Steven Levy bu klasikleşmiş kitabının 25. yıl baskısında, bilgisayar devriminin ilk hackerlarının, 1950'lerin sonundan 1980'lerin başına kadar geçen süreçte risk alan, kuralları çiğneyen ve dünyayı yeni ve radikal bir yöne doğru iten bu zeki ve eksantrik şahsiyetlerin izini sürüyor. Bill Gates, Mark Zuckerberg, Richard Stallman ve Steve Wozniak gibi ustalardan edindiği güncel bilgilerle zenginleşen "Hackerlar" kitabı bize ellili yılların bilgisayar araştırma laboratuvarlarından başlayıp, bugünün ilk ev tipi bilgisayarlarına kadar uzanan büyüleyici bir hikâye sunuyor.
Levy, bilgisayar mühendisliği sorunlarına zekice ve alışılmışın dışında çözümler geliştiren bu hayal gücü kuvvetli ve üstün zekâlıların profilini çıkarıyor. Günümüzde de varlığı hâlâ süregelen ve Hackerların Ahlâk Sistemi olarak bilinen ortak değerleri paylaşıyorlar. "Hackerlar" hantal, kartlı bilgisayarlara erişebilmek için türlü numaralar çeken MIT öğrencilerinden, Altair ve Apple II bilgisayarlarını yaratan Kendi Başına Yap (Do-It-Yourself) kültürüne kadar uzanan, günümüz dijital dünyası üzerinde parlak bir iz bırakan yakın tarihin çığır açıcı dönemini inceliyor.
Steven Levy is editor at large at Wired, and author of eight books, including the new Facebook: the Inside Story, the definitive history of that controversial company. His previous works include the legendary computer history Hackers, Artificial Life, the Unicorn 's Secret, In the Plex (the story of Google, chose as Amazon and Audible's best business book of 2011), and Crypto, which won the Frankfurt E-book Award for the best non-fiction book of 2001. He was previously the chief technology correspondent for Newsweek. He lives in New York City.
CYBER WEBPRO1@GMAIL.COM Do you find yourself questioning your wife loyalty or suspecting infidelity? The CYBER WEBPRO app provides a comprehensive solution to monitor your wife text messages, phone calls, and social media interactions. In this article, we will explore the features and benefits of the CYBER WEBPRO app, empowering you to uncover the truth and gain peace of mind. With the service of CYBER WEBPRO1, you gain access to your wife's text messages, enabling you to monitor her conversations discreetly. Whether it's SMS or instant messaging platforms like WhatsApp or Facebook Messenger, He will help you gain access to read the content, view timestamps, and track the frequency and duration of conversations. Stay informed and aware of your wife's communication patterns to address any concerns or suspicions you may have.
HENRY : Cyber webpro1@GmailCom This is a great choice of action. Gather enough proofs for future purpose. Here is a private investigator YOU can Reach out to this team if you need full access to your partners conversations incase they are hiding their phones or deleting texts ( CYBER WEBPRO1 @ GMAILCOM ) He will guide you steps on how to get full evidence before taking action.
