The hacker culture is a
subculture
A subculture is a group of people within a culture that differentiates itself from the parent culture to which it belongs, often maintaining some of its founding principles. Subcultures develop their own norms and values regarding cultural, poli ...
of individuals who enjoy—often in collective effort—the intellectual challenge of creatively overcoming the limitations of
software system
A software system is a system of intercommunicating components based on software forming part of a computer system (a combination of hardware and software). It "consists of a number of separate programs, configuration files, which are used to se ...
s or
electronic hardware
Electronic hardware consists of interconnected electronic components which perform analog or logic operations on received and locally stored information to produce as output or store resulting new information or to provide control for output actu ...
(mostly
digital electronics), to achieve novel and clever outcomes.
The act of engaging in activities (such as programming or other media
[The Hacker Community and Ethics: An Interview with Richard M. Stallman, 2002]
(gnu.org)) in a spirit of playfulness and exploration is termed ''hacking''. However, the defining characteristic of a
hacker is not the activities performed themselves (e.g.
programming), but how it is done
and whether it is exciting and meaningful.
Activities of playful cleverness can be said to have "hack value" and therefore the term "hacks" came about,
with early examples including
pranks at MIT done by students to demonstrate their technical aptitude and cleverness. The hacker culture originally emerged in academia in the 1960s around the
Massachusetts Institute of Technology (MIT)'s
Tech Model Railroad Club (TMRC) and
MIT Artificial Intelligence Laboratory. Hacking originally involved entering restricted areas in a clever way without causing any major damage. Some famous
hacks at the Massachusetts Institute of Technology were placing of a campus police cruiser on the roof of the Great Dome and converting the Great Dome into
R2-D2.
Richard Stallman explains about hackers who program:
Hackers from this subculture tend to emphatically differentiate themselves from what they pejoratively call "
crackers"; those who are generally referred to by media and members of the general public using the term "hacker", and whose primary focusbe it to malign or for malevolent purposeslies in
exploiting weaknesses in computer security.
Definition
The
Jargon File
The Jargon File is a glossary and usage dictionary of slang used by computer programmers. The original Jargon File was a collection of terms from technical cultures such as the MIT AI Lab, the Stanford AI Lab (SAIL) and others of the old ARPANET A ...
, an influential but not universally accepted compendium of hacker slang, defines hacker as "A person who enjoys exploring the details of programmable systems and stretching their capabilities, as opposed to most users, who prefer to learn only the minimum necessary."
The
Request for Comments (RFC) 1392, the Internet Users' Glossary, amplifies this meaning as "A person who delights in having an intimate understanding of the internal workings of a system, computers and computer networks in particular."
As documented in the Jargon File, these hackers are disappointed by the mass media and general public's usage of the word ''
hacker'' to refer to
security breakers, calling them "crackers" instead. This includes both "good" crackers ("
white hat hackers"), who use their computer security-related skills and knowledge to learn more about how systems and networks work and to help to discover and fix security holes, as well as those more "evil" crackers ("
black hat hacker
A Black Hat (Black Hat Hacker or Blackhat) is a computer hacker who usually violates laws or typical ethical standards. The term originates from the 1950s westerns, when bad guys typically wore black hats and good guys white hats. Black hat hacker ...
s"), who use the same skills to author harmful software (such as viruses or trojans) and illegally infiltrate secure systems with the intention of doing harm to the system.
Definition of "Cracker" in the Jargon File
The Jargon File is a glossary and usage dictionary of slang used by computer programmers. The original Jargon File was a collection of terms from technical cultures such as the MIT AI Lab, the Stanford AI Lab (SAIL) and others of the old ARPANET A ...
The programmer subculture of hackers, in contrast to the cracker community, generally sees computer security-related activities as contrary to the ideals of the original and true meaning of the hacker term, that instead related to playful cleverness.
History
The word "hacker" derives from the seventeenth-century word of a "lusty laborer" who harvested fields by dogged and rough swings of his hoe. Although the idea of "hacking" existed long before the term "hacker"with the most notable example of
George Ellsworth, Lightning Ellsworth, it was not a word that the first programmers used to describe themselves. In fact, many of the first programmers were from engineering or physics backgrounds.
There was a growing awareness of a style of programming different from the cut and dried methods employed at first, but it was not until the 1960s that the term "hackers" began to be used to describe proficient computer programmers. Therefore, the fundamental characteristic that links all who identify themselves as hackers is that each is someone who enjoys "…the intellectual challenge of creatively overcoming and circumventing limitations of programming systems and who tries to extend their capabilities" (47).
