1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
|
working title:
History of Software Freedom: Free Software and Open Source
hacker subculture - ~04:00
will discuss first, since:
hacker values permeate and give context to the history of sw freedom
few, if any, in the audience know what a hacker is
Phil Agre, an MIT hacker, on the definition:
The word hack doesn't really have 69 different meanings. In fact, hack
has only one meaning, an extremely subtle and profound one which defies
articulation.
[Jargon-meaning]
nonetheless, many have attempted to define hacking:
RFC 1392:
hacker
A person who delights in having an intimate understanding of the
internal workings of a system, computers and computer networks in
particular. The term is often misused in a pejorative context,
where "cracker" would be the correct term. See also: cracker.
[RFC1392, 21]
RMS, a renowned hacker I'll be discussing in detail shortly:
It is hard to write a simple definition of something as varied as
hacking, but I think what these activities have in common is
playfulness, cleverness, and exploration. Thus, hacking means
exploring the limits of what is possible, in a spirit of playful
cleverness. Activities that display playful cleverness have "hack
value".
[RMS-hacking]
Jargon file offers a good detailed explanation:
1. A person who enjoys exploring the details of programmable systems
and how to stretch their capabilities, as opposed to most users, who
prefer to learn only the minimum necessary. RFC1392, the Internet
Users' Glossary, usefully amplifies this as: A person who delights
in having an intimate understanding of the internal workings of a
system, computers and computer networks in particular.
2. One who programs enthusiastically (even obsessively) or who
enjoys programming rather than just theorizing about programming.
3. A person capable of appreciating hack value.
4. A person who is good at programming quickly.
5. An expert at a particular program, or one who frequently does
work using it or on it; as in ‘a Unix hacker’. (Definitions 1
through 5 are correlated, and people who fit them congregate.)
[Jargon-hacker]
MIT Tech Model Railroad Club
1950s and 1960s
members sought to learn how things worked
members disliked authority
information wants to be free
vocabulary
foo, frob, cruft, hack, etc.
TODO: continue history, describe hacker ethic
examples of hacks
MIT
campus police car on the Great Dome
[IHTFP-CP-Car]
nyan cat
[IHTFP-Nyan-Cat]
RFC 1149
A Standard for the Transmission of IP Datagrams on Avian Carriers
CPIP (Carrier Pidgeon IP)
Bergen Linux User's Group
2001-04-28: Bergen, Norway
— 10.0.3.1 ping statistics —
9 packets transmitted, 4 packets received, 55% packet loss
round-trip min/avg/max = 3211900.8/5222806.6/6388671.9 ms
[RFC1149]
[Jargon-meaning]
[BLUG-CPIP-WG]
in the beginning, there was freedom - ~02:00
DEC PDP-1
became the favorite machine of the budding hacker culture
after its donation to MIT in 1962
[WP-PDP-1]
DECUS
Digital Equipment Computer Users Society
users had to write software for PDP-1
founded in 1961
facilitated free exchange of info and sw between customers and DEC
[CHM-DECUS]
Spacewar!
space shooter with realistic physics that showed power of PDP-1
written by Steve Russel in 1961-1962
a traditional hack
goofy and random, with no use other than as a diversion
MIT hackers freely shared game
[Quinn, 316]
[CHM-Spacewar!]
[Williams-RMS, 211]
TODO: something about sharing software like sugar [Williams-RMS, 5]
Unix
originally written in 1969 to run on PDP-7
by Ken Thompson, Dennis Ritchie, M. D. McIlroy, and J. F. Ossanna
to be "a system around which a fellowship could form"
AT&T was required to license non-telephone tech. to anyone who asked
under a 1958 consent decree in settlement of an antitrust case
AT&T licensed Unix with source code to univs, corps, U.S. gov't
Lion's Commentary, 1976, documented Unix source code
Unix hackers of the early 1970s
enjoyed largely unrestricted access to Unix sys at univs and corps
throughout the 1970s, univs worldwide contributed greatly to Unix dev
[DMR-Hist]
[ESR-TAOUP-2.1]
[WP-Unix]
proprietarization - ~02:00
IBM unbundling
1969
IBM stopped providing software in source form with hardware
instead began selling binary copies of software at a high cost
pioneered the "software industry"
[WP-IBM]
"Open Letter to Hobbyists"
written by Bill Gates, General Partner, Micro-Soft
published between January and May, 1976
in Homebrew Computer Club Newsletter, Computer Notes, et al
accused hobbyists of stealing
claimed that sharing software is unfair and prevents writing of good sw
[WP-Open-Letter]
[DB-Gates]
copyright
Commission on New Technological Uses of Copyrighted Works (CONTU)
established in 1974 to study and make recommends on legislation
Copyright Act of 1976
added 17 U.S.C. §117
Computer Software Copyright Act of 1980
added defn of "computer program" to 17 U.S.C. §101
explicitly made software copyrightable
rewrote 17 U.S.C. §117
"it is not an infringement for the owner of a copy of a computer
program to make or to authorize the making of another copy or
adaptation of that computer program provided:
(1) that such a new copy or adaptation is created as an
essential step in the utilization of the computer program in
conjunction with a machine and that it is used in no other
manner, or
(2) that such new copy or adaptation is for archival
purposes only and that all archival copies are destroyed in
the event that continued possession of the computer program
should cease to be rightful."
