Page "Hacker (term)" Paragraph 34
from
Wikipedia
According to Raymond, hackers from the programmer subculture usually work openly and use their real name, while computer security hackers prefer secretive groups and identity-concealing aliases.
The former focus on creating new and improving existing infrastructure ( especially the software environment they work with ), while the latter primarily and strongly emphasize the general act of circumvention of security measures, with the effective use of the knowledge ( which can be to report and help fixing the security bugs, or exploitation for criminal purpose ) being only rather secondary.
The most visible difference in these views was in the design of the MIT hackers ' Incompatible Timesharing System, which deliberately did not have any security measures.
Page 1 of 1.
1.842 seconds.