With this definition in mind, it can be clear where the negative implications of the word "hacker" and the subculture of "hackers" came from.
Some common nicknames among this culture include "crackers", who are considered to be unskilled thieves who mainly rely on luck, and "phreaks", which refers to skilled
crackers and "warez d00dz" (crackers who acquire reproductions of copyrighted software). Hackers who are hired to test security are called "pentesters" or "tiger teams".
Before communications between computers and computer users were as
networked as they are now, there were multiple independent and parallel hacker subcultures, often unaware or only partially aware of each other's existence. All of these had certain important traits in common:
* Creating software and sharing it with each other
* Placing a high value on freedom of inquiry
* Hostility to secrecy
* Information-sharing as both an ideal and a practical strategy
* Upholding the right to
fork
* Emphasis on rationality
* Distaste for authority
* Playful cleverness, taking the serious humorously and humor seriously
These sorts of subcultures were commonly found at
academic settings such as
college campus
A campus is traditionally the land on which a college or university and related institutional buildings are situated. Usually a college campus includes libraries, lecture halls, residence halls, student centers or dining halls, and park-like se ...
es. The
MIT Artificial Intelligence Laboratory, the
University of California, Berkeley and
Carnegie Mellon University
Carnegie Mellon University (CMU) is a private research university in Pittsburgh, Pennsylvania. One of its predecessors was established in 1900 by Andrew Carnegie as the Carnegie Technical Schools; it became the Carnegie Institute of Technology ...
were particularly well-known hotbeds of early hacker culture. They evolved in parallel, and largely unconsciously, until the
Internet, where a legendary
PDP-10 machine at MIT, called AI, that was running
ITS, provided an early meeting point of the hacker community. This and other developments such as the rise of the
free software movement and
community drew together a critically large population and encouraged the spread of a conscious, common, and systematic ethos. Symptomatic of this evolution were an increasing adoption of
common slang and a shared view of history, similar to the way in which other occupational groups have professionalized themselves, but without the formal credentialing process characteristic of most professional groups.
Over time, the academic hacker subculture has tended to become more conscious, more cohesive, and better organized. The most important consciousness-raising moments have included the composition of the first
Jargon File
The Jargon File is a glossary and usage dictionary of slang used by computer programmers. The original Jargon File was a collection of terms from technical cultures such as the MIT AI Lab, the Stanford AI Lab (SAIL) and others of the old ARPANET A ...
in 1973, the promulgation of the
GNU Manifesto in 1985, and the publication of
Eric Raymond
The given name Eric, Erich, Erikk, Erik, Erick, or Eirik is derived from the Old Norse name ''Eiríkr'' (or ''Eríkr'' in Old East Norse due to monophthongization).
The first element, ''ei-'' may be derived from the older Proto-Norse ''* ain ...
's ''
The Cathedral and the Bazaar
''The Cathedral and the Bazaar: Musings on Linux and Open Source by an Accidental Revolutionary'' (abbreviated ''CatB'') is an essay, and later a book, by Eric S. Raymond on software engineering methods, based on his observations of the Linux k ...
'' in 1997. Correlated with this has been the gradual recognition of a set of shared culture heroes, including:
Bill Joy,
Donald Knuth,
Dennis Ritchie
Dennis MacAlistair Ritchie (September 9, 1941 – October 12, 2011) was an American computer scientist. He is most well-known for creating the C programming language and, with long-time colleague Ken Thompson, the Unix operating system and B p ...
,
Alan Kay,
Ken Thompson,
Richard M. Stallman
Richard Matthew Stallman (; born March 16, 1953), also known by his initials, rms, is an American free software movement activist and programmer. He campaigns for software to be distributed in such a manner that its users have the freedom to u ...
,
Linus Torvalds,
Larry Wall, and
Guido van Rossum.
The concentration of academic hacker subculture has paralleled and partly been driven by the commoditization of computer and networking technology, and has, in turn, accelerated that process. In 1975, hackerdom was scattered across several different families of
operating systems and disparate networks; today it is largely a
Unix and
TCP/IP phenomenon, and is concentrated around various
operating systems based on
free software and
open-source software development.
