Return Styles: Pseud0ch, Terminal, Valhalla, NES, Geocities, Blue Moon.

Pages: 1-

CAPTCHA

Name: Anonymous 2010-09-03 9:59

Hey Guys I Love /B/ But Now It has Captcha

Can anyone give me a hack program? And why you don't have CAPTCHA???

Name: Anonymous 2010-09-03 10:01

Hey Guys I Love /B/ But Now It has Captcha
So this is where the imageboard cretins keep their capital letters!

Can anyone give me a hack program?
Trivially googleable.

And why you don't have CAPTCHA???
We don't make worthless single-word posts that say ``lulz'' or ``epic'' or ``newfag'' (ugh).

Name: Anonymous 2010-09-03 10:02

You misunderstand the meaning of hacking.

The hacking community developed at MIT and some other universities in the 1960s and 1970s. Hacking included a wide range of activities, from writing software, to practical jokes, to exploring the roofs and tunnels of the MIT campus. Other activities, performed far from MIT and far from computers, also fit hackers' idea of what hacking means: for instance, I think the controversial 1950s "musical piece" by John Cage, 4'33", which has no notes, is more of a hack than a musical composition. The palindromic three-part piece written by Guillaume de Machaut in the 1300s, "Ma Fin Est Mon Commencement", was also a good hack, even better because it also sounds good. Puck appreciated hack value.

It is hard to write a simple definition of something as varied as hacking, but I think what these activities have in common is playfulness, cleverness, and exploration. Thus, hacking means exploring the limits of what is possible, in a spirit of playful cleverness. Activities that display playful cleverness have "hack value".

Hackers typically had little respect for the silly rules that administrators like to impose, so they looked for ways around. For instance, when computers at MIT started to have "security" (that is, restrictions on what users could do), some hackers found clever ways to bypass the security, partly so they could use the computers freely, and partly just for the sake of cleverness (hacking does not need to be useful). However, only some hackers did this—many were occupied with other kinds of cleverness, such as placing some amusing object on top of MIT's great dome (**), finding a way to do a certain computation with only 5 instructions when the shortest known program required 6, writing a program to print numbers in roman numerals, or writing a program to understand questions in English.

Meanwhile, another group of hackers at MIT found a different solution to the problem of computer security: they designed the Incompatible Timesharing System without security "features". In the hacker's paradise, the glory days of the Artificial Intelligence Lab, there was no security breaking, because there was no security to break. It was there, in that environment, that I learned to be a hacker, though I had shown the inclination previously. We had plenty of other domains in which to be playfully clever, without building artificial security obstacles which then had to be overcome.

Yet when I say I am a hacker, people often think I am making a naughty admission, presenting myself specifically as a security breaker. How did this confusion develop?

Around 1980, when the news media took notice of hackers, they fixated on one narrow aspect of real hacking: the security breaking which some hackers occasionally did. They ignored all the rest of hacking, and took the term to mean breaking security, no more and no less. The media have since spread that definition, disregarding our attempts to correct them. As a result, most people have a mistaken idea of what we hackers actually do and what we think.

You can help correct the misunderstanding simply by making a distinction between security breaking and hacking—by using the term "cracking" for security breaking. The people who do it are "crackers". Some of them may also be hackers, just as some of them may be chess players or golfers; most of them are not.

Name: Anonymous 2010-09-03 10:03

>>2
Stop encouraging transparent trolls.

Name: Anonymous 2010-09-03 10:07

>>1,2,4
SPAWHNBT

Name: VIPPER 2010-09-03 10:24

JEWS JEWS

Name: Anonymous 2010-09-03 10:26

lulz

Name: VIPPER 2010-09-03 10:42

JEWS

Name: Anonymous 2010-09-03 10:50

>>3
This explanation of hacking sounds like Richard Stallman or at least a contemporary of Stallman. I dont think that people realize that Stallman's definition of hacking pervades his whole concept of how the software industry should be run. Here is an article I found that I think sheds light on that:
http://www.gnu.org/gnu/rms-lisp.html

an exerpt:


There were two different ideas about what this company should be like. Greenblatt wanted to start what he called a “hacker” company. This meant it would be a company run by hackers and would operate in a way conducive to hackers. Another goal was to maintain the AI Lab culture (1). Unfortunately, Greenblatt didn't have any business experience, so other people in the Lisp machine group said they doubted whether he could succeed. They thought that his plan to avoid outside investment wouldn't work.