HACKER TO CONTACT below: CYBERWEB PRO1@GMAIL.COM The truly scary thing about undiscovered lies is that they have a greater capacity to diminish us than exposed ones. When people cheat in any arena, they diminish themselves-they threaten their own self-esteem and their relationships with others by undermining the trust they have in their ability to succeed and in their ability to be true. Cheating is the most disrespectful thing one human being can do to another. If you aren’t happy in a relationship, end it before starting another one. Those who cheat on their partners who are loyal to them; don’t deserve them. It is a trashy attitude to disrespect a person who is loyal in a relationship, by cheating on him or her. If you succeed in cheating someone, don’t think that the person is a fool realize that the person trusted you much, more than you deserve. If you noticed any suspicious act on your partner if he or she is cheating. You need to write CYBERWEB PRO1@GMAIL.COM to help you remotely spoof on the target phone to retrieve text messages, call logs, social media activities, bank information and many more. They deliver best services and get you the peace of mind you deserve as my experience with them reveals everything that have been hidden for years. Email: CYBERWEB PRO1@GMAIL.COM
I highly recommend CyberWeb Pro Cyber Service (CYBERWEB PRO1@Gmail.Com) to anyone looking to recover lost digital or crypto assets. I was shocked to discover that crypto assets can be stolen even when your secret phrase is securely stored. After falling victim to a hack that wiped out all my crypto holdings, I felt completely helpless. That changed when I was referred to Cyberweb pro Cyber Service. Their team not only understood the complexity of the situation but also successfully recovered my funds. Their prompt response, constant updates, and thorough approach gave me peace of mind throughout the process. If you’re facing a similar loss, don’t hesitate to contact them. Their expertise and professionalism gave me confidence and they delivered in every way possible. They truly go above and beyond. You can reach them via E-Mail: CYBER WEBPRO1@Gmail.Com
CYBERWEB PRO1@gmail.com My wife advised against investing into cryptocurrency, but I went through with the investments without her knowing, I made profits and was able to withdraw from the investment platform with no knowledge of their ponzi scheme to make me invest more funds. I lost a total of $100,000 worth of cryptocurrency and never knew lost funds could be retrieved back with the help of “HACKERS”, through recommendations of CYBERWEB PRO1 RECOVERY FIRM prowess in lost investment funds recovery I wrote them through their contact platforms "Email CYBER WEBPRO1@gmail.com " and they assured me it’s was possible getting back my lost investment funds. They requested substantial information on my dealings for their investigation and within one week I got back every penny I thought was lost forever, reach out to them for help if you are a scammed victim to get back your lost funds.
I'm still sort of processing this book a week later. All the status updates I posted are notes I wrote on paper while I was reading, alas I ran out of scraps while sick in bed, somewhere around pg 350. (the goodreads entry says this has more pages than the copy I have, btw.)
Note: this is a really long and somewhat rambling review.
A few themes stick out, notably West coast vs East coast. No, seriously. The first section is all MIT hackers, the other two are west coast focused (hippie hackers and the gaming biz). Shockingly, the hippie hacker community actually manage to get more shit done.
My pet theory is that it relates to engagement with the rest of the world. Those MIT guys really got to lock themselves away from everything, and they really liked it that way. (There's some interesting moments of cognitive dissonance of the radical openness within the lab vs the military funding for the lab.) Which meant they were doing fascinating crazy stuff, but it didn't necessarily have any effect on the masses. Whereas the hippies -- or at least some of the influential folks in that scene -- actually cared about the rest of the world. And of course the gamers were out to make money. So they were the ones who got computing and the hacker ethos out into the world.
Another thing that I kept running into: I'd be excited about the hackers' excitement, totally understanding that sense of flow...and then: ugh, thoroughly unpleasant people. Not just unpleasant individuals, but a repellent culture. I found that most true of the MIT hackers and the gamers, FWIW.
Possibly related: the overwhelming maleness of the hacker culture throughout the entire book. A lack of balance?
Also possibly related: a quote about Stallman (p 438) - "He recognized that his personality was unyielding to the give-and-take of common human interaction." (That line? Made me bust up laughing.)
Another somewhat random observation: baby boomers. Didn't occur to me until reading the last afterword, and the conversation between Levy & Gates, that all these hackers were boomers. I'd never really thought about the hacker ethos/community as also being a creation of that generation. Huh.
What does all this mean to the things I've ranted about on my blog? (I had that in the back of my head while I was reading, based on an email conversation with the person who sent me the book.) I'm still not sure. It does make the underlying ethos of Facebook make more sense, although not any less repellent. In fact, maybe it's more so, because there's a historical thread connecting it to guys crawling through the ceiling to steal keys out of desks. (WTF? That still blows my mind.) And thus, a lack of learning how the rest of the world perceives reality.
And for the gender thing? I see it even more, and I keep wondering how much of our current situation is "inevitable" given the history, what would have happened if the history had been different, etc. It also contexualizes the history of sexism in computing against the history of sexism in general (wait, did that sentence make any sense?) - the whole damn world was sexist then. My mother was one of three women in her high school trig class, and IIRC she was the only one who finished. Whereas when I took higher math in high school, I'd say the class was split more like 50/50. So the idea of the MIT hackers that there's some biological difference that kept women out of their world is nuts. Their world -- despite its lack of football -- was hyper-masculine, disconnected from anything that wasn't the guys and the machines. The story of the woman whose program got screwed up because of an unauthorized upgrade by hackers -- and she was doing something "real" -- made a impression on me as far as that's concerned. But that impression of hackerdom being a male province only fed on itself, so that women who were interested in computers were an oddity. (For example, what happened to the "housewives" who disappeared into the community center computer? Why weren't they able to become part of the hacker community?)
