💾 Archived View for spam.works › mirrors › textfiles › humor › sflvrs.hacker captured on 2023-11-14 at 10:18:00.

View Raw

More Information

⬅️ Previous capture (2023-06-14)

-=-=-=-=-=-=-

          >> A Beautiful obsession with the binary world <<
                         >> By Steven Levy <<

				She can kill all your files;
				She can freeze with a frown.
				And a wave of her hand brings the
				  whole system down.
				And she works on her code until ten
				  after three.
				She lives like a bat but she's always a
				  hacker to me.

				               - from the LOTS
						 Hacker songbook



THE LOW OVERHEAD Time-Sharing (LOTS) facility at Stanford University
is blanketed with an eerie calm. There are more than a hundred
students here, but they speak in whispers, as though they were in the
presence of something godlike. The cavernous main lobby, which reaches
up to a fourth-floor skylight (the building is the architectural soul
mate of the recently collapsed Kansas City Hyatt), holds a lounge in
which a dozen or so students are scattered, some pacing impatiently,
others snoozing, their heads resting on textbooks.  The names of these
students are on a computer queue; they are waiting for a free computer
terminal at the north end of the lobby, where each of perhaps fifty
cubicles is equipped with a keyboard and display screen.  Staring at
each of these terminals is a Stanford student, or someone posing as a
Stanford student in order to use the computer. In an adjoing room,
there are approximately sixty more terminals, also in use.  The hushed
voices give the occasional beeps of the computer an odd prominence,
and you can often hear the methodical, somewhat screechy churn of the
computer's printer in the other room.  But most of the noise is lost
because of the enormity of the lobby.  To the ear, this is an
electronic cathedral.
	It's well past midnight.
	Most of the students are under the whip of academic
discipline.  Siting in a rather formal posture, they tentatively key
in data and watch for the results on the display screen with skeptical
frowns.  They often consult their books before making another move.
These are the users.  For them, computers are functional, if over
complex, tools:  necessary evils.
	But to a small society that convenes here at LOTS, computers
are much more.  The big, orange-topped, million-dollar DECSYSTEM-20
(DEC-20) computer, visible behind a glass partition, looks no more
spectacular than a line of file cabinets, but it is the dominant icon
of these devotees' existence, the secret sharer of their dreams, their
instrument of power and creativity, their medium of communication,
their companion in merrymaking.  This is the society of hackers.
	Hackers are the mutant offspring of the eggheads who once
prowled throught engineering buildings with slide rules attached to
their belts.  The computer's power has made the hackers a subculture
to be reckoned with.  Their fellow students may consider them creepy,
but among themselves they are risk takers, exploreres, artists.  They
communicate with one another by intricate computer networks, speak in
their own jargon and qualify for lucrative jobs in which they will
create the complex programs essential for the everyday functioning of
our nation, our world.  They have the potential to be supercriminals,
to use digital skeleton keys to electronic vaults holding money,
confidential personal data and national security secrets.  But the
power is not without a price:  an addiction to computing, a conpulsion
to program.  And they think it's fun.
	I leave Newell to his PCL. There are about forty people still
using the computer. Each seems to be a self-sufficient system of man
and machine. It is almost four a.m.--the hour of the hacker.

