Free & Open Source Software Stéphane Couture, Université De
Total Page:16
File Type:pdf, Size:1020Kb

Load more
Recommended publications
-
Hacker Culture & Politics
HACKER CULTURE & POLITICS COMS 541 (CRN 15368) 1435-1725 Department of Art History and Communication Studies McGill University Professor Gabriella Coleman Fall 2012 Arts W-220/ 14:35-17:25 Professor: Dr. Gabriella Coleman Office: Arts W-110 Office hours: Sign up sheet Tuesday 2:30-3:30 PM Phone: xxx E-mail: [email protected] OVERVIEW This course examines computer hackers to interrogate not only the ethics and technical practices of hacking, but to examine more broadly how hackers and hacking have transformed the politics of computing and the Internet more generally. We will examine how hacker values are realized and constituted by different legal, technical, and ethical activities of computer hacking—for example, free software production, cyberactivism and hactivism, cryptography, and the prankish games of hacker underground. We will pay close attention to how ethical principles are variably represented and thought of by hackers, journalists, and academics and we will use the example of hacking to address various topics on law, order, and politics on the Internet such as: free speech and censorship, privacy, security, surveillance, and intellectual property. We finish with an in-depth look at two sites of hacker and activist action: Wikileaks and Anonymous. LEARNER OBJECTIVES This will allow us to 1) demonstrate familiarity with variants of hacking 2) critically examine the multiple ways hackers draw on and reconfigure dominant ideas of property, freedom, and privacy through their diverse moral 1 codes and technical activities 3) broaden our understanding of politics of the Internet by evaluating the various political effects and ramifications of hacking. -
Coleman-Coding-Freedom.Pdf
Coding Freedom !" Coding Freedom THE ETHICS AND AESTHETICS OF HACKING !" E. GABRIELLA COLEMAN PRINCETON UNIVERSITY PRESS PRINCETON AND OXFORD Copyright © 2013 by Princeton University Press Creative Commons Attribution- NonCommercial- NoDerivs CC BY- NC- ND Requests for permission to modify material from this work should be sent to Permissions, Princeton University Press Published by Princeton University Press, 41 William Street, Princeton, New Jersey 08540 In the United Kingdom: Princeton University Press, 6 Oxford Street, Woodstock, Oxfordshire OX20 1TW press.princeton.edu All Rights Reserved At the time of writing of this book, the references to Internet Web sites (URLs) were accurate. Neither the author nor Princeton University Press is responsible for URLs that may have expired or changed since the manuscript was prepared. Library of Congress Cataloging-in-Publication Data Coleman, E. Gabriella, 1973– Coding freedom : the ethics and aesthetics of hacking / E. Gabriella Coleman. p. cm. Includes bibliographical references and index. ISBN 978-0-691-14460-3 (hbk. : alk. paper)—ISBN 978-0-691-14461-0 (pbk. : alk. paper) 1. Computer hackers. 2. Computer programmers. 3. Computer programming—Moral and ethical aspects. 4. Computer programming—Social aspects. 5. Intellectual freedom. I. Title. HD8039.D37C65 2012 174’.90051--dc23 2012031422 British Library Cataloging- in- Publication Data is available This book has been composed in Sabon Printed on acid- free paper. ∞ Printed in the United States of America 1 3 5 7 9 10 8 6 4 2 This book is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE !" We must be free not because we claim freedom, but because we practice it. -
Hacked: a Radical Approach to Hacker Culture and Crime by Kevin F.Steinmetz Richard A
