<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://cyborganthropology.com/index.php?action=history&amp;feed=atom&amp;title=Hacker-as-Hero</id>
	<title>Hacker-as-Hero - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://cyborganthropology.com/index.php?action=history&amp;feed=atom&amp;title=Hacker-as-Hero"/>
	<link rel="alternate" type="text/html" href="https://cyborganthropology.com/index.php?title=Hacker-as-Hero&amp;action=history"/>
	<updated>2026-04-22T11:15:53Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.45.3</generator>
	<entry>
		<id>https://cyborganthropology.com/index.php?title=Hacker-as-Hero&amp;diff=4674&amp;oldid=prev</id>
		<title>Caseorganic at 22:05, 2 July 2011</title>
		<link rel="alternate" type="text/html" href="https://cyborganthropology.com/index.php?title=Hacker-as-Hero&amp;diff=4674&amp;oldid=prev"/>
		<updated>2011-07-02T22:05:03Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 22:05, 2 July 2011&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l4&quot;&gt;Line 4:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 4:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Hackers are often analogous to wizards in fantasy books. Harry Potter and Gandolf have many of the same qualities of hackers in their ability to manipulate the basic structure of the world that surrounds us. Fantasy novels ask us to take it is a basic premise that magic exists, but hackers work within the world that we inhabit. The hacker/wizard trope thus embodies Arthur Clark&amp;#039;s law that any technology of sufficient complexity is indistinguishable from magic.&amp;lt;ref&amp;gt;Clarke, Arthur C. Hazards of Prophecy: The Failure of Imagination. Published in Profiles of the Future. Harper &amp;amp; Row, 1962. Revised 1973.&amp;lt;/ref&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Hackers are often analogous to wizards in fantasy books. Harry Potter and Gandolf have many of the same qualities of hackers in their ability to manipulate the basic structure of the world that surrounds us. Fantasy novels ask us to take it is a basic premise that magic exists, but hackers work within the world that we inhabit. The hacker/wizard trope thus embodies Arthur Clark&amp;#039;s law that any technology of sufficient complexity is indistinguishable from magic.&amp;lt;ref&amp;gt;Clarke, Arthur C. Hazards of Prophecy: The Failure of Imagination. Published in Profiles of the Future. Harper &amp;amp; Row, 1962. Revised 1973.&amp;lt;/ref&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;In the real world, hacker heros are those that use their powers to expose insecurities in systems, spread information to groups that need it, and discover and make known unjust acts or persons.  &lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;Whereas a traditional hero or Robin Hood might use physical technologies and tactics to succeed, a hacker hero uses mental tools and technology to achieve their goals. &lt;/ins&gt;In the real world, hacker heros are those that use their powers to expose insecurities in systems, spread information to groups that need it, and discover and make known unjust acts or persons.  &lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;In &lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;recent &lt;/del&gt;fiction, the most prominent example a hacker hero would be Neo, the main protagonist in the Matrix. As a hacker who suspected that there was more to life than met the eye, he discovered that his entire life and reality was a computer program. In addition, he discovered that he was &quot;the one&quot; that had the power to manipulate this reality-program. Other hacker heros include the protagonists from Swordfish, Hackers, Terminator 2, The Social Network, and supporting actors in the X-files, Ghost in the Shell, and Cowboy Bebop.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;In fiction, the most prominent example a hacker hero would be Neo, the main protagonist in the Matrix. As a hacker who suspected that there was more to life than met the eye, he discovered that his entire life and reality was a computer program. In addition, he discovered that he was &quot;the one&quot; that had the power to manipulate this reality-program. Other hacker heros include the protagonists from Swordfish, Hackers, Terminator 2, The Social Network, &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;Serial Experiments Lain &lt;/ins&gt;and supporting actors in the X-files, Ghost in the Shell, and Cowboy Bebop.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==References==&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==References==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;

&lt;!-- diff cache key p37438:diff:1.41:old-4673:rev-4674:php=table --&gt;
&lt;/table&gt;</summary>
		<author><name>Caseorganic</name></author>
	</entry>
	<entry>
		<id>https://cyborganthropology.com/index.php?title=Hacker-as-Hero&amp;diff=4673&amp;oldid=prev</id>
		<title>Caseorganic at 22:02, 2 July 2011</title>
		<link rel="alternate" type="text/html" href="https://cyborganthropology.com/index.php?title=Hacker-as-Hero&amp;diff=4673&amp;oldid=prev"/>
