This website uses cookies to ensure you have the best experience. Learn more

The Hacker Subculture Essay

2020 words - 8 pages

Hacker subculture[1] is heavily dependent on technology. It has produced its own slang and various forms of unusual alphabet use, for example l33tspeak. Such things are usually seen as an especially silly aspect by the academic hacker subculture.[citation needed] In part due to this, the slangs of the two subcultures differ substantially.[citation needed] Political attitude usually includes views for freedom of information, freedom of speech, a right for anonymity and most have a strong opposition against copyright.[citation needed] Writing programs and performing other activities to support these views is referred to as hacktivism by the subculture. Some go as far as seeing illegal cracking ethically justified for this goal; the most common form is website defacement.[citation needed]

Hacker culture is frequently compared to the Wild West: a male-dominated Frontier to conquer.[3]

Hacker groups

Main articles: hacker conference and hacker group

The network hacking subculture is supported by regular real-world gatherings called hacker conventions or "hacker cons". These have drawn more people every year including SummerCon (Summer), DEF CON, HoHoCon (Christmas), PumpCon (Halloween), H.O.P.E. (Hackers on Planet Earth) and HEU (Hacking at the End of the Universe).[citation needed] They have helped expand the definition and solidify the importance of the network hacker subculture.[citation needed]

Hacking and the media
This article or section may require cleanup because it is in a list format that may be better presented using prose.
You can help by converting this section to prose, if appropriate. Editing help is available. (August 2008)

Hacker magazines

Main category: Hacker magazines

The security hackers have also edited some magazines, most notably:

* Phrack
* 2600: The Hacker Quarterly
* Hakin9

While the information contained in hacker magazines and ezines was often outdated, they improved the reputations of those who contributed by documenting their successes.[4]

Hackers in fiction

Hackers from the network hacking subculture often show an interest in fictional cyberpunk and cyberculture literature and movies. Absorption of fictional pseudonyms, symbols, values, and metaphors from these fictional works is very common.[citation needed]

Books portraying hackers:

* The cyberpunk novels of William Gibson novels — especially the Sprawl Trilogy — are very popular with hackers.[5]
* Hackers (short stories)
* Snow Crash
* Helba from the dot .hack manga and anime series.

Films also portray hackers:

* WarGames
* The Matrix series
* Hackers
* Die Hard 4.0
* Swordfish
* The Net
* The Net 2.0
* Antitrust
* Enemy of the State
* Sneakers
* Untraceable

Non-fiction books

* The Hacker Crackdown
* Hackers: Heroes of the Computer Revolution

Hacker attitudes

The term "hacker" has a number of different...

Find Another Essay On The Hacker Subculture

Computer Crime in society Essay

1458 words - 6 pages beliefs about the information that is stored in personal computers. Said best by J. Thomas McEwen in the article Computer Ethics many hackers believe that "computerized data [is] free and should be accessible to anyone (McEwen 1991; 8-11). A subculture is a group a group of people who share a different set of beliefs that differ significantly from the larger society (Kendall; 604). Besides forming subcultures, many hackers have learned their

A History of Hacking Essay

1697 words - 7 pages . They may also break into anyone else’s phone in a matter of seconds, leaving its owner to the mercy of the hacker. In Tereza Pultarova's article she described an experience at a Black Hat convention in Las Vegas, “By simply tapping two handsets together, he initiated a peer-to-peer NFC session gaining unauthorized access to the targeted phone, running a code which allowed him to load a malicious webpage onto the device without having to request

Acomplishments Through The BDSM Performances

1183 words - 5 pages driving, who decides where we're eating, where we're going on vacation. It's like the classic joke: 'we know who wears the pants in that family' or 'she knows her place.' (Weiss 143) These performances fly in the face of dominance and oppression. The practitioners negotiate terms, set up safe words, and the one in the submissive role has the option to set up safe words and end a situation at any time. Although the BDSM subculture does

William Gibson and the internet

5058 words - 20 pages chemistry.G)Small groups or individual 'console cowboys' can wield tremendous power over governments. corporations, etc.H) The coalescence of a computer 'culture' is expressed in self-aware computer music , art, virtual communities, and a hacker/street tech subculture. The computer nerd image is passe', and people are not ashamed anymore about the role the computer has in this subculture. The computer is a cool tool, a friend , important, human

Cyber Criminology: Exploring Internet Crimes and Criminal Behavior by K. Jaishankar