International Social Science Review Volume 93 | Issue 2 Article 10 Book Review: Hacked: A Radical Approach to Hacker Culture and Crime by Kevin F.Steinmetz Richard A. Almeida Francis Marion University Follow this and additional works at: https://digitalcommons.northgeorgia.edu/issr Part of the Anthropology Commons, Communication Commons, Economics Commons, Geography Commons, International and Area Studies Commons, Political Science Commons, and the Public Affairs, Public Policy and Public Administration Commons Recommended Citation Almeida, Richard A. () "Book Review: Hacked: A Radical Approach to Hacker Culture and Crime by Kevin F.Steinmetz," International Social Science Review: Vol. 93 : Iss. 2 , Article 10. Available at: https://digitalcommons.northgeorgia.edu/issr/vol93/iss2/10 This Book Review is brought to you for free and open access by Nighthawks Open Institutional Repository. It has been accepted for inclusion in International Social Science Review by an authorized editor of Nighthawks Open Institutional Repository. Almeida: Book Review: Hacked Steinmetz, Kevin F. Hacked: A Radical Approach to Hacker Culture and Crime. 2016. New York: New York University Press. xv + 285 pages. Paperback, $28. “Hackers” and “hacking” occupy a complicated place in twenty-first century American life. Images of misfit teenagers, sinister manipulators of the democratic process, and monomaniacally-focused corporate intruders abound. Kevin Steinmetz acknowledges that those archetypes have some legitimacy but makes a convincing case that “craftsperson,” “guild member,” and “exploited proletarian” should be added to the iconography of hacking. On his account, hackers and hacker culture occupy an interesting and important place in American culture and the post-Fordist economy, one that can be fruitfully explored with a “radical” (Marx- inspired) approach. -
Open Source Software Development: an Overview
COMPUTING PRACTICES Open Source Software Development: An Overview Although some challenge the value of open source software development,its popularity cannot be disputed. This overview of open source licensing and development models describes some of the movement’s main principles. Ming-Wei Wu roprietary software vendors operate on a seeks to develop Unix-compatible software and return closed-source model: They develop their software to a state of freedom. Ying-Dar Lin own software and release that software to Stallman is both an open source evangelist and a National the public with the intention of gaining mar- major open source contributor as the principal author Chiao Tung University, ket penetration and earning a profit. The of the GNU C Compiler (GCC), GNU symbolic Taiwan Popen source movement, while still profitable in many debugger (GDB), GNU Emacs, and more. All these ways to profit-oriented companies, relies on a differ- packages provide essential tools for GNU/Linux. The ent set of practices. In the open source movement, Red Hat 7.1 distribution, which collects some 1,016 everyone capable of writing code is welcome to join packages altogether, contains 70 GNU packages. in, a strategy that—according to open source advo- The purpose of the Free Software Foundation is not cates—directly leads to more robust software and to ensure distributing software to the end user without more diverse business models. cost, but to ensure that the end user can use the soft- While some challenge the general assumptions ware freely. From the Free Software Foundation’s per- about the benefits of open source software develop- spective, the term “free software” has nothing to do ment,1 the evidence of popular buy-in cannot be dis- with price: A program is free software if you have the puted. -
Free As in Freedom (2.0): Richard Stallman and the Free Software Revolution
Free as in Freedom (2.0): Richard Stallman and the Free Software Revolution Sam Williams Second edition revisions by Richard M. Stallman i This is Free as in Freedom 2.0: Richard Stallman and the Free Soft- ware Revolution, a revision of Free as in Freedom: Richard Stallman's Crusade for Free Software. Copyright c 2002, 2010 Sam Williams Copyright c 2010 Richard M. Stallman Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.3 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the section entitled \GNU Free Documentation License." Published by the Free Software Foundation 51 Franklin St., Fifth Floor Boston, MA 02110-1335 USA ISBN: 9780983159216 The cover photograph of Richard Stallman is by Peter Hinely. The PDP-10 photograph in Chapter 7 is by Rodney Brooks. The photo- graph of St. IGNUcius in Chapter 8 is by Stian Eikeland. Contents Foreword by Richard M. Stallmanv Preface by Sam Williams vii 1 For Want of a Printer1 2 2001: A Hacker's Odyssey 13 3 A Portrait of the Hacker as a Young Man 25 4 Impeach God 37 5 Puddle of Freedom 59 6 The Emacs Commune 77 7 A Stark Moral Choice 89 8 St. Ignucius 109 9 The GNU General Public License 123 10 GNU/Linux 145 iii iv CONTENTS 11 Open Source 159 12 A Brief Journey through Hacker Hell 175 13 Continuing the Fight 181 Epilogue from Sam Williams: Crushing Loneliness 193 Appendix A { Hack, Hackers, and Hacking 209 Appendix B { GNU Free Documentation License 217 Foreword by Richard M. -