"WITHIN THE NEXT twenty years, culture will be divided between those
who know something about the computer and those who don't. It's like
knowing how to read when the printing press was invented," says James
Milojkovic, a Stanford psychologist working toward a doctorate.
Milojkovic, a cheery Australian who studies "psychological issues in
computer interaction," has been watching hackers closely. He thinks
it's essential that we study them. "They are looked upon as sick and
strange; they see themselves as doing what everyone will be doing in
the future.  There's a real mystery to them, because they know things
that we don't.  They believe they have total control of what's going
on, because when you understand what the computer does, you can have
it do almost anything. Once you learn how, you're part of the
priesthood. It's a priesthood of the young. I've heard stories of
elementary school kids breaking into schools at night so they can use
the computer."
	Ernest Adams never figured to be a hacker. True, he like
computing, which he'd been doing since he was twelve; then he
experienced his first epiphany: "Here I was typing things, and the
machine was typing things back at me, and we're imagining we're
playing a space war!" Adams had a natural talent for computers, but he
thought he got it all out of his system in high school, when he hung
out with a group who would stay late tapping into the computer at the
nearby University of Kentucky. He came to Stanford to major in
physics--until sometime in his first quarter, when he wandered into
LOTS.
	Low Overhead Time-Sharing began at Stanford five years ago as
a twenty-four-hour self-service operation designed to encourage
student computer use. It was too successful. "The first student
coordinator dropped out of school because he got to involved with the
computer," says LOTS programmer J.Q. Johnson, "and several more got
pretty close."
	The Stanford community has witnessed previous generations of
hackers, mostly in the Artificial Intelligence Lab. But that group was
unique and pioneering. LOTS hackers are indicative of a new wave
haunting computing centers in colleges throughout the country. In many
cases, these new hackers, like Adams, have been raised on computers.
They have little experience with anything but computers. They often
don't care to learn about anything else. They associate only with
other hackers, speaking in the own strange jargon, always complaining
about some "bagbiting kluge," whistling in awe over some "winner's
cuspy, yet nontrivial" program. These words are delivered in a
high-pitched, goofy burst of verbiage that assumes the listener is
inputting data as quickly as a PDP-11. Uninformed non-hackers (called
users, often modified to lusers) have a word for these creatures:
nerd. But their attitude is also touched with a trace of envy, since
hackers know something the users don't.
	Five weeks away from home, Ernest Adams was unhappy. He
disliked dorm life. He was also suffering thorugh the tortuous throes
of unrequited love known only to seventeen-year-old males. Physics was
not going to solve his problems, so he came to LOTS. He sat down at a
terminal, opened an account, and for the next few hours, had a long
talk with the computer about its operating system. He'd found a
friend.
	"I became involved with LOTS to the exclusion of other
things," Ernest says. "I would come to drown my sorrows." His
expertise grew, and his programming ideas became grandiose. You could
do anything with a program. As Ralph Gorin, the director of LOTS, puts
it: "Who else do you know who will do whatever you tell it to?" Adams
has his own explanation: "It's knowing you can start from scratch,
create an object called a program, hand it to the computer and have
the computer start plotting beautiful graphs across the screen--and
you are personally responsible!" He smiles demonically beneath his
beard. "It's a little like playing God."
	The world that Adams has entered is based entirely on the
computer.  In this world, participants are asked to choose a new name,
and they often identify themselves with such fantasy monikers as
Gandalf or Bombadil.  With its multimillion-character memory, the
DEC-20 is sort of a home, an office, a babysitter and a best friend.
It will handle the most elaborate programs you can conceive of.  It
will play chekcers and robot war with you, and it will remind you,
with an accompanying bell, when it's time for dinner.  <Somewhere in
the computer memory is a list of pizzerias that deliver.> It will tell
you when your friends have logged into the system, and allow you to
send messages to them without leaving your terminal.  It will
entertain you with lewd limericks stored in its core.  It will type
your paper for you, help you with homework and, with its electronic
bulletin board, help you sell your roller skates.  If you get
restless, you can go exploring in the nooks and crannies of the
DEC-20's labyrinthine operating system, looking for stray bugs.
	The computer generates a closely knit community of disciples.
Hackers hang out with fellow hackers, meeting one another in
late-night sessions where they may crowd around the terminal of
someone who is preparing a hack that will, upon reaching "winnitude,"
be placed in the computer's operating system.  On six a.m. excursions
to breakfast, the talk is of the machine's new PASCAL language
compiler, or the upcoming trade of a program written at SCORE (another
computer facility at Stanford) for a digital electronic memory cache.
Violent arguments erupt over the relative virtues of LISP programming
language and PCL.  The arguments are fought in the weird, coldly
logical syntax that comes from working in the rigid linear protocol of
programming.
	Though some hackers won't socialize at all, most love to talk
computers.  On slight provocation they will overwhelm users with
arcanely detailed explanations of computer protocol.  But inevitably,
they return to their terminals.  Only rarely does the hacker community
gather together for special occasions, such as the recent fifth
anniversary of LOTS, when hackers faced the glass window of the
computer room and sang "Happy Birthday" to the DEC-20.  Otherwise, the
most social moments at LOTS come toward the end of each quarter, when
the lobby is packed with students waiting their turns at the computer.
Those waiting for terminals swill beer to the accompaniment of a
guitar-toting crooner singing hacker lyrics to the tunes of popular
songs.  Sing-along selections include "Fifty Ways to Write Your
Program," "LOTS Is Painless," "I Wonder How the System Is Doing
Tonight," "I Don't Know How to Log In" and "Fun Fun Fun Till Her Daddy
Took the Keyboard Away."
	To understand what hackers really >do< when they sit at
terminals until rough stubble emerges on their chins, you must
understand something about high-level computer programming.  You must
also set aside suspicions that computers are vile, impersonal
manipulators of numbers, and enemies of individuality.  To hackers,