3422 words - 14 pages secrets behind these attacks, the reasons for them, and statistics taken from researchers to show who commits these crimes and why they did so. In the first section of Cyber Criminology, is the subject matter of individuals going away from acceptable standards of what one normal person would take and the subculture behind these people in cyberspace. The Internet is used for personal gains or destruction of others by people described as hackers

When the Bubble Burst

1539 words - 6 pages By the time I arrived state side from my second tour in the Middle East the housing bubble had already burst. I noticed a drastic change in the way that many of my friends and family were living. Several of my friends that worked in real estate had sold their boats and seconds houses. My own stock portfolio had lost a third of its value. My sister and her husband had defaulted on their home mortgage leaving them scrambling for a place to live. I

phase diagram

4456 words - 18 pages Introduction: Chemical equilibrium is a crucial topic in Chemistry. To represent and model equilibrium, the thermodynamic concept of Free energy is usually used. For a multi-component system the Gibbs free energy is a function of Pressure, Temperature and quantity (mass, moles) of each component. If one of these parameters is changed, a state change to a more energetically favorable state will occur. This state has the lowest free energy

Revolutionary Work of Art

1890 words - 8 pages Walter Benjamin emphasizes in his essay, “The Work of Art in the Age of its Technological Reproducibility” that technology used to make an artwork has changed the way it was received, and its “aura”. Aura represents the originality and authenticity of a work of art that has not been reproduced. The Sistine Chapel in the Vatican is an example of a work that has been and truly a beacon of art. It has brought a benefit and enlightenment to the art

Enlightenment Thought in New Zealand Schools

1594 words - 6 pages In this essay I will be looking at how the political and intellectual ideas of the enlightenment have shaped New Zealand Education. I will also be discussing the perennial tension of local control versus central control of education, and how this has been affected by the political and intellectual ideas of the enlightenment. The enlightenment was an intellectual movement, which beginnings of were marked by the Glorious Revolution in Britain

Psychological Egoism Theory

2240 words - 9 pages The theory of psychological egoism is indeed plausible. The meaning of plausible in the context of this paper refers to the validity or the conceivability of the theory in question, to explain the nature and motivation of human behavior (Hinman, 2007). Human actions are motivated by the satisfaction obtained after completing a task that they are involved in. For example, Mother Teresa was satisfied by her benevolent actions and

How Celtic Folkore has Influenced My Family

1587 words - 6 pages Every family has a unique background that influences the way they live and interact with other people. My parents, who emigrated from Ireland to the States with my three brothers in 1989, brought over their own Celtic folklore and traditions that have helped shaped the way our family operates and lives. One aspect of folklore that has helped shape my family dynamic is the Celtic cross—both its background and what role it has played in our lives

Similar Essays

Should You Hire A Hacker To Protect Your Computer Systems?

1305 words - 5 pages readily answered for every individual because every person is different.Hackers belong to a subculture of computing enthusiasts. The mainstream media often uses the word hacker to refer to individuals who break computer information laws to circumvent security restrictions and obtain either a financial reward or an audience. Just as security has evolved, so has the hacker and more often they are responsible for highly organized and coordinated attacks

Little Brother: The Tech Geek Subculture

2062 words - 8 pages his computer took him to as cyberspace-somewhere exciting, a place more real than his own life, a land he could conquer, not a drab teenager's room in his parents' house" (Smith n.p.). In short, geek subculture is much inclined in technology such as computers and the new media. Members of this subculture are well-acquainted with computers. In contrast with computer professionals, geeks utilize the terms "cracker and hacker" in a positive

Hackers Vs. Crackers Essay

3212 words - 13 pages , ongoing effort on the part of some hackers to distance themselves from their malicious colleagues and to emphasize the positive aspects of their subculture: insatiable curiosity, fierce independence, and total, hands-on knowledge of how technology works. A recent article on the "News for Nerds" site Slashdot proposed a search for a completely new word of "hacker," since the old one had been dragged through the mud so often by the media. Here are

Hackers Essay

1310 words - 5 pages This paper is about the hacker subculture. The paper breaks the misused term 'hacker' in to its sub categories provides descriptions of the categories and a psychological profile of the most common type.-------------------------------Hackers cannot be defined by skin color, religion, or race, nor can they properly be generalized as one group. Hackers are not a homogeneous group, they have a variety of values, beliefs and experience that can