Why did he want to avoid outside investment? Because when a company has outside investors, they take control and they don't let you have any scruples. And eventually, if you have any scruples, they also replace you as the manager.

So Greenblatt had the idea that he would find a customer who would pay in advance to buy the parts. They would build machines and deliver them; with profits from those parts, they would then be able to buy parts for a few more machines, sell those and then buy parts for a larger number of machines, and so on. The other people in the group thought that this couldn't possibly work.

Greenblatt then recruited Russell Noftsker, the man who had hired me, who had subsequently left the AI Lab and created a successful company. Russell was believed to have an aptitude for business. He demonstrated this aptitude for business by saying to the other people in the group, “Let's ditch Greenblatt, forget his ideas, and we'll make another company.” Stabbing in the back, clearly a real businessman. Those people decided they would form a company called Symbolics. They would get outside investment, not have scruples, and do everything possible to win.

But Greenblatt didn't give up. He and the few people loyal to him decided to start Lisp Machines Inc. anyway and go ahead with their plans. And what do you know, they succeeded! They got the first customer and were paid in advance. They built machines and sold them, and built more machines and more machines. They actually succeeded even though they didn't have the help of most of the people in the group. Symbolics also got off to a successful start, so you had two competing Lisp machine companies. When Symbolics saw that LMI was not going to fall flat on its face, they started looking for ways to destroy it.

Thus, the abandonment of our lab was followed by “war” in our lab. The abandonment happened when Symbolics hired away all the hackers, except me and the few who worked at LMI part-time. Then they invoked a rule and eliminated people who worked part-time for MIT, so they had to leave entirely, which left only me. The AI lab was now helpless. And MIT had made a very foolish arrangement with these two companies. It was a three-way contract where both companies licensed the use of Lisp machine system sources. These companies were required to let MIT use their changes. But it didn't say in the contract that MIT was entitled to put them into the MIT Lisp machine systems that both companies had licensed. Nobody had envisioned that the AI lab's hacker group would be wiped out, but it was.

So Symbolics came up with a plan (4). They said to the lab, “We will continue making our changes to the system available for you to use, but you can't put it into the MIT Lisp machine system. Instead, we'll give you access to Symbolics' Lisp machine system, and you can run it, but that's all you can do.”

This, in effect, meant that they demanded that we had to choose a side, and use either the MIT version of the system or the Symbolics version. Whichever choice we made determined which system our improvements went to. If we worked on and improved the Symbolics version, we would be supporting Symbolics alone. If we used and improved the MIT version of the system, we would be doing work available to both companies, but Symbolics saw that we would be supporting LMI because we would be helping them continue to exist. So we were not allowed to be neutral anymore.

Up until that point, I hadn't taken the side of either company, although it made me miserable to see what had happened to our community and the software. But now, Symbolics had forced the issue. So, in an effort to help keep Lisp Machines Inc. going (2) — I began duplicating all of the improvements Symbolics had made to the Lisp machine system. I wrote the equivalent improvements again myself (i.e., the code was my own).

After a while (3), I came to the conclusion that it would be best if I didn't even look at their code. When they made a beta announcement that gave the release notes, I would see what the features were and then implement them. By the time they had a real release, I did too.

In this way, for two years, I prevented them from wiping out Lisp Machines Incorporated, and the two companies went on. But, I didn't want to spend years and years punishing someone, just thwarting an evil deed. I figured they had been punished pretty thoroughly because they were stuck with competition that was not leaving or going to disappear(6). Meanwhile, it was time to start building a new community to replace the one that their actions and others had wiped out.

Name: Anonymous 2010-09-03 10:50

What a shitty thread.

Name: Anonymous 2010-09-03 10:55

Name: Anonymous 2010-09-03 11:07

>>9
RMS doesn't care if software businesses are composed of hackers or dime-a-dozen code monkeys. He petitions for user freedoms - the right to hack and the right to share and cooperate within a community.

