The Jargon File v2.3.1 03 JAN 1991, part 11 of 11

Eric S. Raymond eric at snark.thyrsus.com
Fri Jan 4 08:09:01 AEST 1991


---- Cut Here and unpack ----
#!/bin/sh
# This is a shell archive (shar 3.10)
# made 01/03/1991 21:08 UTC by eric at snark.thyrsus.com
# Source directory /usr2/eric/jargon
#
# existing files WILL be overwritten
#
# This shar contains:
# length  mode       name
# ------ ---------- ------------------------------------------
#  31018 -rw-r--r-- jsplit.ak
#
touch 2>&1 | fgrep '[-amc]' > /tmp/s3_touch$$
if [ -s /tmp/s3_touch$$ ]
then
	TOUCH=can
else
	TOUCH=cannot
fi
rm -f /tmp/s3_touch$$
# ============= jsplit.ak ==============
sed 's/^X//' << 'SHAR_EOF' > jsplit.ak &&
XAs the Boston Globe later reported, "If you want to know the truth,
XM.I.T. won The Game."
X
XThe prank had taken weeks of careful planning by members of MIT's
XDelta Kappa Epsilon fraternity.  The device consisted of a weather
Xballoon, a hydraulic ram powered by Freon gas to lift it out of the
Xground, and a vacuum-cleaner motor to inflate it.  They made eight
Xseparate expeditions to Harvard Stadium between 1 and 5 AM, in which
Xthey located an unused 110-volt circuit in the stadium, and ran buried
Xwiring from the stadium circuit to the 40-yard line, where they buried
Xthe balloon device.  When the time came to activate the device, two
Xfraternity members had merely to flip a circuit breaker and push a
Xplug into an outlet.
X
XThis stunt had all the earmarks of a perfect hack: surprise,
Xpublicity, the ingenious use of technology, safety, and harmlessness.
XThe use of manual control allowed the prank to be timed so as not to
Xdisrupt the game (it was set off between plays, so the outcome of the
Xgame would not be unduly affected).  The perpetrators had even
Xthoughtfully attached a note to the balloon explaining that the device
Xwas not dangerous and contained no explosives.
X
XHarvard president Derek Bok commented: "They have an awful lot of
Xclever people down there at MIT, and they did it again."  President
XPaul E. Gray of MIT said, "There is absolutely no truth to the rumor
Xthat I had anything to do with it, but I wish there were."  Such is
Xthe way of all good hacks.
X
XThe Untimely Demise of Mabel the Monkey (a Cautionary Tale)
X***********************************************************
X
X   The following, modulo a couple of inserted commas and capitalization
Xchanges for readability, is the exact text of a famous USENET message.
XThe reader may wish to review the definitions of PM and MOUNT in the main
Xtext before continuing.
X
X     Date: Wed 3 Sep 86 16:46:31-EDT
X     From: "Art Evans" <Evans at TL-20B.ARPA>
X     Subject: Always Mount a Scratch Monkey
X     To: Risks at CSL.SRI.COM
X
XMy friend Bud used to be the intercept man at a computer vendor for
Xcalls when an irate customer called.  Seems one day Bud was sitting at
Xhis desk when the phone rang.
X    
X     Bud:       Hello.                 Voice:      YOU KILLED MABEL!!
X     B:         Excuse me?             V:          YOU KILLED MABEL!!
X
XThis went on for a couple of minutes and Bud was getting nowhere, so he
Xdecided to alter his approach to the customer.
X    
X     B:         HOW DID I KILL MABEL?   V: YOU PM'ED MY MACHINE!!
X
XWell, to avoid making a long story even longer, I will abbreviate what had
Xhappened.  The customer was a Biologist at the University of Blah-de-blah,
Xand he had one of our computers that controlled gas mixtures that Mabel (the
Xmonkey) breathed.  Now, Mabel was not your ordinary monkey.  The University
Xhad spent years teaching Mabel to swim, and they were studying the effects
Xthat different gas mixtures had on her physiology.  It turns out that the
Xrepair folks had just gotten a new Calibrated Power Supply (used to
Xcalibrate analog equipment), and at their first opportunity decided to
Xcalibrate the D/A converters in that computer.  This changed some of the gas
Xmixtures and poor Mabel was asphyxiated.  Well, Bud then called the branch
Xmanager for the repair folks:
X
X     Manager:     Hello
X     B:           This is Bud, I heard you did a PM at the University of
X                  Blah-de-blah.
