Hackers, Heroes of the Computer Revolution | Page 2

Steven Levy
MODIFIED COPIES: The copies you distribute must either be exact copies of this etext, including this Small Print statement, or can be in binary, compressed, mark- up, or proprietary form (including any form resulting from word processing or hypertext software), so long as *EITHER*:
(1) The etext, when displayed, is clearly readable, and does *not* contain characters other than those intended by the author of the work, although tilde (~), asterisk (*) and underline (_) characters may be used to convey punctuation intended by the author, and additional characters may be used to indicate hypertext links; OR
(2) The etext is readily convertible by the reader at no expense into plain ASCII, EBCDIC or equivalent form by the program that displays the etext (as is the case, for instance, with most word processors); OR
(3) You provide or agree to provide on request at no additional cost, fee or expense, a copy of the etext in plain ASCII.
LIMITED WARRANTY; DISCLAIMER OF DAMAGES
This etext may contain a "Defect" in the form of incomplete, inaccurate or corrupt data, transcription errors, a copyright or other infringement, a defective or damaged disk, computer virus, or codes that damage or cannot be read by your equipment. But for the "Right of Replacement or Refund" described below, the Project (and any other party you may receive this etext from as a PROJECT GUTENBERG-tm etext) disclaims all liability to you for damages, costs and expenses, including legal fees, and YOU HAVE NO REMEDIES FOR NEGLIGENCE OR UNDER STRICT LIABILITY, OR FOR BREACH OF WARRANTY OR CONTRACT, INCLUDING BUT NOT LIMITED TO INDIRECT, CONSEQUENTIAL, PUNITIVE OR INCIDENTAL DAMAGES, EVEN IF YOU GIVE NOTICE OF THE POSSIBILITY OF SUCH DAMAGES.
If you discover a Defect in this etext within 90 days of receiving it, you can receive a refund of the money (if any) you paid for it by sending an explanatory note within that time to the person you received it from. If you received it on a physical medium, you must return it with your note, and such person may choose to alternatively give you a replacement copy. If you received it electronically, such person may choose to alternatively give you a second opportunity to receive it electronically.
THIS ETEXT IS OTHERWISE PROVIDED TO YOU "AS-IS". NO OTHER WARRANTIES OF ANY KIND, EXPRESS OR IMPLIED, ARE MADE TO YOU AS TO THE ETEXT OR ANY MEDIUM IT MAY BE ON, INCLUDING BUT NOT LIMITED TO WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Some states do not allow disclaimers of implied warranties or the exclusion or limitation of consequential damages, so the above disclaimers and exclusions may not apply to you, and you may have other legal rights.
INDEMNITY
You will indemnify and hold the Project, its directors, officers, members and agents harmless from all liability, cost and expense, including legal fees, that arise directly or indirectly from any of the following that you do or cause: [1] distribution of this etext, [2] alteration, modification, or addition to the etext, or [3] any Defect.
WHAT IF YOU *WANT* TO SEND MONEY EVEN IF YOU DON'T HAVE TO?
Project Gutenberg is dedicated to increasing the number of public domain and licensed works that can be freely distributed in machine readable form. The Project gratefully accepts contributions in money, time, scanning machines, OCR software, public domain etexts, royalty free copyright licenses, and whatever else you can think of. Money should be paid to "Project Gutenberg Association / Benedictine University".
*SMALL PRINT! Ver.04.29.93 FOR COPYRIGHT PROTECTED ETEXTS*END*

Hackers, Heroes of the Computer Revolution, by Steven Levy (C)1984 by Steven Levy

Chapters 1 and 2 of Hackers, Heroes of the Computer Revolution by Steven Levy

Who's Who The Wizards and their Machines
Bob Albrecht Found of People's Computer Company who took visceral pleasure in exposing youngsters to computers.
Altair 8800 The pioneering microcomputer that galvanized hardware hackers. Building this kit made you learn hacking. Then you tried to figure out what to DO with it.
Apple II ][ Steve Wozniak's friendly, flaky, good-looking computer, wildly successful and the spark and soul of a thriving industry.
Atari 800 This home computer gave great graphics to game hackers like John Harris, though the company that made it was loath to tell you how it worked.
Bob and Carolyn Box World-record-holding gold prospectors turned software stars, working for Sierra On-Line.
Doug Carlston Corporate lawyer who chucked it all to form the Broderbund software company.
Bob Davis Left job in liquor store to become best-selling author of Sierra On-Line computer game "Ulysses and the Golden Fleece." Success was his downfall.
Peter Deutsch Bad in sports, brilliant at math, Peter was still in short pants when he stubled on the TX-0 at MIT--and hacked it along with the masters.
Steve Dompier Homebrew member who first made the Altair sing, and later wrote the "Targe" game on the Sol which entranced Tom Snyder.
John Draper The notorious "Captain Crunch"
Continue reading on your phone by scaning this QR Code

 / 20
Tip: The current page has been bookmarked automatically. If you wish to continue reading later, just open the Dertz Homepage, and click on the 'continue reading' link at the bottom of the page.