Hacking and Hacker Culture.

Programming is Forgetting: Toward a New Hacker Ethic

Read Stephen Levy

Hacking and Hacker Culture.

MIT AI Intelligence Lab, the Hacker Ethic and Beyond.

  • Thesis - Section II: Historical background on the phenomenon

    Section II Historical Background On The Phenomenon Using context to understand why hackers set out to build digital currency systems. “Corporations have neither bodies to be punished, nor souls to be condemned; they therefore do as they li..

  • Christopher Lemmer Webber (@dustyweb)

    New episode of @librelounge is out! Episode 3: Hacker Culture, Past, Belonging and Inclusion Tricky things discussed in this episode… is it possible to have FOSS heritage connected to subcultures without being exclusionary to those outside of th…

  • A genealogy of hacking

    Abstract: Hacking is now a widely discussed and known phenomenon, but remains difficult to define and empirically identify because it has come to refer to many different, sometimes incompatible, material practices. This paper proposes genealogy as a framework for understanding hacking by briefly revisiting Foucault’s concept of genealogy and interpreting its perspectival stance through the feminist materialist concept of the situated observer. Using genealogy as a theoretical frame a history of hacking will be proposed in four phases. The first phase is the ‘prehistory’ of hacking in which four core practices were developed. The second phase is the ‘golden age of cracking’ in which hacking becomes a self-conscious identity and community and is for many identified with breaking into computers, even while non-cracking practices such as free software mature. The third phase sees hacking divide into a number of new practices even while old practices continue, including the rise of serious cybercrime, hacktivism, the division of Open Source and Free Software and hacking as an ethic of business and work. The final phase sees broad consciousness of state-sponsored hacking, the re-rise of hardware hacking in maker labs and hack spaces and the diffusion of hacking into a broad ‘clever’ practice. In conclusion it will be argued that hacking consists across all the practices surveyed of an interrogation of the rationality of information techno-cultures enacted by each hacker practice situating itself within a particular techno-culture and then using that techno-culture to change itself, both in changing potential actions that can be taken and changing the nature of the techno-culture itself.

  • A HACKER PRIMER Matt Devost - April 5, 1997

    An introduction to the document is followed by an examination of hacker organizational and social considerations to include a detailed listing of hacker communication mechanisms and listings of high profile hacker groups. Subsequent sections identify hacker targets and off-line techniques hackers use to supplement their intrusion capabilities, provide a descriptive listing of common hacker tools with Internet reference points, and furnish a listing of hacker references to include WWW sites, related books, magazines and movies.


  • hacks.mit.edu/

    Welcome to the IHTFP Gallery!

  • Hacks, tomfoolery & pranks - MIT Admissions

    At MIT Admissions, we recruit and enroll a talented and diverse class of undergraduates who will learn to use science, technology, and other areas of scholarship to serve the nation and the world in the 21st century.

  • Hacks at the Massachusetts Institute of Technology

    Hacks at the Massachusetts Institute of Technology are practical jokes and pranks meant to prominently demonstrate technical aptitude and cleverness, or to commemorate popular culture and historical topics. The pranks are anonymously installed at night by hackers, usually, bu…

  • A Brief History of Hacker Culture

    The annual Harvard-Yale football game doesn’t really excite many college football fans, played as it is between two schools known more for intellectual than athletic prowess. So on November 30, 1982, during the 2nd quarter of the 99th meeting of the two teams, it was largely students and alumni of those two Ivy League colleges in the stands watching.

    As the teams faced off after Harvard’s second touchdown, a strange noise drew the crowd’s attention to the sideline at midfield. Springing out of the turf and slowly growing was a black balloon. As it continued to inflate, stopping the game, a set of letters became clearly visible. “MIT” read the balloon, before it exploded with a bang and a swirl of white vapor.

    The Harvard-Yale game had just been hacked.

  • What the Hack? Tracing the Origins of Hacker Culture and the Hacker Ethic

    It is difficult to associate open source with “hacker culture” or “the hacker ethic.” Instead, open source values, and projects such as Linux, can be traced to academia.

  • A Short History of “Hack”

“Before Amazon, before eBay, the seminal act of e-commerce was a drug deal.” What the Dormouse Said

  • Full text of “New Hacker’s Dictionary, The”

    This is the Jargon File, a comprehensive compendium of hacker slang illuminating many aspects of hackish tradition, folklore, and humor.

    This document (the Jargon File) is in the public domain, to be freely used, shared, and modified. There are (by intention) no legal restraints on what you can do with it, but there are traditions about its proper use to which many hackers are quite strongly attached.

    Please extend the courtesy of proper citation when you quote the File, ideally with a version number, as it will change and grow over time. (Examples of appropriate citation form: “Jargon File 4.2.2” or “The on-line hacker Jargon File, version 4.2.2, 20 AUG 2000”.)

    The Jargon File is a common heritage of the hacker culture. Over the years a number of individuals have volunteered considerable time to maintaining the File and been recognized by the net at large as editors of it. Editorial responsibilities include: to collate contributions and suggestions from others; to seek out corroborating information; to cross-reference related entries; to keep the file in a consistent format; and to announce and distribute updated versions periodically. Current volunteer editors include:

Hackers – Heroes of the Computer Revolution

The book is in three parts, exploring the canonical AI hackers of MIT, the hardware hackers who invented the personal computer industry in Silicon Valley, and the third-generation game hackers in the early 1980s.

Hacker Spirit

Open Source



  • Xanadu.com
  • w3.org/Xanadu.html
  • Ted Nelson and the Xanadu Hypertext System

    On June 17, 1937, American pioneer of information technology, philosopher, and sociologist Theodore Holm “Ted” Nelson was born. Nelson coined the terms hypertext and hypermedia in 1963 and publishe

  • Project Xanadu

    Project Xanadu was the first hypertext project, founded in 1960 by Ted Nelson. Administrators of Project Xanadu have declared it an improvement over the World Wide Web, with mission statement: “Today’s popular software simulates paper. The World Wide Web (another imitation of…

Silicon Valley

Steve Blank Secret History of Silicon Valley

Tech Talk: Steve Blank — “The Secret History of Silicon Valley: How Stanford & the CIA/NSA Built the Valley We Know Today” - VIMEO


  • A New Digital Manifesto -newsycombinator comments
  • DEF CON and Stack Overflow: What Our Traffic Says About Cybersecurity - Hacker News

    Today is the first day of DEF CON 27, arguably the world’s best known hacker convention. Each year, thousands of people interested in security (and/or the hacking thereof) travel to Las Vegas to learn and gather with like-minded community. Some also attend Black Hat, a related conference which is typically scheduled right before DEF CON, also in Las Vegas. Not everyone who identifies as a hacker or is part of hacker culture writes code or uses Stack Overflow, but we would expect a significant proportion to do so. Well over 25,000 people attended DEF CON in 2018, all located in Las Vegas. Can we see any differences in traffic to Stack Overflow during the days of DEF CON? What can we learn about the hacker community from traffic during that time?

  • Birth of a Digital Nation

    And perhaps the toughest questions of all: Can we build a new kind of politics? Can we construct a more civil society with our powerful technologies? Are we extending the evolution of freedom among human beings? Or are we nothing more than a great, wired babble pissing into the digital wind?

    Where freedom is rarely mentioned in mainstream media anymore, it is ferociously defended - and exercised daily - on the Net.


This content is open source. Help improve it.