mirror of
https://github.com/greyscalepress/manifestos.git
synced 2024-10-01 05:25:35 -04:00
some formatting fixes.
This commit is contained in:
parent
6c15f90c6e
commit
f62a97bd90
@ -6,7 +6,7 @@
|
||||
|
||||
# Computer Lib
|
||||
|
||||
Any nitwit can understand computers, and many do. Unfortunately, due to ridiculous historical circumstances, computers have been made a mystery to most of the world. And this situation does not seem to be improving. You hear more and more about computers, but to most people it's just one big blur. The people who *know* about computers often seem unwilling to explain things or answer your questions. Stereotyped notions develop about computers operating in fixed ways – and so confusion increases. The chasm between laymen and computer people widens fast and dangerously .
|
||||
Any nitwit can understand computers, and many do. Unfortunately, due to ridiculous historical circumstances, computers have been made a mystery to most of the world. And this situation does not seem to be improving. You hear more and more about computers, but to most people it's just one big blur. The people who *know* about computers often seem unwilling to explain things or answer your questions. Stereotyped notions develop about computers operating in fixed ways – and so confusion increases. The chasm between laymen and computer people widens fast and dangerously.
|
||||
|
||||
This book is a measure of desperation, so serious and abysmal is the public sense of confusion and ignorance. Anything with buttons or lights can be palmed off on the layman as a computer. There are so many different things, and their differences are so important; yet to the lay public they are lumped together as "computer stuff," indistinct and beyond understanding or criticism. It's as if people couldn't tell apart camera from exposure meter or tripod, or car from truck or tollbooth. This book is therefore devoted to the premise that
|
||||
|
||||
|
@ -1,6 +1,9 @@
|
||||
# The Hacker's Manifesto
|
||||
# The Hacker’s Manifesto
|
||||
|
||||
By The Mentor (a.k.a. Loyd Blankenship)
|
||||
## The Conscience of a Hacker
|
||||
|
||||
By The Mentor (a.k.a. Loyd Blankenship)
|
||||
Written on January 8, 1986
|
||||
|
||||
Another one got caught today, it's all over the papers.
|
||||
"Teenager Arrested in Computer Crime Scandal", "Hacker Arrested after
|
||||
@ -15,13 +18,19 @@ him?
|
||||
|
||||
I am a Hacker, enter my world....
|
||||
|
||||
Mine is a world that begins with school... I'm smarter than most
|
||||
Mine is a world that begins with school... I'm smarter than most
|
||||
of the other kids, this crap they teach us bores me...
|
||||
|
||||
Damn underachiever. They're all alike.
|
||||
|
||||
I made a discovery today. I found a comupter. Wait a second,
|
||||
this is cool. It does what I want it to. If it makes a mistake it's
|
||||
I'm in junior high or high school. I've listened to teachers explain
|
||||
for the fifteenth time how to reduce a fraction. I understand it. "No, Ms.
|
||||
Smith, I didn't show my work. I did it in my head..."
|
||||
|
||||
Damn kid. Probably copied it. They're all alike.
|
||||
|
||||
I made a discovery today. I found a computer. Wait a second,
|
||||
this is cool. It does what I want it to. If it makes a mistake, it's
|
||||
because I screwed it up. Not because it doesn't like me...
|
||||
Or feels threatened by me...
|
||||
Or thinks I'm a smart ass...
|
||||
@ -31,8 +40,8 @@ Damn kid. All he does is play games. They're all alike.
|
||||
|
||||
And then it happened... a door opened to a world... rushing
|
||||
through the phone line like heroin through an addict's veins, an
|
||||
electronic pulse is sent out, a refuge from the day-to-day incompetencys
|
||||
is sought... a bored is found.
|
||||
electronic pulse is sent out, a refuge from the day-to-day incompetencies
|
||||
is sought... a board is found.
|
||||
|
||||
"This is it... this is where I belong..."
|
||||
I know everyone here... even if I've never met them, never talked
|
||||
@ -51,17 +60,21 @@ This is our world now... the world of the electron and the
|
||||
switch, the beauty of the baud. We make use of the service already
|
||||
existing without paying for what could be dirt-cheap if it wasn't run by
|
||||
profiteering gluttons, and you call us criminals. We explore... and you
|
||||
call us criminals. We seek after knowledge, and you call us criminals.
|
||||
call us criminals. We seek after knowledge... and you call us criminals.
|
||||
We exist without skin color, without nationality, without religous
|
||||
bias... and you call us criminals.
|
||||
You build atomic bombs, you wage wars, you murder, cheat, and
|
||||
lie to us and try to make us believe it's for our own good, yet we're the
|
||||
criminals.
|
||||
|
||||
Yes, I am a crimial. My crime is that of curiosity. My crime is
|
||||
that of judging people by what they say and think, not what they look
|
||||
like. My crime is that of outsmarting you, something you will never
|
||||
forgive me for.
|
||||
Yes, I am a criminal. My crime is that of curiosity. My crime is
|
||||
that of judging people by what they say and think, not what they look like.
