background preloader

What is a Hacker?

What is a Hacker?
Copyright © 2001 Eric S. Raymond As editor of the Jargon File and author of a few other well-known documents of similar nature, I often get email requests from enthusiastic network newbies asking (in effect) "how can I learn to be a wizardly hacker?". Back in 1996 I noticed that there didn't seem to be any other FAQs or web documents that addressed this vital question, so I started this one. A lot of hackers now consider it definitive, and I suppose that means it is. Still, I don't claim to be the exclusive authority on this topic; if you don't like what you read here, write your own. If you are reading a snapshot of this document offline, the current version lives at Note: there is a list of Frequently Asked Questions at the end of this document. Numerous translations of this document are available: ArabicBelorussianChinese (Simplified), Czech, Danish, Dutch, Estonian, German, GreekItalianHebrew, Norwegian, PersianPortuguese (Brazilian), RomanianSpanish, Turkish, and Swedish. 1. 2. 3.

http://catb.org/~esr/faqs/hacker-howto.html#what_is

Related:  Project Managementandroid MODDING

Change Is Good, But It’s Also Really Hard: Tech News and Analysis « Last month, I took a little break from all the hustle and bustle of the Internets and decided to focus on trying to get a better handle on my daily life. It included eating right, working out and, in short, decompressing. I was trying to use a month-long break to change life-long behaviors such as staying up late, working long hours and more often than not, eating erratically. I think these were some of the problems that got me into trouble the first place. That growing bit of self-awareness and some well-minded friends and colleagues who convinced me — it was time to Get. A.

Nexus One: How to unroot device and restore back to the original rom This guide will explain how to restore a rooted/custom rom Nexus One back to its original Google image. This guide will work with most Android devices. This will remove root, restore back to a factory recovery image and also remove all custom tweaks to the OS. This can be handy if you decide to sell or return your phone. Be sure to back up all data prior to doing this since anything on the phone will be removed. So if your running a custom recovery image like Clockwork or Anon’s it will be removed and returned to the stock recovery image.

How To Become A Hacker Copyright © 2001 Eric S. Raymond As editor of the Jargon File and author of a few other well-known documents of similar nature, I often get email requests from enthusiastic network newbies asking (in effect) "how can I learn to be a wizardly hacker?". Back in 1996 I noticed that there didn't seem to be any other FAQs or web documents that addressed this vital question, so I started this one. The Mozilla Manifesto Introduction The Internet is becoming an increasingly important part of our lives. The Mozilla project is a global community of people who believe that openness, innovation, and opportunity are key to the continued health of the Internet. We have worked together since 1998 to ensure that the Internet is developed in a way that benefits everyone. We are best known for creating the Mozilla Firefox web browser. The Mozilla project uses a community-based approach to create world-class open source software and to develop new types of collaborative activities.

Scientific History And The Lessons For Today's Emerging Ideas In a hundred years time, historians of science and technology will look back at our age and marvel at the theories, experiments, and breakthroughs that characterise our age. But they will also puzzle over the scientific cul de sacs of our time: the theories and ideas that fell by the wayside because they turned out to be misconceived, wrong or just plain mumbo jumbo. Inevitably, this raises an interesting question: how much of what we consider mainstream investigation will fall into this category of best-forgotten science? One way to approach this question is to examine our own attitude to science at the end of the 19th century and the beginning of the 20th. The popular account goes a little like this.

Some lesser-known truths about programming My experience as a programmer has taught me a few things about writing software. Here are some things that people might find surprising about writing code: Averaging over the lifetime of the project, a programmer spends about 10-20% of his time writing code, and most programmers write about 10-12 lines of code per day that goes into the final product, regardless of their skill level. Good programmers spend much of the other 90% thinking, researching, and experimenting to find the best design. Bad programmers spend much of that 90% debugging code by randomly making changes and seeing if they work.A good programmer is ten times more productive than an average programmer.

[Hboot Collection] Easily change partitions w/o pc via recovery [Hboot Collection] Easily change partitions w/o pc via recovery Hey all... Collection of flashable Hboot so that u can Easily Resize Your Hboot Partition w/o pc How-To Permanently Delete Your Facebook Account Looking to permanently delete your Facebook account? Not surprising. Over the years, Facebook has seen its share of controversy in regards to the privacy of its users. It’s hard to say what sparked all the excitement: Rapid growth of its service? the hacker's manifesto, 1998 by Morbus & Stillborn the hacker's manifesto, 1998 by Morbus & Stillborn On Monday, June 22, 1998, the webserver that Disobey.com resided on was hacked. After two days of people coming to the site in hopes of finding the quality content that they have grown accustomed too, they were met with 404's in every direction. It sucked real bad.

French Chanteurs Photo juin 25, 2013 2 notes Photo What agile means to me [Update: in response to some of the comments here and on HN, I thought it might be worth updating with a note on my personal experience with Agile, which appears at the bottom of the post.] Agile (with a big 'A') has become so mainstream now that it has started to become the problem. An alarming number of people who espouse the virtues of Agile, and who quote the Agile Manifesto believe that Agile is a project management methodology, and that Agile really means SCRUM, XP, Kanban, and that it is embodied in the daily stand-up, whiteboards or writing requirements on post-it notes. I was once told by an Agile Trainer (LOL) that the correct way to phrase the requirement "we need advertising placeholders on the site, and some way to manage which ads appear where" was "As a User, I wish to be marketed to." Needless to say his company lost a $m project on the back of such BS. So, a few lessons I've learned along the (hard) way:

How to Install Android Adb & Fastboot Drivers on Your Windows PC [Guide] ADB – stands for Android Debug Bridge and helps you to build a connection between your Android Emulator or Android Device and your computer. Having ADB and Fastboot drivers installed is essential if you want to play with your device by installing new recoveries, flashing custom roms and mods and trying other similar tricks. ADB & Fastboot drivers a must have thing for Google Nexus owners as well as these are important for some other devices like HTC. If you are looking for a method to install ADB & Fastboot drivers on your windows PC you’ve spotted the right place as we will learn today how we can install these drivers. First of all you need to download Android SDK Tools form Android Development Site.In order to make the Android SDK Manager work you must have Java installed in your PC. Download & Install Java SE Development Kit 7 for your windows.

Hackers: Heroes of the Computer Revolution - Wikipedia, the free The book saw an edition with a new afterword (entitled "Afterword: Ten Years After") by the author in 1994.[1] In 2010, a 25th anniversary edition with updated material was published by O'Reilly.[2] Levy's description of hacker ethics and principles[edit] First and foremost to Levy's principles is the concept of the hacker ethic and the popularization of them to popular culture. In Levy's own words, the principles dictate; Access to computers—and anything which might teach you something about the way the world works—should be unlimited and total.

Related:  Hacking Articles