ObHack:
ObHack? ObHack? I don't need to sticken ObHack. (So Glenn tells me.)
--eugene miya, NASA Ames Research Center, eug...@orville.nas.nasa.gov
Resident Cynic, Rock of Ages Home for Retired Hackers
{uunet,mailrus,other gateways}!ames!eugene
>So short of constantly scanning the Net, how we identify future hacker
>talent? What about young hackers in high school without Net access?
Fortunately (or unfortunately :-) hackers identify themselves.
In high school - there are plenty of physical or electronics devices
and explosives in chemical classes.
I remember (dozen years ago) putting dry Na into not very favourite teacher's
flower pot. She was so suprised when white smoke
and then flame appeared from her flowers after she started pour water
to pot.
So just wait a little - and when your system crashes or
your security is broken - here is new hacker identification.
--
- Igor Belchinskiy b...@bsdi.com Here and now.
- Berkeley Software Design, Inc +1(703)876-5040
No, I'm not talking about system crackers. Cracking is just one small
facit. No, I mean hacker in the traditional positive sense, someone
involved in technology and really into it.
I am talking about a bright person who finds elegant solutions or 'hacks'
to problems. That's why I used the word talent rather than hacker.
Just about anyone can break into systems these days, crackers are a
dime a dozen these days. I want candidates beyond that.
Unfortunately, two of the email addresses I got bounced. One sounded
promising.
Good question, I think the FSF has found one way,
hackers seem to gravitate to them. In another thread
on another group someone was claiming that the FSF was
a failure. Gcc seems to be a pretty massive hack for a
failure.... (Of course some of the things that have
been done to it have been entirely mundane, but what do
you expect?)
Obligatory mention of a hack: I'm hacking on cnews'
expiry code to get adaptive expiry to work. Most of
the work is done in the shell scripts, all I've added
to expire is a variable scaling factor that gets
applied when the explist file is read. (ie, if explist
says 1.0 days for the expire time for a set of group,
and -f 14.0 is supplied on the command line - this
becomes 14 days.) We're about to install a 1.2 gb
drive and expand our news spool, and want to always
have as much news as possible given that the flow rate
is variable, adaptive expiry based on a targeted amount
of time between expire runs seems like a reasonable
solution. (We at one time had such a thing under B
news, but when we upgraded to C news we upgraded disk
subsystems as well and didn't need it for a while.)
--
"I still dream of Orgonon..." --- KaTe Bush, Cloudbusting
Fnord. Roland Pleasant Dunkerley III, KSC
South Coast Computing Services, Inc - Houston Public Access UNIX
or...@nuchat.sccsi.com {uhnix1,uunet}!nuchat!orion
- Mike
>universities) is too easy in this day and age and the consequences of hacking
>into a government system are quite sever - not that I'd know (:
^^^^^
Well, if you don't think having a vowel snatched is severe...
"Crack knuckles not computers." - Bunny Hugger
It shows they are interested in learning, spend the time reading up on
what they have to know and go on to implement their wish lists.
Mark
ma...@otto.bf.rmit.oz.au
ma...@gus.bf.rmit.oz.au
Ob Hack: Making the console of the Acorn Econet LAN Filesever back in Year 11
look like a Commodore 64, IBM PC and Apple ][ at various days of the
week by programming it's video registers with remote low level
network calls. That when we werent annoying network manager in more
subtle ways :)
"Unauthorized access attempts may subject you to a fine
and/or imprisonment in accordance with Title 18, USC, Section 1030."
Yes, I have to agree with you. The "environment" on networks is different
than the 70s. I truly wish that an educational product like a small
Internet could be sold. Students need a kind of place to roam and learn
about different architectures, different OSes, different environments.
I don't know, maybe if you were exposed to the ARPAnet of the 70s you would
be repulsed. You had to sit there and figure out how to roam around a
system you had no idea about (TOPS-10 for instance, chose another if
you know this one). Now it's all PCs, Macs, VAXen, and SUNs and SGIs.
All byte oriented, 32-bit machines all running Unix.
t89...@otto.bf.rmit.oz.au (Mark) writes:
>I'd say a good way of finding hacker types is by looking for the ones who
>take the default account init files and add to them.... .cshrc's, .bashrc's
>.ircrc's etc..
I would say that a good ways of finding hackers are...
- Log on at 12am. Do a "who". Do the same thing at 4am, 10am,
2pm and 6pm. Do this when there are no assignments due within the newt
few days. Anyone who appears in "who" at all 4 times is a hacker,
or is *you* looking for them...
- Look for someone playing nethack at 4am the night before
an exam.
- Go to the cafeteria and look for the people who scream
"Foo!" amongst each other, and talk about computers amongs themselves at
the lunch table, rather than talking to the attractive people of the
opposite sex at the table next to them... :-)
- Look for someone who has not only modified their dotfiles,
but has written a bunch of shell scripts which are impossible to read...
Using sed, awk, and backquoting into shell variables the same same
one-line script.
Jamie
Well, whether they're running UNIX or not they all LOOK like they are.
Obhack: hand-compiling the Software Tools ratfor compiler and macro
processor to Fortran to get Ratfor up on RSX-11. I even implemented
printf for Fortran IV+.
--
-- Peter da Silva. Taronga Park BBS. +1 713 568 0480|1032 2400/n/8/1.
-- `-_-' "Have you hugged your wolf today?"
-- 'U`
but did you do it to get Conquest running?
>--
>-- Peter da Silva. Taronga Park BBS. +1 713 568 0480|1032 2400/n/8/1.
>-- `-_-' "Have you hugged your wolf today?"
>-- 'U`
-cgw-
sorry, no ObHack today.
>but did you do it to get Conquest running?
No. "ex". It was better than EDT.
[ List deleted ]
I'd add:
* Look for CS Seniors who have written their resumes using troff and
are finding, uh, creative ways to get output since the LaserWriters
are off-limits to non-faculty.
* Hell, look for someone using troff.
Ob hack:
Using a disk based Apple II game's own RWTS routines to duplicate the
disk onto other floppies.
--
| William Kucharski, Solbourne Computer, Inc. | Opinions expressed above
| Internet: kuch...@solbourne.com Ham: N0OKQ | are MINE alone, not those
| Snail Mail: 1900 Pike Road, Longmont, CO 80501 | of Solbourne Computer, Inc.
| President, "Just the Ten of Us" Fan Club | "It's Night 9 with D2 Dave!"
These latter two are useful litmus tests for misc.jobs.[offered|resumes]
Hey I like these!
The nethack one is a bit marginal, but maybe useful.
These are a little on the elementary side.
More, more...
"I would never belong to a club that would have me for a member."
--Groucho Marx and Woody Allen
Oh, I don't think that's true. I think the vast majority of machines
aren't UNIX CPUs: banks, airlines, etc. Sure as Mike Muuss pointed out
years ago DOS is looking increasing like UNIX. I think lots of companies
are still pushing old antiquated batch OSes. And the sooner we get rid of
those dinosaurs, the sooner we can get to a UNIX successor.
>Obhack:
I've been told by Tenney that I don't need one. QED.
Bunk! TeX vs troff isn't always a litmus test. I use TeX. I know
many hackers that use TeX, but I also know many that refuse to use it.
>* Hackers don't use csh. Ideally they use rc, if they have a version, or
> sh. Csh is deemed baroque and silly.
Ha! It was considered high art at school to use csh. I've moved on
to tcsh.
>* If someone flinches when System V is mentioned the chances are he's a good
> hacker.
Not necessarily. I hate Sys V, but so do some of my non-hacker
friends.
>* True hackers don't have home computers. They just stay in the office all
> day.
Most of the True Hackers I know have home computers, but they are
likely to be PDP-11s or something like that running version 6 unix
rather than a mere PC.
>* Most hackers try gnuemacs. Once.
Again, it is environment. I use gnu-emacs all the time, as do at
least two other high caliber hackers. It is what you learned first.
I learned Emacs 4 years before I even heard of vi.
Warner
--
Warner Losh i...@Solbourne.COM MMP to DoD #882
I'm hip to that man. That cat didn't know any tunes.
