Help


from Wikipedia
« »  
According to Raymond, hackers from the programmer subculture usually work openly and use their real name, while computer security hackers prefer secretive groups and identity-concealing aliases.
Also, their activities in practice are largely distinct.
The former focus on creating new and improving existing infrastructure ( especially the software environment they work with ), while the latter primarily and strongly emphasize the general act of circumvention of security measures, with the effective use of the knowledge ( which can be to report and help fixing the security bugs, or exploitation for criminal purpose ) being only rather secondary.
The most visible difference in these views was in the design of the MIT hackers ' Incompatible Timesharing System, which deliberately did not have any security measures.

1.842 seconds.