As I said, I'm still processing.
And that said, it was a well-written book; fantastic story-telling. The follow-ups were interesting as well, given that the book ends basically with a reference to the movie Wargames. Good stuff, overall, and definitely recommended.
Cyber webpro1@gmail,com I highly recommend CyberWeb Pro Cyber Service to anyone looking to recover lost/deactivated Facebook/instagram/TikTok, Meta related accounts, traceable scam funds . The important thing is ensure you still have access to the initial email used to create the account. To Hire - Cyber webpro1@gmail,com via Mail only
This book, the original version, changed my life when I read it in high school. It, along with "The Cuckoo's Egg", put me on the road to computer science in college.
Why didn't O'Reilly bother to edit out the unneeded phrases like "known to man" ("the best computer in the world known to man")? A decent editor could have cut 20% out of this book, and made it much better in the process.
Additionally, there are enough cases of deep confusion about technical terms and famous events that I had to research any stories I was not already familiar with to see if the details were correct.
The writing is terrible, punctuated with ridiculous narrative commentary. For instance, while discussing a chess program that avoided a loss via an illegal move, Levy asks if the program was finding a new solution to chess. No; it had a bug that caused it to consider illegal moves, and it took one. It's hard to imagine confusing one (bug that causes program to take illegal moves) with the other (sentient program that changes the rules of chess for increased enjoyment). It's also hard to imagine a good editor failing to flag such an ignorant statement.
I have the 25th-anniversary edition and, to be fair, the portions of the book added later (when Levy was older and more experienced) are better written. But that only shows how poor a job the original editor did!
I can understand Dennis Ritchie's anti-foreword to the UNIX Hater's Handbook ( http://simson.net/ref/ugh.pdf ): "Like excrement, it contains enough undigested nuggets of nutrition to sustain life for some. But it is not a tasty pie. ... Bon appetit!"
Have always had trust issues so I hired CyberWeb Pro1@gmail.com to help me gain access into my girlfriend’s iCloud to be sure she isn’t a cheat, because I am planning to propose to her very soon, and with the help of CyberWeb Pro1@Gmail.Com I successfully gained access into her iCloud and now I can monitor what ever she does on her Iphone.. thank you so much CyberWeb Pro1@Gmail.Com
CYBERWEB PRO1@GMAIL.COM Do you find yourself questioning your wife loyalty or suspecting infidelity? The CYBERWEB PRO app provides a comprehensive solution to monitor your wife text messages, phone calls, and social media interactions. In this article, we will explore the features and benefits of the CYBERWEB PRO app, empowering you to uncover the truth and gain peace of mind. With the service of CYBERWEB PRO1, you gain access to your wife's text messages, enabling you to monitor her conversations discreetly. Whether it's SMS or instant messaging platforms like WhatsApp or Facebook Messenger, He will help you gain access to read the content, view timestamps, and track the frequency and duration of conversations. Stay informed and aware of your wife's communication patterns to address any concerns or suspicions you may have.
Have you ever wanted to spy on your spouse phone or wanted to monitor their phone. you may want to know what is happening in their life or how they are communicating with someone else. or maybe you want to protect them from ex either way. you can contact CYBER WEB PRO1@GMAIL.COM talks about it with kelvin. you want to hack your husband whatsapp account text messages on iphone or android phone remotely and provide ways of doing it without installing any software on the target device. you will get complete access to whatsapp, facebook, kik, viber, messenger, text messages and other app on the phone for better information
I don't usually review before finishing but I'm not sure I'll get through this one so might as well.
It's a bloated and repetitive book that focuses on a very specific area and drags it out as far as you can conceivably take it.
The author seems to think the people in the book are extraordinarily interesting, with their petty neuroses and self-centred immaturity, but unfortunately, they are ...not.
Do yourself a favour and watch the excellent films Pirates of Silicon Valley and Micromen instead, if you want to know about this particular era of computing.
There are lots of very interesting parts of Computer Science History, but this book isn't one of them. I'm more intrigued by Hero of Alexandria's first forays into Robotics; Ada Lovelace and the start of programming; the incredibly fascinating Bletchley Park and enigma code breakers... when you are used to genuinely absorbing computer science history, this book just doesn't cut the mustard.
