Hacking


SUBMITTED BY: sush1212

DATE: Nov. 30, 2016, 6:30 a.m.

FORMAT: Text only

SIZE: 2.5 kB

HITS: 2959

  1. The idea of hacking may conjure stylized images of electronic vandalism, espionage, dyed hair, and
  2. body piercings. Most people associate hacking with breaking the law and assume that everyone who
  3. engages in hacking activities is a criminal. Granted, there are people out there who use hacking
  4. techniques to break the law, but hacking isn’t really about that. In fact, hacking is more about
  5. following the law than breaking it. The essence of hacking is finding unintended or overlooked uses
  6. for the laws and properties of a given situation and then applying them in new and inventive ways to
  7. solve a problem — whatever it may be.
  8. The following math problem illustrates the essence of hacking:
  9. Use each of the numbers 1, 3, 4, and 6 exactly once with any of the four basic math operations (addition, subtraction, multiplication,
  10. and division) to total 24. Each number must be used once and only once, and you may define the order of operations; for example, 3
  11. * (4 + 6) + 1 = 31 is valid, however incorrect, since it doesn’t total 24.
  12. The rules for this problem are well defined and simple, yet the answer eludes many. Like the solution
  13. to this problem (shown on the last page of this book), hacked solutions follow the rules of the system,
  14. but they use those rules in counterintuitive ways. This gives hackers their edge, allowing them to
  15. solve problems in ways unimaginable for those confined to conventional thinking and methodologies.
  16. Since the infancy of computers, hackers have been creatively solving problems. In the late 1950s, the
  17. MIT model railroad club was given a donation of parts, mostly old telephone equipment. The club’s
  18. members used this equipment to rig up a complex system that allowed multiple operators to control
  19. different parts of the track by dialing in to the appropriate sections. They called this new and
  20. inventive use of telephone equipment hacking ; many people consider this group to be the original
  21. hackers. The group moved on to programming on punch cards and ticker tape for early computers like
  22. the IBM 704 and the TX-0. While others were content with writing programs that just solved
  23. problems, the early hackers were obsessed with writing programs that solved problems well. A new
  24. program that could achieve the same result as an existing one but used fewer punch cards was
  25. considered better, even though it did the same thing. The key difference was how the program
  26. achieved its results — elegance.

comments powered by Disqus