Open Source and Journalism: Toward New Frameworks for Imagining News
MCS35510.1177/0163443713485494Media, Culture & SocietyLewis and Usher 4854942013 Article Media, Culture & Society 35(5) 602 –619 Open source and journalism: © The Author(s) 2013 Reprints and permissions: toward new frameworks for sagepub.co.uk/journalsPermissions.nav DOI: 10.1177/0163443713485494 imagining news innovation mcs.sagepub.com Seth C Lewis University of Minnesota, USA Nikki Usher George Washington University, USA Abstract Journalists and technologists increasingly are organizing and collaborating, both formally and informally, across major news organizations and via grassroots networks on an international scale. This intersection of so-called ‘hacks and hackers’ carries with it a shared interest in finding technological solutions for news, particularly through open- source software programming. This article critically evaluates the phenomenon of open source in journalism, offering a theoretical intervention for understanding this phenomenon and its potential implications for newswork. Building on the literature from computer science and journalism, we explore the concept of open source as both a structural framework of distributed development and a cultural framework of pro- social hacker ethics. We identify four values of open-source culture that connect with and depart from journalism—transparency, tinkering, iteration, and participation—and assess their opportunities for rethinking journalism innovation. Keywords computational journalism, data, hackers, innovation, journalism studies, online journalism, open source, participation, -
The Digital Revolution and the Hackers Culture
The Digital Revolution and the Hackers Culture. Elective course 3rd module (Feb-Mar) 2019 Fabio Grazioso Introduction Aims of the Course • To study of the history and evolution of digital technologies • To learn the details of some examples of digital technologies and digital media • To read authors who have contributed to the debate on digital technologies • To develop critical thinking with regards to technology (in particular digital technology) Digital Technology • Computers • Computer Networks • Mobile phones • eBooks • Podcasts • Music • Movies Digital Technology • Computers • Computer Networks • Mobile phones • eBooks • Podcasts • Music • Movies Digital Technology • Computers • Computer Networks • Mobile phones • eBooks • Podcasts • Music • Movies Digital Technology • Computers • Computer Networks • Mobile phones • eBooks • Podcasts • Music • Movies Digital Technology • Computers • Computer Networks • Mobile phones • eBooks • Podcasts • Music • Movies some consequences of digital technology • easy to copy • easy to transmit (error correction) • question identity • question reality • digital is “less natural” (e.g. writing) question identity => identity theft question reality => Philip K. Dick New “questions” • ownership • authenticity Postmodernism From Wikipedia: «[…] postmodernism is generally defined by an attitude of skepticism, irony, or rejection toward the meta-narratives and ideologies of modernism, often calling into question various assumptions of Enlightenment rationality. Consequently, common targets of postmodern critique include universalist notions of objective reality, morality, truth, human nature, reason, language, and social progress.» postmodernism is generally defined by an attitude of skepticism, irony, or rejection toward the meta-narratives and ideologies of modernism, often calling into question various assumptions of Enlightenment rationality. Consequently, common targets of postmodern critique include universalist notions of objective reality, morality, truth, human nature, reason, language, and social progress. -
Cyberpunk & Hacker Culture
