RG.JMTURN%MIT-OZ@MIT-MC.ARPA (04/17/84)
Wrong wrong wrong! The original term hacker, as relating to CS, originated at MIT, where it had very much the same connotation as wizard does on the SAIL systems, one who is conversant enough with the world that he/she can hack together a fix for a problem in a short period of time. If you look at the MITSAI JARGON file, the 5 definitions of hacker do include the one being used today by newspeople, someone who breaks into systems for fun, but it is listed fifth and last. I am preparing an article for submission which outlines why the term is inappropriate for most cases of computer security violation. Briefly, it goes like this: All security violation has to begin with access. If you can't get past the login, you can't do anything (even Trojan horses have to get by login.) To login, you need insiders info. At the least, you need a valid user id. From that, you can use exhustive search of passwords (which is slow, but eventually works), or lucky guesses (the 60% "Susan" rule). Neither of these is elegant, nor does either require much expertise. I could teach any literate person to break into systems in under an hour. The tools of a login hacker are traded secrets, like DEC's field circus password. Now, the abillity of someone to override account limitations once they get in is a different story. This actually requires considerable skill. But just like passwords, once one person knows how to do it, the word gets around (I've heard rumors of a 7 line MACRO program which turns on VMS SETPRV...) The people who are being labeled hackers are in reality the same people who trade MCI numbers and pay TV decoder plans. The computer facet just gets more publicity. Calling them hackers is like calling anyone who can make mustard gas and use it for terrorism a chemist. I resent being classed with a bunch of third rate pimply high school kids who don't have what it takes to rate legit computer time. And in direct response to Don Provan's comment, most hackers (MIT sense) have the skill to whittle, but I note a lot of the CS gurus who can whittle don't have the strength to hack. Proud to be called a hacker, James M. Turner Software Engineer, LISP Machine, Inc (JMTURN@MIT-MC)