Hell, if you can write a complicated shell script in csh, you MUST be a
hacker. I think most people stick with sh though. There's less of a
tendency to want to bash your head into a concrete pylon.
Tcsh is nice. Any shell that doesn't allow you to type !vi is worthless, IMHO.
(and don't tell me about some bonehead bolted-on ksh function foo, either.)
>>* If someone flinches when System V is mentioned the chances are he's a good
>> hacker.
>
>Not necessarily. I hate Sys V, but so do some of my non-hacker
>friends.
I've been using System V every day for seven months and I *still* flinch.
SVR4 will be nice, but SVR3 sucks. It's gotten to the point where I no
longer hit Ctrl-Z as a reflex (I still hit Ctrl-W while sending mail
though... goddamn SysV line disciplines...).
>>* True hackers don't have home computers. They just stay in the office all
>> day.
>
>Most of the True Hackers I know have home computers, but they are
>likely to be PDP-11s or something like that running version 6 unix
>rather than a mere PC.
Apple II forever.
>>* Most hackers try gnuemacs. Once.
>
>Again, it is environment. I use gnu-emacs all the time, as do at
>least two other high caliber hackers. It is what you learned first.
They must be on fast machines. I gave up on it because it was so damn slow...
I prefer vi for writing programs anyway. Too bad !}fmt isn't faster on this
clunky mainframe (clunky == 35% of the CPU allotted to this "machine" with
792 logins... it moves, but it ain't pretty).
>I learned Emacs 4 years before I even heard of vi.
Egad! vi is the basis of all life! I'm sorry you had such a deprived
computer-childhood. :-)
>Warner Losh i...@Solbourne.COM MMP to DoD #882
--
fad...@uts.amdahl.com (Andy McFadden)
[ Above opinions are mine, Amdahl has nothing to do with them, etc, etc. ]
>Hell, if you can write a complicated shell script in csh, you MUST be a
>hacker. I think most people stick with sh though. There's less of a
>tendency to want to bash your head into a concrete pylon.
* Hackers use "perl" as their shell. (Maybe in debug mode)
(Even on a PC or Mac).
(If you've never heard 'perl' you're not a hacker :-)
-- budi
``A system without PERL is like a hockey game without a fight.''
-- Mitch Wright
#!/usr/local/bin/perl
print pack("C25", 74,117,115,116, 32, 65,110,111,
116,104,101,114, 32, 80,101,114,108, 32, 72, 97, 99,107,101,114,10)
--
Budi Rahardjo <rah...@ccu.umanitoba.ca>
Unix Support - Computer Services - University of Manitoba
I enjoyed some of the humor, but I think these are a tad on the exclusive
side.
>Ok, here are some suggestions for spotting talent:
>
>* True hackers don't use TeX. HCI and formal methods people use TeX; hackers
> use troff.
Well, Knuth does hack. And I regard people like Kay and Ingalls and
Goldberg as hackers.
>* Hackers don't use csh. Ideally they use rc, if they have a version, or
> sh. Csh is deemed baroque and silly.
Joy hacked csh. Korn hacked ksh, so again I've no problem with either
of these former efforts.
>* The only books on a hacker's bookshelf are Bourne, Leffler and (possibly)
> K&R and Stroustrup. Even these are basically there for backup, since
> the hacker has memorised them anyway. TNHD might be found on the shelves
> of those who are still able to go into bookshops...
K&P is acceptable.
>* If someone flinches when System V is mentioned the chances are he's a good
> hacker.
How about v8 or v9? ;^)
>* Anyone who can speak UUCP G-protocol is definitely a hacker of the
> highest calibre.
>
>* Look at the .exrc. If you find macros along the lines of
> " look at the manual page for the word the cursor is on
> map ]m mzdePo^[i:!man ^[pa ^V|/usr/bin/less^["zdd@z`z
> then the chances are you've found a hacker. Of course the hacker is
> unlikely to ever use this macro, but writing it was fun.
Acceptable.
>* True hackers don't have home computers. They just stay in the office all
> day.
Hummmm, some. Certainly.
>* Anyone who can remember more than 50 numeric IP addresses (not including
> easy ones like uunet, wuarchive, gatekeeper, export) is probably fairly
> talented.
These must be in different domains, no hosts in a subnet.
>* Real hackers never use the Mail command. They telnet to the SMTP port.
>
>* Most hackers try gnuemacs. Once.
You only need to invoke it once.
>* Hackers don't like AIX; many don't even believe that it's really Unix.
>
>
> ...Pete (about 1/2 of these apply)
Oh, I think people can hack AIX. I started hacking under MVT.
The definition of hacker does not necessarily imply computers: you can
hack genes in genetic engineering, you have hack VLSI hardware, you
might hack steam engines as one friend does. Danny Hillis can hack
tinker-toys and Seymour Papert can hack Lego Blocks (tm). Feynman's
challenge for small motors is a good problem (done years ago). And so forth.
Access to computers -- and anything which might teach you something about
the way the world works -- should be unlimited and total. Always yield
to the Hands-On Imperative!
From Levy (I want to emphasize the last two points):
All information should be free.
Mistrust authority -- Promote decentralization.
Hackers should be judged by their hacking, not bogus criteria such as
degrees, age, race, or position.
You can create art and beauty on a computer.
Computers can change your life for the better.
Hacker "ethic"
from Hackers by Steven Levy
Page 40-45
--eugene miya, NASA Ames Research Center, eug...@orville.nas.nasa.gov
Resident Cynic, Rock of Ages Home for Retired Hackers
{uunet,mailrus,other gateways}!ames!eugene
A state of equilibrium is likely to be symmetric.
--Hermann Weyl
Most excellent. Oh, by the way, the protocol is "g" not "G" ... nobody's
approved "G" yet. Seeing as I *wrote* a g implementation, I suppose that
qualifies me.
I'd like to thank the academy. I'd like to thank AT&T for making this
day possible. I'd like to thank my parents for making me possible...
>>* True hackers don't have home computers. They just stay in the office all
>> day.
>
>Hummmm, some. Certainly.
What if the office is in their home? Better yet, what if their home is in
their office?
>>* Real hackers never use the Mail command. They telnet to the SMTP port.
for the 25th time, I said HELO!!!! (grin)
--
If you insist upon living in a | ch...@zeus.calpoly.edu | Fubar Systems BBS
dream, you may be taken as mad. | | (805) 54-FUBAR
I like my dream. | Because all you of | 3/12/24, MNP5, 8N1
Then you *are* mad! | Earth are IDIOTS!! | FSBBS 2.0, FSUUCP 1.2
You would have loved the ITS system at MIT. (The login "shell" was
a debugger.)
Doug
--
Doug Merritt Preferred: do...@netcom.com (or: do...@eris.berkeley.edu)
Professional Wild-eyed Visionary Member, Crusaders for a Better Tomorrow
Anyways, I'm seeing a lot of comments that I agree with. I'm a
junior at UT (senior next semester), and I see some of the stuff
that's posted here going on in my account. I've completely
re-written my .profile and .bashrc (and I don't think bash is
supported by UTCS, it seems to have a few bugs in this compile,
anyways. I think I'll recompile it sometime soon...)
I've used troff/nroff/script type text processors, and find that
they're really fairly fun to work with. I had never thought of
them as general languages until some of the posts I've read here,
but I can see how they manage to be.
I'm proficient in sed, awk, c, c++, ... ect ... and have just found
perl. One problem I'm having is finding good people to learn from
anymore -- the classes haven't taught me 1/3 of my cs knowledge,
and its getting hard to find people who can just teach me stuff.
There seems to be a canyon between undergrads and grad students
here, so I don't really have the grad students to help me, either.
I am logged on at quite odd hours, as a previous post said that
'new talent' should be. I see 8 am most times only if I've
been up since before midnight. :) I've got the obligitory
low-paying job with the CS department (the only way I could
get a unix account with no quota as a freshman....) and
have enjoyed life since.
Does multi-platform experience contribute to a hacker? I think
so. It seems, hackers are people who are around a while,
so they become exposed to various operating systems/architectures.
I've worked on MSDOS, CMS/VM, UNIX (Sys 5, but prefer BSD4.3+),
and VMS (and *hate* it).
