rich's technology

So You've Hired a Hacker

There is a wonderful variety among humans. Ethnicity and culture provide one of the most important dimensions--but there can be profound differences between two people who look the same. If neither appreciates the differences, and thinks, "He's just like me--only not doing a very good job of it," there will be conflicts that can be prevented. If they understand their differences, both can profit. This document is written so that you can understand your hacker and enjoy a more productive working relationship.

Becoming a Hacker

There is a community, a shared culture, of expert programmers and networking wizards that traces its history back through decades to the first time-sharing minicomputers and the earliest ARPAnet experiments. The members of this culture originated the term `hacker'. Hackers built the Internet. Hackers made the Unix operating system what it is today. Hackers run Usenet. Hackers make the World Wide Web work. If you are part of this culture, if you have contributed to it and other people in it know who you are and call you a hacker, you're a hacker.

The hacker mind-set is not confined to this software-hacker culture. There are people who apply the hacker attitude to other things, like electronics or music — actually, you can find it at the highest levels of any science or art. Software hackers recognize these kindred spirits elsewhere and may call them "hackers" too — and some claim that the hacker nature is really independent of the particular medium the hacker works in. But in the rest of this document we will focus on the skills and attitudes of software hackers, and the traditions of the shared culture that originated the term `hacker'.

Monolithic Hack FAQ

If we said "to teach hacking", we would be lying.

  1. First off, no documentation will teach you how to hack. This FAQ simply attempts to answers common questions regarding some of the underlying mechanics.
  2. Second, we will not be drawn into a debate regarding usage of terms (hacker vs. cracker, etc.) and will certainly not be drawn into a discussion on the moral or legal issues involved.
  3. The material is what it is - no more, no less, and we use terms the way we see fit to answer a question from the intruder perspective.

The goal here is simply information disemination.

rich's technology

Last Updated: 10.11.03 rw