|
||||
My crime is that of outsmarting you, something that you will never forgive me
|
||||
for.
|
||||
|
||||
I am a Hacker, and this is my manifesto. You may stop this
|
||||
individual, but you can't stop us all. After all... we're all alike.
|
||||
I am a hacker, and this is my manifesto. You may stop this individual,
|
||||
but you can't stop us all... after all, we're all alike.
|
||||
|
||||
----
|
||||
|
||||
Published in: Phrack, Volume One, Issue 7, Phile 3 of 10
|
||||
|
@ -30,23 +30,7 @@ We follow these principles:
|
||||
|
||||
## Authors
|
||||
|
||||
Kent Beck
|
||||
Mike Beedle
|
||||
Arie van Bennekum
|
||||
Alistair Cockburn
|
||||
Ward Cunningham
|
||||
Martin Fowler
|
||||
James Grenning
|
||||
Jim Highsmith
|
||||
Andrew Hunt
|
||||
Ron Jeffries
|
||||
Jon Kern
|
||||
Brian Marick
|
||||
Robert C. Martin
|
||||
Steve Mellor
|
||||
Ken Schwaber
|
||||
Jeff Sutherland
|
||||
Dave Thomas
|
||||
Kent Beck, Mike Beedle, Arie van Bennekum, Alistair Cockburn, Ward Cunningham, Martin Fowler, James Grenning, Jim Highsmith, Andrew Hunt, Ron Jeffries, Jon Kern, Brian Marick, Robert C. Martin, Steve Mellor, Ken Schwaber, Jeff Sutherland, Dave Thomas
|
||||
|
||||
© 2001, the above authors
|
||||
this declaration may be freely copied in any form,
|
||||
|
@ -4,9 +4,9 @@ by Adam Hyde, June 26-27 2012
|
||||
|
||||
ok..so i have too much time in my hands...i was pondering the things we do in FLOSS Manuals in abstract and thought we could almost come up kind of short (shudder) manifesto for the kinds of methods we use for book production. I was trying to capture something that could encompass all the activities from Book Sprints to rolling manual development to remote update sprints etc etc etc
|
||||
|
||||
so...here it is:
|
||||
so... here it is:
|
||||
|
||||
## Iterative Book Development (IDB) Manifesto:
|
||||
## Iterative Book Development (IBD) Manifesto:
|
||||
|
||||
We value:
|
||||
|
||||
|
@ -2,7 +2,7 @@
|
||||
|
||||
By Edward Snowden
|
||||
|
||||
In a very short time, the world has learned much about unaccountable secret agencies and about sometimes illegal surveillance programs. Sometimes the agencies even deliberately try to hide their surveillance of high officials or the public. While the NSA and GCHQ seem to be the worst offenders - this is what the currently available documents suggest - we must not forget that mass surveillance is a global problem in need of global solutions.
|
||||
In a very short time, the world has learned much about unaccountable secret agencies and about sometimes illegal surveillance programs. Sometimes the agencies even deliberately try to hide their surveillance of high officials or the public. While the NSA and GCHQ seem to be the worst offenders - this is what the currently available documents suggest - we must not forget that mass surveillance is a global problem in need of global solutions.
|
||||
|
||||
Such programs are not only a threat to privacy, they also threaten freedom of speech and open societies. The existence of spy technology should not determine policy. We have a moral duty to ensure that our laws and values limit monitoring programs and protect human rights.
|
||||
|
||||
@ -12,9 +12,9 @@ Today we know that this was a mistake and that such action does not serve the pu
|
||||
|
||||
Citizens have to fight suppression of information on matters of vital public importance. To tell the truth is not a crime.
|
||||
|
||||
> This text was written by Edward Snowden on November 1, 2013 in Moscow. It was sent to SPIEGEL staff over an encrypted channel.
|
||||
----
|
||||
|
||||
*****
|
||||
This text was written by Edward Snowden on November 1, 2013 in Moscow. It was sent to SPIEGEL staff over an encrypted channel.
|
||||
|
||||
> This article by Edward Snowden was published 11/03/2013, in Der Spiegel. Translated by Martin Eriksson (meriksson.net)
|
||||
> Source: \url{http://www.informationclearinghouse.info/article36733.htm}
|
||||
This article by Edward Snowden was published 11/03/2013, in Der Spiegel. Translated by Martin Eriksson (meriksson.net)
|
||||
Source: \url{http://www.informationclearinghouse.info/article36733.htm}
|
@ -4,7 +4,10 @@
|
||||
|
||||
\vspace*{\fill}
|
||||
|
||||
Edited March 6-7 2015 during Fahrenheit 39, Ravenna
|
||||
Version 0.0 edited March 6-7 2015 at Fahrenheit39
|
||||
Version 0.1 released March 11 2015
|
||||
Version 0.2 released March 24 2015
|
||||
Version 0.3 (current) released April 2015
|
||||
|
||||
Greyscale Press
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user