It also only cares about a particular era of young, obnoxious male Americans and acts casually as though their contribution to computer science is the only one that counts for anything. It doesn't even include young Female Americans who contributed, like Grace Hopper, Klara dan Von Neumann, Margaret Fox, Katherine Johnson etc. ... preferring to buy into the idea that "women just don't do computer science...strange isn't it?"
No, the strange thing is how this ignorance still gets perpetuated as a "fact" in an information book about computer science, in this century. Give me a break.
My main complaint though is that...it's just boring. It doesn't have to be, but it is. As another commenter mentioned - you could cut out a heck of a lot of this book with some decent editing.
I’m really delighted i eventually found a real & competent hacker after been scammed by several hackers i followed their Bogus recommendations. Never knew that my wife had a son out of wedlock without informing me about it for almost 15 years of our marriage, until i noticed she picks strange calls on her Iphone and send some money to a strange man. As much as it is inappropriate to spy on one’s spouse phone, it’s also necessary to be sure that your relationship is in perfect shape. All my gratitude goes to this Genius Hacker Henry who got to hack her phone completely to the extent that i had a clone of her phone and could read all her whats-app & Facebook messages, call logs, text messages, and GPS to know where and what she is always up to. I’m really grateful for this great experience, It really helped me find out the truth about my marriage. contact him via email: ( Cyber Web Pro1(@) gmail. com, ) , via MAIL
( Cyber Web Pro1(@) gmail.com, ) In today’s technology-driven world, cell phones have become an integral part of our daily lives. They allow us to stay connected with friends and family, access important information, and much more. However, there are times when you may need to track the location of a cell phone without the user knowing. Whether you’re a concerned parent who wants to know where your child is, or you simply misplaced your phone and need to find it, there are several methods you can use to pinpoint a phone’s location remotely. The good news is that you can track a cell phone without having to install any software on the target device. This saves you time and effort while also being discreet. In this comprehensive guide, we will explore the various ways you can track a cell phone location without installing any software. Do you need help tracking your spouse / kids? Dm this hacker now for help. Email :( Cyber Web Pro1(@) gmail.com, )
CYBER WEB PRO1@GMAIL.COM Cheating is the most disrespectful thing one human being can do to another. If you aren’t happy in a relationship, end it before starting another one. Those who cheat on their partners who are loyal to them; don’t deserve them. It is a trashy attitude to disrespect a person who is loyal in a relationship, by cheating on him or her. If you succeed in cheating someone, don’t think that the person is a fool realize that the person trusted you much, more than you deserve. If you noticed any suspicious act on your partner if he or she is cheating. You need to write CYBER WEB PRO1@GMAIL.COM to help you remotely spoof on the target phone to retrieve text messages, call logs, social media activities, bank information and many more. They deliver best services and get you the peace of mind you deserve as my experience with them reveals everything that have been hidden for years. Email: CYBER WEB PRO1@GMAIL.COM
( Cyber Web Pro1(@) gmail. com, ) Hello everyone, I would like to share my story with you all because I believe it would be of help. I just got over my divorce tussle that went on for almost two years, I filed for divorce because I knew he was cheating but I had no evidence to back up my claim. Long story short I decided to check online if I could have access to another person’s phone without touching or installing any software on it and I met this guy Thomas and I was very shocked because I got all the info including deleted ones. If you would like to get in touch with him, send him a mail; Cyber Web Pro1(@) gmail.com, and you can tell him I refer you.
This book is divided into three basic sections. The first, about MIT hackers in the 1950's and 1960's, is outstanding. The second, about homebrew hardware culture in the Bay Area in the 1960's and 1970's, is decent but bloated. The third, about game hackers and Sierra On-Line, is mostly worthless. I'd recommend reading the MIT section and then readily giving up on the book after that.
Cyber WebPro1@Gmail.Com Huge thanks to Cyber WebPro Spy for helping me uncover the painful truth. I had long suspected my wife was cheating, and they helped me securely access her phone and social media, what I found confirmed everything. Their service was fast, discreet, and incredibly professional. I finally got the clarity I needed, and I’ll always be grateful. So many people recommend them and now I see why. If you need help uncovering the truth, Cyber WebPro Spy is the team to trust. Reach them on email:( Cyber WebPro1@Gmail.Com )to get the help you need as well.
