The Hacker's Code of Ethics
来源:互联网 发布:知世故而不世故 林黛玉 编辑:程序博客网 时间:2024/04/29 15:00
Levy (1984) suggests that there is a "code of ethics" for hacking which, though not pasted on the walls, is in the air:
- Access to Computers - and anything which might teach you something about the way the world works - should be unlimited and total. Always yield to the Hands-On Imperative!
- All information should be free.
- Mistrust Authority - Promote Decentralization.
- Hackers should be judged by their hacking, not bogus criteria such as degrees, age, race, or position.
- You can create art and beauty on a computer.
- Computers can change your life for the better.
Reference:
Levy, Steven. 1984. Hackers: Heroes of the Computer Revolution, Anchor Press/Doubleday, Garden City, NY, 458 pp.
Last updated 97/02/24
J.A.N. Lee.
- The Hacker's Code of Ethics
- The Hacker's Code
- The Handbook of Information and Computer Ethics
- Software Engineering Code of Ethics and Professional Practices
- Ethics of Using Wireless Transmission
- The Web Application Hacker's Handbook
- The Web Application Hacker's Handbook
- The Web Application Hacker's Handbook
- The Antivirus Hacker's Handbook 读书笔记
- ethics
- The Best of 2600: A Hacker Odyssey
- The Ethics of Belief, by William K. Clifford
- the code of love
- The Database Hacker's Handbook : Defending Database Servers
- The Database Hacker's Handbook: Defending Database Servers
- The Oracle Hacker's Handbook: Hacking and Defending Oracle
- The Database Hacker's Handbook: Defending Database Servers
- The Top 9½ In a Hacker’s Bookshelf
- Cygwin&Vim 搭建Mainframe IDE [13] - 在Vim中集成Cygwin的bash
- The Hacker's Code
- 本人属虎
- SharpDevelop源码分析笔记(一)
- 身為中國人簡直系一種恥辱
- The Hacker's Code of Ethics
- C++调用JAVA方法详解(转)
- MMU: 存储器管理单元
- VS2005和Oracle的环境配置
- fedora12使用eclipse,切换SVN帐号
- Allegro中导出Gerber文件和钻孔数据文件方法步骤
- SQL SERVER 将日期转换为格式化字符串
- 重新获得验证码
- double 计算精度的问题