1、黑客道简史黑客道简史 一、早期的黑客时间: 2007-10-21阅读: 608次 整理: 华西安全网作者:埃里克斯蒂芬雷蒙(Eric Steven Raymond)【著】译者:刘安辙(Angelo Liu)【译】原文链接:http:/catb.org/esr/writings/hacker-history/hacker-history-5.html1. TranslationsRussian http:/www.kazan.lug.ru/articles/esr/hacker-hist.html2. Prologue: The Real ProgrammersIn the beginning,
2、 there were Real Programmers. Thats not what they called themselves. They didnt call themselves hackers, either, or anything in particular; the sobriquet Real Programmer wasnt coined until after 1980, retrospectively by one of their own. But from 1945 onward, the technology of computing attracted ma
3、ny of the worlds brightest and most creative minds. From Eckert & Mauchlys first ENIAC computer onward there was a more or less continuous and self-conscious technical culture of enthusiast programmers, people who built and played with software for fun. The Real Programmers typically came out of eng
4、ineering or physics backgrounds. They were often amateur-radio hobbyists. They wore white socks and polyester shirts and ties and thick glasses and coded in machine language and assembler and FORTRAN and half a dozen ancient languages now forgotten. From the end of World War Two to the early 1970s,
5、in the great days of batch processing and the big iron mainframes, the Real Programmers were the dominant technical culture in computing. A few pieces of revered hacker folklore date from this era, including various lists of Murphys Laws and the mock-German Blinkenlights poster that still graces man
6、y computer rooms. Some people who grew up in the Real Programmer culture remained active into the 1990s. Seymour Cray, designer of the Cray line of supercomputers, was among the greatest. He is said once to have toggled an entire operating system of his own design into a computer of his own design t
7、hrough its front-panel switches. In octal. Without an error. And it worked. Real Programmer macho supremo. The Real Programmer culture, though, was heavily associated with batch (and especially batch scientific) computing. It was eventually eclipsed by the rise of interactive computing, the universi
8、ties, and the networks. These gave birth to another engineering tradition that, eventually, would evolve into todays open-source hacker culture. 3. The Early HackersThe beginnings of the hacker culture as we know it today can be conveniently dated to 1961, the year MIT acquired the first PDP-1. The
9、Signals and Power committee of MITs Tech Model Railroad Club adopted the machine as their favorite tech-toy and invented programming tools, slang, and an entire surrounding culture that is still recognizably with us today. These early years have been examined in the first part of Steven Levys book H
10、ackers Levy . MITs computer culture seems to have been the first to adopt the term hacker. The Tech Model Railroad Clubs hackers became the nucleus of MITs Artificial Intelligence Laboratory, the worlds leading center of AI research into the early 1980s. Their influence was spread far wider after 19
11、69, the first year of the ARPANET. The ARPANET was the first transcontinental, high-speed computer network. It was built by the Defense Department as an experiment in digital communications, but grew to link together hundreds of universities and defense contractors and research laboratories. It enab
12、led researchers everywhere to exchange information with unprecedented speed and flexibility, giving a huge boost to collaborative work and tremendously increasing both the pace and intensity of technological advance. But the ARPANET did something else as well. Its electronic highways brought togethe
13、r hackers all over the U.S. in a critical mass; instead of remaining in isolated small groups each developing their own ephemeral local cultures, they discovered (or re-invented) themselves as a networked tribe. The first intentional artifacts of the hacker culture - the first slang lists, the first
14、 satires, the first self-conscious discussions of the hacker ethic - all propagated on the ARPANET in its early years. In particular, the first version of the Jargon File developed as a cross-net collaboration during 1973-1975. This slang dictionary became one of the cultures defining documents. It
15、was eventually published as The Hackers Dictionary in 1983; that first version is out of print, but a revised and expanded version is New Hackers Dictionary Raymond . Hackerdom flowered at the universities connected to the net, especially (though not exclusively) in their computer science department
16、s. MITs AI Lab was first among equals from the late 1960s. But Stanford Universitys Artificial Intelligence Laboratory (SAIL) and Carnegie-Mellon University (CMU) became nearly as important. All were thriving centers of computer science and AI research. All attracted bright people who contributed gr
