HOME



picture info

IHTFP
Hacks at the Massachusetts Institute of Technology are practical jokes and pranks meant to prominently demonstrate technical aptitude and cleverness, and/or to commemorate popular culture and historical topics. The pranks are anonymously installed at night by hackers, usually, but not exclusively, undergraduate students. The hackers' actions are governed by an informal yet extensive body of precedent, tradition and ethics. Hacks can occur anywhere across campus, and occasionally off campus; many make use of the iconic Great Dome, Little Dome, Green Building tower, or other prominent architectural features of the MIT campus. Well-known hacker alumni include Nobel Laureates Richard P. Feynman and George F. Smoot. In October 2009, US President Barack Obama made a reference to the MIT hacking tradition during an on-campus speech about clean energy. In recent years, MIT students have employed hacks to protest MIT's collaborations with the Israeli military and arms suppliers during ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Green Building (MIT)
The Cecil and Ida Green Building, also called the Green Building or Building 54, is an academic and research building at the Massachusetts Institute of Technology (MIT) in Cambridge, Massachusetts. The building houses the Department of Earth, Atmospheric, and Planetary Sciences (EAPS). It is one of the List of tallest buildings and structures in Cambridge, Massachusetts, tallest buildings in Cambridge. The Green Building was designed by I. M. Pei, who received a bachelor's degree in architecture from MIT in 1940, and Araldo Cossutta. Principal donor Cecil Howard Green received a bachelor's degree and master's degree from MIT and was a co-founder of Texas Instruments. Architecture The Green Building was constructed during 1962–1964 using reinforced concrete. It has 18 floors, equivalent to 21 stories or tall, with a concrete facade that resembles the limestone and concrete of the older MIT buildings near it. The basement of the building is below sea level and connects to the ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Infinite Corridor
The Infinite Corridor 203 pp. is a hallway that runs through the Campus of the Massachusetts Institute of Technology, main buildings of the Massachusetts Institute of Technology, specifically parts of the buildings numbered 7, 3, 10, 4, and 8 (from west to east). Twice a year, in mid-November and in late January, the corridor lines up lengthwise with the position of the Sun, causing sunlight to fill the entire corridor. Named #MIThenge, MIThenge, the event is celebrated by students, faculty, and staff. Significance The corridor is important not only because it links major MIT buildings, but also because it serves as the most direct indoor route between the east and west ends of the campus. The corridor was designed as the central spine of the original set of MIT buildings designed by William W. Bosworth in 1913. The Infinite Corridor is slightly longer than that of the University Hall building at the University of Lethbridge, Alberta, Canada, which measures long. It is ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Hacker Culture
The hacker culture is a subculture of individuals who enjoy—often in collective effort—the intellectual challenge of creatively overcoming the limitations of software systems or electronic hardware (mostly digital electronics), to achieve novel and clever outcomes. The act of engaging in activities (such as programming or other media) in a spirit of playfulness and exploration is termed ''hacking''. However, the defining characteristic of a hacker is not the activities performed themselves (e.g. programming), but how it is done and whether it is exciting and meaningful. Activities of playful cleverness can be said to have "hack value" and therefore the term "hacks" came about, with early examples including pranks at MIT done by students to demonstrate their technical aptitude and cleverness. The hacker culture originally emerged in academia in the 1960s around the Massachusetts Institute of Technology (MIT)'s Tech Model Railroad Club (TMRC) and MIT Artificial ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

MIT Simmons Smiles
The Massachusetts Institute of Technology (MIT) is a Private university, private research university in Cambridge, Massachusetts, United States. Established in 1861, MIT has played a significant role in the development of many areas of modern technology and science. In response to the increasing Technological and industrial history of the United States, industrialization of the United States, William Barton Rogers organized a school in Boston to create "useful knowledge." Initially funded by a land-grant universities, federal land grant, the institute adopted a Polytechnic, polytechnic model that stressed laboratory instruction in applied science and engineering. MIT moved from Boston to Cambridge in 1916 and grew rapidly through collaboration with private industry, military branches, and new federal basic research agencies, the formation of which was influenced by MIT faculty like Vannevar Bush. In the late twentieth century, MIT became a leading center for research in compu ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




