The Hacker Ethic

Results: 9



#Item
1Hacker culture / Computing / Hacking / Technology / Security hacker / Phrack / Hacker ethic / Hackers: Heroes of the Computer Revolution / Hacker / Electron / Black hat / Underground

What hackers learn that the rest of us don’t Sergey Bratus May 17, 2008 1

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2008-05-17 04:08:00
2Hacker ethic / Richard Stallman / Free software movement / Typeface / Hacker / Copyleft / Free software / Free culture movement / Free and open source software / Computing / Social movements / Software licenses

THE FREE FONT MOVEMENT david crossland Dissertation submitted in partial fulfilment of the requirements for the MA Typeface Design, University of Reading, 2008

Add to Reading List

Source URL: understandingfonts.com

Language: English - Date: 2015-03-01 19:54:28
3Hacking / Hacker / Jargon File / Eric S. Raymond / The Hacker Ethic / Hacker Emblem / Computing / Electronics / Hacker ethic

The hacker ethic, openness, and sustainability Jorge Luis Zapico Centre for Sustainable Communications, KTH, Stockholm. http://jorge.zapi.co @zapico Sustainability is a normative concept, building on ideas

Add to Reading List

Source URL: www.diva-portal.org

Language: English - Date: 2013-07-08 05:13:58
4Hacker ethic / Hackers: Heroes of the Computer Revolution / Hacker / What the Hack / Information wants to be free / Hacks at the Massachusetts Institute of Technology / Electron / Steven Levy / Hacker Emblem / Computing / Electronics / Hacking

How Digital Technology Found Utopian Ideology: Lessons From the First Hackers’ Conference Fred Turner Department of Communication Stanford University Forthcoming in David Silver and Adrienne Massanari, eds., Critical C

Add to Reading List

Source URL: fredturner.stanford.edu

Language: English - Date: 2012-08-02 18:55:52
5Hacker / White hat / Electron / Operation Sundevil / Phreaking / Hacker ethic / Digital DawgPound / Computing / Hacking / Electronics

Microsoft Word - Costs and Benefits in the Digital Underground 3.doc

Add to Reading List

Source URL: www.peterleeson.com

Language: English - Date: 2005-08-12 18:03:00
6Hacker / Grey hat / White hat / Penetration test / Hacktivism / Black hat / Hacker ethic / South African hacker history / Hacking / Computing / Electronics

Th3 M1nD 0f 4 H4xx0r A guide to the world of Hacking

Add to Reading List

Source URL: www.nopc.org

Language: English - Date: 2012-12-13 15:38:55
7Cybercrime / Cyberwarfare / Hacker ethic / Hacker / Cyberterrorism / Computer security / Vulnerability / Grey hat / White hat / Computing / Hacking / Electronics

Testimony for the Committee on Government Reform’s Subcommittee on Government Efficiency, Financial Management and Intergovernmental Relations

Add to Reading List

Source URL: www-bcf.usc.edu

Language: English - Date: 2002-07-23 10:17:24
8Hacker / White hat / Penetration test / Grey hat / Hack / Computer ethics / Hacker ethic / South African hacker history / Computing / Hacking / Electronics

Teaching Students to Hack: Ethical Implications in Teaching Students to Hack at the University Level

Add to Reading List

Source URL: cs.potsdam.edu

Language: English - Date: 2012-04-06 21:26:50
9Middle States Association of Colleges and Schools / New York University / Hackers: Heroes of the Computer Revolution / Hacker ethic / Hacker / What the Hack / Tron / Enid Gabriella Coleman / Computer security conference / Computing / Electronics / Hacking

PDF Document

Add to Reading List

Source URL: steinhardt.nyu.edu

Language: English - Date: 2010-12-07 15:10:55
UPDATE