ImageVerifierCode 换一换
格式:DOCX , 页数:15 ,大小:29.45KB ,
资源ID:2649829      下载积分:3 金币
快捷下载
登录下载
邮箱/手机:
温馨提示:
快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。 如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝    微信支付   
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【https://www.bingdoc.com/d-2649829.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录   QQ登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(黑客道简史.docx)为本站会员(b****1)主动上传,冰点文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知冰点文库(发送邮件至service@bingdoc.com或直接QQ联系客服),我们立即给予删除!

黑客道简史.docx

1、黑客道简史黑客道简史 一、早期的黑客时间: 2007-10-21阅读: 608次 整理: 华西安全网作者:埃里克斯蒂芬雷蒙(Eric Steven Raymond)【著】译者:刘安辙(Angelo Liu)【译】原文链接:http:/catb.org/esr/writings/hacker-history/hacker-history-5.html1. TranslationsRussian http:/www.kazan.lug.ru/articles/esr/hacker-hist.html2. Prologue: The Real ProgrammersIn the beginning,

2、 there were Real Programmers. Thats not what they called themselves. They didnt call themselves hackers, either, or anything in particular; the sobriquet Real Programmer wasnt coined until after 1980, retrospectively by one of their own. But from 1945 onward, the technology of computing attracted ma

3、ny of the worlds brightest and most creative minds. From Eckert & Mauchlys first ENIAC computer onward there was a more or less continuous and self-conscious technical culture of enthusiast programmers, people who built and played with software for fun. The Real Programmers typically came out of eng

4、ineering or physics backgrounds. They were often amateur-radio hobbyists. They wore white socks and polyester shirts and ties and thick glasses and coded in machine language and assembler and FORTRAN and half a dozen ancient languages now forgotten. From the end of World War Two to the early 1970s,

5、in the great days of batch processing and the big iron mainframes, the Real Programmers were the dominant technical culture in computing. A few pieces of revered hacker folklore date from this era, including various lists of Murphys Laws and the mock-German Blinkenlights poster that still graces man

6、y computer rooms. Some people who grew up in the Real Programmer culture remained active into the 1990s. Seymour Cray, designer of the Cray line of supercomputers, was among the greatest. He is said once to have toggled an entire operating system of his own design into a computer of his own design t

7、hrough its front-panel switches. In octal. Without an error. And it worked. Real Programmer macho supremo. The Real Programmer culture, though, was heavily associated with batch (and especially batch scientific) computing. It was eventually eclipsed by the rise of interactive computing, the universi

8、ties, and the networks. These gave birth to another engineering tradition that, eventually, would evolve into todays open-source hacker culture. 3. The Early HackersThe beginnings of the hacker culture as we know it today can be conveniently dated to 1961, the year MIT acquired the first PDP-1. The

9、Signals and Power committee of MITs Tech Model Railroad Club adopted the machine as their favorite tech-toy and invented programming tools, slang, and an entire surrounding culture that is still recognizably with us today. These early years have been examined in the first part of Steven Levys book H

10、ackers Levy . MITs computer culture seems to have been the first to adopt the term hacker. The Tech Model Railroad Clubs hackers became the nucleus of MITs Artificial Intelligence Laboratory, the worlds leading center of AI research into the early 1980s. Their influence was spread far wider after 19

11、69, the first year of the ARPANET. The ARPANET was the first transcontinental, high-speed computer network. It was built by the Defense Department as an experiment in digital communications, but grew to link together hundreds of universities and defense contractors and research laboratories. It enab

12、led researchers everywhere to exchange information with unprecedented speed and flexibility, giving a huge boost to collaborative work and tremendously increasing both the pace and intensity of technological advance. But the ARPANET did something else as well. Its electronic highways brought togethe

13、r hackers all over the U.S. in a critical mass; instead of remaining in isolated small groups each developing their own ephemeral local cultures, they discovered (or re-invented) themselves as a networked tribe. The first intentional artifacts of the hacker culture - the first slang lists, the first

14、 satires, the first self-conscious discussions of the hacker ethic - all propagated on the ARPANET in its early years. In particular, the first version of the Jargon File developed as a cross-net collaboration during 1973-1975. This slang dictionary became one of the cultures defining documents. It

15、was eventually published as The Hackers Dictionary in 1983; that first version is out of print, but a revised and expanded version is New Hackers Dictionary Raymond . Hackerdom flowered at the universities connected to the net, especially (though not exclusively) in their computer science department

