Hackers, Heroes of the Computer Revolution by Steven Levy (i have read the book a hundred times .TXT) đź“•
Dick Sunderland Chalk-complexioned MBA who believed that firm managerial bureaucracy was a worth goal, but as president of Sierra On-Line found that hackers didn't think that way.
Gerry Sussman Young MIT hacker branded "loser" because he smoked a pipe and "munged" his programs; later became "winner" by algorithmic magic.
Margot Tommervik With her husband Al, long-haired Margot parlayed her game show winnings into a magazine that deified the Apple Computer.
Tom Swift Terminal Lee Felsenstein's legendary, never-to-be-built computer terminal which would give the user ultimate leave to get his hands on the world.
TX-0 Filled a small room, but in the late fifties this $3 million machine was the world's first personal computer--for the community of MIT hackers that formed around it.
Jim Warren Portly purveyor of "techno-gossip" at Homebrew, he was first editor of hippie-styled Dr. Dobbs Journal, later started the lucrative Computer Faire.
Randy
Read free book «Hackers, Heroes of the Computer Revolution by Steven Levy (i have read the book a hundred times .TXT) 📕» - read online or download for free at americanlibrarybooks.com
- Author: Steven Levy
- Performer: 0141000511
Read book online «Hackers, Heroes of the Computer Revolution by Steven Levy (i have read the book a hundred times .TXT) 📕». Author - Steven Levy
**This is a COPYRIGHTED Project Gutenberg Etext, Details Below**
Hackers, Heroes of the Computer Revolution, by Steven Levy (C)1984 by Steven Levy
Please take a look at the important information in this header.
We encourage you to keep this file on your own disk, keeping an electronic path open for the next readers. Do not remove this.
**Welcome To The World of Free Plain Vanilla Electronic Texts**
**Etexts Readable By Both Humans and By Computers, Since 1971**
These Etexts Prepared By Hundreds of Volunteers and Donations
Information on contacting Project Gutenberg to get Etexts, and further information is included below. We need your donations.
Hackers, Heroes of the Computer Revolution, by Steven Levy (C)1984 by Steven Levy
November, 1996 [Etext #729]
*****The Project Gutenberg Etext of Hackers, by Steven Levy*****
******This file should be named hckrs10.txt or hckrs10.zip******
Corrected EDITIONS of our etexts get a new NUMBER, hckrs11.txt VERSIONS based on separate sources get new LETTER, hckrs10a.txt The official release date of all Project Gutenberg Etexts is at Midnight, Central Time, of the last day of the stated month. A preliminary version may often be posted for suggestion, comment and editing by those who wish to do so. To be sure you have an up to date first edition [xxxxx10x.xxx] please check file sizes in the first week of the next month. Since our ftp program has a bug in it that scrambles the date [tried to fix and failed] a look at the file size will have to do, but we will try to see a new copy has at least one byte more or less.
Information about Project Gutenberg (one page) We produce about two million dollars for each hour we work. The fifty hours is one conservative estimate for how long it we take to get any etext selected, entered, proofread, edited, copyright searched and analyzed, the copyright letters written, etc. This projected audience is one hundred million readers. If our value per text is nominally estimated at one dollar, then we produce 2
million dollars per hour this year we, will have to do four text files per month: thus upping our productivity from one million.
The Goal of Project Gutenberg is to Give Away One Trillion Etext Files by the December 31, 2001. [10,000 x 100,000,000=Trillion]
This is ten thousand titles each to one hundred million readers, which is 10% of the expected number of computer users by the end of the year 2001.
We need your donations more than ever!
All donations should be made to “Project Gutenberg/BU”: and are tax deductible to the extent allowable by law. (BU = Benedictine University). (Subscriptions to our paper newsletter go to BU.) For these and other matters, please mail to: Project Gutenberg
P. O. Box 2782
Champaign, IL 61825
Internet: [email protected] Bitnet: dircompg@uiucux1
CompuServe: >internet:[email protected] Attmail: internet!ux1.cso.uiuc.edu!dircompg When all other email fails try our Michael S. Hart, Executive Director:
[email protected] (internet)
We would prefer to send you this information by email (Internet, Bitnet, Compuserve, ATTMAIL or MCImail).
