First, the hacker loses the ice-cold most pure freedom spirit of PC World in the paradise, It is hacker's spirit. Those have interests purpose , help each other hacker culture that form for interest, It is the origin of the free strength. In unreal to take on the corner of cyberspace, live in a group of odd persons while being long. Among legend, they with dishevelled hair and a dirty face, look wood receive, Blood red eyes always emit the unusual splendor at the time of staring at the screen of the computer, The people our media spoilt and call them hackers( Hacker). This group of people is superb, move about freely and quickly in one's own manor , but seldom exposed to the external world, As to most people among them, external world know " network name" of them without knowing the people real appearance just. Recently, this group hide in 0 becoming global focus of media with batman in the 1 world suddenly. They have two sets of faces in the legends of the media, one set is that one group specialize in and destroy, Network killer making people frightened; It is loyal to maintain network world free equal chivalrous person while being chivalrous while being competent if another is but. They wander up and down social lonely community between being" chivalrous " in" evil spirit".
Refer to hacker the wording , can't help and mention culture, serving of friend,. Common people friend guest clan of impression, it is that kind that linger on and in New York Queens block , shave" the strange very beginning", Face wipe varicoloured, conduct unusual, faith peculiar first fellow. Friend guest clan except that it is special in appearance, they have one's own unique opinions, They are the push people of the counterculture, discontended with common customs, do not like the morals to be fettered , Stick to one's old way. They consider as with realistic society antipathetic weird clan, Beijing native language name drift along the son, Shanghai native language is named the tramp, a bit more pleasant one is named" a generation of the scar".
U.S.A. in the 1970s, these have the same different to concentrate in groups on ordinary person friend serving clan of thought, . Some people of them, fight, take drug. Real heterodoxy cultural complex and town scoundrel confuse together, can not tell it each other, Here multiply prevailing thing after the one year, but they oneself has at all been faded from memory . They have theory summarize, some release of mood mostly social morals wind vane that culture changed , A lot of people of them move towards the extreme, become and degenerate a generation.
" Cyberpunk"( serving, friend of network,) that Markoff write jointly, John of &,, Hafnet of Katie, of the one book, describe hacker and friend habits and acquired characteristics that serving similar to in detail. The hacker clan has a characteristic similar to friend's guest clan too, in stranger's view, They unique weird( because common people impossible to take more than ten hours, Sit in front of computer studying day and night), on people exchanges, live in uninhabited dark bat of area strange and chivalrous seldom, Black coat and environment formate an organic whole, can not tell fuzzy and clearly.
Hacker one word it thinks to be hateful invador masses, worth that we study. "Hack the word have cut down, purpose of dismemberment arbitrarily , add word tail - person that form cut down arbitrarily, later generation of er,. "Just simple from literal to come and treat this word of Hacker, come down to mislead people's understanding of the hacker to misunderstand for a long time, Especially the translated name of Chinese, mix the mysterious veil for these people even more. Cyberpunk translate betray for computer guest is further darker the hacker revolts, the impression destroyed, In fact, though hacker individual character rebel against, represent purpose that they have for destroy at all. It's a pity we new noun no can express these for crowd that computer present freely accurate too now, Have to hope that people can find out about the hacker's existence value slowly . Real hacker, like exploring the systematic detail, studying latest technology and expansion one's own ability , As to an light part of essential computer general knowledges that common people study, What they practise and have is real computer knowledge and system core, though they may not be really top procedure past masters , But in what they pay close attention to, there is not any procedure past master that can be equal to them. This group fond of and design program fanatic one's share, like the technological challenge to be better than the discussion of the theory, Often write the exquisite computer procedure , but never consider business application. Have a group of people too in them, admit obstinatly that" the world of Internet, the information is equal", Invade various kinds of websites wantonly . The same as the friend guest, frequently, it is the ruffian in the Cyberspace who people can not tell, Who is the real hacker. Have" the evil spirit" " chivalrously", but the hacker's typical characteristic .