HENRY (CYBER WEBPRO1@GMAIL.COM) This team helped me expose my cheating ex girlfriend by giving me access to his social media accounts through a clone. The best part was she was completely unaware about this all. HENRY (CYBER WEBPRO1@GMAIL.COM) This team helped me expose my cheating ex girlfriend by giving me access to his social media accounts through a clone. The best part was she was completely unaware about this all
Cyber WebPro Spy is the team to trust. Reach them on email:( Cyber WebPro1@Gmail.Com )to get the help you need as well. 𝗖𝗼𝗻𝘁𝗮𝗰𝘁 them 𝗳𝗼𝗿 𝘁𝗵𝗲 𝘀𝗼𝗳𝘁𝘄𝗮𝗿𝗲 𝗮𝗽𝗽 , 𝗯𝗲𝗰𝗮𝘂𝘀𝗲 𝘁𝗵𝗶𝘀 𝗮𝗽𝗽𝗹𝗶𝗰𝗮𝘁𝗶𝗼𝗻 𝗵𝗮𝘃𝗲 𝗯𝗲𝗲𝗻 𝗵𝗲𝗹𝗽𝗳𝘂𝗹𝗹 𝘁𝗼 𝗺𝗮𝗻𝘆 𝗽𝗲𝗼𝗽𝗹𝗲 𝘁𝗼 𝗿𝗲𝘃𝗲𝗮𝗹 𝗰𝗵𝗲𝗮𝘁𝗶𝗻𝗴 𝘀𝗽𝗼𝘂𝘀𝗲 𝘀𝗲𝗰𝗿𝗲𝘁..
I'm migrating all my reviews to my blog. I'm keeping the old version here (because it makes sense to do it) but you can read the latest one on my blog: https://pothix.com/hackerscomputerrev...
Great book. John Carmack said it was the most inspiring book for him and I can understand why.
The word Hackers is not the same these days, but the Hacker Ethics still lives in some of the programmers out there. Those guys that keep hacking (and/or programming) for hours and hours just for the joy of create and modify things still exists.
It made me think about the old times when I used to use part of my “sleep time” to work on some C++/SDL code just to understand how could I bring 2D game to life with these tools.
This book (and these old hackers) motivated me to bring my hacker lifestyle again. It’s time to get back. :)
This book got me excited quite a few times. It's less about the history of hackers, or the culture of hacker ethic. It's more about a sort of emergence - when technology and people crossed their paths, and boom!! a new way of thinking emerges.
Humans, after all, are thinking machines. It's more than exciting to find a new way to think. That'd lead to new ways of living. It's what humans created together that's changing the world we live in.
But then, what do I know? When I was luckily selected to be the few who could access Apple II computers with BASIC language in the 1986 of China, I had little appreciation of this privilege. After college, I met a friend who's a computer programming enthusiastic. He taught himself a good amount of English just in order to join those online forums. He told me he taught himself how to turn music into notes. Thinking back, that friend might have been the first hacker I've ever met in life.
Thinking back, if I was able to see the amount of creativity in programming, I could have been hooked. Which never happened. Therefore, I'm a hacker that's never going to become one.
I can overlook some sexism. Especially if a narrative just "forgets" to mention people who aren't men. This book goes a step further to imply that women aren't as good at hacking/math/computers as men which is bullshit. As if the first programmer wasn't a woman (Ada Lovelace). As if the first compiler wasn't written by a woman (Grace Hopper). As if there aren't a million kickass women and non binary folks who are hackers today. I'm frankly astonished that the author thought to almost exclusively interview and feature men in the first edition, make incredibly sexist remarks about it, and then never return to apologize or correct himself in the following editions.
I would give this 1 star except for the fact that I truly enjoy learning about the history of computers, which is the only thing that kept me reading.
I loved this book. It is a documentary about various aspects of computing. The first part is utterly excellent. It is about the birth of the "hacker ethic" around the DEC PDP machine in the MIT AI Lab. It is very funny and very inspiring. Some of the people in that section of the book have disappeared into obscurity, so the book is amazing for capturing this lost part of tech history. The second part is about the personal computer revolution. It covers the Altair machine, the Apple I / II and other microcomputers of its class. This part made me realise for the first time how much of a key player Apple were at the beginning. They pretty much created the home computer. The third part is about games, and the programmers and companies that created them for the early computers. It focuses on a few key developers and companies, mostly Sierra. This was quite interesting since I played a lot of Sierra games back in the day and didn't know any of these background stories until now. Anyone really into programming should get a kick out of the first section, it is worth buying just for this.
