The Origin of “Hacker” April 1, 2008
Posted by Imran Ghory in Computer Security, etymology.trackback
Everytime the media carries a sensationalist story about “hackers” committing cybercrimes there’s always an uproar among geeks about the misappropriation of the word “hacker”. Sadly it’s the geeks who are mistaken and not for once the media.
A few years ago Fred Shapiro tracked down the earliest known reference to computer hackers:
1963 The Tech (MIT student newspaper) 20 Nov. 1 Many telephone services have been curtailed because of so-called hackers, according to Prof. Carlton Tucker, administrator of the Institute phone system. … The hackers have accomplished such things as tying up all the tie-lines between Harvard and MIT, or making long-distance calls by charging them to a local radar installation. One method involved connecting the PDP-1 computer to the phone system to search the lines until a dial tone, indicating an outside line, was found. … Because of the “hacking,” the majority of the MIT phones are “trapped.”
This is the earliest know usage of hacker in the modern sense, the TMRC Dictionary has it a few years earlier but not in the computer sense. The earliest computer related uses of the term (through anecdotal evidence) were also malicious (although the term wasn’t originally intended maliciously – in practice it was) in the sense that they involved gaining unauthorized access to computers to play on.
The modern “geek” definition of the term hacker to reflect a skilled programmer didn’t originate until the late seventies when the term ended up in the later famous Jargon File.
That doesn’t mean to say we should all stop using the word “hacker” in it’s positive sense, but as evidence advocating geeks we should at least stop claiming a false history to support our cause. As we all know where that ends up.
In response to those who disagree with me: If you think I’m wrong then show me the evidence, if you can find earlier records showing hack(er)s being used in a computer context in a non-“black hat” manner I’d be happy to retract my post and put the evidence up here.
april fools joke?
no actually it’s serious, maybe it was a bad day to post it 🙂
Actually, you’re the one who’s mistaken — history *does* support the benign view. As you note, the term hacker dates back even to the Tech Model Railroad Club. The term was generalized to include all sorts of neat but benign tomfoolery (http://en.wikipedia.org/wiki/MIT_hack) including white hat phone phreaking. At MIT, there’s definitely always been a sense that hacking has a code of ethics and that people who do bad things under the guise of hacking aren’t hacking at all.
The Tech’s 1963 reference to malicious phreakers as hackers is the same as modern day references to crackers as hackers: a mistake.
The secondary source of wikipedia doesn’t count as evidence, while you’re right term “hack” was used in a “positive” sense with regards to model railways, “hack” in the context of computers wasn’t. In the earliest days at TMRC it was used with regards to gain unauthorized access on MIT’s computer systems (although with less negative connotations then it has now). The modern geek “hacker” sense which is in common use now of an elite programmer didn’t come around until much later.
From the 1959 version of TMRC (source http://www.gricer.com/tmrc/dictionary1959.html):
HACK: 1) something done without constructive end; 2) a project under-
taken on bad self-advice; 3) an entropy booster; 4) to produce,
or attempt to produce, a hack3.
I saw this as a term for an unconventional or unorthodox application of technology, typically deprecated for engineering reasons. There was no specific suggestion of malicious intent (or of benevolence, either). Indeed, the era of this dictionary saw some “good hacks:” using a room-sized computer to play music, for instance; or, some would say, writing the dictionary itself.
HACKER: one who hacks, or makes them.
A hacker avoids the standard solution. The hack is the basic concept; the hacker is defined in terms of it.
You dismiss his source but are fine to support your defense of the media by using the media as a source?
(I know it is produced by students but it is still a newspaper)
Also I don’t see why you are limiting it to the earliest computer reference, as far as I can see your quote above is not really about computers itself. Technology, yes – computers, no.
Agreed it does say they used a computer, but there actual target was the phone system (so today they would be called phreakers)
Thats kind of interesting, I guess people always find a way of exploiting things.