Cyberpunk & Hacker Culture - From Fiction to Reality Keren Elazari, CISSP Cyber Security Expert Tel Aviv , Israel Session ID: MASH-W26A Session Classification: General Interest ABOUT +10 Years in Cyber Security Fortune 500 companies Security technology vendors Teaching Fellow, Singularity University www.k3r3n3.com TECHNOLOGY >>> REALITY www.k3r3n3.com www.k3r3n3.com www.k3r3n3.com www.k3r3n3.com www.k3r3n3.com www.k3r3n3.com SCIENCE FICTION >>> REALITY www.k3r3n3.com www.k3r3n3.com BLADE RUNNER - 1982 www.k3r3n3.com NERUOMANCER - 1982 www.k3r3n3.com www.k3r3n3.com www.k3r3n3.com THE MATRIX - 1999 www.k3r3n3.com www.k3r3n3.com THE FUTUROLOGICAL CONGRESS www.k3r3n3.com GIRL WITH THE DRAGON TATTOO www.k3r3n3.com WOMEN IN CYBER FRONTIERS ► Joanna Rutkowska ► Jeri Elseworth ► Limor Fried ► Hilary Mason ► Kaliya Hamlin ► Del Harvey ► Linux Chicks ► “Women Who Code” ► Grace Hopper Celebration of “Women in Computing” www.k3r3n3.com HACKERS OF FICTION NeuroMancer, Case, Molly Millions, Hero Protagonist, YT, Johnny Mnemonic, BioHazard, Spider, V, Neo, Morpheus , Trinity , Zero Cool, CrashOverRide, Cereal Killer , AcidBurn www.k3r3n3.com THIS TEAM MADE CYBERSPACE www.k3r3n3.com HACKERS OF THE WORLD UNITE! www.k3r3n3.com HACKERS OF FAME & FORTUNE THE CAPTAIN KEVIN ANALYZER CRUNCH MITNICK www.k3r3n3.com WARGAMES - 1983 www.k3r3n3.com www.k3r3n3.com www.k3r3n3.com www.k3r3n3.com www.k3r3n3.com www.k3r3n3.com www.k3r3n3.com www.k3r3n3.com MIND READING MACHINES? www.k3r3n3.com HACKING EMBEDDED DEVICES www.k3r3n3.com www.k3r3n3.com LEPHT ANONYM, A CYBORG www.k3r3n3.com THE FUTURE OF HACKING www.k3r3n3.com CYBERPUNK FICTION HAS INSPIRED HACKER REALITY www.k3r3n3.com HACKING IS THE 21ST CENTURY FORM OF POWER! www.k3r3n3.com HACK THE PLANET www.k3r3n3.com THANK YOU! WWW.K3R3N3.COM Twitter: @k3r3n3 LinkedIn.com/in/kerene . -
Hacking: the Performance of Technology? Cathy Legg Cycorp, University of Melbourne
Techné 9:2 Winter 2005 Legg, The Performance of Technology? / 151 Hacking: The Performance of Technology? Cathy Legg Cycorp, University of Melbourne Thomas, Douglas. 2002. Hacker Culture. Minneapolis: University of Minnesota Press. The word “hacker” has an interesting double-meaning: one vastly more widespread connotation of technological mischief, even criminality, and an original meaning amongst the tech-savvy as a term of highest approbation. Both meanings, however, share the idea that hackers possess a superior ability to manipulate technology according to their will (and, as with God, this superior ability to exercise will is a source of both mystifying admiration and fear). This book mainly concerns itself with the former meaning. To Thomas this simultaneously mystified and vilified, elusive set of individuals exemplifies “the performance of technology” (xx), showing the way in which “the cultural, social and political history of the computer...is fraught with complexity and contradictions” (ix). In fact, he claims that hacking is more a cultural than a technological phenomenon, citing Heidegger’s, “[t]he essence of technology is not anything technological” (56). In part one of the book, “The Evolution of The Hacker,” Thomas claims secrecy to be the defining issue of “hacker culture.” Society has an ambivalent, contradictory relationship to secrecy, which the pranks of hackers highlight in paradoxical and/or ‘supplementary’ ways. For instance, “[s]ecrets can preserve an institution’s identity, but...they can also prevent a hacker from being identified” (xi). Hackers play with these contradictions (the hacker “both deploys and disturbs the notion of the secret” (189)). Thomas seeks a “genealogy of secrecy” in the Foucauldian sense. -
The Open Source Software Development Phenomenon: an Analysis Based on Social Network Theory
THE OPEN SOURCE SOFTWARE DEVELOPMENT PHENOMENON: AN ANALYSIS BASED ON SOCIAL NETWORK THEORY Greg Madey Vincent Freeh Computer Science & Engineering Computer Science & Engineering University of Notre Dame University of Notre Dame [email protected] [email protected] Renee Tynan Department of Management University of Notre Dame [email protected] Abstract The OSS movement is a phenomenon that challenges many traditional theories in economics, software engineering, business strategy, and IT management. Thousands of software programmers are spending tremendous amounts of time and effort writing and debugging software, most often with no direct monetary compensation. The