programming is the mental equivalent of supersonic test piloting, and
the computer is a bottomless font of spirituality.
	A program is a set of instructions to the computer.  It
consists of lines of code usually written in a specific language that
the computer, equipped with suitable microprocessing translators, can
understand.  By telling the computer how to rearrange and access its
binary contents, each program allows the computer to perform a set of
functions, and the results might be anything from a Space Invaders
game to a mailing list.
	A program must be scrupulously constructed to perform its
function.  Former IBM software manager Frederick Brooks wrote in "The
Mythical Man-Month": "If one character, one pause of the incantation
is not in stricly proper form, the magic doesn't work."  But even
after it seems to work, there might be bugs in the program that will
affect performance.  A maniacal perfectionism is called for in
debugging.  While it may seem workaday, hackers think otherwise."
	"Debugging is like laying a long railroad track," says John
Levy, a software manager for Apple Computers.  "There's a little piece
you want to test, so you back up the locomotive five miles down the
road and at ninety miles an hour, you bring it across the track yo're
testing.  If everyting is perfect, it flies right over, but if there's
one flaw, the engine rools off, flying and crashing until it comes to
rest a mile down the track.  Only at that point do you get to see the
pieces."
	The ones who take the greatest programming challenges, who
fearlessly construct miles of fragile track and race the hugest
engines acrosss them, are hackers.  Just as the early astronauts
achieved legendary status, there is a hacker elite whose wizardry has
set them apart as digital daredevils.
	Don Woods is acknowledged to have the Right Stuff.  With long,
stringy black hair and a bearish grin, he looks somewhat older than
his twenty-nine years.  He works at Xerox and wears a dark GAMES
T-shirt that contrasts with his almost chalk-colored skin.  Pinned
next to the Xerox employee badge on his shirt is a button that reads
QUESTION AUTHORITY.  Wood is known as a classic, or canonical, hacker.
"Here's a quick hack I've been working on," he says.  He types a few
characters on his keyboard, and from the computer come the
calliopelike sounds of a rousing, Sousa-style marching song.  "I put
it together in a couple of days," he says.
	One of the results of Woods' epic hacks is Adventure, a
collaboration with Will Crowther.  Ostensibly a game, Adventure is a
metaphor for hacking.  When you begin Adventure, the computer tells
you your location: at a stream, near a forest, within sight of a small
brick building.  From there you embark on a Tolkeinesque journey
through the caverns and glens of a medieval land, encountering
murderous midgets, poisonous snakes, treacherous rapids, thieving
pirates and magazines written in dwarf language.  By telling the
computer the direction you wish to move (typeing N for north or U for
up, for example), the computer calculates where, on the unseen map
created in Woods' imaginations, you will wind up next, and displays a
written description of your next location.  You go deeper and deeper
into this netherworld, hoping to emerge by the same path with treasure
in hand.  There are almost 200 rooms you pass through on your way to
the treasure, many dotted with hazards, and the path crosses and
intertwines in ways impossible to divine without hours of exploration.
Adventure is the most popular game at LOTS, and indeed it is a
national craze among those with access to computers.  "I would show it
to people on a Fraday afternoon," Woods says, "and they wouldn't leave
their terminals until they finished it, maybe on Monday.
	Adventure is a kind of litmus test for hackers:  if you can
lose yourself in the gullies and misty caverns, you might be
susceptible to computer addiction.  Just as the plot of Adventure is a
world unto itself, the vast memory and operating system of a mainframe
computer is a gigantic landscape, seeming impenetrable but eventually
accessible to the most devoted seekers.  Just as everything in the
physical world is constructed of atoms, everything a computer
processes or reads is ultimately reduced to bits of either one or
zero.  Like treasure seekers in the subterranean Adventure world,
hackers are elcetronic spelunkers who have developed the skill to
burrow down from the more superficial programming languages to the
bedrock machine language of digits.  Woods call this "going down and
doing the grudgies."  To get involved this deeply, you must be able to
think in dizzyingly abstract terms.  Your mental concentration is so
intense that your conciousness is subsumed by the computer.
	When a hacker programs, he creates worlds.  A well-crafted
program - a good hack - is elegant, doing the most work in the fewest
lines of code.  If it displays wizardry and is fairly sophisticated,
hackers call it a nontrivial program, even though what the program
>does< might be absurdly frivolous.  Hackers judge themselves not on
criteria of compassion, wit, altruism or even the results of their
programs.  If your program cures cancer, fine.  If it helps a credit
bureau track down your uncle, tough.  What's important is the
brilliance of the program itself.
	"My level of judgment is technically oriented, one that would
disqualify many who consider themselves hackers," says Mark Crispin, a
systems programmer at SCORE.  "That is, what nontrivial program have
you written?  As opposed to logging in and sending bug reports and
flaming [translation:  bullshitting] on the bulletin board.  I
consider a nontrivial program to be something above a hundred lines of
text, and it depends on what language it is.  It requires some design,
a user interface, a significant amount of time to develop.  It doesn't
matter if the program itself is a great idea."
	Crispin has been holding court for me in the living room of
his condominium, which is decorated in middle-period graduate student
and distinguished only by a half-dozen hand-held computer games and a
terminal hooked up to the telephone.  Crispin is tall, pale, and
though he looks like he's never shaved, he's twenty-five.  He shares
the condo with his finacee, who had been a member of a hacking club at
Columbia University when she spotted a bug in one of Crispin's
programs she was using.  She sent him transcontinental computer mail,
he replied, and the digital correspondence led to a meeting and
eventually a proposal.  She listens approvingly as he speak in a nasal
voice that grows louder when he has a particular point to make.
	Crispin wants to show me something.  He bounds out of his
chair, heads for his terminal and calls the LOTS computer.  He types
in his password, ignores the computer message that tells him he has
electronic mail and demonstrates a program that generates sexual
quips.  Typing its name, Tingle, brings this to the screen:

"I'm back in the saddle again, again!..." shrieked the quadriplegic as
the lurid sabra savagely tossed away his well-cut pants and munched on
his spunk-filled pepperoni.

	Crispin admires the hell out of this hack.  "Tingle is
definitely a nontrivial program," he says.  "It has its own concept of
structured English sentences.  It is completely computer-generated.
Everything Tingle points out makes literal sense.  Tingle builds
scripts of what it's going to do; it remembers male and female
characteristics.  Only then does it randomly choose from vocabulary
columns."
	With all this hoopla, you'd think the program was perfect.
But no program is.  "The program can always work, but you can always
make it better," says Crispin. "You can always have it do something
new, make it perform faster, give it more structure, make it >do<
more!"  Crispin's voice is a high whine, and he's almost out of his
chair.  ">You can always think of ways to make it better!<" You're
never at the point where you stop.  Just when you say, 'It's totally
perfect,' you say, 'Gee, but I can make it do >this<!'"
	Is a computer program a work of art?  Mark Crispin thinks so,
and other hackers agree.  Hackers insist that each programmer wirtes
code in an individual, recognizable style.  Programmers work at a
level of creativity, they say, that is comparable to writing poetry,
composing, painting.  "You can express yourself by writing code," says
Marc LeBrun, a twenty-nine year-old hacker who never aytended college
but spent his teen years at Stanford's Artificial Intelligence Lab.
"And you begin to judge programs on high-level things like style.  You
say, is this a flavorful way to do this?  And people will often get
into huge arguemtnst about something that will ultimately make a
difference of a small microsecond but will have profound stylistic
implications."
	Hackers as artists!  Can it happen?  Will hackers give
dramatic renditions of their latest COBOL hacks?  Will we curl up on
the beach with a good, long word-processing program?  It seems
impossible, because the programmer's art is so self-contained,
esoterically personal, agressively elitist and void of the stuff of
human experience.  "People don't read programs like novels, that's
true," says Stanford computer scientis Dennis Allison. "And it's a
shame."