Name: Anonymous 2010-09-03 11:08

OP- I hope you succeed. 4chan is played out, time to send it into the shitter

Name: Anonymous 2010-09-03 11:12

>>12
The freedom to study how the program works, and change it to make it do what you wish (freedom 1). Access to the source code is a precondition for this.

kind of cute how rms appends "access to the source code" like requiring all code to be open source is just a precondition to be taken for granted. like people arent going to notice that freedom = all code required to be open source

Name: Anonymous 2010-09-03 11:17

>>14
Implying RMS does open source

Name: Anonymous 2010-09-03 11:20

>>15
Im not just implying that RMS does open source, I pasted his own words of freedom#1 that REQUIRE ALL CODE TO BE OPEN SOURCE

here, let me paste that again:
Access to the source code is a precondition for this.
In order to have access to code it has to be permanently OPEN SOURCE

Name: Anonymous 2010-09-03 11:28

The term “open source” software is used by some people to mean more or less the same category as free software. It is not exactly the same class of software: they accept some licenses that we consider too restrictive, and there are free software licenses they have not accepted. However, the differences in extension of the category are small: nearly all free software is open source, and nearly all open source software is free.

Name: Anonymous 2010-09-03 11:48

>>16
No. Please don't confuse the term open source to mean 'source is visible'. To RMS, 'open source' means "a software development process". RMS doesn't care about any software development process which is why he doesn't do open source.

Name: Anonymous 2010-09-03 12:53

>>10
Are you still surprised by shiity threads on /prog/?

Name: Anonymous 2011-02-04 19:49

Name: Anonymous 2012-02-02 9:12

lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz lulz

Name: Anonymous 2012-02-02 14:03

HEY GUYS CHECK MY DUBS DUBS DUBS DUBS DUBS DUBS DUBS DUBS DUBS
DUBS DUBS DUBS DUBS DUBS DUBS DUBS DUBS DUBS DUBS DUBS DUBS DUBS
DUBS DUBS DUBS DUBS DUBS DUBS DUBS DUBS DUBS DUBS DUBS DUBS DUBS
DUBS DUBS DUBS DUBS DUBS DUBS DUBS DUBS DUBS DUBS DUBS DUBS DUBS
DUBS DUBS DUBS DUBS DUBS DUBS DUBS DUBS DUBS DUBS DUBS DUBS DUBS
DUBS DUBS DUBS DUBS DUBS DUBS DUBS DUBS DUBS DUBS DUBS DUBS DUBS
DUBS DUBS DUBS DUBS DUBS DUBS DUBS DUBS DUBS DUBS DUBS DUBS DUBS
DUBS DUBS DUBS DUBS DUBS DUBS DUBS DUBS DUBS DUBS DUBS DUBS DUBS
DUBS DUBS DUBS DUBS DUBS DUBS DUBS DUBS DUBS DUBS DUBS DUBS DUBS
DUBS DUBS DUBS DUBS DUBS DUBS DUBS DUBS DUBS DUBS DUBS DUBS DUBS
DUBS DUBS DUBS DUBS DUBS DUBS DUBS DUBS DUBS DUBS DUBS DUBS DUBS
DUBS DUBS DUBS DUBS DUBS DUBS DUBS DUBS DUBS DUBS DUBS DUBS DUBS
DUBS DUBS DUBS DUBS DUBS DUBS DUBS DUBS DUBS DUBS DUBS DUBS DUBS
DUBS DUBS DUBS DUBS DUBS DUBS DUBS DUBS DUBS DUBS DUBS DUBS DUBS
DUBS DUBS DUBS DUBS DUBS DUBS DUBS DUBS DUBS DUBS DUBS DUBS DUBS
DUBS DUBS DUBS DUBS DUBS DUBS DUBS DUBS DUBS DUBS DUBS DUBS DUBS

Name: Anonymous 2012-02-02 18:07

>>21
No giving yourself the alley-oop, ``winner''!

Name: Anonymous 2012-03-01 3:44

help with captcha!

Name: Anonymous 2012-06-08 14:14

captcha"

Don't change these.
Name: Email:
Entire Thread Thread List