programs, some of which are extremely large and complex, are written without the benefit of traditional project management, change tracking, or error checking techniques. Since the programmers are working outside of a traditional organizational reward structure, accountability is an issue as well. A significant portion of internet e-commerce runs on OSS, and thus many firms have little choice but to trust mission-critical e-commerce systems to run on such software, requiring IT management to deal with new types of socio-technical problems. A better understanding of how the OSS community functions may help IT planners make more informed decisions and develop more effective strategies for using OSS software. We hypothesize that open source software development can be modeled as self-organizing, collaboration, social networks. We analyze structural data on over 39,000 open source projects hosted at SourceForge.net involving over 33,000 developers. We define two software developers to be connected — part of a collaboration social network — if they are members of the same project, or are connected by a chain of connected developers. -
How to Become a Hacker
How To Become A Hacker Eric Steven Raymond Copyright © 2001 Eric S. Raymond Table of Contents Why This Document? What Is a Hacker? The Hacker Attitude 1. The world is full of fascinating problems waiting to be solved. 2. No problem should ever have to be solved twice. 3. Boredom and drudgery are evil. 4. Freedom is good. 5. Attitude is no substitute for competence. Basic Hacking Skills 1. Learn how to program. 2. Get one of the open-source Unixes and learn to use and run it. 3. Learn how to use the World Wide Web and write HTML. 4. If you don't have functional English, learn it. Status in the Hacker Culture 1. Write open-source softwareA 2. Help test and debug open-source software 3. Publish useful information 4. Help keep the infrastructure working 5. Serve the hacker culture itself The Hacker/Nerd Connection Points For Style Historical Note: Hacking, Open Source, and Free Software Other Resources Frequently Asked Questions Why This Document? As editor of the Jargon File and author of a few other well-known documents of similar nature, I often get email requests from enthusiastic network newbies asking (in effect) "how can I learn to be a wizardly hacker?". Back in 1996 I noticed that there didn't seem to be any other FAQs or web documents that addressed this vital question, so I started this one. A lot of hackers now consider it definitive, and I suppose that means it is. Still, I don't claim to be the exclusive authority on this topic; if you don't like what you read here, write your own. -
The Manifestation of Hacker Culture
The Hackers of New York City By Stig-Lennart Sørensen Thesis submitted as part of Cand. Polit degree at the Department of Social Anthropology, Faculty of Social Science, University of Tromsø. May 2003 The Hackers of New York City - List of Illustrations Contents LIST OF ILLUSTRATIONS .................................................................................................. 3 PREFACE ................................................................................................................................. 4 INTRODUCTION....................................................................................................................5 MY INTENTIONS WITH THIS PAPER.............................................................................. 8 PROBLEM POSITIONING.................................................................................................... 8 ENTERING THE FIELD...................................................................................................... 10 ON THE FIELDWORK .............................................................................................................. 10 ON INFORMANTS ................................................................................................................... 12 FIELDWORK AND FILM ISSUES..................................................................................... 13 PRACTICAL CONCERNS:......................................................................................................... 13 ETHICAL CONCERNS: THIN AND THICK CONTEXTUALIZATION