DON PARKER IS NO FAN of hackers.  Author of "Crime by Computer",
resident expert of computer abuse at the Stanford Research Institute
(SRI) and a lanky, three-piece-suited man who resembles an elongated
Donald Pleasance, Parker thinks that hackers promote an attitude that
could lead to disastrous results.
	Computers are highly prone to being tampered with by knowl-
edgeable intruders.  When a large computer is used in a time-sharing
system, safeguards are installed to prevent users from getting access
to the digital files of other users.  If a troublemaker succeeds in
getting these files, he not only can read the private notes but can
change and even erase them.  Parker fears hackers because they not
only have the know-how to crack security, but they regard these
safeguards as mountaineers regard Mount McKinley.  "The more barriers
you put up, the more compelling the incentive is to break them down,"
Parker says.  Marc LeBrun agrees:  "I think the hacker viewpoint is
that the world exists to hack," he says, "and there aren't any angels
with flaming swords standing over the world saying, 'Thou shalt not
push these buttons.'"
	If those angels existed, hackers would finds programs to dull
their swords.  Despite the best efforts of the business and military
establishment, the hacker-proof security system has yet to be devised.
When SRI gathered a team of crack programmers to test the
inviolability of military defense computers, the programmers were
shocked to find that it took them only one telephone call and a few
minutes to break into files containing top-secret information.
	"What we have to do is change the cultural values in this
[hacker] subculture," says Parker.  "there are instructors in high
school and universities who encourage people to attack security
systems as a means to learn more about computers.  There are people
who think of this a a matter of fun and games, a stimulating thing to
do."
	One idle form of hacker amusement is causing the computer to
crash, or temporarily break down.  I've asked at least six hackers to
explain the thrill of this, and I've received only inarticulate
sentence fragments to the effect of, well, it's >there<.  Maybe they
do it to show the computer who's boss.  One hacker bragged how he set
a few hundred programs into motion that constantly forked into other
programs, which begat even more programs, growing at a logarithmic
rate until the overloaded DEC-20 was brought to its knees.  "I guess
it's a phase everyone goes through," explains another hacker.
	Hackers everywhere delight in these tricks, the more harrowing
the better.  Take Julius Smith's Seppuku program.  Smith is a grad
student who hacks at Stanford's Computer Music Center; he has long
been engaged in a search for the algorithm of the violin.  Smith knows
the old hacker trick of giving an enticing name to a rogue program:
when a user peruses a system's menu and sees something call Seppuku,
he'll access it.  (All hackers have insatiable curiosity about other
programs.)  On the screen the user sees:
		Seppuku is not a program for honorable users.  Do not
		run Seppuku unless you can live with your shame.  Type
		y if you must run it.
	As soon as the poor sucker types 'y', the screen becomes
ablaze with six-inch letters shouting, "GOMEN NASAI!!"  This is
approximate Japanese for "Now you've done it."  The screen immediately
begins to list the titles of every file the user has ever stored in
the computer memory.  These files represent years of work.  "Do you
really want to delete all your files?"  the computer asks. DELETE?
Before the stunned user can fully comprehend the catastropghic
implications of this message, the computer answers with a 'Yes'.  One
by one the files are wiped off the screen.
	"Your every file directory has been deleted," says the
computer.  "Goodbye - have a good life." Then the user is logged out.
Screen blank.
	"Seppuku doesn't REALLY delete the files," says Smith.  "It
just looks like it does.  You see, hackers really don't hurt anyone."
	But once a hacker has the knowledge to crack security, he
simply has to be trusted.
		At a terminal sits a hacker and a wheel by his prompt
		And his screen shows the reminders
		Of every bug that broke his code or
		halted
		Till he cried out, in his anger and his shame
		I am leaving, logout, killjob, but the hacker still
		 remains....
	After a few quarters at Stanford, Ernest Adams began to
reassess hacking: what had it done for him?  What had it done TO him?
He had learned an incredible amount about computers but felt cut off
from the mainstream.  He had top grades in this programming courses
but had failed calculus because he spent too much time at LOTS.  He
looked at some of his fellow hackers and decided that their devotion
to computers was eroding their humanity.  Was he turning into a
maching himself?
	Stored within the LOTS computer memory is a computer bulletin