16、s. MITs AI Lab was first among equals from the late 1960s. But Stanford Universitys Artificial Intelligence Laboratory (SAIL) and Carnegie-Mellon University (CMU) became nearly as important. All were thriving centers of computer science and AI research. All attracted bright people who contributed gr

17、eat things to the hacker culture, on both the technical and folkloric levels. To understand what came later, though, we need to take another look at the computers themselves; because the Labs rise and its eventual fall were both driven by waves of change in computing technology. Since the days of th

18、e PDP-1, hackerdoms fortunes had been woven together with Digital Equipment Corporations PDP series of minicomputers. DEC pioneered commercial interactive computing and time-sharing operating systems. Because their machines were flexible, powerful, and relatively cheap for the era, lots of universit

19、ies bought them. Cheap timesharing was the medium the hacker culture grew in, and for most of its lifespan the ARPANET was primarily a network of DEC machines. The most important of these was the PDP-10, first released in 1967. The 10 remained hackerdoms favorite machine for almost fifteen years; TO

20、PS-10 (DECs operating system for the machine) and MACRO-10 (its assembler) are still remembered with nostalgic fondness in a great deal of slang and folklore. MIT, though it used the same PDP-10s as everyone else, took a slightly different path; they rejected DECs software for the PDP-10 entirely an

21、d built their own operating system, the fabled ITS. ITS stood for Incompatible Timesharing System which gives one a pretty good fix on the MIT hackers attitude. They wanted it their way. Fortunately for all, MITs people had the intelligence to match their arrogance. ITS, quirky and eccentric and occ

22、asionally buggy though it always was, hosted a brilliant series of technical innovations and still arguably holds the record for time-sharing system in longest continuous use. ITS itself was written in assembler, but many ITS projects were written in the AI language LISP. LISP was far more powerful

23、and flexible than any other language of its day; in fact, it is still a better design than most languages of today, twenty-five years later. LISP freed ITSs hackers to think in unusual and creative ways. It was a major factor in their successes, and remains one of hackerdoms favorite languages. Many

24、 of the ITS cultures technical creations are still alive today; the EMACS program editor is perhaps the best-known. And much of ITSs folklore is still live to hackers, as one can see in the Jargon File. SAIL and CMU werent asleep, either. Many of the cadre of hackers that grew up around SAILs PDP-10

25、 later became key figures in the development of the personal computer and todays window/icon/mouse software interfaces. Meanwhile hackers at CMU were doing the work that would lead to the first practical large-scale applications of expert systems and industrial robotics. Another important node of th

26、e culture was XEROX PARC, the famed Palo Alto Research Center. For more than a decade, from the early 1970s into the mid-1980s, PARC yielded an astonishing volume of groundbreaking hardware and software innovations. The modern mice, windows, and icons style of software interface was invented there.

27、So was the laser printer, and the local-area network; and PARCs series of D machines anticipated the powerful personal computers of the 1980s by a decade. Sadly, these prophets were without honor in their own company; so much so that it became a standard joke to describe PARC as a place characterize

28、d by developing brilliant ideas for everyone else. Their influence on hackerdom was pervasive. The ARPANET and the PDP-10 cultures grew in strength and variety throughout the 1970s. The facilities for electronic mailing lists that had been used to foster cooperation among continent-wide special-inte

29、rest groups were increasingly also used for more social and recreational purposes. DARPA deliberately turned a blind eye to all the technically unauthorized activity; it understood that the extra overhead was a small price to pay for attracting an entire generation of bright young people into the co

30、mputing field. Perhaps the best-known of the social ARPANET mailing lists was the SF-LOVERS list for science-fiction fans; it is still very much alive today, in fact, on the larger Internet that ARPANET evolved into. But there were many others, pioneering a style of communication that would later be

31、 commercialized by for-profit time-sharing services like CompuServe, GEnie and Prodigy (and later still dominated by AOL). Your historian first became involved with the hacker culture in 1977 through the early ARPANET and science-fiction fandom. From then onward, I personally witnessed and participa

32、ted in many of the changes described here. 4. The Rise of UnixFar from the bright lights of the ARPANET, off in the wilds of New Jersey, something else had been going on since 1969 that would eventually overshadow the PDP-10 tradition. The year of ARPANETs birth was also the year that a Bell Labs hacker named Ken Thompson invented Unix. Thompson had been involved with the development work on a time-sharing OS called Multics, which shared common ancestry with ITS. Multics was a test-bed for some important ideas about

copyright@ 2008-2023 冰点文库 网站版权所有

经营许可证编号:鄂ICP备19020893号-2