		<updated>2011-07-02T22:02:21Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 22:02, 2 July 2011&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l4&quot;&gt;Line 4:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 4:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Hackers are often analogous to wizards in fantasy books. Harry Potter and Gandolf have many of the same qualities of hackers in their ability to manipulate the basic structure of the world that surrounds us. Fantasy novels ask us to take it is a basic premise that magic exists, but hackers work within the world that we inhabit. The hacker/wizard trope thus embodies Arthur Clark&amp;#039;s law that any technology of sufficient complexity is indistinguishable from magic.&amp;lt;ref&amp;gt;Clarke, Arthur C. Hazards of Prophecy: The Failure of Imagination. Published in Profiles of the Future. Harper &amp;amp; Row, 1962. Revised 1973.&amp;lt;/ref&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Hackers are often analogous to wizards in fantasy books. Harry Potter and Gandolf have many of the same qualities of hackers in their ability to manipulate the basic structure of the world that surrounds us. Fantasy novels ask us to take it is a basic premise that magic exists, but hackers work within the world that we inhabit. The hacker/wizard trope thus embodies Arthur Clark&amp;#039;s law that any technology of sufficient complexity is indistinguishable from magic.&amp;lt;ref&amp;gt;Clarke, Arthur C. Hazards of Prophecy: The Failure of Imagination. Published in Profiles of the Future. Harper &amp;amp; Row, 1962. Revised 1973.&amp;lt;/ref&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;The &lt;/del&gt;most prominent example &lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;of &lt;/del&gt;a hacker &lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;as &lt;/del&gt;hero &lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;in fiction &lt;/del&gt;would be Neo, the main protagonist in the Matrix. As a hacker who suspected that there was more to life than met the eye, he discovered that his entire life and reality was a computer program. In addition, he discovered that he was &quot;the one&quot; that had the power to manipulate this reality-program. Other hacker heros include the protagonists from Swordfish, Hackers, Terminator 2, The Social Network, and supporting actors in the X-files, Ghost in the Shell, and Cowboy Bebop.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;In the real world, hacker heros are those that use their powers to expose insecurities in systems, spread information to groups that need it, and discover and make known unjust acts or persons. &lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-side-deleted&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt; &lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-side-deleted&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;In recent fiction, the &lt;/ins&gt;most prominent example a hacker hero would be Neo, the main protagonist in the Matrix. As a hacker who suspected that there was more to life than met the eye, he discovered that his entire life and reality was a computer program. In addition, he discovered that he was &quot;the one&quot; that had the power to manipulate this reality-program. Other hacker heros include the protagonists from Swordfish, Hackers, Terminator 2, The Social Network, and supporting actors in the X-files, Ghost in the Shell, and Cowboy Bebop.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==References==&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==References==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;

&lt;!-- diff cache key p37438:diff:1.41:old-4668:rev-4673:php=table --&gt;
&lt;/table&gt;</summary>
		<author><name>Caseorganic</name></author>
	</entry>
	<entry>
		<id>https://cyborganthropology.com/index.php?title=Hacker-as-Hero&amp;diff=4668&amp;oldid=prev</id>
		<title>Caseorganic at 21:56, 2 July 2011</title>
		<link rel="alternate" type="text/html" href="https://cyborganthropology.com/index.php?title=Hacker-as-Hero&amp;diff=4668&amp;oldid=prev"/>
		<updated>2011-07-02T21:56:41Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 21:56, 2 July 2011&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l2&quot;&gt;Line 2:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 2:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;One of the more notable archetypes to emerge in the 90&amp;#039;s and 00&amp;#039;s has been the hacker hero. Hackers have increasingly become the central protagonists in movies, using their computer skills to augment the &amp;quot;system&amp;quot; and drive the plot. Hackers are here defined as programers that work from outside the system and have powers to manipulate the system that ordinary people lack.  &lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;One of the more notable archetypes to emerge in the 90&amp;#039;s and 00&amp;#039;s has been the hacker hero. Hackers have increasingly become the central protagonists in movies, using their computer skills to augment the &amp;quot;system&amp;quot; and drive the plot. Hackers are here defined as programers that work from outside the system and have powers to manipulate the system that ordinary people lack.  &lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Hackers are often analogous to wizards in fantasy books. Harry Potter and Gandolf have many of the same qualities of hackers in their ability to manipulate the basic structure of the world that surrounds us. Fantasy novels ask us to take it is a basic premise that magic exists, but hackers work within the world that we inhabit. The hacker/wizard trope thus embodies Arthur Clark&#039;s law that any technology of sufficient complexity is indistinguishable from magic.&amp;lt;ref&amp;gt;Clarke, Arthur C. Hazards of Prophecy: The Failure of Imagination in &lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;the collection &lt;/del&gt;Profiles of the Future. Harper &amp;amp; Row, 1962. Revised 1973.&amp;lt;/ref&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Hackers are often analogous to wizards in fantasy books. Harry Potter and Gandolf have many of the same qualities of hackers in their ability to manipulate the basic structure of the world that surrounds us. Fantasy novels ask us to take it is a basic premise that magic exists, but hackers work within the world that we inhabit. The hacker/wizard trope thus embodies Arthur Clark&#039;s law that any technology of sufficient complexity is indistinguishable from magic.&amp;lt;ref&amp;gt;Clarke, Arthur C. Hazards of Prophecy: The Failure of Imagination&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;. Published &lt;/ins&gt;in Profiles of the Future. Harper &amp;amp; Row, 1962. Revised 1973.&amp;lt;/ref&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;The most prominent example of a hacker as hero in fiction would be Neo, the main protagonist in the Matrix. As a hacker who suspected that there was more to life than met the eye, he discovered that his entire life and reality was a computer program. In addition, he discovered that he was &amp;quot;the one&amp;quot; that had the power to manipulate this reality-program. Other hacker heros include the protagonists from Swordfish, Hackers, Terminator 2, The Social Network, and supporting actors in the X-files, Ghost in the Shell, and Cowboy Bebop.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;The most prominent example of a hacker as hero in fiction would be Neo, the main protagonist in the Matrix. As a hacker who suspected that there was more to life than met the eye, he discovered that his entire life and reality was a computer program. In addition, he discovered that he was &amp;quot;the one&amp;quot; that had the power to manipulate this reality-program. Other hacker heros include the protagonists from Swordfish, Hackers, Terminator 2, The Social Network, and supporting actors in the X-files, Ghost in the Shell, and Cowboy Bebop.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;

&lt;!-- diff cache key p37438:diff:1.41:old-4667:rev-4668:php=table --&gt;
&lt;/table&gt;</summary>
		<author><name>Caseorganic</name></author>
	</entry>
	<entry>
		<id>https://cyborganthropology.com/index.php?title=Hacker-as-Hero&amp;diff=4667&amp;oldid=prev</id>
		<title>Caseorganic at 21:55, 2 July 2011</title>
		<link rel="alternate" type="text/html" href="https://cyborganthropology.com/index.php?title=Hacker-as-Hero&amp;diff=4667&amp;oldid=prev"/>
		<updated>2011-07-02T21:55:19Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 21:55, 2 July 2011&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l1&quot;&gt;Line 1:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 1:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;===Definition===&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;===Definition===&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;One of the more notable archetypes to emerge in the 90&amp;#039;s and 00&amp;#039;s has been the hacker hero. Hackers have increasingly become the central protagonists in movies, using their computer skills to augment the &amp;quot;system&amp;quot; and drive the plot. Hackers are here defined as programers that work from outside the system and have powers to manipulate the system that ordinary people lack.  &lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;One of the more notable archetypes to emerge in the 90&amp;#039;s and 00&amp;#039;s has been the hacker hero. Hackers have increasingly become the central protagonists in movies, using their computer skills to augment the &amp;quot;system&amp;quot; and drive the plot. Hackers are here defined as programers that work from outside the system and have powers to manipulate the system that ordinary people lack.  &lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-side-deleted&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-side-deleted&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;Hackers are often analogous to wizards in fantasy books. Harry Potter and Gandolf have many of the same qualities of hackers in their ability to manipulate the basic structure of the world that surrounds us. Fantasy novels ask us to take it is a basic premise that magic exists, but hackers work within the world that we inhabit. The hacker/wizard trope thus embodies Arthur Clark&#039;s law that any technology of sufficient complexity is indistinguishable from magic.