board that is open to comment and response from any user in the
system.  Items on B-Board range from lonely-hearts messages to offers
to sell bicycles, to long-winded debates about issues of school
politics, world affairs and computing ("If a computer had a voice,
which sex would it be?").
	One intense B-Board exchange dealt with the concerns Adams had
about excessive hacking.  The opening salvo was launced by a
disgruntled hacker who flamed about the narrowness, inhumanity and
addictiveness of hacking - he called LOTS an "alien culture" whose
inhabitans' personalities are irreversibly shaped by machine.  This
kicked off a running debate between those like Adams who agreed with
the gist of the attack, and hackers who defended their long hours of
interfacing with "the infinite tool."
	A Stanford psychology professor named Philip Zimbardo acquired
a printout of this debate and sent it to "Psychology Today", which
presented it as "The Hacker Papers," accompanied by Zimbardo's
commentary.  He suggested basically, that hackers would be well
advised to join the human race.  The article made many of the LOTS
hackers self conscious.  "I sometimes try to hide the fact that I'm a
hacker," says Dan Newell.  Others are now defensive at the least sign
of disapproval, charging their critis with "computerphobia."  "Why
single >us< out?" says one.  "Why not talk about how much time the
Stanford marching band practices?"
	All hackers, though, have a hedge against insecurity:  they
are needed.  "The computer field is growing at a termendous rate,"
says Dennis Allison, "and it's going to take a concentrated amount of
wizardy to bring it about."  As our dependence on computers increases,
it will be the hackers who can best create the supersoftware that will
keep society from imploding into a mass of jumbled bits.  An industry
study showed that one good programmer is as productive a ten merely
competent ones; a wizard-level programmer can almost name his price.
The viciously competitive computer firms are desparate for hackers,
who ask only for flexible working hours, no dress or etiquette
requirements, and, above all, nontrivial, trailblazing tasks.  Then
the hackers proceed to work sixteen-hour days until the project is
completed.  "There're lots of opportunities to make an obscene amount
of money," says LOTS staffer Bob Knight.
	Such "real world" pursuits (along with other distractions like
marriage and family) have the potential of eventually turning a hacker
from his computer extremism.  So, many of the LOTS hackers see
Stanford - and possibly graduate school - as a last chance to run amok
with the DEC-20.  As Julius Smith puts it:  "My [student] funding runs
out in a year.  This is my last chance to do something pure in my
life."
	Some hackers find ways of remaining "pure": taking on
temporary programming stints at Silicon Valley's high-tech operations,
keeping a connection with other hackers by illegal accounts on
university computers.
	But Ernest Adams prefers a more conventional existence.  He
wants to be counted among those who have hacked intensely for a year
or two, then managed to grow out of it.  He took off a quarter of his
sophomore year to work computers for the Viking Mars Landing Project,
and later took off more time to do some professional programming.  He
made a conscious effort to pay more attention to his other studies and
get back into the mainstream of users, nonwinners, and even people who
don't know a byte form an escape key.  He once was convince that
hacking was transitory, that society need not worry about it
proliferation.  Now he sees more hackers than ever, and he's not so
sure.  Still, he believes he has freed himself from computer
addiction.
	But old obsessions die hard.  Recently, at six in the morning,
Adams was at LOTS working at a terminal.  "Just editing a paper" was
his excuse.  But he offered no apologies for speaking in rapturous
tones about his planned thesis for a computer doctorate.
	"I would like to write a program that reproduces, that reacts
negatively or positively to its environment and, most important of
all, could be mutated by its environment.  I would like to see if I
could start several of these programs running, and start some sort of
superior program that watches them mutating, and see if they evolve.
That's the God program.  It invents the environment, reates the data
that the programs read, and will mutate the programs...."
	Adams flames on rabidly, his face lit up like a display for a
well-hacked game.  The God program will create hot spots to control
the motions of the one-celled programs.  A maturation factor will
control the growth and adolescence of the one-cells.  The program
might well duplicate the theory of natural selection, and be a kind of
vindication of Darwinian theory ....>I am leaving, logout, killjob,
but the hacker still remains.<

[end of article from April Rolling Stone by Steven Levy]