Penguin

Differences between current version and predecessor to the previous major change of Hacker.

Other diffs: Previous Revision, Previous Author, or view the Annotated Edit History

Newer page: version 7 Last edited on Saturday, December 25, 2004 5:50:58 am by AristotlePagaltzis
Older page: version 5 Last edited on Saturday, October 9, 2004 5:47:51 am by AristotlePagaltzis Revert
@@ -1,15 +1,14 @@
 By and large, [Hacker] is roughly used as a reference to a creative, capable programmer. "Programmer" here is to be understood in the wider sense; it would apply to a [DBA] with intricate understanding of his DataBase just the same, f.ex. In fact, the term applies to anyone with expertise in any kind of technical field: someone who designs and builds a custom turbo charger for his car's engine is a highly respectable car [Hacker]. 
  
 A "hack" is any kind of minimalistic solution or lateral thinking approach to a problem. That might be a quick and dirty patchwork that works anyhow, or an elegant solution that is much simpler than the "ordinary" one. "Hack value" is a term used to describe just how creative or ingenious a solution is; sometimes, [Hacker]s will do things with little or no practical use simply because they have great hack value. 
  
-[Hacker]s are __not__ people who just break into computers. Most of those who do so are ScriptKiddie~s and Crackers, not [Hacker]s. Crackers, unlike ScriptKiddie~s, actually understand how breaking into computers works, but acquire this knowledge as a means to accomplish their goals rather than a primary interest. A real [Hacker] on the other hand may crack services or computers as well, but will usually be doing so in pursuit of better understanding or in an attempt to prove something. 
+[Hacker]s are __not__ people who just break into computers. Most of those who do so are ScriptKiddie~s and Crackers, not [Hacker]s. Crackers, unlike ScriptKiddie~s, actually understand how breaking into computers works, but acquire this knowledge as a means to accomplish their goals rather than a primary interest. A real [Hacker] on the other hand may crack services or computers as well, but will usually be doing so in pursuit of better understanding or in an attempt to prove something. Still, the whole story about the noble and sublime [Hacker] ethic is often exaggerated and overemphasized. [Hacker]s are no more inherently saintly than anyone else. The difference between [Hacker]s and Crackers/ScriptKiddie~s in attacking systems is mostly merely in that the [Hacker] is driven by curiosity. However, a transgression out of curiosity is still a trangression, no less so than one committed out of malice. The real difference is that the definition of [Hacker] is much broader than that of Cracker or ScriptKiddie; many a [Hacker] has never even attempted to break into any system or service
  
-Still, the whole story about the noble and sublime [Hacker] ethic is often exaggerated and overemphasized. [Hacker]s are no more inherently saintly than anyone else. The difference between [Hacker]s and Crackers/ScriptKiddie~s is mostly merely in that the [Hacker] is driven by curiosity. However, a transgression out of curiosity is still a trangression, no less so than one committed out of malice.  
-  
- Hackers often start at [Geek] and tend toward [Nerd], but they need not necessarily be [Geek]s at all, even though such is a rare case. 
+Hackers often start at [Geek] and tend toward [Nerd]. They need not necessarily be [Geek]s at all though , even though such is a rare case. 
  
 See also: 
 * [JargonFile:hacker] 
 * [JargonFile:hack-value] 
 * [A hacker glossary | http://tlc.discovery.com/convergence/hackers/glossary/glossary.html] 
 * [Care and Feeding Of Your Hacker | http://web.demigod.org/~zak/geek/hack.shtml] 
+* ChantalThomson's business [IT] textbook's [depiction of a "hacker" | http://www.wlug.org.nz/archive/images/hacker-linux-rules.jpg?]