Home > Topic > hacker
1 " Google and Apple offer the image of a pseudo-commons to Internet users. That image recalls Nick Dyer-Whiteford's claim that, in light of the structural failures of neoliberal policies, capital could " turn to a 'Plan B', in which limited versions of commons, pollution trading schemes, community development and open-source and file-sharing practices are introduced as subordinate aspects of a capitalist economy, where voluntary cooperation subsidizes profit. One can think here of how Web 2.0 re-appropriates many of the innovations of radical digital activists, and converts them into a source of rent." Indeed, with the rise of the trademarked Digital Commons software platform and with the proliferation of university-based digital and media commons (which are typically limited to fee-paying and/or employed university community members), the very concept of the digital commons appears to be one of these reappropriations. But if, as part of what James Boyle describes as the " Second Closure Movement," this very rhetorical move signals the temporary defeats of the after-globalization and radical hacker movements that claimed the language of the commons, perhaps the advocacy for ownership of digital wares (or at least a form of unalienable, absolute possession, whether individual or communal) would provide a strategic ballast against the proprietary control of large swathes of information by apparently benevolent corporations and institutions. While still dangling in mid-air, the information commodity's consumption might thereby be placed more solidly on common ground. "
2 " Unix is not so much a product as it is a painstakingly compiled oral history of the hacker subculture. It is our Gilgamesh epic: a living body of narrative that many people know by heart, and tell over and over again—making their own personal embellishments whenever it strikes their fancy. The bad embellishments are shouted down, the good ones picked up by others, polished, improved, and, over time, incorporated into the story. […] Thus Unix has slowly accreted around a simple kernel and acquired a kind of complexity and asymmetry about it that is organic, like the roots of a tree, or the branchings of a coronary artery. Understanding it is more like anatomy than physics. "
― Neal Stephenson
3 " If you are a good hacker everybody knows you, But if you are a great hacker nobody knows you. "
4 " I'm getting a daily email from Microsoft which I have been ignoring that states a hacker is trying to access my account. As far as the Microsoft account goes, the hacker can have it...along with all of the nasty Windows 10 upgrade problems! "
― Steven Magee
5 " If Metias joined the Patriots, he'd be a Hacker too. If he were alive. "
― Marie Lu , Prodigy (Legend, #2)
6 " While the Texas prison officials remained in the dark about what was going on, they were fortunate that William and Danny had benign motives. Imagine what havoc the two might have caused; it would have been child's play for these guys to develop a scheme for obtaining money or property from unsuspecting victims. The Internet had become their university and playground. Learning how to run scams against individuals or break in to corporate sites would have been a cinch; teenagers and preteens learn these methods every day from the hacker sites and elsewhere on the Web. And as prisoners, Danny and William had all the time in the world.Maybe there's a lesson here: Two convicted murderers, but that didn't mean they were scum, rotten to the core. They were cheaters who hacked their way onto the Internet illegally, but that didn't mean they were willing to victimize innocent people or naively insecure companies. "
― Kevin D. Mitnick , The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
7 " The guardians of your company's cyber security should be encouraged to network within the industry to swap information on the latest hacker tricks and most effective defenses "
8 " It's not enough to have a hacker culture anymore. You have to have a design culture, too. "
9 " I wasn't a hacker for the money, and it wasn't to cause damage. "
10 " A critical factor in its success was that the X developers were willing to give the sources away for free in accordance with the hacker ethic, and able to distribute them over the Internet. "