Red Hat Hackers: Are They a Necessary Evil?