I think the evidence is quite in favor of hacking being a black-hat term from the get go. It’s a leap to say otherwise. The “hacker as hero” or “Robin Hood hacker” motif, while fun to think about, doesn’t have much basis in reality… I’d be interested to see a (legit) piece of evidence to that effect.
a) Criminal activity is not and has never been a defining part of a “hack” or “hacker”. That doesn’t mean a hacker can’t commit computer related crimes. But that is not what defines him/her. This is also what the originator of the 1959 TMRC dictionary claims (TMRC jargon was largely “copied” into the early computer culture).
b) As the jargon-file says, phreaking was considered a “semi-respectable activity among hackers”: “At one time phreaking was a semi-respectable activity among hackers; there was a gentleman’s agreement that phreaking as an intellectual game and a form of exploration was OK, but serious theft of services was taboo.”
c) And besides: just because a professor at the institution uses the word in an interview, doesn’t mean he actually knows how the people belonging to the culture use the word (he even says “the so-called”, which hints that he is not conversant with the culture himself). Even though his use of the word is not contradictory to this [non-criminal] definition.
To sum up: media is WRONG when they use the word hacker to imply a computer criminal when they do this regardless of his/her skill, creativity and ingenuity. A computer criminal CAN be a hacker, but it IS NOT, AND HAS NEVER BEEN, A DEFINING ATTRIBUTE of a hacker. Most uses of “hacker” in media is plainly wrong, and so are your interpretation of your sources, in my opinion.
Wonderful reading!
Awesome write up, I am always looking for computer facts from the pass, I really enjoyed the one where Bill Gates said 640K would be enough memory for anyone.
I was actually poking around for the etymology for the word just a while ago. Read this article, noticed it was rather old and continued on.
I found that the term does indeed originate from MIT. Apparently, in the early 60s there were two types of students: Tools and Hackers. It was presumed there was no middle ground.
The Tools would attend class regularly, get straight As and be in the library if there weren’t any classes. (I note here, with relish, that this term has entered pop-culture’s slang lexicon as a derogatory term).
Hackers, on the other hand, were Tools’ antithesis. They didn’t go to classes, didn’t get good marks, slept in all day. What set them above drop-outs was the fact that they had a hobby. Trains, construction, and also: computers.
BTW, you can’t cite a media as a source for etymology. A newspaper’s goal is to sell newspapers. To that end, they will always slant things, people, and groups in such a way that it is sensationalist. A white-hat hacker isn’t sensational. A black-hat cracker is. Add to the above mix, a general misunderstanding of word usage, and you’ve got a recipe to (incorrectly) use the word ‘hacker’ to describe a malicious cracker.
If I had a penny for every time the mass-media misinterpreted something, I’d be buying up a controlling share of Microsoft’s stock.
The source I will cite for the origin of the word: http://www.cs.berkeley.edu/~bh/hacker.html
An impressive share, I just given this onto a clugealoe who was doing a little analysis on this. And he in fact bought me breakfast because I found it for him.. smile. So let me reword that: Thnx for the treat! But yeah Thnkx for spending the time to discuss this, I feel strongly about it and love reading more on this topic. If possible, as you become expertise, would you mind updating your blog with more details? It is highly helpful for me. Big thumb up for this blog post!
No, this has to be an April fools joke. There is no way this “author” can justifice the useage of the word hacker to describe, what we have come to know as, a computer hacker. Even if the word hacker was used FIRST, doesn’t mean it’s the CORRECT word.
*Thumbs down*
*Meh*
*-1*
/Forkbomb.
Actually, trying to demonstrate your point you are strengthening my opposite view. You want evidence, but evidence are those many people who, for many years, have been saying that they used to refer to themselves as “hackers” only in a positive sense. You are simply not believing them. It is not (only) the press that defines words. What you posted is first known reference of the word hacker in a mistaken way. Prof Tucker was not a member of the hacker community, in fact he says “so called hacker”. It is likely that the hacker community, despite its honor-code, was not in its entirety committed to it, but messing up the meaning of the term is unfair to those who were, and who are, still committed.
Why can the term not derive logically from the original literal verb of “to hack” from 13th century: to chop, hack, hew, which is a perfect image for gaining access to something difficult? The original slang usage seemed to communicate accessing success a different way, maybe a harder way, not as an academic grind, but as an inventive outlier. It seems that the term is universally accurate as one who accesses or trespasses into an existing system for the purpose of modifying or liberating something about the system’s original designed purpose. In this definition, it hews (pun) to a variation on h[ij]acker: one who seizes a system for another purpose.