&amp;lt;ref&amp;gt;Clarke, Arthur C. Hazards of Prophecy: The Failure of Imagination in the collection Profiles of the Future. Harper &amp;amp; Row, 1962. Revised 1973.&amp;lt;/ref&amp;gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;The most prominent example of a hacker as hero in fiction would be Neo, the main protagonist in the Matrix. As a hacker who suspected that there was more to life than met the eye, he discovered that his entire life and reality was a computer program. In addition, he discovered that he was &amp;quot;the one&amp;quot; that had the power to manipulate this reality-program. Other hacker heros include the protagonists from Swordfish, Hackers, Terminator 2, The Social Network, and supporting actors in the X-files, Ghost in the Shell, and Cowboy Bebop.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;The most prominent example of a hacker as hero in fiction would be Neo, the main protagonist in the Matrix. As a hacker who suspected that there was more to life than met the eye, he discovered that his entire life and reality was a computer program. In addition, he discovered that he was &amp;quot;the one&amp;quot; that had the power to manipulate this reality-program. Other hacker heros include the protagonists from Swordfish, Hackers, Terminator 2, The Social Network, and supporting actors in the X-files, Ghost in the Shell, and Cowboy Bebop.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;Hackers are often analogous to wizards in fantasy books. Harry Potter and Gandolf have many of the same qualities of hackers in their ability to manipulate the basic structure of the world that surrounds us. Fantasy novels ask us to take it is a basic premise that magic exists, but hackers work within the world that we inhabit. The hacker&lt;/del&gt;/&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;wizard trope thus embodies Arthur Clark&#039;s law that any technology of sufficient complexity is indistinguishable from magic. &lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;==References==&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-side-deleted&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&amp;lt;references &lt;/ins&gt;/&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&amp;gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;[[Category:Book Pages]]&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;[[Category:Book Pages]]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;[[Category:Finished]]&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;[[Category:Finished]]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;

&lt;!-- diff cache key p37438:diff:1.41:old-4661:rev-4667:php=table --&gt;
&lt;/table&gt;</summary>
		<author><name>Caseorganic</name></author>
	</entry>
	<entry>
		<id>https://cyborganthropology.com/index.php?title=Hacker-as-Hero&amp;diff=4661&amp;oldid=prev</id>
		<title>Caseorganic at 21:24, 2 July 2011</title>
		<link rel="alternate" type="text/html" href="https://cyborganthropology.com/index.php?title=Hacker-as-Hero&amp;diff=4661&amp;oldid=prev"/>
		<updated>2011-07-02T21:24:54Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 21:24, 2 July 2011&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l2&quot;&gt;Line 2:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 2:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;One of the more notable archetypes to emerge in the 90&amp;#039;s and 00&amp;#039;s has been the hacker hero. Hackers have increasingly become the central protagonists in movies, using their computer skills to augment the &amp;quot;system&amp;quot; and drive the plot. Hackers are here defined as programers that work from outside the system and have powers to manipulate the system that ordinary people lack.  &lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;One of the more notable archetypes to emerge in the 90&amp;#039;s and 00&amp;#039;s has been the hacker hero. Hackers have increasingly become the central protagonists in movies, using their computer skills to augment the &amp;quot;system&amp;quot; and drive the plot. Hackers are here defined as programers that work from outside the system and have powers to manipulate the system that ordinary people lack.  &lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;The most &lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;notable &lt;/del&gt;example of &lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;this &lt;/del&gt;would be Neo in the Matrix. &lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;A &lt;/del&gt;hacker who &lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;suspects &lt;/del&gt;that there &lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;is &lt;/del&gt;more to life than &lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;meets &lt;/del&gt;the eye &lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;discovers &lt;/del&gt;that &lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;everything he has known &lt;/del&gt;his entire life &lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;is &lt;/del&gt;a computer program. &lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;More than this&lt;/del&gt;, he &lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;discovers &lt;/del&gt;that he &lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;is &lt;/del&gt;&quot;the one&quot; that &lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;can &lt;/del&gt;manipulate this reality-program. Other hacker heros include the protagonists from Swordfish, Hackers, Terminator 2, The Social Network, and supporting actors in the X-files, Ghost in the Shell, and Cowboy Bebop.