******
If you have an FTP program (or emulator), please FTP directly to the Project Gutenberg archives: [Mac users, do NOT point and click…type]
ftp mrcnext.cso.uiuc.edu
login: anonymous
password: your@login
cd etext/etext90 though etext/etext94
or cd etext94 [for new books] [now in cd etext/etext93]
or cd etext/articles
dir [to see files]
get or mget [to get files…set bin for zip files]
get INDEX100.GUT
get INDEX200.GUT
for a list of books
and
get NEW.GUT for general information
and
mget GUT* for newsletters.
**Information prepared by the Project Gutenberg legal advisor**
(Three Pages)
***START** SMALL PRINT! for COPYRIGHT PROTECTED ETEXTS ***
TITLE AND COPYRIGHT NOTICE:
Big Dummy’s Guide To The Internet
(C)1993, 1994 by the Electronic Frontier Foundation [EFF]
This etext is distributed by Professor Michael S. Hart through the Project Gutenberg Association at Benedictine University (the “Project”) under the Project’s “Project Gutenberg” trademark and with the permission of the etext’s copyright owner.
LICENSE
You can (and are encouraged!) to copy and distribute this Project Gutenberg-tm etext. Since, unlike many other of the Project’s etexts, it is copyright protected, and since the materials and methods you use will effect the Project’s reputation,
your right to copy and distribute it is limited by the copyright laws and by the conditions of this “Small Print!” statement.
[A] ALL COPIES: The Project permits you to distribute copies of this etext electronically or on any machine readable medium now known or hereafter discovered so long as you: (1) Honor the refund and replacement provisions of this “Small Print!” statement; and
(2) Pay a royalty to the Project of 20% of the net profits you derive calculated using the method you already use to calculate your applicable taxes. If you don’t derive profits, no royalty is due. Royalties are payable to “Project Gutenberg Association / Benedictine University” within the 60 days following each date you prepare (or were legally required to prepare) your annual (or equivalent periodic) tax return.
[B] EXACT AND MODIFIED COPIES: The copies you distribute must either be exact copies of this etext, including this Small Print statement, or can be in binary, compressed, mark-up, or proprietary form (including any form resulting from word processing or hypertext software), so long as EITHER: (1) The etext, when displayed, is clearly readable, and does not contain characters other than those intended by the author of the work, although tilde (~), asterisk (*) and underline (_) characters may be used to convey punctuation intended by the author, and additional characters may be used to indicate hypertext links; OR
(2) The etext is readily convertible by the reader at no expense into plain ASCII, EBCDIC or equivalent form by the program that displays the etext (as is the case, for instance, with most word processors); OR
(3) You provide or agree to provide on request at no additional cost, fee or expense, a copy of the etext in plain ASCII.
LIMITED WARRANTY; DISCLAIMER OF DAMAGES
This etext may contain a “Defect” in the form of incomplete, inaccurate or corrupt data, transcription errors, a copyright or other infringement, a defective or damaged disk, computer virus, or codes that damage or cannot be read by your equipment. But for the “Right of Replacement or Refund”
described below, the Project (and any other party you may receive this etext from as a PROJECT GUTENBERG-tm etext) disclaims all liability to you for damages, costs and expenses, including legal fees, and YOU HAVE NO REMEDIES FOR
NEGLIGENCE OR UNDER STRICT LIABILITY, OR FOR BREACH OF
WARRANTY OR CONTRACT, INCLUDING BUT NOT LIMITED TO INDIRECT, CONSEQUENTIAL, PUNITIVE OR INCIDENTAL DAMAGES, EVEN IF YOU
GIVE NOTICE OF THE POSSIBILITY OF SUCH DAMAGES.
If you discover a Defect in this etext within 90 days of receiving it, you can receive a refund of the money (if any) you paid for it by sending an explanatory note within that time to the person you received it from. If you received it on a physical medium, you must return it with your note, and such person may choose to alternatively give you a replacement copy. If you received it electronically, such person may choose to alternatively give you a second opportunity to receive it electronically.