Roof And Tunnel Hacking
Roof and tunnel hacking is the unauthorized exploration of roof and utility tunnel spaces. The term carries a strong collegiate connotation, stemming from its use at MIT and at the U.S. Naval Academy, where the practice has a long history. It is a form of urban exploration. Some participants use it as a means of carrying out collegiate pranks, by hanging banners from high places or, in one notable example from MIT, placing a life-size model police car on top of a university building. Others are interested in exploring inaccessible and seldom-seen places; that such exploration is unauthorized is often part of the thrill. Roofers, in particular, may be interested in the skyline views from the highest points on a campus. On August 1, 2016, Red Bull TV launched the documentary series '' URBEX – Enter At Your Own Risk'', which also chronicles roof and tunnel hacking. Vadding Vadding is a verb which has become synonymous with urban exploration. The word comes from MI ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Cyberculture
Internet culture refers to culture developed and maintained among frequent and active users of the Internet (also known as netizens) who primarily communicate with one another as members of online communities; that is, a culture whose influence is "mediated by computer screens" and information communication technology, specifically the Internet. Internet culture arises from the frequent interactions between members within various online communities and the use of these communities for communication, entertainment, business, and recreation. Studied aspects of Internet culture include anonymity/pseudonymity, social media, gaming and specific communities, such as fandoms. History The Internet developed in parallel with rapid and sustained technological advances in computing and data communication. Widespread access to the Internet emerged as the cost of infrastructure dropped by several orders of magnitude with consecutive technological improvements. Though Internet cultur ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Hacker Ethic
The hacker ethic is a philosophy and set of moral values within hacker culture. Practitioners believe that sharing information and data with others is an ethical imperative. The hacker ethic is related to the concept of freedom of information, as well as the political theories of anti-authoritarianism, anarchism, and libertarianism. While some tenets of the hacker ethic were described in other texts like '' Computer Lib/Dream Machines'' (1974) by Ted Nelson, the term ''hacker ethic'' is generally attributed to journalist Steven Levy, who appears to have been the first to document both the philosophy and the founders of the philosophy in his 1984 book titled '' Hackers: Heroes of the Computer Revolution.'' History The hacker ethic originated at the Massachusetts Institute of Technology in the 1950s–1960s. The term "hacker" has long been used there to describe college pranks that MIT students would regularly devise, and was used more generally to describe a project undertake ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Urban Exploration
Urban exploration (often shortened as UE, urbex, and sometimes known as roof and tunnel hacking) is the exploration of manmade structures, usually abandoned ruins or hidden components of the manmade environment. Photography and historical interest/documentation are heavily featured in the hobby, sometimes involving trespassing onto private property. Urban exploration is also called draining (a specific form of urban exploration where storm drains or sewers are explored), urban spelunking, urban rock climbing, urban caving, building hacking, or Mouse-holing, mousing. The activity presents various risks, including physical danger, the possibility of arrest and punishment if done illegally and/or without permission, and the risk of encountering Squatting, squatters. Some activities associated with urban exploration may violate local or regional laws, certain broadly interpreted Anti-terrorism legislation, anti-terrorism laws, or can be considered trespassing or invasion of privacy ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

R2-D2
R2-D2 () or Artoo-Detoo is a fictional robot character in the ''Star Wars'' franchise created by George Lucas. He has appeared in ten of the eleven theatrical ''Star Wars'' films to date, including every film in the " Skywalker Saga", which includes the original trilogy, the prequel trilogy and the sequel trilogy. At various points throughout the course of the films, R2, an astromech droid, is a friend to C-3PO, Padmé Amidala, Anakin Skywalker, Leia Organa, Luke Skywalker, and Obi-Wan Kenobi. R2-D2 and his companion C-3PO are the only characters to appear in every theatrical ''Star Wars'' film, with the exception of '' Solo: A Star Wars Story'' (2018). English actor Kenny Baker played R2-D2 in all three original ''Star Wars'' films and received billing credit for the character in the prequel trilogy, where Baker's role was reduced as R2-D2 was portrayed mainly by radio controlled props and CGI models. In the sequel trilogy, Baker was credited as consultant for '' The F ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Culture Jamming
Culture jamming (sometimes also guerrilla communication) is a form of protest used by many anti-consumerist social movements to disrupt or subvert media culture and its mainstream cultural institutions, including corporate advertising. It attempts to "expose the methods of domination" of mass society. Culture jamming employs techniques originally associated with Letterist International, and later Situationist International known as ''détournement.'' It uses the language and rhetoric of mainstream culture to subversively critique the social institutions that produce that culture. Tactics include editing company logos to critique the respective companies, products, or concepts they represent, or wearing fashion statements that criticize the current fashion trends by deliberately clashing with them.Boden, Sharon and Williams, Simon J. (2002) "Consumption and Emotion: The Romantic Ethic Revisited", Sociology 36(3):493–512 Culture jamming often entails using mass media to pr ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Hacker (computer Security)
A security hacker or security researcher is someone who explores methods for breaching or bypassing defenses and exploiting weaknesses in a computer system or network. Hackers may be motivated by a multitude of reasons, such as profit, protest, sabotage, information gathering, challenge, recreation, or evaluation of a system weaknesses to assist in formulating defenses against potential hackers. Longstanding controversy surrounds the meaning of the term "hacker". In this controversy, computer programmers reclaim the term ''hacker'', arguing that it refers simply to someone with an advanced understanding of computers and computer networks, and that ''cracker'' is the more appropriate term for those who break into computers, whether computer criminals ( black hats) or computer security experts ( white hats). A 2014 article noted that "the black-hat meaning still prevails among the general public". The subculture that has evolved around hackers is often referred to as the "co ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]