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;The most &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;prominent &lt;/ins&gt;example of &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;a hacker as hero in fiction &lt;/ins&gt;would be Neo&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;, the main protagonist &lt;/ins&gt;in the Matrix. &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;As a &lt;/ins&gt;hacker who &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;suspected &lt;/ins&gt;that there &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;was &lt;/ins&gt;more to life than &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;met &lt;/ins&gt;the eye&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;, he discovered &lt;/ins&gt;that his entire life &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;and reality was &lt;/ins&gt;a computer program. &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;In addition&lt;/ins&gt;, he &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;discovered &lt;/ins&gt;that he &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;was &lt;/ins&gt;&quot;the one&quot; that &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;had the power to &lt;/ins&gt;manipulate this reality-program. Other hacker heros include the protagonists from Swordfish, Hackers, Terminator 2, The Social Network, and supporting actors in the X-files, Ghost in the Shell, and Cowboy Bebop.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Hackers are often analogous to wizards in fantasy books. Harry Potter and Gandolf have many of the same qualities of hackers in their ability to manipulate the basic structure of the world that surrounds us. Fantasy novels ask us to take it is a basic premise that magic exists, but hackers work within the world that we inhabit. The hacker/wizard trope thus embodies Arthur Clark&amp;#039;s law that any technology of sufficient complexity is indistinguishable from magic.  &lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Hackers are often analogous to wizards in fantasy books. Harry Potter and Gandolf have many of the same qualities of hackers in their ability to manipulate the basic structure of the world that surrounds us. Fantasy novels ask us to take it is a basic premise that magic exists, but hackers work within the world that we inhabit. The hacker/wizard trope thus embodies Arthur Clark&amp;#039;s law that any technology of sufficient complexity is indistinguishable from magic.  &lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;

&lt;!-- diff cache key p37438:diff:1.41:old-4269:rev-4661:php=table --&gt;
&lt;/table&gt;</summary>
		<author><name>Caseorganic</name></author>
	</entry>
	<entry>
		<id>https://cyborganthropology.com/index.php?title=Hacker-as-Hero&amp;diff=4269&amp;oldid=prev</id>
		<title>Caseorganic at 23:48, 16 June 2011</title>
		<link rel="alternate" type="text/html" href="https://cyborganthropology.com/index.php?title=Hacker-as-Hero&amp;diff=4269&amp;oldid=prev"/>
		<updated>2011-06-16T23:48:58Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 23:48, 16 June 2011&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l1&quot;&gt;Line 1:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 1:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-side-deleted&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;===Definition===&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;One of the more notable archetypes to emerge in the 90&amp;#039;s and 00&amp;#039;s has been the hacker hero. Hackers have increasingly become the central protagonists in movies, using their computer skills to augment the &amp;quot;system&amp;quot; and drive the plot. Hackers are here defined as programers that work from outside the system and have powers to manipulate the system that ordinary people lack.  &lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;One of the more notable archetypes to emerge in the 90&amp;#039;s and 00&amp;#039;s has been the hacker hero. Hackers have increasingly become the central protagonists in movies, using their computer skills to augment the &amp;quot;system&amp;quot; and drive the plot. Hackers are here defined as programers that work from outside the system and have powers to manipulate the system that ordinary people lack.  &lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l6&quot;&gt;Line 6:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 7:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;[[Category:Book Pages]]&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;[[Category:Book Pages]]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;[[Category:&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;Marked for editing&lt;/del&gt;]]&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;[[Category:&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;Finished&lt;/ins&gt;]]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;

