Skip over menu

Software Safety Home Page
Definition of the word hacker
Last Modified on: Fri Sep 26 20:15:09 2008
Navigation Menu Left:

Books to read
Compliers with safety in mind Reactive Programing Language
Guidelines for better software
Hardware Design Tips
ISO9000, the correct meaning
Internationalization (I18N & L10)

Definition of the word hacker

Navigation Menu Right:

Metrics Gone Bad
Past Visitors
Photosensitive Epilepsy
Software Patents Gone Bad
Translate the Software Safety web site

If you think that I could be of some assistance to you or your organization let me know,
American Society for Quality  Certified Software Quality Engineer.

Software Safety now has a blog! Check it out.

This site has been listed as the EG3 Editor's Choice in the Embedded Safety category for February 2004.

eCLIPS gives this site four of five stars in the September 7th 2004 SAFETY CRITICAL - DESIGN GUIDE.

Site Search by PicoSearch 
Text Search

>C O M P U T E R U N D E R G R O U N D<
>D I G E S T<
*** Volume 1, Issue #1.12 (June 10, 1990) **

HACKER (Originally, someone who makes furniture with an Ax.) n. 1. A person who enjoys learning the details of programming systems and how to stretch their capabilities, as opposed to most users who prefer to learn only the minimum necessary. 2. One who programs enthusiastically, or who enjoys programming rather than just theorizing about programming. 3. A person capable of appreciating hack value (q.v.). 4. A person who is good at programming quickly. Not everything a hacker produces is a hack. 5. An expert at a particular program, or one who frequently does work using it or on it . . . . 6. A malicious or inquisitive meddler who tries to discover information by poking around.

Obviously, only the last, and least used, definition even remotely approaches the term "varmint." Unfortunately, many hackers, when approached by law enforcement officers, will readily admit to being hackers when questioned about it. Don't make that mistake, varmints.

From CUD119:

A computer programmer's attempt to help a colleague enter a system when a password has been lost or forgotten, debugging a copyright software program, or testing a system's security are examples for which a benign form of hacking is both required and considered acceptable. Nonetheless, this deceptive definition was successful, for it convinced Judge Nicholas Bua that the prosecutor's definition was the most common, would be unlikely to confuse a jury, and was not prejudicial (See Memorandum Order in CuD 1.16).

Hackers: Heroes of the Computer Revolution by Steven Levy

Editorial Reviews from

Steven Levy's classic book explains why the misuse of the word "hackers" to describe computer criminals does a terrible disservice to many important shapers of the digital revolution. Levy follows members of an MIT model railroad club--a group of brilliant budding electrical engineers and computer innovators--from the late 1950s to the mid-1980s. These eccentric characters used the term "hack" to describe a clever way of improving the electronic system that ran their massive railroad. And as they started designing clever ways to improve computer systems, "hack" moved over with them. These maverick characters were often fanatics who did not always restrict themselves to the letter of the law and who devoted themselves to what became known as "The Hacker Ethic." The book traces the history of hackers, from finagling access to clunky computer-card-punching machines to uncovering the inner secrets of what would become the Internet. This story of brilliant, eccentric, flawed, and often funny people devoted to their dream of a better world will appeal to a wide audience.

Select from the menu other areas of Software Safety that you would like to explore.

If you think that I could be of some assistance to you or your organization let me know,
American Society for Quality  Certified Software Quality Engineer.

Go Back To The  Software Safety Home Page