Ethics and principles
Many of the values and tenets of the
free and open source software movement stem from the
hacker ethics that originated at
MIT and at the
Homebrew Computer Club. The hacker ethics were chronicled by Steven Levy in ''
Hackers: Heroes of the Computer Revolution''
[Levy, S: "Hackers: Heroes of the Computer Revolution", Anchor Press/Doubleday, 1984. ] and in other texts in which Levy formulates and summarizes general hacker attitudes:
* Access to computers-and anything that might teach you something about the way the world works-should be unlimited and total.
* All
information should be free
"Information wants to be free" is an expression that means all people should be able to access information freely. It is often used by technology activists to criticize laws that limit transparency and general access to information. People who cri ...
.
*Hackers should be judged by their hacking, not bogus criteria such as degrees, age, race, or position.
*You can create
art and beauty on a computer.
*Computers can change your life for the better.
Hacker ethics are concerned primarily with sharing, openness, collaboration, and engaging in the hands-on imperative.
Linus Torvalds, one of the leaders of the open source movement (known primarily for developing the
Linux kernel
The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel. It was originally authored in 1991 by Linus Torvalds for his i386-based PC, and it was soon adopted as the kernel for the GNU ope ...
), has noted in the book ''The Hacker Ethic'' that these principles have evolved from the known Protestant ethics and incorporates the spirits of capitalism, as introduced in the early 20th century by
Max Weber
Maximilian Karl Emil Weber (; ; 21 April 186414 June 1920) was a German sociologist, historian, jurist and political economist, who is regarded as among the most important theorists of the development of modern Western society. His ideas profo ...
.
Hack value is the notion used by hackers to express that something is worth doing or is interesting. This is something that hackers often feel intuitively about a problem or solution.
An aspect of hack value is performing feats for the sake of showing that they can be done, even if others think it is difficult. Using things in a unique way outside their intended purpose is often perceived as having hack value. Examples are using a
dot matrix impact printer to produce musical notes, using a
flatbed scanner to take ultra-high-resolution photographs or using an
optical mouse as
barcode reader.
A solution or feat has "hack value" if it is done in a way that has finesse, cleverness or brilliance, which makes
creativity an essential part of the meaning. For example,
picking a difficult lock has hack value; smashing it does not. As another example, proving
Fermat's Last Theorem by linking together most of modern mathematics has hack value; solving a combinatorial problem by
exhaustively trying all possibilities does not. Hacking is not using process of elimination to find a solution; it's the process of finding a clever solution to a problem.
Uses
While using ''hacker'' to refer to someone who enjoys playful cleverness is most often applied to computer programmers, it is sometimes used for people who apply the same attitude to other fields.
[
] For example,
Richard Stallman describes the silent composition ''
4′33″
''4′33″'' (pronounced "four minutes, thirty-three seconds" or just "four thirty-three") is a three- movement composition by American experimental composer John Cage. It was composed in 1952, for any instrument or combination of instruments, ...
'' by John Cage and the 14th-century
palindromic three-part piece "Ma Fin Est Mon Commencement" by
Guillaume de Machaut
Guillaume de Machaut (, ; also Machau and Machault; – April 1377) was a French composer and poet who was the central figure of the style in late medieval music. His dominance of the genre is such that modern musicologists use his death to ...
as hacks.
According to the Jargon File,
the word ''hacker'' was used in a similar sense among radio amateurs in the 1950s, predating the software hacking community.
Programming
''
The Boston Globe'' in 1984 defined "hackers" as "computer nuts".
In their programmer subculture, a hacker is a person who follows a spirit of playful cleverness and loves programming. It is found in an originally academic movement unrelated to computer security and most visibly associated with
free software,
open source
Open source is source code that is made freely available for possible modification and redistribution. Products include permission to use the source code, design documents, or content of the product. The open-source model is a decentralized sof ...
and
demoscene. It also has a
hacker ethic, based on the idea that writing software and sharing the result on a voluntary basis is a good idea, and that information should be free, but that it's not up to the hacker to make it free by breaking into private computer systems. This hacker ethic was publicized and perhaps originated in
Steven Levy's ''
Hackers: Heroes of the Computer Revolution'' (1984). It contains a codification of its principles.
The programmer subculture of hackers disassociates from the mass media's pejorative use of the word 'hacker' referring to computer security, and usually prefer the term 'cracker' for that meaning. Complaints about supposed mainstream misuse started as early as 1983, when media used "hacker" to refer to the computer criminals involved in
The 414s case.