&lt;!-- diff cache key p37438:diff:1.41:old-4190:rev-4269:php=table --&gt;
&lt;/table&gt;</summary>
		<author><name>Caseorganic</name></author>
	</entry>
	<entry>
		<id>https://cyborganthropology.com/index.php?title=Hacker-as-Hero&amp;diff=4190&amp;oldid=prev</id>
		<title>And.awarner at 21:21, 12 June 2011</title>
		<link rel="alternate" type="text/html" href="https://cyborganthropology.com/index.php?title=Hacker-as-Hero&amp;diff=4190&amp;oldid=prev"/>
		<updated>2011-06-12T21:21:39Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 21:21, 12 June 2011&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l5&quot;&gt;Line 5:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 5:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Hackers are often analogous to wizards in fantasy books. Harry Potter and Gandolf have many of the same qualities of hackers in their ability to manipulate the basic structure of the world that surrounds us. Fantasy novels ask us to take it is a basic premise that magic exists, but hackers work within the world that we inhabit. The hacker/wizard trope thus embodies Arthur Clark&amp;#039;s law that any technology of sufficient complexity is indistinguishable from magic.  &lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Hackers are often analogous to wizards in fantasy books. Harry Potter and Gandolf have many of the same qualities of hackers in their ability to manipulate the basic structure of the world that surrounds us. Fantasy novels ask us to take it is a basic premise that magic exists, but hackers work within the world that we inhabit. The hacker/wizard trope thus embodies Arthur Clark&amp;#039;s law that any technology of sufficient complexity is indistinguishable from magic.  &lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;[Category:Book Pages]&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;[&lt;/ins&gt;[Category:Book Pages&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;]&lt;/ins&gt;]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;[Category:Marked for editing]&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;[&lt;/ins&gt;[Category:Marked for editing&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;]&lt;/ins&gt;]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;

&lt;!-- diff cache key p37438:diff:1.41:old-4189:rev-4190:php=table --&gt;
&lt;/table&gt;</summary>
		<author><name>And.awarner</name></author>
	</entry>
	<entry>
		<id>https://cyborganthropology.com/index.php?title=Hacker-as-Hero&amp;diff=4189&amp;oldid=prev</id>
		<title>And.awarner: Created page with &#039;One of the more notable archetypes to emerge in the 90&#039;s and 00&#039;s has been the hacker hero. Hackers have increasingly become the central protagonists in movies, using their compu…&#039;</title>
		<link rel="alternate" type="text/html" href="https://cyborganthropology.com/index.php?title=Hacker-as-Hero&amp;diff=4189&amp;oldid=prev"/>
		<updated>2011-06-12T21:20:37Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;#039;One of the more notable archetypes to emerge in the 90&amp;#039;s and 00&amp;#039;s has been the hacker hero. Hackers have increasingly become the central protagonists in movies, using their compu…&amp;#039;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;One of the more notable archetypes to emerge in the 90&amp;#039;s and 00&amp;#039;s has been the hacker hero. Hackers have increasingly become the central protagonists in movies, using their computer skills to augment the &amp;quot;system&amp;quot; and drive the plot. Hackers are here defined as programers that work from outside the system and have powers to manipulate the system that ordinary people lack. &lt;br /&gt;
&lt;br /&gt;
The most notable example of this would be Neo in the Matrix. A hacker who suspects that there is more to life than meets the eye discovers that everything he has known his entire life is a computer program. More than this, he discovers that he is &amp;quot;the one&amp;quot; that can manipulate this reality-program. Other hacker heros include the protagonists from Swordfish, Hackers, Terminator 2, The Social Network, and supporting actors in the X-files, Ghost in the Shell, and Cowboy Bebop.&lt;br /&gt;
&lt;br /&gt;
Hackers are often analogous to wizards in fantasy books. Harry Potter and Gandolf have many of the same qualities of hackers in their ability to manipulate the basic structure of the world that surrounds us. Fantasy novels ask us to take it is a basic premise that magic exists, but hackers work within the world that we inhabit. The hacker/wizard trope thus embodies Arthur Clark&amp;#039;s law that any technology of sufficient complexity is indistinguishable from magic. &lt;br /&gt;
&lt;br /&gt;
[Category:Book Pages]&lt;br /&gt;
[Category:Marked for editing]&lt;/div&gt;</summary>
		<author><name>And.awarner</name></author>
	</entry>
</feed>