<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-8368499494901931477</atom:id><lastBuildDate>Fri, 01 Nov 2024 07:12:32 +0000</lastBuildDate><category>Definition</category><category>Hacker</category><category>Real hackers</category><category>World Wide Web</category><category>crackers</category><category>first time-sharing</category><category>minicomputers</category><category>networking</category><category>networking wizards</category><category>programmers</category><category>technical skills</category><category>wizards</category><title>Hack Attack</title><description></description><link>http://hack-1001tutor.blogspot.com/</link><managingEditor>noreply@blogger.com (1001tutor)</managingEditor><generator>Blogger</generator><openSearch:totalResults>1</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8368499494901931477.post-6724512483487599924</guid><pubDate>Fri, 26 Mar 2010 20:15:00 +0000</pubDate><atom:updated>2010-03-26T13:19:02.705-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">crackers</category><category domain="http://www.blogger.com/atom/ns#">Definition</category><category domain="http://www.blogger.com/atom/ns#">first time-sharing</category><category domain="http://www.blogger.com/atom/ns#">Hacker</category><category domain="http://www.blogger.com/atom/ns#">minicomputers</category><category domain="http://www.blogger.com/atom/ns#">networking</category><category domain="http://www.blogger.com/atom/ns#">networking wizards</category><category domain="http://www.blogger.com/atom/ns#">programmers</category><category domain="http://www.blogger.com/atom/ns#">Real hackers</category><category domain="http://www.blogger.com/atom/ns#">technical skills</category><category domain="http://www.blogger.com/atom/ns#">wizards</category><category domain="http://www.blogger.com/atom/ns#">World Wide Web</category><title>What is a Hacker?</title><description>Jargon File contains a number of definitions of the term &#39;hacker&#39;, most related to technical skills and enjoy solving problems and overcoming limits. If you want to know how a hacker, but only two are really relevant.&lt;br /&gt;&lt;br /&gt;There is a community, culture, expert programmers and networking wizards that traces its history back through decades for the first time-sharing minicomputers and the early ARPAnet experiments. The members of this culture originated the term &#39;hacker&#39;. Hackers built the Internet. Hackers made the Unix operating system it is today. Hackers run Usenet. Hackers make the World Wide Web works. If you are part of this culture, if you have contributed to these and other people in the know who you are and call you a hacker, you&#39;re a hacker.&lt;br /&gt;&lt;br /&gt;Hacker mentality is not confined to this software-hacker culture. There are people who apply the hacker attitude to other things like electronics or music - actually, you can find it at the highest level of science or art. Software hackers recognize these kindred spirits elsewhere and may call them &#39;hackers&#39; too - and some claim that the hacker nature is really independent of specific media hacker to work, but in this paper we will focus on the skills and attitudes software hackers, and the cultural traditions derived from the term &#39;hacker&#39;.&lt;br /&gt;&lt;br /&gt;There is another group of people who call themselves hackers loudly, but did not. These are people (mainly adolescent males) who get kicks out of breaking into computers and phreaking the phone system. Real hackers call these people crackers&#39; and want nothing to do with them. Real hackers mostly think crackers lazy, irresponsible and not very bright, and object security is not able to resolve the hacker made more than your car can Hotwire makes you a car engineer. Unfortunately, many journalists and writers cheated and used the word hacker &#39;to describe crackers, this does not affect real hackers end.&lt;br /&gt;&lt;br /&gt;The fundamental difference is this: hackers build things, crackers break.&lt;div class=&quot;blogger-post-footer&quot;&gt;http://feeds.feedburner.com/blogspot/XisT&lt;/div&gt;</description><link>http://hack-1001tutor.blogspot.com/2010/03/what-is-hacker.html</link><author>noreply@blogger.com (1001tutor)</author><thr:total>0</thr:total></item></channel></rss>