And, yeah, I live by GNU Emacs!
--
-------------------------+--------------------------------------------------
jeff grills | "Sometimes i see myself so clearly, because I
jef...@cs.utexas.edu | see nothing at all. This feeling of emptiness
Undergrad Lab, UT Austin | flees my soul, leaving even less behind." -me
what about the hacker test ? (i'd post it but that means finding it first ....)
phil
--
Philip Watson (an ozzie in exile) | _--_|\ | CLUWRR |
Phil....@newcastle.ac.uk | / \ | Agric & Enviromental Science |
**** SOON TO BE MARRIED !!! **** | \_.--._/ | Uni of Newcastle-Upon-Tyne |
I think I blinked and missed summer | v | England, NE1 |
OK, he's in.
--
Jon Ferro MIT Transportation Modelling Research Center (TMRC)
jf...@andrew.cmu.edu "We can hack it!"
HELLO, I'm a signature virus! Join in the fun and copy me into yours!
In article <4dWTTTa00Vp=ECC...@andrew.cmu.edu> jf...@andrew.cmu.edu
(Jonathan R. Ferro) writes:
>OK, he's in.
But is his login shell gnuemacs :-)
ObHack: Writing a perl scrpt to convert our OI man pages into an Emacs
INFO file.
Warner
--
Warner Losh i...@Solbourne.COM MMP to DoD #882
From: fra...@Think.COM 1-Jun-89 1634 EDT
To: sol...@lcs.mit.edu,to...@lcs.mit.edu
Subj: The Hacker Test - Version 1.0
THE HACKER TEST - Version 1.0
Preface: 06.16.89
This test was conceived and written by Felix Lee, John Hayes and Angela
Thomas at the end of the spring semester, 1989. It has gone through
many revisions prior to this initial release, and will undoubtedly go
through many more.
(Herewith a compendium of fact and folklore about computer hackerdom,
cunningly disguised as a test.)
Scoring - Count 1 for each item that you have done, or each
question that you can answer correctly.
If you score is between: You are
0x000 and 0x010 -> Computer Illiterate
0x011 and 0x040 -> a User
0x041 and 0x080 -> an Operator
0x081 and 0x0C0 -> a Nerd
0x0C1 and 0x100 -> a Hacker
0x101 and 0x180 -> a Guru
0x181 and 0x200 -> a Wizard
Note: If you don't understand the scoring, stop here.
And now for the questions...
0001 Have you ever used a computer?
0002 ... for more than 4 hours continuously?
0003 ... more than 8 hours?
0004 ... more than 16 hours?
0005 ... more than 32 hours?
0006 Have you ever patched paper tape?
0007 Have you ever missed a class while programming?
0008 ... Missed an examination?
0009 ... Missed a wedding?
0010 ... Missed your own wedding?
0011 Have you ever programmed while intoxicated?
0012 ... Did it make sense the next day?
0013 Have you ever written a flight simulator?
0014 Have you ever voided the warranty on your equipment?
0015 Ever change the value of 4?
0016 ... Unintentionally?
0017 ... In a language other than Fortran?
0018 Do you use DWIM to make life interesting?
0019 Have you named a computer?
0020 Do you complain when a "feature" you use gets fixed?
0021 Do you eat slime-molds?
0022 Do you know how many days old you are?
0023 Have you ever wanted to download pizza?
0024 Have you ever invented a computer joke?
0025 ... Did someone not 'get' it?
0026 Can you recite Jabberwocky?
0027 ... Backwards?
0028 Have you seen "Donald Duck in Mathemagic Land"?
0029 Have you seen "Tron"?
0030 Have you seen "Wargames"?
0031 Do you know what ASCII stands for?
0032 ... EBCDIC?
0033 Can you read and write ASCII in hex or octal?
0034 Do you know the names of all the ASCII control codes?
0035 Can you read and write EBCDIC in hex?
0036 Can you convert from EBCDIC to ASCII and vice versa?
0037 Do you know what characters are the same in both ASCII and EBCDIC?
0038 Do you know maxint on your system?
0039 Ever define your own numerical type to get better precision?
0040 Can you name powers of two up to 2**16 in arbitrary order?
0041 ... up to 2**32?
0042 ... up to 2**64?
0043 Can you read a punched card, looking at the holes?
0044 ... feeling the holes?
0045 Have you ever patched binary code?
0046 ... While the program was running?
0047 Have you ever used program overlays?
0048 Have you met any IBM vice-president?
0049 Do you know Dennis, Bill, or Ken?
0050 Have you ever taken a picture of a CRT?
0051 Have you ever played a videotape on your CRT?
0052 Have you ever digitized a picture?
0053 Did you ever forget to mount a scratch monkey?
0054 Have you ever optimized an idle loop?
0055 Did you ever optimize a bubble sort?
0056 Does your terminal/computer talk to you?
0057 Have you ever talked into an acoustic modem?
0058 ... Did it answer?
0059 Can you whistle 300 baud?
0060 ... 1200 baud?
0061 Can you whistle a telephone number?
0062 Have you witnessed a disk crash?
0063 Have you made a disk drive "walk"?
0064 Can you build a puffer train?
0065 ... Do you know what it is?
0066 Can you play music on your line printer?
0067 ... Your disk drive?
0068 ... Your tape drive?
0069 Do you have a Snoopy calendar?
0070 ... Is it out-of-date?
0071 Do you have a line printer picture of...
0072 ... the Mona Lisa?
0073 ... the Enterprise?
0074 ... Einstein?
0075 ... Oliver?
0076 Have you ever made a line printer picture?
0077 Do you know what the following stand for?
0078 ... DASD
0079 ... Emacs
0080 ... ITS
0081 ... RSTS/E
0082 ... SNA
0083 ... Spool
0084 ... TCP/IP
Have you ever used
0085 ... TPU?
0086 ... TECO?
0087 ... Emacs?
0088 ... ed?
0089 ... vi?
0090 ... Xedit (in VM/CMS)?
0091 ... SOS?
0092 ... EDT?
0093 ... Wordstar?
0094 Have you ever written a CLIST?
Have you ever programmed in
0095 ... the X windowing system?
0096 ... CICS?
0097 Have you ever received a Fax or a photocopy of a floppy?
0098 Have you ever shown a novice the "any" key?
0099 ... Was it the power switch?
Have you ever attended
0100 ... Usenix?
0101 ... DECUS?
0102 ... SHARE?
0103 ... SIGGRAPH?
0104 ... NetCon?
0105 Have you ever participated in a standards group?
0106 Have you ever debugged machine code over the telephone?
0107 Have you ever seen voice mail?
0108 ... Can you read it?
0109 Do you solve word puzzles with an on-line dictionary?
0110 Have you ever taken a Turing test?
0111 ... Did you fail?
0112 Ever drop a card deck?
0113 ... Did you successfully put it back together?
0114 ... Without looking?
0115 Have you ever used IPCS?
0116 Have you ever received a case of beer with your computer?
0117 Does your computer come in 'designer' colors?
0118 Ever interrupted a UPS?
0119 Ever mask an NMI?
0120 Have you ever set off a Halon system?
0121 ... Intentionally?
0122 ... Do you still work there?
0123 Have you ever hit the emergency power switch?
0124 ... Intentionally?
0125 Do you have any defunct documentation?
0126 ... Do you still read it?
0127 Ever reverse-engineer or decompile a program?
0128 ... Did you find bugs in it?
0129 Ever help the person behind the counter with their terminal/computer?
0130 Ever tried rack mounting your telephone?
0131 Ever thrown a computer from more than two stories high?
0132 Ever patched a bug the vendor does not acknowledge?
0133 Ever fix a hardware problem in software?
0134 ... Vice versa?
0135 Ever belong to a user/support group?
0136 Ever been mentioned in Computer Recreations?
0137 Ever had your activities mentioned in the newspaper?
0138 ... Did you get away with it?
0139 Ever engage a drum brake while the drum was spinning?
0140 Ever write comments in a non-native language?
0141 Ever physically destroy equipment from software?
0142 Ever tried to improve your score on the Hacker Test?
0143 Do you take listings with you to lunch?
0144 ... To bed?
