Hacking

525 views

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
525
On SlideShare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
5
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Hacking

  1. 1. December 6, 2011DiAmante Astillero, Shannon Bona, John Lo Casio and Marcelo Mazzocato
  2. 2.  Do you guys think of hackers as something good or bad?
  3. 3.  Someone who makes furniture with an axe? A joke thief? An illegal cab operator? One who enjoys the intellectual challenge of creatively overcoming or circumventing limitations.
  4. 4.  A person who enjoys exploring the details of programmable systems and how to stretch their capabilities, as opposed to most users, who prefer to learn only the minimum necessary.
  5. 5.  Attitude  Thrill from Solving Problems  Moral obligation to share results  Boredom and Drudgery are evil  Freedom is good. Distaste for authority
  6. 6.  Skills  Know how to program: Python, C/C++, Java, Perl, and LISP  Be able to use and run a Unix  Use the www and write HTML  English
  7. 7.  Status  Write open-source software  Help test and debug open-source software  Help keep the infrastructure working
  8. 8.  Like science fiction Martial arts (mental discipline) Meditation Analytical ear for music Puns and wordplayWhy these things in particular is not completely clear, but theyre connected with a mix of left- and right-brain skills that seems to be important
  9. 9.  John Conway’s The Game of Life Cellular Automation 4 rules:  1. A dead (white) cell will become alive if surrounded by exactly 3 alive neighbors.  2. A black (alive) cell surrounded by none or 1 neighbor will die.  3. A black cell surrounded by 2 or 3 neighbors will survive to the next generation.  4. A black cell surrounded by 4 or more neighbors, it will die by overpopulation. The Glider
  10. 10.  Hackers build Crackers destroy (viruses, security breaches) Video

×