And trying to halt the evolution of or guard the purity of a linguistic term is impossible. Saying a programmer has sick skills[z] would communicate (be widely understood as) something entirely different today than it would have in 1963. Once a term has a popular tipping point, it has been repurposed, or hacked, in the public lexicon.
Penny, I really like your point, but I’m curious if you think “hacker” still has the same power that it used to have in today’s world. With computer crime becoming more of a society topic do you think there are other buzz words that hold more weight?
Blogging can be exciting, hassle-free, safe and quick to get started on, eventhough it isn’t a make money fast program. You also want to make sure that you have a blog that people want to visit.
Hey There. I found your blog using msn. This is a very well
written article. I’ll make sure to bookmark it
and come back to read more of your useful info. Thanks for the post.
I will certainly comeback.
For newest information you have to pay a visit world-wide-web and on the web I found this web site as
a best site for most recent updates.
[…] is by no means a settled debate. Even in the comments section of the link you produce as evidence ( https://imranontech.com/2008/04/01/the-origin-of-hacker/ ) there is plenty of debate on the […]
CurtisPoonoTeteaseptloyack CurtisJatsspealkjeatoepisa CurtisChaiDahiceFlophychok CurtisFurgefemnalaRatabiat
http://downloadyoutube.ru
u6211u597du5e0cu671bu6bcfu500bu661fu671fu90fdu53efu4ee5u898bu5230u5927u5bb6u5440~~u771fu5fc3u67b6! Click http://d2.ae/hool090645
[…] Jump up^ “The Origin of “Hacker””. […]
VoIP Telephone System Sharjah
The Origin of “Hacker” | Imran On Tech
What are crackers and hackers?
A cracker (also known as a black hat hacker) is an individual with extensive computer knowledge whose purpose is to breach or bypass internet security or gain access to software without paying royalties. The general view is that, while hackers build things, crackers break things. Cracker is the name given to hackers who break into computers for criminal gain; whereas, hackers can also be internet security experts hired to find vulnerabilities in systems. These hackers are also known as white hat hackers. Crackers’ motivations can range from profit, a cause they believe in, general maliciousness or just because they like the challenge. They may steal credit card numbers, leave viruses, destroy files or collect personal information to sell.
Crackers can also refer to those who reverse engineer software and modify it for their own amusement. The most common way crackers gain access to networks or systems is through social engineering, whereby the cracker contacts employees at a company and tricks them into divulging passwords and other information that allows a cracker to gain acces
How To Use This Airtel Free Internet Tricks 2017 🤑
I always try to share some working tricks.There are also tricks such as airtel free internet at night which require invest some money to buy a internet pack.
This time i am going to share a simple trick airtel free Internet for android user, no internet pack required.
It is very simple trick so i never thought to share this trick but recently i found that many people ready to offer money instead of this trick or many scam are running in the name of airtel unlimited free trick.
So i thought to just make this trick free forever.
There are some blogs which are also giving Airtel free Internet tricks but many of them are not working.
Airtel Free Internet Vpn Trick 2016
Step1. First of all you need a Airtel 3G 4G enabled Sim card, this important because you don’t want run free internet in 2g speed. You can also change your network setting to 3G or 4G only, so , no speed deduction valid.
Step2. Now Download DroidVPN from playstore.
Create an APN : airtelgprs.com or airtelfun.com
Note>> Make sure your sim shoule be at zero balance or no Datapack if you have already a datapack, no problem it’s working with data pack too.
Step3. Then install and open the DroidVPN and Singup or login if you have already an Account.
Step4. Go to the protocol section and select TCP protocol.
Note>> you can choose udp if you know some udp in your state, i can post this trick if required.
Step5. Next step is goto Port setting of Droidvpn and select tcp port then type 443 and next select HTTP Header and enabled it, this is the section where we going to use our Host setting.
Step6. Now type any one http Host from the following hosts lists.