In the programmer subculture of hackers, a computer hacker is a person who enjoys designing software and building programs with a sense for aesthetics and playful cleverness. The term hack in this sense can be traced back to "describe the elaborate college pranks that...students would regularly devise" (Levy, 1984 p. 10). To be considered a 'hack' was an honor among like-minded peers as "to qualify as a hack, the feat must be imbued with innovation, style and technical virtuosity" (Levy, 1984 p. 10) The
MIT Tech Model Railroad Club Dictionary defined hack in 1959 (not yet in a computer context) as "1) an article or project without constructive end; 2) a project undertaken on bad self-advice; 3) an entropy booster; 4) to produce, or attempt to produce, a hack(3)", and "hacker" was defined as "one who hacks, or makes them". Much of TMRC's jargon was later imported into early computing culture, because the club started using a
DEC PDP-1 and applied its local model railroad slang in this computing context. Initially incomprehensible to outsiders, the slang also became popular in MIT's computing environments beyond the club. Other examples of jargon imported from the club are 'losing' ("when a piece of equipment is not working")
and 'munged' ("when a piece of equipment is ruined").
Others did not always view hackers with approval.
MIT living groups in 1989 avoided advertising their sophisticated
Project Athena workstations to prospective members because they wanted residents who were interested in people, not computers, with one fraternity member stating that "We were worried about the hacker subculture".
According to
Eric S. Raymond
Eric Steven Raymond (born December 4, 1957), often referred to as ESR, is an American software developer, open-source software advocate, and author of the 1997 essay and 1999 book ''The Cathedral and the Bazaar''. He wrote a guidebook for the ...
, the Open Source and Free Software hacker subculture developed in the 1960s among 'academic hackers' working on early
minicomputer
A minicomputer, or colloquially mini, is a class of smaller general purpose computers that developed in the mid-1960s and sold at a much lower price than mainframe and mid-size computers from IBM and its direct competitors. In a 1970 survey, ...
s in
computer science environments in the United States.
Hackers were influenced by and absorbed many ideas of key technological developments and the people associated with them. Most notable is the technical culture of the pioneers of the
ARPANET, starting in 1969. The
PDP-10 AI machine at MIT, running the
ITS operating system and connected to the ARPANET, provided an early hacker meeting point. After 1980 the subculture coalesced with the culture of
Unix. Since the mid-1990s, it has been largely coincident with what is now called the
free software and
open source movement
The open-source-software movement is a movement that supports the use of open-source licenses for some or all software, as part of the broader notion of open collaboration. The open-source movement was started to spread the concept/idea of open ...
.
Many programmers have been labeled "great hackers", but the specifics of who that label applies to is a matter of opinion. Certainly major contributors to
computer science such as
Edsger Dijkstra and
Donald Knuth, as well as the inventors of popular software such as
Linus Torvalds (
Linux), and
Ken Thompson and
Dennis Ritchie
Dennis MacAlistair Ritchie (September 9, 1941 – October 12, 2011) was an American computer scientist. He is most well-known for creating the C programming language and, with long-time colleague Ken Thompson, the Unix operating system and B p ...
(
Unix and
C programming language
''The C Programming Language'' (sometimes termed ''K&R'', after its authors' initials) is a computer programming book written by Brian Kernighan and Dennis Ritchie, the latter of whom originally designed and implemented the language, as well as ...
) are likely to be included in any such list; see also
List of programmers
This is a list of programmers notable for their contributions to software, either as original author or architect, or for later additions. All entries must already have associated articles.
A
*Michael Abrash – program optimization and x86 ...
. People primarily known for their contributions to the consciousness of the programmer subculture of hackers include
Richard Stallman, the founder of the free software movement and the
GNU project, president of the
Free Software Foundation and author of the famous
Emacs
Emacs , originally named EMACS (an acronym for "Editor MACroS"), is a family of text editors that are characterized by their extensibility. The manual for the most widely used variant, GNU Emacs, describes it as "the extensible, customizable, s ...
text editor as well as the
GNU Compiler Collection (GCC), and
Eric S. Raymond
Eric Steven Raymond (born December 4, 1957), often referred to as ESR, is an American software developer, open-source software advocate, and author of the 1997 essay and 1999 book ''The Cathedral and the Bazaar''. He wrote a guidebook for the ...
