Create New Document

The title of your document (will be displayed as H1)
URL-friendly name (no spaces, use dashes)
Path where to create document (optional, use forward slashes to create subdirectories)

Move/Rename Document

Current location of the document
New path for the document (including the slug)
This only changes the document's path. It does not modify the document's title (H1 heading).

Delete Document

Are you sure you want to delete this document? This action cannot be undone.

Warning: If this is a folder, all contents including subfolders and documents will be deleted.

Message

Message content goes here.

Confirm Action

Are you sure?

Attachments

Allowed file types: jpg, jpeg, png, gif, svg, webp, txt, log, csv, sfd, zip, pdf, docx, xlsx, pptx, mp4 (Max: 10MB)

Document Files

Loading attached files...

Document History

Previous Versions

Loading versions...

Preview

Select a version to preview

Wiki Settings

Language for the user interface
Number of versions to keep per document. Set to 0 to disable versioning.
Maximum allowed file size for uploads in MB.

User Management

Add New User

Leave empty to keep current password
Users with these groups can access restricted sections.

Define path-based access rules for sections of your wiki, then assign users to groups in the Users tab. Rules are evaluated in order. First match wins.

Active Rules

Import markdown files from a ZIP archive. Files will be processed and stored in the appropriate document structure. Directory structure in the ZIP (category/subcategory) will be preserved in the wiki.

Upload a ZIP file containing markdown (.md) files to import.

Create and manage backups of your wiki data. Backups include all documents, images, and configuration files.

Available Backups

Loading backups...

Add/Edit Access Rule

Selected: /

Add Column

Hacker Ethics

The hacker ethics were first written down by Steven Levy in his book "Hackers: Heroes of the Computer Revolution (ISBN 0-440-13405-6, 1984). He mentions the Tech Model Railroad Club at MIT, their members constructed a supersystem of relays and switches - some of them became core members of the ai lab. They used the term "hack" for an "elaborate … prank" with "serious respect implied". The hacker ethics evolved in a time when computers were scarce; and the people sharing a machine had to think about rules of cooperation.

The last two point are additions by the CCC from the 80s. After some more or less crazy individuals from the hacker scene had the idea of offering their "hacker know-how" to the KGB there were intense discussions, three letter agencies have a somewhat different opinion about freedom of information. As well were intrusions into outside systems considered more and more counter productive.

To protect the privacy of the individual and to strengthen the freedom of the information which concern the public the yet last point was added.

Hacker ethics are —like the rest of the world— as such in constant discussion and development. The above rules should be considered as guidelines and basis for discussion.

bron: https://www.ccc.de/en/hackerethik

Search Results