Airtel 3G Free Internet Hosts 2016
1. Host:gam.wynk.in
X-Online-Host:gam.wynk.in
2. Host:one.airtel.in/rcconf/
X-Online-Host:one.airtel.in/rcconf/
3. Host:airtellive.com
X-Online-Host:airtellive.com
4. Host:203.115.112.5
X-Online-Host:203.115.112.5
5. Host:202.87.41.147
X-Online-Host:202.87.41.147
6. Host:get.wynk.in
X-Online-Host:get.wynk.in
7. Host:airtelgurus.com/wtynd
X-Online-Host
:airtelgurus.com/wtynd
8. Host:208.71.186.80
X-Online-Host:208.71.186.80
9. Host:twangmusic.in
X-Online-Host:twangmusic.in
Step 7. Last step is, save all setting, and select any server from free server lists and hit on connect.
Your internet is connected 🙂
This airtel free internet tricks is working in all states, c’mon every one using this trick so how you can say that this trick is not working :).
Please comment your problems, your ideas or you requirements. Your share and comments increase me to write and make tricks free.
© thung. Dont forget to subscribe your email
Airtel 3G Free Internet Hosts 2017
1. Host:gam.wynk.in
X-Online-Host:gam.wynk.in
2. Host:one.airtel.in/rcconf/
X-Online-Host:one.airtel.in/rcconf/
3. Host:airtellive.com
X-Online-Host:airtellive.com
4. Host:203.115.112.5
X-Online-Host:203.115.112.5
5. Host:202.87.41.147
X-Online-Host:202.87.41.147
6. Host:get.wynk.in
X-Online-Host:get.wynk.in
7. Host:airtelgurus.com/wtynd
X-Online-Host
:airtelgurus.com/wtynd
8. Host:208.71.186.80
X-Online-Host:208.71.186.80
9. Host:twangmusic.in
X-Online-Host:twangmusic.in
Step 7. Last step is, save all setting, and select any server from free server lists and hit on connect.
Your internet is connected 🙂
This airtel free internet tricks is working in all states, c’mon every one using this trick so how you can say that this trick is not working :).
Please comment your problems, your ideas or you requirements. Your share and comments increase me to write and make tricks free.
© thung. Dont forget to subscribe your email
It is interesting to me that both the term “hacker” and “cowboy” have have gone through very similar transitions in modern usage. At one point both terms simply referred to a person with a certain set of skills. Neither negative or positive in itself, but the skills were admired. Then “hacker” came to be synonymous with “criminal” and calling someone a “cowboy” today is usually not a compliment.
Today the term “hacker” is differentiated in the IT community by terms originating from old cowboy movies, “White Hats” and “Black Hats”
griffithzone.com
The Origin of “Hacker” | Imran On Tech
[…] Jump up^ “The Origin of “Hacker””. […]
[…] Jump up^ “The Origin of “Hacker””. […]
Hi there to every body, it’s my first pay a visit of this web site;
this web site carries awesome and really excellent data in support of visitors.
Hy there, a primeprovide
To moderate click on the link downstairs
http://bit.ly/2SShZsn
Please let me know if you’re looking for a author for your
site. You have some really great articles and I think
I would be a good asset. If you ever want to take some of
the load off, I’d absolutely love to write some articles for your blog in exchange
for a link back to mine. Please shoot me an e-mail if interested.
Thanks!
Ƭhiis post is really a pleasant one it assists neew internet visitors, wһo
are wisһing for blogging. https://sablonkaosdistrobandung.blogspot.com/
Thank you for the knowledge
How to earn on investments in Cryptocurrency from $ 7865 per day: https://get-5-btc-per-day.blogspot.com?v=03
READY EARNINGS ON THE INTERNET from $7774 per day: http://keqosowefo.tk/7agzm
The origin of hacker
[…] ^ “The Origin of “Hacker““. April 1, 2008. […]
[…] “The Origin of “Hacker““. April 1, 2008. […]
[…] The Origin of “Hacker””. April 1, 2008. […]
[…] better, and smoother. The term’s first public appearance was in 1963, in MIT’s newspaper, The Tech. There you’ll see hackers’ first major accomplishment ever recorded – improving […]