, one of the founders of the
Open Source Initiative and writer of the famous text
The Cathedral and the Bazaar
''The Cathedral and the Bazaar: Musings on Linux and Open Source by an Accidental Revolutionary'' (abbreviated ''CatB'') is an essay, and later a book, by Eric S. Raymond on software engineering methods, based on his observations of the Linux k ...
and many other essays, maintainer of the
Jargon File
The Jargon File is a glossary and usage dictionary of slang used by computer programmers. The original Jargon File was a collection of terms from technical cultures such as the MIT AI Lab, the Stanford AI Lab (SAIL) and others of the old ARPANET A ...
(which was previously maintained by
Guy L. Steele, Jr.
Guy Lewis Steele Jr. (; born October 2, 1954) is an American computer scientist who has played an important role in designing and documenting several computer programming languages and technical standards.
Biography
Steele was born in Missouri ...
).
Within the computer programmer subculture of hackers, the term hacker is also used for a programmer who reaches a goal by employing a series of modifications to extend existing
code
In communications and information processing, code is a system of rules to convert information—such as a letter, word, sound, image, or gesture—into another form, sometimes shortened or secret, for communication through a communication ...
or resources. In this sense, it can have a negative connotation of using inelegant
kludges to accomplish programming tasks that are quick, but ugly, inelegant, difficult to extend, hard to maintain and inefficient. This derogatory form of the noun "
hack
Hack may refer to:
Arts, entertainment, and media Games
* ''Hack'' (Unix video game), a 1984 roguelike video game
* ''.hack'' (video game series), a series of video games by the multimedia franchise ''.hack''
Music
* ''Hack'' (album), a 199 ...
" derives from the everyday English sense "to cut or shape by or as if by crude or ruthless strokes"
erriam-Websterand is even used among users of the positive sense of "hacker" who produces "cool" or "neat" hacks. In other words, to "hack" at an original creation, as if with an axe, is to force-fit it into being usable for a task not intended by the original creator, and a "hacker" would be someone who does this habitually. (The original creator and the hacker may be the same person.) This usage is common in both programming, engineering and building. In programming, hacking in this sense appears to be tolerated and seen as a necessary compromise in many situations. Some argue that it should not be, due to this negative meaning; others argue that some kludges can, for all their ugliness and imperfection, still have "hack value".
In non-software engineering, the culture is less tolerant of unmaintainable solutions, even when intended to be temporary, and describing someone as a "hacker" might imply that they lack professionalism. In this sense, the term has no real positive connotations, except for the idea that the hacker is capable of doing modifications that allow a system to work in the short term, and so has some sort of marketable skills. However, there is always the understanding that a more skillful or technical logician could have produced successful modifications that would not be considered a "hack-job". The definition is similar to other, non-computer based uses of the term "hack-job". For instance, a professional modification of a production sports car into a racing machine would not be considered a hack-job, but a cobbled together backyard mechanic's result could be. Even though the outcome of a race of the two machines could not be assumed, a quick inspection would instantly reveal the difference in the level of professionalism of the designers. The adjective associated with hacker is "hackish" (see the
Jargon file
The Jargon File is a glossary and usage dictionary of slang used by computer programmers. The original Jargon File was a collection of terms from technical cultures such as the MIT AI Lab, the Stanford AI Lab (SAIL) and others of the old ARPANET A ...
).
In a very universal sense, hacker also means someone who makes things work beyond perceived limits in a clever way in general, without necessarily referring to computers, especially at MIT.
That is, people who apply the creative attitude of software hackers in fields other than computing. This includes even activities that predate computer hacking, for example
reality hackers or
urban spelunkers (exploring undocumented or unauthorized areas in buildings). One specific example is clever pranks traditionally perpetrated by MIT students, with the perpetrator being called hacker. For example, when MIT students surreptitiously put a fake police car atop the dome on MIT's Building 10, that was a hack in this sense, and the students involved were therefore hackers. Other types of hacking are
reality hackers,
wetware hackers ("hack your brain"), and
media hacker
In Internet activism, hacktivism, or hactivism (a portmanteau of ''hack'' and ''activism''), is the use of computer-based techniques such as hacking as a form of civil disobedience to promote a political agenda or social change. With roots in hack ...
s ("hack your reputation"). In a similar vein, a "hack" may refer to a
math
Mathematics is an area of knowledge that includes the topics of numbers, formulas and related structures, shapes and the spaces in which they are contained, and quantities and their changes. These topics are represented in modern mathematics ...
hack, that is, a clever solution to a mathematical problem. All of these uses have spread beyond MIT.
Home computing enthusiasts
In yet another context, a hacker is a computer hobbyist who pushes the limits of software or hardware. The home computer hacking subculture relates to the hobbyist home computing of the late 1970s, beginning with the availability of
MITS Altair
The Altair 8800 is a microcomputer designed in 1974 by MITS and based on the Intel 8080 CPU. Interest grew quickly after it was featured on the cover of the January 1975 issue of Popular Electronics and was sold by mail order through advertisemen ...
. An influential organization was the
Homebrew Computer Club. However, its roots go back further to
amateur radio
Amateur radio, also known as ham radio, is the use of the radio frequency spectrum for purposes of non-commercial exchange of messages, wireless experimentation, self-training, private recreation, radiosport, contesting, and emergency communic ...
enthusiasts. The amateur radio slang referred to creatively tinkering to improve performance as "hacking" already in the 1950s.
A large overlaps between hobbyist hackers and the programmer subculture hackers existed during the Homebrew Club's days, but the interests and values of both communities somewhat diverged. Today, the hobbyists focus on commercial
computer and video games
''Computer and Video Games'' (also known as ''CVG'', ''Computer & Video Games'', ''C&VG'', ''Computer + Video Games'', or ''C+VG'') was a UK-based video game magazine, published in its original form between 1981 and 2004. Its offshoot website ...
,
software cracking and exceptional computer programming (
demo scene). Also of interest to some members of this group is the modification of computer hardware and other electronic devices, see
modding.
Electronics hobbyists working on machines other than computers also fall into this category. This includes people who do simple modifications to
graphing calculators,
video game consoles, electronic
musical keyboards or other device (see
CueCat for a notorious example) to expose or add functionality to a device that was unintended for use by end users by the company who created it. A number of
techno musicians have modified 1980s-era
Casio SK-1 sampling keyboards to create unusual sounds by doing
circuit bending
Circuit bending is the creative, chance-based customization of the circuits within electronic devices such as low-voltage, battery-powered guitar effects, children's toys and digital synthesizers to create new musical or visual instruments and ...
: connecting wires to different leads of the integrated circuit chips. The results of these DIY experiments range from opening up previously inaccessible features that were part of the chip design to producing the strange, dis-harmonic digital tones that became part of the techno music style.
Companies take different attitudes towards such practices, ranging from open acceptance (such as
Texas Instruments for its graphing calculators and
Lego
Lego ( , ; stylized as LEGO) is a line of plastic construction toys that are manufactured by The Lego Group, a privately held company based in Billund, Denmark. The company's flagship product, Lego, consists of variously colored interlocking ...
for its
Lego Mindstorms robotics gear) to outright hostility (such as
Microsoft's attempts to lock out
Xbox hackers or the
DRM routines on
Blu-ray Disc
The Blu-ray Disc (BD), often known simply as Blu-ray, is a Digital media, digital optical disc data storage format. It was invented and developed in 2005 and released on June 20, 2006 worldwide. It is designed to supersede the DVD format, and c ...
players designed to sabotage compromised players.)
In this context, a "hack" refers to a
program
Program, programme, programmer, or programming may refer to:
Business and management
* Program management, the process of managing several related projects
* Time management
* Program, a part of planning
Arts and entertainment Audio
* Progra ...
that (sometimes illegally) modifies another program, often a video game, giving the user access to features otherwise inaccessible to them. As an example of this use, for
Palm OS users (until the 4th iteration of this
operating system), a "hack" refers to an extension of the operating system which provides additional functionality. Term also refers to those people who cheat on video games using special software. This can also refer to the
jailbreaking of
iPhones.
Hacker artists
Hacker artists create
art by hacking on
technology as an
artistic medium
Arts media is the material and tools used by an artist, composer or designer to create a work of art, for example, "pen and ink" where the pen is the tool and the ink is the material. Here is a list of types of art and the media used within tho ...
. This has extended the definition of the term and what it means to be a hacker. Such
artist
An artist is a person engaged in an activity related to creating art, practicing the arts, or demonstrating an art. The common usage in both everyday speech and academic discourse refers to a practitioner in the visual arts only. However, th ...
s may work with
graphics
Graphics () are visual images or designs on some surface, such as a wall, canvas, screen, paper, or stone, to inform, illustrate, or entertain. In contemporary usage, it includes a pictorial representation of data, as in design and manufacture ...
,
computer hardware
Computer hardware includes the physical parts of a computer, such as the computer case, case, central processing unit (CPU), Random-access memory, random access memory (RAM), Computer monitor, monitor, Computer mouse, mouse, Computer keyboard, ...
,
sculpture,
music and other
audio
Audio most commonly refers to sound, as it is transmitted in signal form. It may also refer to:
Sound
*Audio signal, an electrical representation of sound
*Audio frequency, a frequency in the audio spectrum
*Digital audio, representation of sound ...
,
animation
Animation is a method by which image, still figures are manipulated to appear as Motion picture, moving images. In traditional animation, images are drawn or painted by hand on transparent cel, celluloid sheets to be photographed and exhibited ...
,
video,
software,
simulations,
mathematics
Mathematics is an area of knowledge that includes the topics of numbers, formulas and related structures, shapes and the spaces in which they are contained, and quantities and their changes. These topics are represented in modern mathematics ...
, reactive
sensory
Sensory may refer to:
Biology
* Sensory ecology, how organisms obtain information about their environment
* Sensory neuron, nerve cell responsible for transmitting information about external stimuli
* Sensory perception, the process of acquiri ...
systems, text,
poetry,
literature, or any combination thereof.
Dartmouth College musician Larry Polansky states:
Another description is offered by Jenny Marketou:
A successful software and hardware hacker artist is
Mark Lottor
Mark may refer to:
Currency
* Bosnia and Herzegovina convertible mark, the currency of Bosnia and Herzegovina
* East German mark, the currency of the German Democratic Republic
* Estonian mark, the currency of Estonia between 1918 and 1927
* Fi ...
(mkl), who has created the 3-D light art projects entitled the
Cubatron, and the
Big Round Cubatron
Big or BIG may refer to:
* Big, of great size or degree
Film and television
* ''Big'' (film), a 1988 fantasy-comedy film starring Tom Hanks
* ''Big!'', a Discovery Channel television show
* ''Richard Hammond's Big'', a television show presente ...
. This art is made using custom computer technology, with specially designed
circuit boards and programming for
microprocessor chips to manipulate the
LED
A light-emitting diode (LED) is a semiconductor Electronics, device that Light#Light sources, emits light when Electric current, current flows through it. Electrons in the semiconductor recombine with electron holes, releasing energy i ...
lights.
Don Hopkins is a software hacker artist well known for his artistic cellular automata. This art, created by a
cellular automata computer program, generates objects which randomly bump into each other and in turn create more objects and designs, similar to a lava lamp, except that the parts change color and form through interaction. Hopkins Says:
Some hacker artists create art by writing computer code, and others, by developing hardware. Some create with existing software tools such as
Adobe Photoshop
Adobe Photoshop is a raster graphics editor developed and published by Adobe Inc. for Microsoft Windows, Windows and macOS. It was originally created in 1988 by Thomas Knoll, Thomas and John Knoll. Since then, the software has become the indu ...
or
GIMP
GIMP ( ; GNU Image Manipulation Program) is a free and open-source raster graphics editor used for image manipulation (retouching) and image editing, free-form drawing, transcoding between different image file formats, and more specialized task ...
.
The creative process of hacker artists can be more abstract than artists using non-technological media. For example,
mathematicians have produced visually stunning graphic presentations of
fractal
In mathematics, a fractal is a geometric shape containing detailed structure at arbitrarily small scales, usually having a fractal dimension strictly exceeding the topological dimension. Many fractals appear similar at various scales, as illu ...
s, which hackers have further enhanced, often producing detailed and intricate graphics and animations from simple mathematical formulas.
file:Bubbles2.gif, ''Bubbles'' was created using watercolors, then scanned into a computer. Colors were then manipulated using a software imaging tool
file:Sunrise-lile.gif, ''Sunrise'' was created using pen and ink, then scanned into a computer and colored with a software imaging tool
file:Hills7p.gif, ''Rolling Golden Hills of California'' was created using pencil, scanned, and then painted with a software imaging tool
file:Bransleys fern.png, ''Barnsley's fern
The Barnsley fern is a fractal named after the British mathematician Michael Barnsley who first described it in his book ''Fractals Everywhere''. '', a fractal fern computed using an iterated function system
In mathematics, iterated function systems (IFSs) are a method of constructing fractals; the resulting fractals are often self-similar. IFS fractals are more related to set theory than fractal geometry. They were introduced in 1981.