THIS ETEXT IS OTHERWISE PROVIDED TO YOU “AS-IS”. NO OTHER
WARRANTIES OF ANY KIND, EXPRESS OR IMPLIED, ARE MADE TO YOU AS
TO THE ETEXT OR ANY MEDIUM IT MAY BE ON, INCLUDING BUT NOT
LIMITED TO WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Some states do not allow disclaimers of implied warranties or the exclusion or limitation of consequential damages, so the above disclaimers and exclusions may not apply to you, and you may have other legal rights.
INDEMNITY
You will indemnify and hold the Project, its directors, officers, members and agents harmless from all liability, cost and expense, including legal fees, that arise directly or indirectly from any of the following that you do or cause: [1] distribution of this etext, [2] alteration, modification, or addition to the etext, or [3] any Defect.
WHAT IF YOU WANT TO SEND MONEY EVEN IF YOU DON’T HAVE TO?
Project Gutenberg is dedicated to increasing the number of public domain and licensed works that can be freely distributed in machine readable form. The Project gratefully accepts contributions in money, time, scanning machines, OCR software, public domain etexts, royalty free copyright licenses, and whatever else you can think of. Money should be paid to “Project Gutenberg Association / Benedictine University”.
SMALL PRINT! Ver.04.29.93 FOR COPYRIGHT PROTECTED ETEXTSEND*
Hackers, Heroes of the Computer Revolution, by Steven Levy (C)1984 by Steven Levy
Chapters 1 and 2 of Hackers, Heroes of the Computer Revolution by Steven LevyWho’s Who
The Wizards and their Machines
Bob Albrecht
Found of People’s Computer Company who took visceral pleasure in exposing youngsters to computers.
Altair 8800
The pioneering microcomputer that galvanized hardware hackers.
Building this kit made you learn hacking. Then you tried to figure out what to DO with it.
Apple II ][
Steve Wozniak’s friendly, flaky, good-looking computer, wildly successful and the spark and soul of a thriving industry.
Atari 800
This home computer gave great graphics to game hackers like John Harris, though the company that made it was loath to tell you how it worked.
Bob and Carolyn Box
World-record-holding gold prospectors turned software stars, working for Sierra On-Line.
Doug Carlston
Corporate lawyer who chucked it all to form the Broderbund software company.
Bob Davis
Left job in liquor store to become bestselling author of Sierra On-Line computer game “Ulysses and the Golden Fleece.”
Success was his downfall.
Peter Deutsch
Bad in sports, brilliant at math, Peter was still in short pants when he stubled on the TX-0 at MIT—and hacked it along with the masters.
Steve Dompier
Homebrew member who first made the Altair sing, and later wrote the “Targe” game on the Sol which entranced Tom Snyder.
John Draper
The notorious “Captain Crunch” who fearlessly explored the phone systems, got jailed, hacked microprocessors.
Cigarettes made his violent.
Mark Duchaineau
The young Dungeonmaster who copy-protected On-Lines disks at his whim.
Chris Esponosa
Fourteen-year-old follower of Steve Wozniak and early Apple employee.
Lee Felsenstein
Former “military editor” of Berkeley Barb, and hero of an imaginary science-fiction novel, he designed computers with “junkyard” approach and was central figure in Bay Area hardware hacking in the seventies.
Ed Fredkin
Gentle founder of Information International, thought himself world’s greates programmer until he met Stew Nelson. Father figure to hackers.
Gordon French
Silver-haired hardware hacker whose garage held not cars but his homebrewed Chicken Hawk comptuer, then held the first Homebrew Computer Club meeting.
Richard Garriott
Astronaut’s son who, as Lord British,
created Ultima world on computer disks.
Bill Gates
Cocky wizard, Harvard dropout who wrote Altair BASIC, and complained when hackers copied it.
Bill Gosper
Horwitz of computer keyboards, master math and LIFE hacker at MIT AI lab, guru of the Hacker Ethic and student of Chinese restaurant menus.
Richard Greenblatt
Single-minded, unkempt, prolific, and canonical MIT hacker who went into night phase so often that he zorched his academic career. The hacker’s hacker.
John Harris
The young Atari 800 game hacker who became Sierra On-Line’s star programmer, but yearned for female companionship.
IBM-PC
Comments (0)