GNU
the Trojan Horse printer
printer in MIT AI lab
jammed frequently
RMS, a hacker in the lab, devised a clever workaround
modified the driver sw on systems to check for jams and alert users
users awaiting jobs congregated around printer
usually at least one knew how to fix the jam
[Williams-RMS, 3]
Xerox Corporation donated a fast new prototype printer
jammed frequently
RMS thought to apply the same hack
searched for the Xerox printer driver, found no source code
[Williams-RMS, 2-4]
CMU computer scientist
RMS heard that a scientist at CMU had a copy of the source code
eventually he visited CMU and found the scientist
asked for a copy
scientist said he'd agreed not to share it, signed an NDA
RMS, stuned and angry, immediately and without a word walked out
[Williams-RMS, 6-8]
commercial free software
many believe that money can't be made in open source and free software
that free means noncommercial
logical fallacy, false exclusionary disjunct
free software can be used commercially, and successful business models exist
if a license allows only noncommercial dealing, it would be non-free
[FSD]
generalized the ways people make money with fs into 3 broad categories
1. development
resembles pre-1970s economic models around software
programmers paid for time spent on work
not for copies of work (or rather contracts allowing use thereof)
[Codebreakers]
four examples:
a. Linux
over 70% of work done on Linux is done by paid programmers
[Linux-Kernel-Development, 12-13]
6000? 7000? programmers work on Linux
clarify? cite?
at least 659 companies have supported Linux development
[Linux-Kernel-Development, 10]
compare to the Microsoft Windows NT kernel
one company? plus contractors?
1,000 MSFT employees worked on Windows Vista as a whole
estimate ~20 employees worked on NT kernel between 5.x and 6.x
years?
b. Qt
flexible cross-platform application framework
popular in desktop, server, and embedded environments
[Qt]
most developers employed by Qt Development Frameworks
subsidiary of Nokia Corporation since 2008
[Qt-Development-Frameworks]
free software, GNU LGPL 2.1
[Qt Licensing]
now maintained as an independent project
[citation needed]
c. GNAT
a compiler for the Ada programming lang, now part of GCC
originally developed by NYU
under $3-million contract awarded by USAF in 1992
under requirements of contract, (C) transferred to FSF
sw released with terms of GNU GPL
[GNAT]
d. GNU
FSF hired programmers to work on parts of GNU
GNU Bash
popular and user-friendly command shell
now used in systems like GNU/Linux and Apple Mac OS X
GLIBC
ISO C library
GNU tar
archiving program
[Freedom-and-Cooperation]
all are fs, all are nowadays often distributed at no charge
why do companies pay for development of sw for which few people pay?
many companies sell support
many companies sell hw with which fs is run
servers, wireless network adapters, digital cameras,
mobile phones, televisions, cars, commercial airplanes, etc.
many companies see fs as a way to save time+money
and not have to reinvent wheels
2. support
3. distribution
Jargon-meaning
http://www.catb.org/jargon/html/meaning-of-hack.html
RFC1392
http://www.rfc-editor.org/rfc/rfc1392.txt
RMS-hacking
http://www.stallman.org/articles/on-hacking.html
Jargon-hacker
http://www.catb.org/jargon/html/H/hacker.html
RFC1149
http://tools.ietf.org/html/rfc1149
IHTFP-CP-Car
http://hacks.mit.edu/Hacks/by_year/1994/cp_car/
IHTFP-No-Tresspassing
http://hacks.mit.edu/Hacks/by_year/2004/no_tresspassing/
IHTFP-Firetruck
http://hacks.mit.edu/Hacks/by_year/2006/firetruck/
IHTFP-Nyan-Cat
http://hacks.mit.edu/Hacks/by_year/2011/nyan_cat/
BLUG-CPIP-WG
http://www.blug.linux.no/rfc1149/
WP-PDP-1
http://en.wikipedia.org/wiki/PDP-1
CHM-DECUS
http://pdp-1.computerhistory.org/pdp-1/index.php?f=theme&s=4&ss=7
Quinn
Quinn, Michael J. _Ethics for the Information Age_. Fourth Edition.
Addison-Wesley, 2011. 316.
CHM-Spacewar!
http://pdp-1.computerhistory.org/pdp-1/index.php?f=theme&s=4&ss=3
DMR-Hist
http://cm.bell-labs.com/cm/cs/who/dmr/hist.html
ESR-TAOUP-2.1
http://www.faqs.org/docs/artu/ch02s01.html
WP-Unix
http://en.wikipedia.org/wiki/Unix
WP-IBM
http://en.wikipedia.org/wiki/History_of_IBM
#1969:_Antitrust.2C_the_Unbundling_of_software_and_services
WP-Open-Letter
http://en.wikipedia.org/wiki/Open_Letter_to_Hobbyists
DB-Gates
http://www.digibarn.com/collections/newsletters/homebrew/V2_01/
homebrew_V2_01_p2.jpg
Williams-RMS
|