0145 Ever patch a microcode bug?
0146 ... around a microcode bug?
0147 Can you program a Turing machine?
0148 Can you convert postfix to prefix in your head?
0149 Can you convert hex to octal in your head?
0150 Do you know how to use a Kleene star?
0151 Have you ever starved while dining with philosophers?
0152 Have you solved the halting problem?
0153 ... Correctly?
0154 Ever deadlock trying eating spaghetti?
0155 Ever written a self-reproducing program?
0156 Ever swapped out the swapper?
0157 Can you read a state diagram?
0158 ... Do you need one?
0159 Ever create an unkillable program?
0160 ... Intentionally?
0161 Ever been asked for a cookie?
0162 Ever speed up a system by removing a jumper?
* Do you know...
0163 Do you know who wrote Rogue?
0164 ... Rogomatic?
0165 Do you know Gray code?
0166 Do you know what HCF means?
0167 ... Ever use it?
0168 ... Intentionally?
0169 Do you know what a lace card is?
0170 ... Ever make one?
0171 Do you know the end of the epoch?
0172 ... Have you celebrated the end of an epoch?
0173 ... Did you have to rewrite code?
0174 Do you know the difference between DTE and DCE?
0175 Do you know the RS-232C pinout?
0176 ... Can you wire a connector without looking?
* Do you have...
0177 Do you have a copy of Dec Wars?
0178 Do you have the Canonical Collection of Lightbulb Jokes?
0179 Do you have a copy of the Hacker's dictionary?
0180 ... Did you contribute to it?
0181 Do you have a flowchart template?
0182 ... Is it unused?
0183 Do you have your own fortune-cookie file?
0184 Do you have the Anarchist's Cookbook?
0185 ... Ever make anything from it?
0186 Do you own a modem?
0187 ... a terminal?
0188 ... a toy computer?
0189 ... a personal computer?
0190 ... a minicomputer?
0191 ... a mainframe?
0192 ... a supercomputer?
0193 ... a hypercube?
0194 ... a printer?
0195 ... a laser printer?
0196 ... a tape drive?
0197 ... an outmoded peripheral device?
0198 Do you have a programmable calculator?
0199 ... Is it RPN?
0200 Have you ever owned more than 1 computer?
0201 ... 4 computers?
0202 ... 16 computers?
0203 Do you have a SLIP line?
0204 ... a T1 line?
0205 Do you have a separate phone line for your terminal/computer?
0206 ... Is it legal?
0207 Do you have core memory?
0208 ... drum storage?
0209 ... bubble memory?
0210 Do you use more than 16 megabytes of disk space?
0211 ... 256 megabytes?
0212 ... 1 gigabyte?
0213 ... 16 gigabytes?
0214 ... 256 gigabytes?
0215 ... 1 terabyte?
0216 Do you have an optical disk/disk drive?
0217 Do you have a personal magnetic tape library?
0218 ... Is it unlabelled?
0219 Do you own more than 16 floppy disks?
0220 ... 64 floppy disks?
0221 ... 256 floppy disks?
0222 ... 1024 floppy disks?
0223 Do you have any 8-inch disks?
0224 Do you have an internal stack?
0225 Do you have a clock interrupt?
0226 Do you own volumes 1 to 3 of _The Art of Computer Programming_?
0227 ... Have you done all the exercises?
0228 ... Do you have a MIX simulator?
0229 ... Can you name the unwritten volumes?
0230 Can you quote from _The Mythical Man-month_?
0231 ... Did you participate in the OS/360 project?
0232 Do you have a TTL handbook?
0233 Do you have printouts more than three years old?
* Career
0234 Do you have a job?
0235 ... Have you ever had a job?
0236 ... Was it computer-related?
0237 Do you work irregular hours?
0238 Have you ever been a system administrator?
0239 Do you have more megabytes than megabucks?
0240 Have you ever downgraded your job to upgrade your processing power?
0241 Is your job secure?
0242 ... Do you have code to prove it?
0243 Have you ever had a security clearance?
* Games
0244 Have you ever played Pong?
Have you ever played
0246 ... Spacewar?
0247 ... Star Trek?
0248 ... Wumpus?
0249 ... Lunar Lander?
0250 ... Empire?
Have you ever beaten
0251 ... Moria 4.8?
0252 ... Rogue 3.6?
0253 ... Rogue 5.3?
0254 ... Larn?
0255 ... Hack 1.0.3?
0256 ... Nethack 2.4?
0257 Can you get a better score on Rogue than Rogomatic?
0258 Have you ever solved Adventure?
0259 ... Zork?
0260 Have you ever written any redcode?
0261 Have you ever written an adventure program?
0262 ... a real-time game?
0263 ... a multi-player game?
0264 ... a networked game?
0265 Can you out-doctor Eliza?
* Hardware
0266 Have you ever used a light pen?
0267 ... did you build it?
Have you ever used
0268 ... a teletype?
0269 ... a paper tape?
0270 ... a decwriter?
0271 ... a card reader/punch?
0272 ... a SOL?
Have you ever built
0273 ... an Altair?
0274 ... a Heath/Zenith computer?
Do you know how to use
0275 ... an oscilliscope?
0276 ... a voltmeter?
0277 ... a frequency counter?
0278 ... a logic probe?
0279 ... a wirewrap tool?
0280 ... a soldering iron?
0281 ... a logic analyzer?
0282 Have you ever designed an LSI chip?
0283 ... has it been fabricated?
0284 Have you ever etched a printed circuit board?
* Historical
0285 Have you ever toggled in boot code on the front panel?
0286 ... from memory?
0287 Can you program an Eniac?
0288 Ever seen a 90 column card?
* IBM
0289 Do you recite IBM part numbers in your sleep?
0290 Do you know what IBM part number 7320154 is?
0291 Do you understand 3270 data streams?
0292 Do you know what the VM privilege classes are?
0293 Have you IPLed an IBM off the tape drive?
0294 ... off a card reader?
0295 Can you sing something from the IBM Songbook?
* Languages
0296 Do you know more than 4 programming languages?
0297 ... 8 languages?
0298 ... 16 languages?
0299 ... 32 languages?
0300 Have you ever designed a programming language?
0301 Do you know what Basic stands for?
0302 ... Pascal?
0303 Can you program in Basic?
0304 ... Do you admit it?
0305 Can you program in Cobol?
0306 ... Do you deny it?
0307 Do you know Pascal?
0308 ... Modula-2?
0309 ... Oberon?
0310 ... More that two Wirth languages?
0311 ... Can you recite a Nicklaus Wirth joke?
0312 Do you know Algol-60?
0313 ... Algol-W?
0314 ... Algol-68?
0315 ... Do you understand the Algol-68 report?
0316 ... Do you like two-level grammars?
0317 Can you program in assembler on 2 different machines?
0318 ... on 4 different machines?
0319 ... on 8 different machines?
Do you know
0320 ... APL?
0321 ... Ada?
0322 ... BCPL?
0323 ... C++?
0324 ... C?
0325 ... Comal?
0326 ... Eiffel?
0327 ... Forth?
0328 ... Fortran?
0329 ... Hypertalk?
0330 ... Icon?
0331 ... Lisp?
0332 ... Logo?
0333 ... MIIS?
0334 ... MUMPS?
0335 ... PL/I?
0336 ... Pilot?
0337 ... Plato?
0338 ... Prolog?
0339 ... RPG?
0340 ... Rexx (or ARexx)?
0341 ... SETL?
0342 ... Smalltalk?
0343 ... Snobol?
0344 ... VHDL?
0345 ... any assembly language?
0346 Can you talk VT-100?
0347 ... Postscript?
0348 ... SMTP?
0349 ... UUCP?
0350 ... English?
* Micros
0351 Ever copy a copy-protected disk?
0352 Ever create a copy-protection scheme?
0353 Have you ever made a "flippy" disk?
0354 Have you ever recovered data from a damaged disk?
0355 Ever boot a naked floppy?
* Networking
0356 Have you ever been logged in to two different timezones at once?
0357 Have you memorized the UUCP map for your country?
0358 ... For any country?
