There is a certain allure to computing which is difficult to replicate in other environments. In many respects computing is always "real" rather than merely an example or model, though there is equally always the hope for more power and greater facilities to do bigger and better hacks. Whereas in other endeavors the development of a project such as a hot-rod car or a trip to Hawaii costs real dollars, computing costs nothing – it is a utility. Driving a hot-rod on a dirt strip is also fraught with real physical danger, while hot-rodding a computer is safe. The computer does not hit back even when the worst of effects are programmed.
Even the non-hacker and the non-programmer are affected by the computer. With the advent of e-mail systems, one can easily recognize the change in personality with comes from a non-evasive form of communication. Persons who are puppy dogs in face-to-face communication become wolves when they do not have to look into the eyes of the receiver and are not threatened physically by their textual combatant
Access to Computers – and anything which might teach you something about the way the world work – should be unlimited and total. Always yield to the Hands-On Imperative!
All information should be free.
Mistrust Authority – Promote Decentralization.
Hackers should be judged by their hacking, not bogus criteria such as degrees, age, race, or position.
you can create art and beauty on a computer.
Computers can change your life for the better.
hacking, whether it is benign or felonious, is associated with learning and exploration. While there are elder hackers, they grew up from the hacking covens of youngsters interested in exploring and exploiting the new ethereal world of electronic tripping. But like so many other new technologies, the growth of the amateur capabilities and the sharing of findings, soon outgrows the normal and the useful; to find an area in which to make a mark requires an excursion into the not so acceptable domains.