disposition of the thousands of people voluntarily hacking part-time who built and evolve the Linux operating system, for example. Then I was reading up about the characteristics of open source development communities: And why run an experiment like this only for a week?

Global Peace Index | Institute for Economics and Peace The Global Peace Index (GPI) is the world’s leading measure of national peacefulness. Now in its seventh year, it ranks 162 nations according to their ‘absence of violence’. The GPI is developed by IEP under the guidance of an international panel of independent experts with data collated and calculated by the Economist Intelligence Unit (EIU). It is composed of 22 indicators, ranging from a nation’s level of military expenditure to its relations with neighbouring countries and the percentage of prison population. The data is sourced from a wide range of respected sources, including the International Institute of Strategic Studies, The World Bank, various UN Agencies, peace institutes and the EIU. The GPI is intended to contribute significantly to the public debate on peace. The Index is currently used by many international organisations, governments and NGOs including the World Bank, the OECD, and the United Nations. Global Peace Index Interactive Map 2013 Global Peace Index Request data

National Lawyers Guild at Jeremy Hammond’s Press Conference Heidi Boghosian spoke at the press conference for Jeremy Hammond (02/21/2013), alleged hacker accused of leaking millions of Statfor documents. The NLG wants to see Judge Preska recluse herself as her husband was one of the people who had information disclosed about him in the alleged hacks. Heidi Boghosian is the executive director of the National Lawyers Guild which represents individuals that are targeted by the government and corporations for activism. Learn more about Jeremy Hammond: Support us by subscribing here Check out our merchandise at Become a member of The Sponsor Lounge and get exclusive behind the scenes content while helping us grow! Der Social Hacker - Psychologie und Computersicherheit Digital Literacy The Cute Cat Theory Talk at ETech I’d forgotten just how much fun ETech is. Not only are the talks some of the most creative and innovative you can hear in the tech community, the room full of people is one of the most congenial, smart and funny you’re likely to encounter anywhere. Tim O’Reilly won’t come out and say that it’s his favorite conference, but he’s willing to declare it the most important that his organization puts on. I was only able to be in San Diego for one of the days of the conference – long enough to catch several excellent talks, but briefly enough that I’m relying on Ryan Singel of Wired to catch talks that I’m very sorry to miss: Larry Lessig’s plans to change congress; Quinn Norton, who’s now thinking about hacking her brain as well as her body; Joel Selanikio’s celebration of the mobile phone as a tool for transforming Africa. Singel did an excellent job with my talk as well, The Cute Cat Theory of Digital Activism. Web 1.0 was invented to allow physicists to share research papers.

White hat (computer security) Ethical Hacking One of the first instances of an ethical hack being used was a "security evaluation" conducted by the United States Air Force of the Multics operating systems for "potential use as a two-level (secret/top secret) system." Their evaluation found that while Multics was "significantly better than other conventional systems,"[citation needed] it also had "... vulnerabilities in hardware security, software security and procedural security"[citation needed] that could be uncovered with "a relatively low level of effort."[citation needed] The authors performed their tests under a guideline of realism, so that their results would accurately represent the kinds of access that an intruder could potentially achieve. They performed tests that were simple information-gathering exercises, as well as other tests that were outright attacks upon the system that might damage its integrity. Some other methods of carrying out these include: Ethical Hacking

Patent Tutorials and FAQs The basics and not-so-basics of intellectual property (IP) are generally not very well understood by the general public, although the consequences of IP can be far-reaching. In particular, the scientific research community is becoming more involved in IP activities but often without understanding the constraints of IP. This area of the Patent Lens aims to acquaint the reader with some basic information on intellectual property concepts, but more importantly, to provide instructional material that is pragmatic. These materials present " how-to" approaches in a number of areas. It is our belief that providing a framework for approaching an intellectual property topic will assist you in navigating the sometimes murky waters of patents. Prior Art and Its Uses: A primer, by Theodore C. DISCLAIMER The contents of these pages are informational only and should not substitute for legal advice.

Related: