This decision further benefits from the fact that, prior to 1993, Stallman saw little need to insist on credit.

Some might view the decision to use GNU/Linux for later versions of the same operating system as arbitrary. I would like to point out that it was in no way a prerequisite for gaining Stallman"s cooperation in the making of this book. I came to it of my own accord, partly because of the operating system"s modular nature and the community surrounding it, and partly because of the apolitical nature of the Linux name. Given that this is a biography of Richard Stallman, it seemed inappropriate to define the operating system in apolitical terms.

In the final phases of the book, when it became clear that O"Reilly & a.s.sociates would be the book"s publisher, Stallman did make it a condition that I use "GNU/Linux" instead of Linux if O"Reilly expected him to provide promotional support for the book after publication. When informed of this, I relayed my earlier decision and left it up to Stallman to judge whether the resulting book met this condition or not.

At the time of this writing, I have no idea what Stallman"s judgment will be.

A similar situation surrounds the terms "free software"

and "open source." Again, I have opted for the more politically laden "free software" term when describing software programs that come with freely copyable and freely modifiable source code. Although more popular, I have chosen to use the term "open source" only when referring to groups and businesses that have championed its usage. But for a few instances, the terms are completely interchangeable, and in making this decision I have followed the advice of Christine Peterson, the person generally credited with coining the term. "The "free software" term should still be used in circ.u.mstances where it works better," Peterson writes.

"["Open source"] caught on mainly because a new term was greatly needed, not because it"s ideal."

Appendix B Hack, Hackers, and Hacking

To understand the full meaning of the word " hacker,"

it helps to examine the word"s etymology over the years.

The New Hacker Dictionary , an online compendium of software-programmer jargon, officially lists nine different connotations of the word "hack" and a similar number for "hacker." Then again, the same publication also includes an accompanying essay that quotes Phil Agre, an MIT hacker who warns readers not to be fooled by the word"s perceived flexibility. "Hack has only one meaning," argues Agre. "An extremely subtle and profound one which defies articulation."

Regardless of the width or narrowness of the definition, most modern hackers trace the word back to MIT, where the term bubbled up as popular item of student jargon in the early 1950s. In 1990 the MIT Museum put together a journal doc.u.menting the hacking phenomenon. According to the journal, students who attended the inst.i.tute during the fifties used the word "hack" the way a modern student might use the word "goof." Hanging a jalopy out a dormitory window was a "hack," but anything harsh or malicious-e.g., egging a rival dorm"s windows or defacing a campus statue-fell outside the bounds. Implicit within the definition of "hack" was a spirit of harmless, creative fun.

This spirit would inspire the word"s gerund form: "hacking." A 1950s student who spent the better part of the afternoon talking on the phone or dismantling a radio might describe the activity as "hacking." Again, a modern speaker would subst.i.tute the verb form of "goof"-"goofing" or "goofing off"-to describe the same activity.

As the 1950s progressed, the word "hack" acquired a sharper, more rebellious edge. The MIT of the 1950s was overly compet.i.tive, and hacking emerged as both a reaction to and extension of that compet.i.tive culture.

Goofs and pranks suddenly became a way to blow off steam, thumb one"s nose at campus administration, and indulge creative thinking and behavior stifled by the Inst.i.tute"s rigorous undergraduate curriculum. With its myriad hallways and underground steam tunnels, the Inst.i.tute offered plenty of exploration opportunities for the student undaunted by locked doors and "No Trespa.s.sing" signs. Students began to refer to their off-limits explorations as "tunnel hacking." Above ground, the campus phone system offered similar opportunities. Through casual experimentation and due diligence, students learned how to perform humorous tricks. Drawing inspiration from the more traditional pursuit of tunnel hacking, students quickly dubbed this new activity "phone hacking."

The combined emphasis on creative play and restriction-free exploration would serve as the basis for the future mutations of the hacking term. The first self-described computer hackers of the 1960s MIT campus originated from a late 1950s student group called the Tech Model Railroad Club. A tight clique within the club was the Signals and Power (S&P) Committee-the group behind the railroad club"s electrical circuitry system. The system was a sophisticated a.s.sortment of relays and switches similar to the kind that controlled the local campus phone system. To control it, a member of the group simply dialed in commands via a connected phone and watched the trains do his bidding.

The nascent electrical engineers responsible for building and maintaining this system saw their activity as similar in spirit to phone hacking. Adopting the hacking term, they began refining it even further. From the S&P hacker point of view, using one less relay to operate a particular stretch of track meant having one more relay for future play. Hacking subtly shifted from a synonym for idle play to a synonym for idle play that improved the overall performance or efficiency of the club"s railroad system at the same time. Soon S&P committee members proudly referred to the entire activity of improving and reshaping the track"s underlying circuitry as "hacking" and to the people who did it as "hackers."

Given their affinity for sophisticated electronics-not to mention the traditional MIT-student disregard for closed doors and "No Trespa.s.sing" signs-it didn"t take long before the hackers caught wind of a new machine on campus. Dubbed the TX-0, the machine was one of the first commercially marketed computers. By the end of the 1950s, the entire S&P clique had migrated en ma.s.se over to the TX-0 control room, bringing the spirit of creative play with them. The wide-open realm of computer programming would encourage yet another mutation in etymology. "To hack" no longer meant soldering unusual looking circuits, but cobbling together software programs with little regard to "official" methods or software-writing procedures. It also meant improving the efficiency and speed of already-existing programs that tended to hog up machine resources. True to the word"s roots, it also meant writing programs that served no other purpose than to amuse or entertain.

A cla.s.sic example of this expanded hacking definition is the game s.p.a.cewar, the first interactive video game.

Developed by MIT hackers in the early 1960s, s.p.a.cewar had all the traditional hacking definitions: it was goofy and random, serving little useful purpose other than providing a nightly distraction for the dozen or so hackers who delighted in playing it. From a software perspective, however, it was a monumental testament to innovation of programming skill. It was also completely free. Because hackers had built it for fun, they saw no reason to guard their creation, sharing it extensively with other programmers. By the end of the 1960s, s.p.a.cewar had become a favorite diversion for mainframe programmers around the world.

This notion of collective innovation and communal software ownership distanced the act of computer hacking in the 1960s from the tunnel hacking and phone hacking of the 1950s. The latter pursuits tended to be solo or small-group activities. Tunnel and phone hackers relied heavily on campus lore, but the off-limits nature of their activity discouraged the open circulation of new discoveries. Computer hackers, on the other hand, did their work amid a scientific field biased toward collaboration and the rewarding of innovation. Hackers and "official" computer scientists weren"t always the best of allies, but in the rapid evolution of the field, the two species of computer programmer evolved a cooperative-some might say symbiotic-relationship.

It is a testament to the original computer hackers"

prodigious skill that later programmers, including Richard M. Stallman, aspired to wear the same hacker mantle. By the mid to late 1970s, the term "hacker" had acquired elite connotations. In a general sense, a computer hacker was any person who wrote software code for the sake of writing software code. In the particular sense, however, it was a testament to programming skill. Like the term "artist," the meaning carried tribal overtones. To describe a fellow programmer as hacker was a sign of respect. To describe oneself as a hacker was a sign of immense personal confidence. Either way, the original looseness of the computer-hacker appellation diminished as computers became more common.

As the definition tightened, "computer" hacking acquired additional semantic overtones. To be a hacker, a person had to do more than write interesting software; a person had to belong to the hacker "culture" and honor its traditions the same way a medieval wine maker might pledge membership to a vintners" guild. The social structure wasn"t as rigidly outlined as that of a guild, but hackers at elite inst.i.tutions such as MIT, Stanford, and Carnegie Mellon began to speak openly of a "hacker ethic": the yet-unwritten rules that governed a hacker"s day-to-day behavior. In the 1984 book Hackers, author Steven Levy, after much research and consultation, codified the hacker ethic as five core hacker tenets.

In many ways, the core tenets listed by Levy continue to define the culture of computer hacking. Still, the guild-like image of the hacker community was undermined by the overwhelmingly populist bias of the software industry. By the early 1980s, computers were popping up everywhere, and programmers who once would have had to travel to top-rank inst.i.tutions or businesses just to gain access to a machine suddenly had the ability to rub elbows with major-league hackers via the ARPAnet.

The more these programmers rubbed elbows, the more they began to appropriate the anarchic philosophies of the hacker culture in places like MIT. Lost within the cultural transfer, however, was the native MIT cultural taboo against malicious behavior. As younger programmers began employing their computer skills to harmful ends-creating and disseminating computer viruses, breaking into military computer systems, deliberately causing machines such as MIT Oz, a popular ARPAnet gateway, to crash-the term "hacker" acquired a punk, nihilistic edge. When police and businesses began tracing computer-related crimes back to a few renegade programmers who cited convenient portions of the hacking ethic in defense of their activities, the word "hacker" began appearing in newspapers and magazine stories in a negative light. Although books like Hackers did much to doc.u.ment the original spirit of exploration that gave rise to the hacking culture, for most news reporters, "computer hacker" became a synonym for "electronic burglar."

Although hackers have railed against this perceived misusage for nearly two decades, the term"s rebellious connotations dating back to the 1950s make it hard to discern the 15-year-old writing software programs that circ.u.mvent modern encryption programs from the 1960s college student, picking locks and battering down doors to gain access to the lone, office computer terminal.

One person"s creative subversion of authority is another person"s security headache, after all. Even so, the central taboo against malicious or deliberately harmful behavior remains strong enough that most hackers prefer to use the term " cracker"-i.e., a person who deliberately cracks a computer security system to steal or vandalize data-to describe the subset of hackers who apply their computing skills maliciously.

This central taboo against maliciousness remains the primary cultural link between the notion of hacking in the early 21st century and hacking in the 1950s. It is important to note that, as the idea of computer hacking has evolved over the last four decades, the original notion of hacking-i.e., performing pranks or exploring underground tunnels-remains intact. In the fall of 2000, the MIT Museum paid tradition to the Inst.i.tute"s age-old hacking tradition with a dedicated exhibit, the Hall of Hacks. The exhibit includes a number of photographs dating back to the 1920s, including one involving a mock police cruiser. In 1993, students paid homage to the original MIT notion of hacking by placing the same police cruiser, lights flashing, atop the Inst.i.tute"s main dome. The cruiser"s vanity license plate read IHTFP, a popular MIT acronym with many meanings. The most noteworthy version, itself dating back to the pressure-filled world of MIT student life in the 1950s, is "I hate this f.u.c.king place." In 1990, however, the Museum used the acronym as a basis for a journal on the history of hacks. t.i.tled, The Inst.i.tute for Hacks Tomfoolery and Pranks, the journal offers an adept summary of the hacking.

"In the culture of hacking, an elegant, simple creation is as highly valued as it is in pure science," writes Boston Globe reporter Randolph Ryan in a 1993 article attached to the police car exhibit. "A Hack differs from the ordinary college prank in that the event usually requires careful planning, engineering and finesse, and has an underlying wit and inventiveness,"

Ryan writes. "The unwritten rule holds that a hack should be good-natured, non-destructive and safe. In fact, hackers sometimes a.s.sist in dismantling their own handiwork."

The urge to confine the culture of computer hacking within the same ethical boundaries is well-meaning but impossible. Although most software hacks aspire to the same spirit of elegance and simplicity, the software medium offers less chance for reversibility.

Dismantling a police cruiser is easy compared with dismantling an idea, especially an idea whose time has come. Hence the growing distinction between "black hat"

and "white hat"-i.e., hackers who turn new ideas toward destructive, malicious ends versus hackers who turn new ideas toward positive or, at the very least, informative ends.

Once a vague item of obscure student jargon, the word "hacker" has become a linguistic billiard ball, subject to political spin and ethical nuances. Perhaps this is why so many hackers and journalists enjoy using it.

Where that ball bounces next, however, is anybody"s guess.

Appendix C GNU Free Doc.u.mentation License (GFDL)

GNU Free Doc.u.mentation License Version 1.1, March 2000 Copyright (C) 2000 Free Software Foundation, Inc. 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA Everyone is permitted to copy and distribute verbatim copies of this license doc.u.ment, but changing it is not allowed. PREAMBLE The purpose of this License is to make a manual, textbook, or other written doc.u.ment "free" in the sense of freedom: to a.s.sure everyone the effective freedom to copy and redistribute it, with or without modifying it, either commercially or noncommercially. Secondarily, this License preserves for the author and publisher a way to get credit for their work, while not being considered responsible for modifications made by others.

This License is a kind of "copyleft," which means that derivative works of the doc.u.ment must themselves be free in the same sense. It complements the GNU General Public License, which is a copyleft license designed for free software.

We have designed this License in order to use it for manuals for free software, because free software needs free doc.u.mentation: a free program should come with manuals providing the same freedoms that the software does. But this License is not limited to software manuals; it can be used for any textual work, regardless of subject matter or whether it is published as a printed book. We recommend this License princ.i.p.ally for works whose purpose is instruction or reference. APPLICABILITY AND DEFINITIONS This License applies to any manual or other work that contains a notice placed by the copyright holder saying it can be distributed under the terms of this License. The "Doc.u.ment", below, refers to any such manual or work.

Any member of the public is a licensee, and is addressed as "you."

A "Modified Version" of the Doc.u.ment means any work containing the Doc.u.ment or a portion of it, either copied verbatim, or with modifications and/or translated into another language.

A "Secondary Section" is a named appendix or a front-matter section of the Doc.u.ment that deals exclusively with the relationship of the publishers or authors of the Doc.u.ment to the Doc.u.ment"s overall subject (or to related matters) and contains nothing that could fall directly within that overall subject.

(For example, if the Doc.u.ment is in part a textbook of mathematics, a Secondary Section may not explain any mathematics.) The relationship could be a matter of historical connection with the subject or with related matters, or of legal, commercial, philosophical, ethical or political position regarding them.

The "Invariant Sections" are certain Secondary Sections whose t.i.tles are designated, as being those of Invariant Sections, in the notice that says that the Doc.u.ment is released under this License.

The "Cover Texts" are certain short pa.s.sages of text that are listed, as Front-Cover Texts or Back-Cover Texts, in the notice that says that the Doc.u.ment is released under this License.

A "Transparent" copy of the Doc.u.ment means a machine-readable copy, represented in a format whose specification is available to the general public, whose contents can be viewed and edited directly and straightforwardly with generic text editors or (for images composed of pixels) generic paint programs or (for drawings) some widely available drawing editor, and that is suitable for input to text formatters or for automatic translation to a variety of formats suitable for input to text formatters. A copy made in an otherwise Transparent file format whose markup has been designed to thwart or discourage subsequent modification by readers is not Transparent. A copy that is not "Transparent" is called "Opaque."

Examples of suitable formats for Transparent copies include plain ASCII without markup, Texinfo input format, LaTeX input format, SGML or XML using a publicly available DTD, and standard-conforming simple HTML designed for human modification. Opaque formats include PostScript, PDF, proprietary formats that can be read and edited only by proprietary word processors, SGML or XML for which the DTD and/or processing tools are not generally available, and the machine-generated HTML produced by some word processors for output purposes only.

The "t.i.tle Page" means, for a printed book, the t.i.tle page itself, plus such following pages as are needed to hold, legibly, the material this License requires to appear in the t.i.tle page. For works in formats which do not have any t.i.tle page as such, "t.i.tle Page" means the text near the most prominent appearance of the work"s t.i.tle, preceding the beginning of the body of the text.

VERBATIM COPYING You may copy and distribute the Doc.u.ment in any medium, either commercially or noncommercially, provided that this License, the copyright notices, and the license notice saying this License applies to the Doc.u.ment are reproduced in all copies, and that you add no other conditions whatsoever to those of this License. You may not use technical measures to obstruct or control the reading or further copying of the copies you make or distribute. However, you may accept compensation in exchange for copies. If you distribute a large enough number of copies you must also follow the conditions in section 3.

You may also lend copies, under the same conditions stated above, and you may publicly display copies.

COPYING IN QUANt.i.tY If you publish printed copies of the Doc.u.ment numbering more than 100, and the Doc.u.ment"s license notice requires Cover Texts, you must enclose the copies in covers that carry, clearly and legibly, all these Cover Texts: Front-Cover Texts on the front cover, and Back-Cover Texts on the back cover. Both covers must also clearly and legibly identify you as the publisher of these copies. The front cover must present the full t.i.tle with all words of the t.i.tle equally prominent and visible. You may add other material on the covers in addition. Copying with changes limited to the covers, as long as they preserve the t.i.tle of the Doc.u.ment and satisfy these conditions, can be treated as verbatim copying in other respects.

If the required texts for either cover are too voluminous to fit legibly, you should put the first ones listed (as many as fit reasonably) on the actual cover, and continue the rest onto adjacent pages.

If you publish or distribute Opaque copies of the Doc.u.ment numbering more than 100, you must either include a machine-readable Transparent copy along with each Opaque copy, or state in or with each Opaque copy a publicly-accessible computer-network location containing a complete Transparent copy of the Doc.u.ment, free of added material, which the general network-using public has access to download anonymously at no charge using public-standard network protocols. If you use the latter option, you must take reasonably prudent steps, when you begin distribution of Opaque copies in quant.i.ty, to ensure that this Transparent copy will remain thus accessible at the stated location until at least one year after the last time you distribute an Opaque copy (directly or through your agents or retailers) of that edition to the public.

It is requested, but not required, that you contact the authors of the Doc.u.ment well before redistributing any large number of copies, to give them a chance to provide you with an updated version of the Doc.u.ment.

MODIFICATIONS You may copy and distribute a Modified Version of the Doc.u.ment under the conditions of sections 2 and 3 above, provided that you release the Modified Version under precisely this License, with the Modified Version filling the role of the Doc.u.ment, thus licensing distribution and modification of the Modified Version to whoever possesses a copy of it. In addition, you must do these things in the Modified Version:

1. Use in the t.i.tle Page (and on the covers, if any) a t.i.tle distinct from that of the Doc.u.ment, and from those of previous versions (which should, if there were any, be listed in the History section of the Doc.u.ment).

You may use the same t.i.tle as a previous version if the original publisher of that version gives permission.

2. List on the t.i.tle Page, as authors, one or more persons or ent.i.ties responsible for authorship of the modifications in the Modified Version, together with at least five of the princ.i.p.al authors of the Doc.u.ment (all of its princ.i.p.al authors, if it has less than five).

3. State on the t.i.tle page the name of the publisher of the Modified Version, as the publisher.

© 2024 www.topnovel.cc