0359 Have you ever found a sendmail bug?
0360 ... Was it a security hole?
0361 Have you memorized the HOSTS.TXT table?
0362 ... Are you up to date?
0363 Can you name all the top-level nameservers and their addresses?
0364 Do you know RFC-822 by heart?
0365 ... Can you recite all the errors in it?
0366 Have you written a Sendmail configuration file?
0367 ... Does it work?
0368 ... Do you mumble "defocus" in your sleep?
0369 Do you know the max packet lifetime?
* Operating systems
Can you use
0370 ... BSD Unix?
0371 ... non-BSD Unix?
0372 ... AIX
0373 ... VM/CMS?
0374 ... VMS?
0375 ... MVS?
0376 ... VSE?
0377 ... RSTS/E?
0378 ... CP/M?
0379 ... COS?
0380 ... NOS?
0381 ... CP-67?
0382 ... RT-11?
0383 ... MS-DOS?
0384 ... Finder?
0385 ... PRODOS?
0386 ... more than one OS for the TRS-80?
0387 ... Tops-10?
0388 ... Tops-20?
0389 ... OS-9?
0390 ... OS/2?
0391 ... AOS/VS?
0392 ... Multics?
0393 ... ITS?
0394 ... Vulcan?
0395 Have you ever paged or swapped off a tape drive?
0396 ... Off a card reader/punch?
0397 ... Off a teletype?
0398 ... Off a networked (non-local) disk?
0399 Have you ever found an operating system bug?
0400 ... Did you exploit it?
0401 ... Did you report it?
0402 ... Was your report ignored?
0403 Have you ever crashed a machine?
0404 ... Intentionally?
* People
0405 Do you know any people?
0406 ... more than one?
0407 ... more than two?
* Personal
0408 Are your shoelaces untied?
0409 Do you interface well with strangers?
0410 Are you able to recite phone numbers for half-a-dozen computer systems
but unable to recite your own?
0411 Do you log in before breakfast?
0412 Do you consume more than LD-50 caffeine a day?
0413 Do you answer either-or questions with "yes"?
0414 Do you own an up-to-date copy of any operating system manual?
0415 ... *every* operating system manual?
0416 Do other people have difficulty using your customized environment?
0417 Do you dream in any programming languages?
0418 Do you have difficulty focusing on three-dimensional objects?
0419 Do you ignore mice?
0420 Do you despise the CAPS LOCK key?
0421 Do you believe menus belong in restaurants?
0422 Do you have a Mandelbrot hanging on your wall?
0423 Have you ever decorated with magnetic tape or punched cards?
0424 Do you have a disk platter or a naked floppy hanging in your home?
0425 Have you ever seen the dawn?
0426 ... Twice in a row?
0427 Do you use "foobar" in daily conversation?
0428 ... "bletch"?
0429 Do you use the "P convention"?
0430 Do you automatically respond to any user question with RTFM?
0431 ... Do you know what it means?
0432 Do you think garbage collection means memory management?
0433 Do you have problems allocating horizontal space in your room/office?
0434 Do you read Scientific American in bars to pick up women?
0435 Is your license plate computer-related?
0436 Have you ever taken the Purity test?
0437 Ever have an out-of-CPU experience?
0438 Have you ever set up a blind date over the computer?
0439 Do you talk to the person next to you via computer?
* Programming
0440 Can you write a Fortran compiler?
0441 ... In TECO?
0442 Can you read a machine dump?
0443 Can you disassemble code in your head?
Have you ever written
0444 ... a compiler?
0445 ... an operating system?
0446 ... a device driver?
0447 ... a text processor?
0448 ... a display hack?
0449 ... a database system?
0450 ... an expert system?
0451 ... an edge detector?
0452 ... a real-time control system?
0453 ... an accounting package?
0454 ... a virus?
0455 ... a prophylactic?
0456 Have you ever written a biorhythm program?
0457 ... Did you sell the output?
0458 ... Was the output arbitrarily invented?
0459 Have you ever computed pi to more than a thousand decimal places?
0460 ... the number e?
0461 Ever find a prime number of more than a hundred digits?
0462 Have you ever written self-modifying code?
0463 ... Are you proud of it?
0464 Did you ever write a program that ran correctly the first time?
0465 ... Was it longer than 20 lines?
0466 ... 100 lines?
0467 ... Was it in assembly language?
0468 ... Did it work the second time?
0469 Can you solve the Towers of Hanoi recursively?
0470 ... Non-recursively?
0471 ... Using the Troff text formatter?
0472 Ever submit an entry to the Obfuscated C code contest?
0473 ... Did it win?
0474 ... Did your entry inspire a new rule?
0475 Do you know Duff's device?
0476 Do you know Jensen's device?
0477 Ever spend ten minutes trying to find a single-character error?
0478 ... More than an hour?
0479 ... More than a day?
0480 ... More than a week?
0481 ... Did the first person you show it to find it immediately?
* Unix
0482 Can you use Berkeley Unix?
0483 .. Non-Berkeley Unix?
0484 Can you distinguish between sections 4 and 5 of the Unix manual?
0485 Can you find TERMIO in the System V release 2 documentation?
0486 Have you ever mounted a tape as a Unix file system?
0487 Have you ever built Minix?
0488 Can you answer "quiz function ed-command" correctly?
0489 ... How about "quiz ed-command function"?
* Usenet
0490 Do you read news?
0491 ... More than 32 newsgroups?
0492 ... More than 256 newsgroups?
0493 ... All the newsgroups?
0494 Have you ever posted an article?
0495 ... Do you post regularly?
0496 Have you ever posted a flame?
0497 ... Ever flame a cross-posting?
0498 ... Ever flame a flame?
0499 ... Do you flame regularly?
0500 Ever have your program posted to a source newsgroup?
0501 Ever forge a posting?
0502 Ever form a new newsgroup?
0503 ... Does it still exist?
0504 Do you remember
0505 ... mod.ber?
0506 ... the Stupid People's Court?
0507 ... Bandy-grams?
* Phreaking
0508 Have you ever built a black box?
0509 Can you name all of the 'colors' of boxes?
0510 ... and their associated functions?
0511 Does your touch tone phone have 16 DTMF buttons on it?
0512 Did the breakup of MaBell create more opportunities for you?
--
{backbone}!cs.cmu.edu!ralf ARPA: RA...@CS.CMU.EDU FIDO: Ralf Brown 1:129/26.1
BITnet: RALF%CS.CMU.EDU@CARNEGIE AT&Tnet: (412)268-3053 (school) FAX: ask
DISCLAIMER? Did | Lunsford's Rule of Scientific Endeavor: The simple
I claim something? | explanation always follows the complex solution.
> eug...@wilbur.nas.nasa.gov (Eugene N. Miya) recently informed us:
> >pe...@minster.york.ac.uk (Pete Fenelon) writes:
> >>* Anyone who can speak UUCP G-protocol is definitely a hacker of the
> >> highest calibre.
> >
> >Acceptable.
>
> Most excellent. Oh, by the way, the protocol is "g" not "G" ... nobody's
> approved "G" yet. Seeing as I *wrote* a g implementation, I suppose that
> qualifies me.
What about "G" in AT&T sys Vr4 ?
>
> I'd like to thank the academy. I'd like to thank AT&T for making this
> day possible. I'd like to thank my parents for making me possible...
>
> >>* True hackers don't have home computers. They just stay in the office all
> >> day.
> >
> >Hummmm, some. Certainly.
>
> What if the office is in their home? Better yet, what if their home is in
> their office?
What if they spend more time at the office than at home.
>
> >>* Real hackers never use the Mail command. They telnet to the SMTP port.
>
> for the 25th time, I said HELO!!!! (grin)
>
How's this?
* Real hackers use the Switch-Register on a PDP-11!
Rick
This is my first post to alt.hackers; how did it go?
Internet: ri...@ricksys.lonestar.org Fidonet: Richard McCombs on 1:385/6
"What do you do if everytime you see this incredible woman you think
your going to hurl?"
"I say hurl. If you blow chunks and she comes back, she's yours."
