A hacker (hacker called) - a person with a very large, practical skills in ICT (or electronic) that identifies the hacker community. Hackers have very good knowledge of the Internet, knowledge of many programming languages, as well as excellent knowledge of operating systems, particularly the family of Unix (GNU / Linux, BSD, etc.).
Is also used to determine adequately quantified, eg, Perl hacker meaning are very well familiar with Perl hacker and security - to determine an outstanding specialist in computer security.
Etymology
The English word comes from the hack hacker. The term hack among students at the Massachusetts Institute of Technology in the 60s płatanych referring to jokes such as wrapping the university campus dominates the dome light rays reflecting foil. To earn this term to distinguish jokes have special creativity and style, and not to bring harm.
Miano hacker imparted to each other, some members of the Tech Model Railroad Club (Railway Club of model) and Artificial Intelligence Laboratory at the university running. Some of them later moved his interest in computers - they can be regarded as the prototype of today's hackers.
Technology
Not all computer systems are equally vulnerable to hacking. Many operating systems (eg Microsoft Windows) does not contain a default even such basic tools as the compiler is useful for applications programming text editor. Hackers therefore more likely to meet users of Unix systems, particularly systems such as Linux, FOSS, but also closed Unixes are usually very friendly programmer.
The most popular programming languages among hackers are the ones that allow you to quickly create interesting and useful applications, and give the programmer a lot of control over the program. These languages include C (recently also C + +) and Perl, functional languages (Lisp, Haskell) and interpreted many new languages (Python, Ruby, etc.), and even hated by hackers proverbially is COBOL.
Culture and community of hackers
Hackers have never had institutions that unifikowałyby all their community, but the Internet has brought a lot of channels that increase the degree of its integration. Specific features of the community is only spread by contact between the different groups. There is a second mechanism for the dissemination of the characteristics of the hacker culture - convergence. The hacker culture, which is actually a kind of subculture among the most important values are the technical skills and technique in itself, but the values that integrate the hacker community is primarily a liberation movements, including movement of the free software and open source movements later. Because information technologies are being developed in all places at the same time, these same products of hacker activity can spread independently in several autonomous communities. Such was the nature of the spread of such Linux, Perl and Open Source - while they distribute among many hackers and their local communities, due to its impact on the hacking, not because of the impact of central institutions.
According to Manuel Castells, the founder of three-volume work dedicated to the information society Fri The Age of Information hacker culture is based primarily on technomerytokratycznej culture, which in turn is based on improving technical skills. Raised technical skills, in turn, allow for continuous sharing of knowledge related to the availability of the source code.
One of the main values in the hacker by Castells is freedom - in three dimensions:
freedom of creation
freedom of access to knowledge
freedom to form knowledge sharing
Castells also determines the hacker culture as a culture of gift.
Another important value is the recognition, prestige which the hacker can gain in the environment by sharing their innovative programs and solutions in existing programs. Prestige resulting from the creative use of knowledge to create new technologies and to share with them, is the basis for building environmental authority hackers. Formal education but does not translate into recognition of hackers, most of them are still students, especially in engineering and science.
Although hackers have the ability to meet outside of the internet, most interactions are virtual. Communication also is informal, so they do not use names, creating its identity around the self-created nicknames.
Hacker jargon
Hackers use the specific, to some extent, hermetic language. In Poland, it is usually a mixture of Polish, English, technical vocabulary and words typical of the hacker culture.
Eric Raymond edits Jargon File, jargon-English-speaking hackers. There is as yet this type of development for the Polish hacker jargon.
Using jargon is necessary for hackers because they need to communicate effectively in a number of topics that are not present in the mainstream language, if only because of their novelty. This applies not only highly technical words, but also less technical terms, which, however, are much shorter and more accurate than those provided by traditional forms of language such example BOFH (literally bastard operator from hell, or administrator-bastard from hell in terms of administrator very low tolerance for mistakes and stupidity of users), trivial (in the sense of no potential for hacking, not worthy of attention - you can see here a reference to the mathematical jargon) or thinko (in the sense of error due to temporary impairment of thought processes, which is then obvious to the person who committed it, the think - to think by analogy with the typo - typo caused by careless writing on the keyboard).
Hacker emblem
Main article: hacker emblem.
In October 2003, Eric Raymond proposed hacker emblem: a glider from the Game of Life (game called life). It has been no major objections accepted by the community, although some hackers believe that the community should not have the emblem itself.
Hackers and cybercrime
Meaning of the word "hacker" in the mass media is different than those used by the hacker community. Media commonly use it to violate the security of computer systems, computer vocabulary which is referred to as "cracking" and violating the security as "crackers". Determination of crackers as hackers is frowned upon in the environment, as opposed to ethics, cyber hacker. Crackingiem deal with the people without hacking skills, using pre-hacks. Among hackers such persons together being referred to pejoratively script kiddie (literally scripting kid).
