| A book about hacking is a book about everything. First, the meaning of hacker.
The word “hacker” emerged in an engineering context and became popular at The Massachusetts Institute of Technology (MIT), among other places, as a way to talk about any ingenious, creative, or unconventional use of a machine doing novel things, usually unintended or unforeseen by its inventors. A hacker was someone involved in a technical feat of legerdemain; a person who saw doors where others saw walls or built bridges that looked to the uninitiated like planks on which one walked into shark-filled seas.
The mythology of hacking was permeated with the spirit of Coyote, the Trickster. Hackers see clearly into the arbitrariness of structures that others accept as the last word.They see contexts as contents, which is why when they apply themselves to altering the context, the change in explicit content seems magical.They generally are not builders in the sense that creating a functional machine that will work in a benign environment is not their primary passion. Instead, they love to take things apart and see how machines can be defeated. Their very presuppositions constitute the threat environment that make borders and boundaries porous.
In their own minds and imaginations, they are free beings who live in a world without walls. Sometimes they see themselves as the last free beings, and anyone and anything organizational as a challenge and opportunity. Beating The Man at his own game is an adrenalin rush of the first order. |
|
|
Syngress Force 2006 Emerging Threat Analysis: From Mischief to MaliciousOver the last seven years, Internet Security Systems' (ISS) elite X-Force has discovered more high-risk vulnerabilities than all other research groups and vendors combined, including the vulnerability that led to the recent, widespread Zotob worm. For the first time ever, follow the X-Force team as they analyze potential vulnerabilities and... | | | | |
Word 2010: Advanced: MOS Edition (Ilt)
his ILT Series course builds on the skills and concepts taught in Word 2010: Intermediate. Students will perform mail merges, create and use forms, and create master documents that include a table of contents, a table of figures, footnotes, endnotes, an index, bookmarks, cross-references, and Web frames. They will also create macros,... | | Microsoft Silverlight 4 Business Application Development: Beginners Guide
Microsoft Silverlight is a programmable web browser plug-in that enables features including animation, vector graphics, and audio-video playback--features that characterize Rich Internet Applications. Silverlight makes possible the development of RIA applications in familiar .NET languages such as C# and VB.NET.
Silverlight is a... | | BlackBerry All-in-One For Dummies
Hi there, and welcome to BlackBerry All-in-One For Dummies. If you already have a BlackBerry, this is a great book to have around when you want to discover new features or need something to use as a reference. If you don’t have a BlackBerry yet and have some basic questions (such as “What is a BlackBerry?” or “How can... |
|