"Okay." ----[From a TV commercial for "Wayne's World"]
Never eaten laser chicken but a group of hackers that I hang about
with specialize in something called Kung Pao Death. Not for the faint
hearted or tender palated. It has reduced numerous newbies to eating
only rice. Also often on the menu, Kung Pao Terry (Hi trf!) and Kung
Pao Steve (not named for me but for Steve Freyder, a man who could eat
an exploding nuclear warhead and wash it down with a couple of Tsing
Taos).
What is it about hackers and hot food? Anybody know the origins?
ObHack: Recovering almost every byte of data from a magneto-optical
disk whose directories and FATs were piddled on by MS-DOS so badly
that even Norton Utilities wouldn't touch the disk. Not really
much of a hack, more tedious than anything else... but the scientist
who owns the disk thinks that I'm God now and we've managed to rescue
a year's worth of research from the bit bucket.
spl (the p stands for
poisonous little systems,
those PCs)
--
Steve Lamont, SciViGuy -- (619) 534-7968 -- s...@dim.ucsd.edu
UCSD Microscopy and Imaging Resource/UCSD Med School/La Jolla, CA 92093-0608
just heard a commercial/which told me/Farmer John smokes his own/bacon
now, theres a tough/son of a/bitch. - Charles Bukowski, "yeah"
> Obhack on a dirty line with a toothache: Did you know you can ftp to your tty?
> No shit. Just playin with it today.. Runnin' might-ee VMS it seems that with
> at least two versions of ftp (one for WINS and the other for.. well, god-knows
> what) you can get filename SYS$OUTPUT: right to your tty.. Not only that,
> but you can send files via ASCII.. Hmmm. Useless for most applications, but
> good for reading those README.dox that you always want to read before you go
> get an entire package from somewhere.. On unix, Sun, anyway, seems to allow
> get filename /dev/ttyxx, but it's not as sweet.. There's something wrong, and
under ULTRIX at least you can do this:
ftp> get filename.ext "| more"
I would be surprised if it didn't work under other unixes as well.
> I can't put my finger on it yet.. AND since yer /tty device ain't no standard
> file it ain't goan 'send' from the sumbich...
> Ouch. I'm in pain here.
--
Terje Malmedal
malm...@cernvax.cern.ch
CERN PS Division
Geneva Switzerland
Here at UVa, I have found a *glaring* lack of Chinese food lovers.
(Right now a bunch of
them are eating KFC. Why when you can eat Five Spice Chicken?)
Governor's Chicken forever!
(with a side of potstickers)
Steve
>I'm proficient
>One problem I'm having is finding good people to learn from anymore
>and its getting hard to find people who can just teach me stuff.
>There seems to be a canyon between undergrads and grad students
>here, so I don't really have the grad students to help me, either.
>Does multi-platform experience contribute to a hacker? I think
>so. It seems, hackers are people who are around a while,
While multi-platform experience does contribute, it does not have to,
nor do you have to be around a while (helps). I empathize with your search
to learn (that is a part of it, too). Note again in my first post that I
said that the person did not have to be a computer person, they could be
a gene splicer, or a mechanical engineer, or some non-computer field.
Many talented people out there. No doubt, fine programmers, fine
mechanical engineers. I am certain many of you are finer hackers than I.
I want to find the creme. No make that the creme of the creme.
I thought about the title I would use for the Subject: line. And it appears
to have been a good first cut. Published examples of creme: the
recent article on Danny Hillis in Inside magazine.
I also want to find the humble hacker. The guy who does not toot his horn
and his quiet actions speak louder than his words. I have found a few
in my travels. Really brillant people (all ages from 10 to 70, some have
authored books, others have yet to make their stakes). I want to separate
ego from accomplishment.
I think it's one of those Tests of Manhood (Personhood?); Eating Hotter Food,
Drinking More Beer, Enduring More Pain, and all that fun stuff. Or maybe it
just fits in with the whole "we're different from the rest" thang.
Whatever the case, most of the people I've known who claim to enjoy really
hot food rarely try to keep it a secret... quite the opposite. Kinda like
people who like to drink beer until they detonate. :-)
(hmm... maybe it's a hacker pseudo-frat thing?)
Personally, I eat food that I enjoy. Hot Garlic Sauce can be a painful
experience, but it's so damn GOOD at a good restaurant.
Do all hackers like Chinese food?
(no need to ask about pizza... that's a given. :-) )
>Steve Lamont, SciViGuy -- (619) 534-7968 -- s...@dim.ucsd.edu
--
Try 'get README |more'. (On a UNIX machine of course.)
--
-Buck (bu...@sunyit.edu)
"Just go with the flow control, roll with the crunches, and, when you
get a prompt, type like hell."
Ouch.
Obhack on a dirty line with a toothache: Did you know you can ftp to your tty?
No shit. Just playin with it today.. Runnin' might-ee VMS it seems that with
at least two versions of ftp (one for WINS and the other for.. well, god-knows
what) you can get filename SYS$OUTPUT: right to your tty.. Not only that,
but you can send files via ASCII.. Hmmm. Useless for most applications, but
good for reading those README.dox that you always want to read before you go
get an entire package from somewhere.. On unix, Sun, anyway, seems to allow
get filename /dev/ttyxx, but it's not as sweet.. There's something wrong, and
I can't put my finger on it yet.. AND since yer /tty device ain't no standard
file it ain't goan 'send' from the sumbich...
Ouch. I'm in pain here.
What's *really* funny is the transfer speed.. It's quite different seeing
012 characters per second for an ftp transfer.
Ouch.
[That one would print out on every 50th boot
"Elk Cloner: The program with a personality
It will get on all your disks
It will infiltrate your chips
Yes it's Cloner!
It will stick to you like glue
It will modify ram too
Send in the Cloner!"
]
Its author (at the time his address was skr...@blekko.commodore.com)
told me in April 1990:
>Cloner was also mentioned in Computer Recreations (Scientific American,
>March, 1985 I think), and also made it into Time (November 4, 1985).
>The most complete description of its creation appeared in The Daily
>Northwestern, a college paper. Ask me for a copy if you're interested.
Unfortunately after that one message I never heard a thing from him again,
despite my attempts!
SO...
Does anyone have a copy of that "The Daily Northwestern" article
they could send me???? I'd be most grateful, and I'll ACK you in the paper.
[My virus escaped too, but didn't DO anything except spread and
lay low, so (with one notable exception...) spread silently.]
/\ /\ /\/\/\/\/\/\/\.-.-.-.-.......___________
/ \ / \ /Hawaii Institute of Geophysics, Honolulu\/\/\.-.-....__
___/ \/ \/Joe Dellinger, Internet: j...@montebello.soest.hawaii.edu\/\.-.__
I think this is reversed. Only a hacker would *want* to do such a
thing!
> Have you ever used
> 0085 ... TPU?
> 0090 ... Xedit (in VM/CMS)?
These are still my favorite editors. B-)
> 0119 Ever mask an NMI?
This is too easy. Most PC programmers would know how to do it (on a
PC).
[The rest omitted because it's more appropriate for
alt.folkore.computers.]
So:
Have you ever eaten laser chicken?
... did you _realy_ like it?
Nicolai
Yes. It looks reversed to me. I've changed the value of 10 a couple
of times, but I never really wanted to do that (well, there was this
one assembler program that I had written using self modifying code...)
Warner
--
Warner Losh i...@Solbourne.COM MMP to DoD #882
"You better stay away from him, he'll rip your lungs out Jim,
He's looking for James Taylor" -- Warewolves of Boulder WZ
Um...laser chicken *is* Kung Pao chicken!
> What is it about hackers and hot food? Anybody know the origins?
I've been poking at this question since the earliest phases of the Jargon File
revision, querying long-time hackers and discussing the question with various
interested friends.
None of the hypotheses I've heard sound very convincing. The most popular is
that the connection is historical, because once upon a time Chinese places were
the only kind of restaurant that stayed open late or all night.
Myself, I think some clue is to be found in the fact that hot-food tropism is
characteristic of a couple of other subcultures connected to hackerdom; most
notably SF fandom (see the {neophilia} entry in TNHD). But I don't know what
this clue means.