IFS fractals, ...
file:Animated fractal mountain.gif, A fractal that models the surface of a mountain
Art
*
Burning Man Festival
Burning Man is an event focused on community, art, self-expression, and self-reliance held annually in the western United States. The name of the event comes from its culminating ceremony: the symbolic burning of a large wooden effigy, referre ...
*
Computer art
*
Computer music
*
Digital art
*
Demoscene
*
Electronic art
*
Electronic art music
*
Electronica
Electronica is both a broad group of electronic-based music styles intended for listening rather than strictly for dancing and a music scene that started in the early 1990s in the United Kingdom. In the United States, the term is mostly used to r ...
*
Experiments in Art and Technology
*
Generative art
*
Internet art
upright=1.3, "Simple Net Art Diagram", a 1997 work by Michael Sarff and Tim Whidden
Internet art (also known as net art) is a form of new media art distributed via the Internet. This form of art circumvents the traditional dominance of the phys ...
*
Maker movement
*
Media art
New media art includes artworks designed and produced by means of electronic media technologies, comprising virtual art, computer graphics, computer animation, digital art, interactive art, sound art, Internet art, video games, robotics, 3D prin ...
*
Robotic art
*
Software art
Hacker art mentions
"Vector in Open Space"by Gerfried Stocker 1996.
Switch, JournalJun 14 1998.
"Tag – who's it?" by Ingrid Hein, July 16, 1998.
Linux Today "Playing the Open Source Game" by , Jul 5, 1999.
Resources by Subject – Art & Design, 2001.
SuperCollider Workshop / SeminarJoel Ryan describes collaboration with hacker artists of Silicon Valley. 21 March 2002
"Why Geeks Love Linux", Sept 2003.
Gesture and Response in Field-Based Performance by
Sha Xin Wei
Sha Xin Wei is a media philosopher and professor at the School of Arts, Media + Engineering in the Herberger Institute for Design and the Arts + Ira A. Fulton Schools of Engineering at Arizona State University. He has created ateliers such as the ...
& Satinder Gill, 2005.
Hackers, Who Are They"The Hackers Identity", October 2014.
See also
*
Cowboy coding
Cowboy coding is software development where programmers have autonomy over the development process. This includes control of the project's schedule, languages, algorithms, tools, frameworks and coding style. Typically, little to no coordination ...
: software development without the use of strict
software development methodologies
*
Demoscene
*
History of free software
In the 1950s and 1960s, computer operating software and compilers were delivered as a part of hardware purchases without separate fees. At the time, source code, the human-readable form of software, was generally distributed with the software p ...
*
Maker culture
The maker culture is a contemporary subculture representing a technology-based extension of DIY culture that intersects with hardware-oriented parts of hacker culture and revels in the creation of new devices as well as tinkering with existing on ...
*
Unix philosophy
References
Further reading
The
Jargon File
The Jargon File is a glossary and usage dictionary of slang used by computer programmers. The original Jargon File was a collection of terms from technical cultures such as the MIT AI Lab, the Stanford AI Lab (SAIL) and others of the old ARPANET A ...
has had a role in acculturating hackers since its origins in 1975. These academic and literary works helped shape the academic hacker subculture:
*
*
*
*
*
*
*
*
*
*
*
*
*
*Olson, Parmy. (05-14-2013). ''We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency.'' .
*Coleman, Gabriella. (Nov 4, 2014). ''Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous''. Verso Books. .
*Shantz, Jeff; Tomblin, Jordon (2014-11-28). ''Cyber Disobedience: Re://Presenting Online Anarchy''. John Hunt Publishing. .
External links
A Brief History of HackerdomHack, Hackers, and Hacking(see ''Appendix A'')
*
Gabriella Coleman
Enid Gabriella Coleman (usually known as Gabriella Coleman or Biella; born 1973) is an anthropologist, academic and author whose work focuses on cultures of hacking and online activism, particularly Anonymous. She previously held the Wolfe Ch ...
The Anthropology of HackersThe Atlantic, 2010.
*
Gabriella Coleman
Enid Gabriella Coleman (usually known as Gabriella Coleman or Biella; born 1973) is an anthropologist, academic and author whose work focuses on cultures of hacking and online activism, particularly Anonymous. She previously held the Wolfe Ch ...
Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymousat
Open Library
{{DEFAULTSORT:Hacker (Programmer Subculture)
Subcultures
Computing and society
Do it yourself
Hobbies
Culture