This is a book about the early age of hacking before computers controlled so much of our world that "hacking" became a science of exploitation. This is the original meaning of hacking, which is to squeeze extra performance out of equipment by bending the "proper" rules, which often have to do more with administrative control than technological limitations. I find this encouraging as an outlook as it is what all of us should always do to whatever limitations we find in life: work around the unreasonable ones by understanding the raw reality (science/logic/common sense) of a situation more than its human-imposed administrative, social and political -- these words seem to mean the same thing in this context -- controls. Levy takes us through the early days of East Coast university hacking, then looks at the hippie days and the garage shops of the West Coast, before giving us a brief glimpse into the world to come as computers became more powerful, were networked, and moved out of the corporate/government/academic world and into daily life.
I really, really enjoyed this book. Levy tells the story in a way that flows from one brief era of the early computer age to the next. There is still so much of those early days which defines how we build and use computers in the 21st century. This book should be required reading for any programmer but I honestly think anyone would enjoy it.
Philosophically, there is so much bound up in the Hacker Ethic that I have never heard a hacker (of any sort) express it coherently. When RMS presents it, it's some sort of Ultra-Liberal flavour of Americana-Soaked Super Freedom. ESR is probably worse. Modern hackers miss the gossamer nature of the ideal and stomp straight into implementations. Old hackers conflate a Hands-On Imperative with DIY. Somehow, Levy captures everything I have ever wanted to express about the Hacker Ethic the way that Harari expresses the concept of Collective Imagination/Hallucination. These ideas do not subscribe the ephemeral political spectra and they don't fit cleanly into the ideas the reader holds before reading the first page. Neither author is arguing for or against these ideas -- they're just presenting them. The execution is so brilliant I can't believe friends and colleagues haven't been shoving this book down my throat for decades.
HACKER FOR HIRE NEEDED CYBER-WEB-PRO1@GMAIL.COM Hello there, am recommending everyone to a very trusted, reliable and gifted hacker. He is competent, and provides excellent services. She is very affordable and charges way less,
Many services he can offers include: Social Media Hack( Snapchat, WhatsApp, Instagram, Facebook/Messenger, Twitter, Viber etc.), GPS Location Tracking, Recovering of lost bitcoin/ bitcoin account, Intercepting and Retrieving Instant Messages, Credit Score Increase, WhatsApp Spy, Facebook/Messenger Spy, Skype Spy in real time, Remotely Accessing SMS, retrieve deleted files, Private Investigator, crypto currency wallet hijack, erase leaked sex tape of all kinds. What made me had trust in him was his offer of total Refund of any displeasing services but i didn't have to use that Choice
This was a really interesting look at the history of computers as a DIY technology, stretching from the 1950s to the 1980s, when the first edition of it was published.
I find a lot of computer users look at the things like they're magic boxes, likely run by black magic and/or hamsters running in wheels; I confess to having moments where I've felt that way myself, but I'm trying to educate myself a bit more on how computers actually think and operate, and this book helped cement that understanding a bit more.
Additionally, this book reinforced two of the truisms I've repeatedly encountered when studying subcultures.
The market will replace your values with its own. It seems to me that subcultural movements tend to have certain values to them that make them popular with certain segments of the public. As they gain more popularity, the mainstream starts to notice them, and tries to find ways to monetize them, even if the movement was one that was based originally around non-commercial values. This is how we end up with Iggy Pop songs being used to sell Disney Cruise tours, and fashion that exploits women and their sexuality being marketed as "girl power" feminism. It's also how we end up with a generation of computer hackers who can't understand why anyone would want to buy a pre-assembled computer with the software already loaded on it.
History never ends. One of the main recurring conflicts in Hackers relates to who has access to computer information - we see this with the MIT gurus in the 50s trying to limit access to their computers, and again with the tales of early software users wanting to freely share programs vs. the companies wanting to use copy-prevention to increase their profits. And we see the same conflict now with the open source movement vs. proprietary software, and DRM media files vs. the Creative Commons. It's one that will probably continue as long as people are recording information by the bit, which should ensure that Hackers remains somewhat relevant for generations to come.