17、eat things to the hacker culture, on both the technical and folkloric levels. To understand what came later, though, we need to take another look at the computers themselves; because the Labs rise and its eventual fall were both driven by waves of change in computing technology. Since the days of th
18、e PDP-1, hackerdoms fortunes had been woven together with Digital Equipment Corporations PDP series of minicomputers. DEC pioneered commercial interactive computing and time-sharing operating systems. Because their machines were flexible, powerful, and relatively cheap for the era, lots of universit
19、ies bought them. Cheap timesharing was the medium the hacker culture grew in, and for most of its lifespan the ARPANET was primarily a network of DEC machines. The most important of these was the PDP-10, first released in 1967. The 10 remained hackerdoms favorite machine for almost fifteen years; TO
20、PS-10 (DECs operating system for the machine) and MACRO-10 (its assembler) are still remembered with nostalgic fondness in a great deal of slang and folklore. MIT, though it used the same PDP-10s as everyone else, took a slightly different path; they rejected DECs software for the PDP-10 entirely an
21、d built their own operating system, the fabled ITS. ITS stood for Incompatible Timesharing System which gives one a pretty good fix on the MIT hackers attitude. They wanted it their way. Fortunately for all, MITs people had the intelligence to match their arrogance. ITS, quirky and eccentric and occ
22、asionally buggy though it always was, hosted a brilliant series of technical innovations and still arguably holds the record for time-sharing system in longest continuous use. ITS itself was written in assembler, but many ITS projects were written in the AI language LISP. LISP was far more powerful
23、and flexible than any other language of its day; in fact, it is still a better design than most languages of today, twenty-five years later. LISP freed ITSs hackers to think in unusual and creative ways. It was a major factor in their successes, and remains one of hackerdoms favorite languages. Many
24、 of the ITS cultures technical creations are still alive today; the EMACS program editor is perhaps the best-known. And much of ITSs folklore is still live to hackers, as one can see in the Jargon File. SAIL and CMU werent asleep, either. Many of the cadre of hackers that grew up around SAILs PDP-10
25、 later became key figures in the development of the personal computer and todays window/icon/mouse software interfaces. Meanwhile hackers at CMU were doing the work that would lead to the first practical large-scale applications of expert systems and industrial robotics. Another important node of th
26、e culture was XEROX PARC, the famed Palo Alto Research Center. For more than a decade, from the early 1970s into the mid-1980s, PARC yielded an astonishing volume of groundbreaking hardware and software innovations. The modern mice, windows, and icons style of software interface was invented there.
27、So was the laser printer, and the local-area network; and PARCs series of D machines anticipated the powerful personal computers of the 1980s by a decade. Sadly, these prophets were without honor in their own company; so much so that it became a standard joke to describe PARC as a place characterize
28、d by developing brilliant ideas for everyone else. Their influence on hackerdom was pervasive. The ARPANET and the PDP-10 cultures grew in strength and variety throughout the 1970s. The facilities for electronic mailing lists that had been used to foster cooperation among continent-wide special-inte
29、rest groups were increasingly also used for more social and recreational purposes. DARPA deliberately turned a blind eye to all the technically unauthorized activity; it understood that the extra overhead was a small price to pay for attracting an entire generation of bright young people into the co
30、mputing field. Perhaps the best-known of the social ARPANET mailing lists was the SF-LOVERS list for science-fiction fans; it is still very much alive today, in fact, on the larger Internet that ARPANET evolved into. But there were many others, pioneering a style of communication that would later be
31、 commercialized by for-profit time-sharing services like CompuServe, GEnie and Prodigy (and later still dominated by AOL). Your historian first became involved with the hacker culture in 1977 through the early ARPANET and science-fiction fandom. From then onward, I personally witnessed and participa
32、ted in many of the changes described here. 4. The Rise of UnixFar from the bright lights of the ARPANET, off in the wilds of New Jersey, something else had been going on since 1969 that would eventually overshadow the PDP-10 tradition. The year of ARPANETs birth was also the year that a Bell Labs hacker named Ken Thompson invented Unix. Thompson had been involved with the development work on a time-sharing OS called Multics, which shared common ancestry with ITS. Multics was a test-bed for some important ideas about
copyright@ 2008-2023 冰点文库 网站版权所有
经营许可证编号:鄂ICP备19020893号-2