Coding Freedom: The Ethics and Aesthetics of Hacking

Free Coding Freedom: The Ethics and Aesthetics of Hacking by E. Gabriella Coleman Page B

Book: Coding Freedom: The Ethics and Aesthetics of Hacking by E. Gabriella Coleman Read Free Book Online
Authors: E. Gabriella Coleman
Tags: COM051000
of 1993 and that was the end for me as well, or at least the beginning. All these flashing lines coming by [ … ] just immediately appealed to me.
    The “ah-ahhh,” “oh my gosh,” “this is so cool,” “oh my god” factor of discovering free software depended on a myriad of intersecting elements. For some hackers, free software meant they could finally have a workable Unix operating system for their personal computer (previously, Unix ran primarily on larger, more expensive machines). Gone were the days of having to trudge through snowy streets to access a beloved Unix machine in the computer science department.
    Prior to Linux, there were few workable Unix systems that ran on personal computers and were nonproprietary. The production of Linux thus represented a general liberation of the Unix architecture, and also inaugurated its individualization, decentralization, and proliferation. Unhitched from the sole province of the university, corporation, and stringent rules of conventional intellectual property law, Linux was released as a public good and was also produced in public fashion through a volunteer association. 10 Most significantly, hackers were able to run Linux on mass-produced personal computers at home, spending more quality one-on-one time than before with an architecture that even now, still demands an active and dedicated partner. One programmer explained his early excitement as “finally” having “a workshop with all the most powerful tools to hack on real stuff at home.” Most young hackers, however, were thrilled, and many were downright “floored,” at the newfound unlimited access to source code.
    Yet the real adventure of free software came
after
its discovery. In the early days, when Linux distributions were only available off the Net, one had to download the system from a slow connection, usually a modem—a technical feat in and of itself. Taking at least a week to accomplish, the connection would undoubtedly crash, multiple times (but fortunately the download protocols allowed resuming from where it crashed), and a number of the floppies would invariably be corrupt. Once completed, Linux would often occupy around “forty floppy disks.” 11 With a stack of floppies, some hackers would immediately begin installation, and then had to hack at the system to make it actually work. Others first had to fend off accusations of piracy from what some developers intimated was some pesky, ignorant, low-level computer lab administrator. The annoyed but excited hacker could offer the administrator only an ambiguous defense, because at this time most hackers lacked the vocabulary with which to describe themeaning and purpose of free software. They might have said it was shareware, to use a term that probably would have been understood, even if it was technically incorrect. Without the intimacy that is born from time and discussion about the nature of objects with peers, free software and Linux in the early 1990s existed for many hackers as an unconceptualized “thing” in the ways theorized by Martin Heidegger ([1927] 2008), whose meaning had yet to be actualized, naturalized, or solidified as a social “object” known collectively by many.
    Once the download was complete and the suspicious administrator was sufficiently placated, hackers would then proceed to the next phase of the adventure: the death match of installation. Uninstalled, the OS was an unruly creature that had to be transformed into an obedient object so that it could be used for other acts of creative production. Until at least around 1998 (and arguably still so with many distributions, depending on the user’s experience and skills), Linux installation was nothing short of a weeklong grueling ritual of esoteric initiation into an arcane technical world that tested skills, patience, and a geek’s deepest resolve to conquer the seemingly unconquerable. Just to configure basic components of a system like X windows (the graphical

Similar Books

Identical

Ellen Hopkins

Attack of the Amazons

Gilbert L. Morris

Between Two Worlds

Zainab Salbi

Kalila

Rosemary Nixon

Sinful

Carolyn Faulkner

Find a Victim

Ross MacDonald

Until It's You

C.B. Salem