Real computer hacker in the world in the face of commercial one generation that civilization lose information, But because long self-imposed space in network, society brand will merciless to carve at their forehead ruffian, In the environment that they are not being understood , recreates by oneself, nearly have no time to go out of their skies. Hacker ordinary programmer definitely, one programmer no matter how high it will be competence of him, If he just regards it as the means to make a living, a kind of means of sending of boring time while going to work to programme, Name entitled hacker of the quilt that he can't forever Claim. Hacker most original characteristic to challenge to commercialized software world. Computer and procedure hacker a part of life, but not one hateful acquisition prerequisite of work. U.S.A. most famous hacker in him when arresting Kevin( he invade telephone system, follow FBI instead, make a great stir), The once crazy computer which protected him, he said: "Don't touch her , she is bleeding ! "
Most early hacker is world born in computer, evolve from telephone of U.S.A. to fly to serving( Phreaker) hacker most early embryonic form the seventies. All of us know telephone of U.S.A. network very developed, but in era that the PC had not born yet at that time, Seeing through the developed telephone system, it is a very attractive activity to talk to the person from all parts, Just as white board BBS of electron later. If in the vast area of U.S.A., in order to can meet with the person having the same habit above line from all parts , Some player to master telephone system begin and study how avoid control of telephone operator, Let oneself act on one's own, freer even more in the activity on the line of telephone. This can be regarded as the network free rising of now too. They do not hope to be interfered , see through the blue box( Blue Box), they can roam the whole world whenever and wherever possible , Do not fail in our present Internet at all. Famous once by a report of magazine Jobs, president of Apple,, Have made the blue box by oneself, phone amusement to all parts of the world. Certainly, Jobs changed one's profession and developed the apple computer , found Apple later on, Needn't take risks for some telephone rate of the province again.
Whole Hacker development of culture to regard artificial intelligence laboratory of MIT as the centre, But Stanford University artificial intelligence laboratory( abbreviate SAIL as( abbreviated as CMU). Three large-scale information science research center and artificial intelligence authority of field, Gather the elites from all parts of the world, no matter on technology or on the spiritual level, Culture have high contribution extremely to hacker.
Another hacker important strategic place Palo Alto Research Center of Company, PARC of XEROX,. From 1970 initial stages to this more than ten years of 1980 middle period, PARC presents the surprising break-through and invents constantly, No matter quality or quantity, software or hardware. Modern mouse - window - icon software of style invent there .
Countryside in New Jersey, another whiff of mysterious strength invades hacker's society actively, Swept across the tradition of the whole PDP-10 at last. It was born in 1969, it was equally that year when ARPANET was established, A young man Ken Thompson in AT&T Bell Laboratory has invented a kind of new operating system --Thorough whole computer world Unix of name later.
Ken Thompson like Multics very much, because he write one game Star Travel have computer can play, find set of scrap machine PDP-7s on the laboratory, Write one operating system is should systematic to have and copy from Multics come his own ideas too on design. He Kernighan, Brian of colleague, like the system very much , laugh at Ken Thompson say: "System that you write fine and very disappointing, the universe fragile to ask Unics charged. "( Unics pronounces like the eunuch's English Eunuchs), in this way, the system of Thompson calls this name , Change and, let Unix only. His colleague Dennis Ritchie, has invented a new computer language C language, Then he and Thompson rewrite with Unix that assembler language write once originally with C. The design principle of C is handy, very free elasticity is very old. UNIX combines and becomes a entity with C perfectly in this way, C and Unix become leadings factor of world of Internet quickly.
If we little to look hacker contribution in" digital world" now, should really review the history carefully , A dogged name appears at the moment of every historic turning --" hacker"! Business software make one software company become rich suddenly and violently, appear rich really but huge enterprise of the enemy state, But all these have not really want for the hackers . Someone think hacker civilization begins to lose soil that can really be multiplied, Real reputation of hacker begin and substitute for some systematic invador, people begin forget those can oneself show whole operating system software real hacker gradually. When everybody thinks that hacker's culture collapses, the miracle has appeared again, Hacker civilization does not become feeble and die, on the contrary, in one ocean of business software, Emerge suddenly . Because that is cultural lifeblood of human life and growth in nature.
One the beginning, one pessimistic observer write articles and point out reason think legend story of UNIX have hacker's civilization to go bankrupt with him together already. A lot of people predict , UNIX will die within June from then on. They clear UNIX commercialization for one year, make freedom step UNIX dream of platform end in failure very. What UNIX promise step platform portability, lose of bickering ceaselessly between a dozen UNIX edition that big company have specially, One perfect operating system become to roll messy and rough many kinds of edition finally, Should say that it is a great tragedy on a human civilized history in this. Among exclusive software society," centralization of state power system, cathedral" like Microsoft the mode of production succeeds only. That piece people of era believe technological individualistic heroism era of world already been finished pessimistic, The industry of the software and developing internet will be arranged by huges enterprise like Microsoft gradually , Have" Zuro" again, world world of Julius Constantine, computer civilization will enter dark kingdom era . The hacker has already died, does not pay the existence in freedom.