--
Eric S. Raymond = er...@snark.thyrsus.com (TNHD editor)
In much the same sense that gnu emacs is en editor. (Actually, if emacs
was as full-featured as ITS DDT, it would be my login shell too...)
ObHack: (having run out of telco wire) running EIA over three lines of a
massbus cable. It's mighty funny-lookin' coming out of the back of the
11/23, but it works...
And can you imagine fifty people a day? I said FIFTY people a day,
calling up, singin' a bar of "Alice's PDP-10" and hanging up?
Friends, they may think it's a MOVEMENT, and that's what it is: THE
36-BIT ANTI-LOSSAGE MOVEMENT! And all you gotta do to join is to sing
it the next time it comes up to the head of the GOLST.
With feelin'.
You can hack anything you want, with TECO and DDT.
You can hack anything you want, with just TECO and DDT.
$U in and begin to hack.
Twiddle bits in a core dump and write it back.
You can hack anything you want, with TECO and DDT.
(But be careful typing <RET>)
Just with TECO and DDT!
Oops. My blushes. And me with my copy of TNHD right at my elbow,
too.
Oh well, it's not a term in use locally. We usually just refer to it
as KPD.
Regarding spicy food:
My tropism to spicy food predates my tropism to computers -- I grew up
with and around a lot of Mexican-American folks.
spl (the p stands for
pass the habeneros...)
--
Steve Lamont, SciViGuy -- (619) 534-7968 -- s...@dim.ucsd.edu
UCSD Microscopy and Imaging Resource/UCSD Med School/La Jolla, CA 92093-0608
just heard a commercial/which told me/Farmer John smokes his own/bacon
now, there's a tough/son of a/bitch. - Charles Bukowski, "yeah"
I don't know about the rest of the hackers in the world, but I got my
hot foot fixation when I was in school in New Mexico. There was this
hole in the wall New Mexican resturant that served real New Mexican
food. Their HOT Green Chili sause was enough to burn a hole through
your tongue, throat, stomach, etc (and I do mean etc!). Ever since
then, I've liked food a litte hotter than normal.
In article <1fMmvZ#73SbQ255vJcy0HRG1k7FsWm1=er...@snark.thyrsus.com>
er...@snark.thyrsus.COM (Eric S. Raymond) writes:
>Um...laser chicken *is* Kung Pao chicken!
Yum. You gotta eat the chilis to make it laser chicken, however.
ObHack: Spending hours disassembling code for the Rainbow since I
don't have full sources to everything. Even then, most disassemblers
don't produce quite what I'm looking for in source reconstruction...
Writing my own slowly, as I get fed up with the others (although
Z80MU's is about the best I've seen in a long time, and it is 6 years
old).
>In article <d4C302S...@amdahl.uts.amdahl.com>, fad...@uts.amdahl.com
>(Andy McFadden) writes:
>|>In article <kotg3i...@network.ucsd.edu> s...@alex.uucp (Steve
>Lamont) writes:
>|>
>|>Do all hackers like Chinese food?
>Here at UVa, I have found a *glaring* lack of Chinese food lovers.
>(Right now a bunch of
>them are eating KFC. Why when you can eat Five Spice Chicken?)
Unfortunate, but Volcano Pizza in Sydney has closed down. A lovely
place, it combined two of a normal hacker's favourite food groups:
Hotly spiced and Pizza.
The "volcano" came in three densities: Screaming, Yelling and Whimpering.
I usually had the Whimpering. One day they accidently gave me a Yelling.
This resulted in my face going numb and hyperventilation. Man, was it hot.
I'd hate to have to try the Screaming.
BTW, if you've seen the movie FX2 (with Brian Denehy (sp?) and Brian Brown),
the "world's best pizza" Brown mentions in the final scene I am reliably
informed refers to Volcano Pizza.
ObHack: Personnel Manipulation Hack #1: Convincing bank management that
it is quite safe to connect to the internet. Re-writing SMTP and NNTP
to meet the bank's established "security standards"
regards...
Chris Keane. State Bank NSW ph. +61 2 259 4459
Unix Systems Administrator (Group Treasury) ch...@rufus.state.COM.AU
Disclaimer: These are my own opinions, but I'm insane. What's your excuse?
All this talk about hot food flung a craving on me, so I *had* to go
out for Thai food at lunch today -- East Bay Thai, on Thornton in
Newark. First shopping center on the left as you go west from 880.
*GOOD* food. They've got 1, 2, and 3 stars -- I think the only 3-star
is one of the appetizers, and I haven't tried it.
I don't know about the origin, but I think it's been around for quite
a while. At the University of Alabama ca. 1974, hacker types
frequented the Moongate Inn, a really nice Mandarin style restaurant.
At the Johnson Space Center in Houston about 1976, programmer-types
jammed a little restaurant called "The Jalapeno Tree", which served
hamburgers with jalapeno cheese (slightly hot) jalapeno relish (*WOW*
that was tasty stuff, moderatly hot) or both. Served with a big, thick
slice of onion to make sure the pores of your tongue opened wide and
let all the capsacin seep in.
--
"Ain't nothin' in the middle Mike Van Pelt
o' the road, 'cept a yellow m...@netcom.com
line and dead 'possums." m...@hsv3.lsil.com
There's another degree of hot, "Thai Hot". That's the full-intensity no-
holds-barred kiss-your-mouth-goodbye temperature. My parents visited
Thailand and managed to develop some resistance to the pain (my personal
belief is that they can no longer taste or feel anything in their mouths),
so when they came back they started requesting things at full power.
On more than one occasion, the chefs came out of the kitchen and asked
them if they really wanted it THAT hot. On at least one occasion, the
chefs stood at a discrete distance and watched these two anglos calmly
setting their mouths on fire...
As they put it, it works out okay if you just keep telling yourself that,
eventually, the pain will subside. After about 10 minutes, it usually does.
Stuff would have to taste REALLY good to make me go through that kinda of
pain... What's that stuff called that you stick tiny pieces of to each
mouthful of food? Preak nam pla or something like that (thai peppers in
fish sauce)?
>"Ain't nothin' in the middle Mike Van Pelt
--
*sigh* I've been searching in vain for a source of fresh habaneros in
the SF Bay area. I found out about the farmers market at Town &
Country Villiage in San Jose the weekend after they closed for the
winter.
--
Mike Van Pelt "Hey, hey, ho ho,
m...@netcom.com Western culture's got to go."
Stanford students and faculty.
Ahh, but once you have thrown your life in search of the spiciest foods
possible, then how can you appreciate the subtle taste of foods like...
bread!! Am I the only one who likes to be able to taste their food instead
of having it attack them? :-)
>Do all hackers like Chinese food?
Of course...
>(no need to ask about pizza... that's a given. :-) )
> ...
>fad...@uts.amdahl.com (Andy McFadden)
--
I am a .signature anti-virus. If I am obscured, you have a .signature virus!
I am a .signature antKendall Gelner (ken...@rice.edu)ave a .signature virus!
I am a .signature anti-virus. If I am obscured, you have a .signature virus!
I am a .signature anti-virus. If I am obscured, you have a .signature virus!
>>(hmm... maybe it's a hacker pseudo-frat thing?)
>>
>>Personally, I eat food that I enjoy. Hot Garlic Sauce can be a painful
>>experience, but it's so damn GOOD at a good restaurant.
> Ahh, but once you have thrown your life in search of the spiciest foods
> possible, then how can you appreciate the subtle taste of foods like...
> bread!! Am I the only one who likes to be able to taste their food instead
> of having it attack them? :-)
Easy, don't eat them at the same time! :-)
Lance
--
--
Lance A. Brown <br...@cs.utk.edu>
The Crystal Wind is the Storm, and the Storm is Data,
and the Data is Life -- The Player's Litany
from _The Long Run_ by D.K. Moran
What a silly (but annoyingly common) idea! Capsaicin produces no physical
damage. The hotness is on a different sensory channel from taste, and in
no way makes me less able to taste, either at that meal, or at a later one.
--tom
Jeff
ObHack: writing a DOS-to-Unix text-file converter (in C, natch) by simply
reading in the input as a text file, and writing the output file as binary.
fgetc() does the CRLF-to-LF conversion for you.