X     M:           Yes, we really performed a complete PM.  What can I do
X                  for you?
X     B:           Can you swim?
X
XThe moral is, of course, that you should always mount a scratch monkey.
X
X              ~~~~~~~~~~~~~~~~~~~~~~
X
XThere are several morals here related to risks in use of computers.
XExamples include, "If it ain't broken, don't fix it."  However, the
Xcautious philosophical approach implied by "always mount a scratch
Xmonkey" says a lot that we should keep in mind.
X
X     Art Evans
X     Tartan Labs
X
XTV Typewriters: A Tale Of Hackish Ingenuity
X*******************************************
X
XHere is a true story about a glass tty.  One day an MIT hacker was in
Xa motorcycle accident and broke his leg.  He had to stay in the
Xhospital quite a while, and got restless because he couldn't HACK (use
Xthe computer).  Two of his friends therefore took a display terminal
Xand a telephone connection for it to the hospital, so that he could
Xuse the computer by telephone from his hospital bed.
X
XNow this happened some years before the spread of home computers, and
Xcomputer terminals were not a familiar sight to the average person.
XWhen the two friends got to the hospital, a guard stopped them and
Xasked what they were carrying.  They explained that they wanted to
Xtake a computer terminal to their friend who was a patient.
X
XThe guard got out his list of things that patients were permitted to
Xhave in their rooms: TV, radio, electric razor, typewriter, tape
Xplayer...  no computer terminals.  Computer terminals weren't on the
Xlist, so they couldn't take it in.  Rules are rules.
X
XFair enough, said the two friends, and they left again.  They were
Xfrustrated, of course, because they knew that the terminal was as
Xharmless as a TV or anything else on the list... which gave them an
Xidea.
X
XThe next day they returned, and the same thing happened: a guard
Xstopped them and asked what they were carrying.  They said, "This is
Xa TV typewriter!"  The guard was skeptical, so they plugged it in and
Xdemonstrated it.  "See?  You just type on the keyboard and what you
Xtype shows up on the TV screen."  Now the guard didn't stop to think
Xabout how utterly useless a typewriter would be that didn't produce
Xany paper copies of what you typed; but this was clearly a TV
Xtypewriter, no doubt about it.  So he checked his list: "A TV is all
Xright, a typewriter is all right... okay, take it on in!"
X
XTwo Stories About "Magic" (As Told By Guy Steele)
X*************************************************
X
XWhen Barbara Steele was in her fifth month of pregnancy, her doctor
Xsent her to a specialist to have a sonogram made to determine whether
Xthere were twins.  She dragged her husband Guy along to the
Xappointment.  It was quite fascinating; as the doctor moved an
Xinstrument along the skin, a small TV screen showed cross-sectional
Xpictures of the abdomen.
X
XNow Barbara and I had both studied computer science at MIT, and we
Xboth saw that some complex computerized image-processing was involved.
XOut of curiosity, we asked the doctor how it was done, hoping to learn
Xsome details about the mathematics involved.  The doctor, not knowing
Xour educational background, simply said, "The probe sends out sound
Xwaves, which bounce off the internal organs.  A microphone picks up
Xthe echoes, like radar, and send the signals to a computer---and the
Xcomputer makes a picture."  Thanks a lot!  Now a hacker would have
Xsaid, "... and the computer *magically* makes a picture",
Ximplicitly acknowledging that he has glossed over an extremely
Xcomplicated process.
X
XSome years ago I was snooping around in the cabinets that housed the
XMIT AI Lab's PDP-10, and noticed a little switch glued to the frame of
Xone cabinet.  It was obviously a homebrew job, added by one of the
Xlab's hardware hackers (no one know who).