One UNIX hacker of generation seem getting approaching old age, basic necessities of life full( Berkeley computer science seminar lose oneself fund in 1994). These it is one that restrain era that pigeonhole. Commercial result of UNIX that have specially prove so heavy so blind inappropriate then, So that Microsoft can snatch away the space that they survived with second- class Windows of technology that, Take away their solid food. Fortunately, in the news report invisible place or even most invisibles place of hacker, One brand-new hacker culture suck INTERNET rain and dew , begin to grow doggedly greedy, In the era, one Oedipus of destiny of bringing etc. in the corner of the network world in software kingdom, In to send out low lowland shout in being shady and cool wing. Finally, success of what culture the adopt one all new direction reach dream.
When declining day by day, American senior reporter Steven Levy of Newsweek finish the famous the book ' hacker's biography ' in hacker culture, Put forth effort to introduce a personage in the book: The story of Richard M. Stallman( RMS), he is a laboratory leader of MIT artificial intelligence, firmly object to the research results commercialization of the laboratory . He is a strong member among the societies of the business software, will never drift with the tide, set up new hacker's culture. Even so, the book ' hacker's biography ' says , Stallman may be a final hacker. Fortunately, Levy is not right. Later, I consulted Levy specially , he explained his statement in detail to me for this , Anyway, the hacker has not died . Have place of Internet, have they soil of life and growth in nature, a kind of brand-new freedom ideal is waiting .
Typical hacker's doctrine. Have GNU appear, have epoch-making Stallman, paranoiac of personage, appear, perhaps world of hacker can with serving the same friend have, A eternal one type and lose a generation of label seal Tibet forever, Stallman is world dark dose of hacker. Whether make hacker unable to surmount he" think I so I in" doctrine not spiritual not personal,it is hacker" piece die in" essence doctrine not technological take to human society of, Let spirit of hacker scratch oppressive computer constraint of space-time, sky in business society agitate blow splendid flame.
In one long business software prosperous time very, a lot of people think " hacker spirit has die already! "But later on fact prove so long as mankind help each other natural instincts of freedom change, Hacker spirit has no end forever . Though Linus create LINUX, become most powerful software personage, soul of world,, world of software, following Bill and Gates, But the same, have Stallman theory and leadership of spirit, Linus achievement of thought can only hacker a legend of world, Have essential difference with Kevin · Mick Nick , go and tear layers of layers of smoke screen of kingdom, Microsoft of Gates,, Let the sunshine of freedom go back to the software world of the overcast calabash shell serving as a dipper again.
Hacker conscientious between consciousness and hacker when colliding independent spiritual theory, The great miracle was born .
That is a democratic kingdom against the business software --Open the source code in the world.
Writing the space of this text , just have an opportunity to chat with president Lei Jun of Golden Mountain Company. We when talk about to the technological field to innovate, he mention unique idea very. Commercial company in scale nature, the cost of technological innovation is too high. A innovation of technology, is several dozen technological domains are standing behind one's back, Once fail, impact on whole company's development very big, general commercial company of scale can not finish such an innovative course . We talk about arrive, why Napster can in Microsoft research institute, IBM research institute so when appearing rich place of financial support, We find amateurish research supported by interest is whole power that technology advances , computer of world, in surprise. Research of" spare time" these zero try of cost, can produce among thousands upon thousands persons , So long as there is a chance, they may become the new world master . Financial resources of Microsoft can buy all software companies , but have no idea to buy the freedom software at all , It is even only Linux. Technology the urge and it downs to be invisible boundless ocean of" people's war" totally in free soul, Microsoft traditional tactics that" defeat he buy he" lose efficiency completely," in three out-of-bounds old Sun" a little, Feeling on in the five elements, how me it will be you". PC World, world impossible to have hacker spirit Internet have, and when openning the computer gate with a loud crash China, Begin to demonstrate this scene again ……作者: 雪狐 时间: 2003-9-6 08:11 标题: 黑色海岸线第四期英文文章