Is also used to determine adequately quantified, eg, Perl hacker meaning are very well familiar with Perl hacker and security - to determine an outstanding specialist in computer security.
Etymology
The English word comes from the hack hacker. The term hack among students at the Massachusetts Institute of Technology in the 60s płatanych referring to jokes such as wrapping the university campus dominates the dome light rays reflecting foil. To earn this term to distinguish jokes have special creativity and style, and not to bring harm.
Miano hacker imparted to each other, some members of the Tech Model Railroad Club (Railway Club of model) and Artificial Intelligence Laboratory at the university running. Some of them later moved his interest in computers - they can be regarded as the prototype of today's hackers.
Technology
Not all computer systems are equally vulnerable to hacking. Many operating systems (eg Microsoft Windows) does not contain a default even such basic tools as the compiler is useful for applications programming text editor. Hackers therefore more likely to meet users of Unix systems, particularly systems such as Linux, FOSS, but also closed Unixes are usually very friendly programmer.
The most popular programming languages among hackers are the ones that allow you to quickly create interesting and useful applications, and give the programmer a lot of control over the program. These languages include C (recently also C + +) and Perl, functional languages (Lisp, Haskell) and interpreted many new languages (Python, Ruby, etc.), and even hated by hackers proverbially is COBOL.
Culture and community of hackers
Hackers have never had institutions that unifikowałyby all their community, but the Internet has brought a lot of channels that increase the degree of its integration. Specific features of the community is only spread by contact between the different groups. There is a second mechanism for the dissemination of the characteristics of the hacker culture - convergence. The hacker culture, which is actually a kind of subculture among the most important values are the technical skills and technique in itself, but the values that integrate the hacker community is primarily a liberation movements, including movement of the free software and open source movements later. Because information technologies are being developed in all places at the same time, these same products of hacker activity can spread independently in several autonomous communities. Such was the nature of the spread of such Linux, Perl and Open Source - while they distribute among many hackers and their local communities, due to its impact on the hacking, not because of the impact of central institutions.
According to Manuel Castells, the founder of three-volume work dedicated to the information society Fri The Age of Information hacker culture is based primarily on technomerytokratycznej culture, which in turn is based on improving technical skills. Raised technical skills, in turn, allow for continuous sharing of knowledge related to the availability of the source code.
One of the main values in the hacker by Castells is freedom - in three dimensions:
freedom of creation
freedom of access to knowledge
freedom to form knowledge sharing
Castells also determines the hacker culture as a culture of gift.
Another important value is the recognition, prestige which the hacker can gain in the environment by sharing their innovative programs and solutions in existing programs. Prestige resulting from the creative use of knowledge to create new technologies and to share with them, is the basis for building environmental authority hackers. Formal education but does not translate into recognition of hackers, most of them are still students, especially in engineering and science.
Although hackers have the ability to meet outside of the internet, most interactions are virtual. Communication also is informal, so they do not use names, creating its identity around the self-created nicknames.
Hacker jargon
Hackers use the specific, to some extent, hermetic language. In Poland, it is usually a mixture of Polish, English, technical vocabulary and words typical of the hacker culture.
Eric Raymond edits Jargon File, jargon-English-speaking hackers. There is as yet this type of development for the Polish hacker jargon.
Using jargon is necessary for hackers because they need to communicate effectively in a number of topics that are not present in the mainstream language, if only because of their novelty. This applies not only highly technical words, but also less technical terms, which, however, are much shorter and more accurate than those provided by traditional forms of language such example BOFH (literally bastard operator from hell, or administrator-bastard from hell in terms of administrator very low tolerance for mistakes and stupidity of users), trivial (in the sense of no potential for hacking, not worthy of attention - you can see here a reference to the mathematical jargon) or thinko (in the sense of error due to temporary impairment of thought processes, which is then obvious to the person who committed it, the think - to think by analogy with the typo - typo caused by careless writing on the keyboard).
Hacker emblem
Main article: hacker emblem.
In October 2003, Eric Raymond proposed hacker emblem: a glider from the Game of Life (game called life). It has been no major objections accepted by the community, although some hackers believe that the community should not have the emblem itself.
Hackers and cybercrime
Meaning of the word "hacker" in the mass media is different than those used by the hacker community. Media commonly use it to violate the security of computer systems, computer vocabulary which is referred to as "cracking" and violating the security as "crackers". Determination of crackers as hackers is frowned upon in the environment, as opposed to ethics, cyber hacker. Crackingiem deal with the people without hacking skills, using pre-hacks. Among hackers such persons together being referred to pejoratively script kiddie (literally scripting kid).