Advertise here with Carbon Ads

This site is made possible by member support. โค๏ธ

Big thanks to Arcustech for hosting the site and offering amazing tech support.

When you buy through links on kottke.org, I may earn an affiliate commission. Thanks for supporting the site!

kottke.org. home of fine hypertext products since 1998.

๐Ÿ”  ๐Ÿ’€  ๐Ÿ“ธ  ๐Ÿ˜ญ  ๐Ÿ•ณ๏ธ  ๐Ÿค   ๐ŸŽฌ  ๐Ÿฅ”

kottke.org posts about hackers

Hackers, 25 years later

For the 25th anniversary of his book Hackers: Heroes of the Computer Revolution, Steven Levy talks to a few of the book’s subjects (Bill Gates, Richard Stallman, Steve Wozniak) about how they’ve changed and what hacking means today.

On the one hand, information wants to be expensive, because it’s so valuable,” [Stewart Brand] said. “On the other hand, information wants to be free, because the cost of getting it out is getting lower and lower all the time. So you have these two fighting against each other.” His words neatly encapsulate the tension that has since defined the hacker movement โ€” a sometimes pitched battle between geeky idealism and icy-hearted commerce.


2600 book

2600, the hacker’s quarterly magazine, is publishing a best-of book compiling their most interesting and controversial articles.

Since its introduction in January of 1984, 2600 has been a unique source of information for readers with a strong sense of curiosity and an affinity for technology. The articles in 2600 have been consistently fascinating and frequently controversial. Over the past couple of decades the magazine has evolved from three sheets of loose-leaf paper stuffed into an envelope (readers “subscribed” by responding to a notice on a popular BBS frequented by hackers and sending in a SASE) to a professionally produced quarterly magazine. At the same time, the creators’ anticipated audience of “a few dozen people tied together in a closely knit circle of conspiracy and mischief” grew to a global audience of tens of thousands of subscribers.

Only 888 pages. (via bb)


Ken Thompson built a backdoor into the “

Ken Thompson built a backdoor into the “login” Unix program by inserting commands into the C compiler that ensured that not only would the backdoor code be inserted into the login program, but also into the C compiler itself when compiled.


Documentary on hacking: The Secret History of

Documentary on hacking: The Secret History of Hacking. Features Woz, Capt. Crunch, and Kevin Mitnick.


On the 250th anniversary of Mozart’s birth,

On the 250th anniversary of Mozart’s birth, a fun essay about Mozart as a hacker.


Eyebeam is looking for R&D Fellows

Eyebeam is looking for R&D Fellows for their new OpenLab. “The ideal fellow has experience creating innovative creative technology projects, a love of collaborative development, and a desire to distribute his or her work as widely as possible. We encourage artists, hackers, designers and engineers to apply.”