--
Jeff Joslin University of Waterloo grad student
"I predict that in five years he'll either be dead or in jail." - Larry
Holmes, 1988, talking about Mike Tyson.
[stuff about capsaicin deleted]
Ouch. What you said makes me almost re-evaluate my precious relationship
with my hot food. I couldn't stand including it :-(
Maybe that gives some sort of reason why hackers pull all-nighters every
so often with more and more ease as time goes on ; the discomfort centre
of the brain gets "burnt out" :-)
>ObHack: writing a DOS-to-Unix text-file converter (in C, natch) by simply
>reading in the input as a text file, and writing the output file as binary.
>fgetc() does the CRLF-to-LF conversion for you.
ObCopOut: Letting PCFTP do the job for me.
Ob"Hack" : Our deeply unpleasant 68000-based microtrainers weren't
logging onto our Ethernet server since some doofi (pl. doofus?) weren't
logging out of it after finishing with it. Solution: unplug the
microtrainer, stuff it into another socket, and connect _directly_ to
our ugrad CS Unix system; no messy Ethernet connections needed.
-- Bryan
--
"Hell must be isothermal; for | "Either you are part of the solution or
otherwise the resident engineers and | you are part of the precipitate."
physical chemists (of which there must | "Consumer-grade religion does not
be some) could set up a heat engine to | encourage logical thinking." -- K.Jones
run a refrigerator to cool off a +----------------------------------------
portion of their surroundings to any | Bryan O'Sullivan (Tetragrammaton) :-)
desired temperature." | Internet: bosu...@unix1.tcd.ie
-- Henry Albert Bent, _The Second Law_ | This mind intentionally left blank.
ObHack: writing a DOS-to-UNIX file converter on an IBM 704 through the
front panel.
ObFood: Finally convinced Peter to toss out the two-day-old coffee.
ObRFD: Haha, only serious.
Bet I had you going there for a second, huh...?
--
Stephanie da Silva Taronga Park * Houston, Texas
ari...@taronga.com 568-0480 568-1032
"I Want a New .sig" -- Huey Lewis and the NEWS
Ladies and gentlemen, I believe we've found the wolf.
>Stephanie da Silva Taronga Park * Houston, Texas
--
ObFoodHack: How many days old coffee will you nuke to get the buzz needed
to continue hacking with minimal interruption?
--
Jerry M. Carlin (510) 823-2441 jmc...@srv.pacbell.com
To dream the impossible dream. To fight the unbeatable foe.
Obviously, it's been too long since you've eaten CK. :-I
--
kos...@taronga.com | Why change Bush in the middle of a screw?
Jordan Kossack | Re-elect George in `92.
(713) 270-9056 | (with apologies to the 1972 Nixon campaign. :-)
If it ain't got mold growing in it, who cares how old it is! :)
--
chris gleaves ch...@ponder.csci.unt.edu
"Far away, across the field, the tolling of the iron bell,
calls the faithful to their knees, to hear the softly spoken magic spell."
Does mold grow on coffee?? Isn't typical hacker coffee strong enough to kill
any known lifeform? Don't most hackers drink coke or jolt?
andrew
--
and...@cubetech.com
Andrew Loewenstern | "I shall not equate bit-mapped
Cube Technologies, Inc. | text with reality."
About seven years ago, I was working for a small aerospace subcontracter
-- so small that we had one engineer, and he was semi-retired. But he
did have the hacker mentality. Anyway, he left to work for a startup
instrumentation company. The following Monday, we came in to work, and
it smelled like something had died. I had the dubious honor of
discovering that the source of the foul odor was a cup of coffee left on
Karl's desk....
ObHack: While working at the same place, implementing a pseudo-compiler
in dBASE II on a CPM machine that generated menuing programs and format
files according to a database of specifications of what I wanted. It
was a lot easier to do that than try to update all my code every time
the boss decided he wanted different fields (about every week.)
--
Jack Holt ge...@athena.mit.edu
3 Ames St #93, Cambridge MA 02139
ObQuote: "
You would think so, but it turns out that some molds can hack it if
given enough weeks to work on it. These are doubtless the same molds
that evolved in hot sulfur springs (a similar environment :-)
>Don't most hackers drink coke or jolt?
What a revolting idea. If I have to drink any kind of cola to be a hacker,
I'll turn in my membership card.
Certainly a fair number of hackers like cola or even <shudder> Jolt, but
the notion that *all* do must have originated with the same journalists
who believe that the worlds best computer experts are all under the age
of 16.
ObHack: drink cola while examining what it did to a chicken bone, egg,
or styrofoam cup overnight.
ObHack2: a pot of coffee forgotten over night which transformed liquid
coffee into a diamond-hard brown crust can be cleaned simply by soaking
in hot water without even scrubbing. Ok, maybe everyone knows this, but
it sure surprised me the first time.
Doug
--
Doug Merritt Preferred: do...@netcom.com (or: do...@eris.berkeley.edu)
Professional Wild-eyed Visionary Member, Crusaders for a Better Tomorrow
Obhack3: jery-rigging a ventilation hood using a vacuum cleaner while I
do this. (No, I haven't actually done it. I don't even drink coffee.)
B-)
Otherwise, you wouldn't find coffee cups in novelty stores that read:
"Caution! Mold Experiment in Progress!"
I and a couple of friends bought one for our former HS band director. He was
only moderately amused.
ObHack: 5.25" HD floppies on my Apple //e!
My 5.25" HD drives are now on line formated to all 80-tracks (instead of 77 like
an 8" disk) I am limited to IBM 3740 and System 34 by my controller (SVA ZVX4
in an Apple //e), but I can still get 1006kB free. The 80-track mod to the
format program was easy. Now I want to make it format both sides autmatically
instead of formatting one side of one disk at a time.
The next step is to build circuitry to provide a READY signal that my controller
can deal with as well as multiplexed MOTOR ON (w DRV/SEL) and whatever else is
necessary to get them to chain off the back of Shugart 860's (they have to
look like 8" drives or else my controller will flake out on either the 5.25s
or the real 8-inchers. (a functioning READY signal is a must. The drives
must return READY before my controller will do ANYTHING with them.) Unfortun-
ately, most modern drives only return ready AFTER the controller has finished
setup (up to speed, all seeks complete).
John D. Baker ->An Apple 3.5", 5.25", 8" PCPI Applicard ZCPR3 nut//
Internet: JDB8042@{tamuts|rigel|sigma|summa|zeus|venus}.tamu.edu
UUCP: The Black Box: ...buster!blkbox!jdb8042 [(713) 480-2686|-2685 (2400)]
BBSs: JOHN BAKER on Z-Node #45 [(713) 937-8886],
The Vector Board [(716) 544-1863], PIC of the Mid-Town [(713) 527-8939]
Karnage: "Fire at will!" / Wil (desperately dodging a hail of automatic
weapons fire): "AAAAIYEEEE!!" / Karnage: "No, no. Do not fire at Wil, he
is my Second Mate. FIRE AT THE SEA-DUCK!!"
In article <1992Feb20.1...@sol.acs.unt.edu> ch...@ponder.csci.unt.edu
(Chris Gleaves) writes:
> If it ain't got mold growing in it, who cares how old it is! :)
Does mold grow on coffee?? Isn't typical hacker coffee strong enough to kill
any known lifeform? Don't most hackers drink coke or jolt?
andrew
Exactly! I used to go through a six-pack of Cherry Coke every day, now I'm
down to 2 or 3 a day. More sugar than normal Coke or Pepsi. Can't find Jolt
around here anymore. Too acidic for fungi...
ObHack: brother got a SoundBlaster board for my old AT&T 6300. I thought,
heck, now it's got better sound than my IPC. So I wrote a driver
which let me control the board via the serial port. Now I can get
great sound out of my IPC, through my AT&T :)
--
Robert Lau - Systems Programmer, Unix Systems 213-740-2866
-- University Computing Services Internet: rs...@usc.edu
-- University of Southern California Bitnet: rslau@uscvm
-- 1020 W Jefferson, LA, CA USA, 90089-0251 UUCP: ...!uunet!usc!rslau