X
XYou don't touch an unknown switch on a computer without knowing what
Xit does, because you might crash the computer.  The switch was labeled
Xin a most unhelpful way.  It had two positions, and scrawled in pencil
Xon the metal switch body were the words "magic" and "more magic".
XThe switch was in the "more magic" position.
X
XI called another hacker over to look at it.  He had never seen the
Xswitch before either.  Closer examination revealed that the switch
Xonly had one wire running to it!  The other end of the wire did
Xdisappear into the maze of wires inside the computer, but it's a basic
Xfact of electricity that a switch can't do anything unless there are
Xtwo wires connected to it.  This switch had a wire connected on one
Xside and no wire on its other side.
X
XIt was clear that this switch was someone's idea of a silly joke.
XConvinced by our reasoning that the switch was inoperative, we flipped
Xit.  The computer instantly crashed.
X
XImagine our utter astonishment.  We wrote it off as coincidence, but
Xnevertheless restored the switch to the "more magic" position before
Xreviving the computer.
X
XA year later, I told this story to yet another hacker, David Moon as I
Xrecall.  He clearly doubted my sanity, or suspected me of a
Xsupernatural belief in the power of this switch, or perhaps thought I
Xwas fooling him with a bogus saga.  To prove it to him, I showed him
Xthe very switch, still glued to the cabinet frame with only one wire
Xconnected to it, still in the "more magic" position.  We scrutinized
Xthe switch and its lone connection, and found that the other end of
Xthe wire, though connected to the computer wiring, was connected to a
Xground pin.  That clearly made the switch doubly useless: not only was
Xit electrically nonoperative, but it was connected to a place that
Xcouldn't affect anything anyway.  So we flipped the switch.
X
XThe computer promptly crashed.
X
XThis time we ran for Richard Greenblatt, a long-time MIT hacker, who
Xwas close at hand.  He had never noticed the switch before, either.
XHe inspected it, concluded it was useless, got some diagonal cutters
Xand diked it out.  We then revived the computer and it ran fine ever
Xsince.
X
XWe still don't know how the switch crashed the machine.  There is a
Xtheory that some circuit near the ground pin was marginal, and
Xflipping the switch changed the electrical capacitance enough to upset
Xthe circuit as millionth-of-a-second pulses went through it.  But
Xwe'll never know for sure; all we can really say is that the switch
Xwas MAGIC.
X
XI still have that switch in my basement.  Maybe I'm silly, but I
Xusually keep it set on "more magic."
X
XA Selection of AI Koans
X***********************
X
X   These are perhaps the funniest examples of a genre of jokes told at
Xthe MIT AI lab about various noted computer scientists and hackers.
X
X                                    
X* * *
X
X   A novice was trying to fix a broken Lisp machine by turning the power
Xoff and on.
X
X   Knight, seeing what the student was doing spoke sternly: "You can not
Xfix a machine by just power-cycling it with no understanding of what
Xis going wrong."
X
X   Knight turned the machine off and on.
X
X   The machine worked.
X
X[Ed note: This is much funnier if you know that Tom Knight was one of the
X   Lisp machine's principal designers]
X
X                                    
X* * *
X
XOne day a student came to Moon and said, "I understand how to
Xmake a better garbage collector.  We must keep a reference count
Xof the pointers to each cons."
X
XMoon patiently told the student the following story:
X
X      "One day a student came to Moon and said, "I understand how
X      to make a better garbage collector...
X
X[Ed. note: The point here is technical.  Pure reference-count garbage
X   collectors have problems with `pathological' structures that point
X   to themselves.]
X
X                                    
X* * *
X
XIn the days when Sussman was a novice Minsky once came to him as
Xhe sat hacking at the PDP-6.
X
X   "What are you doing?", asked Minsky.
X
X   "I am training a randomly wired neural net to play Tic-Tac-Toe",
XSussman replied.
X
X   "Why is the net wired randomly?", asked Minsky.
X
X   "I do not want it to have any preconceptions of how to play",
XSussman said.
X
X   Minsky then shut his eyes.
X
X   "Why do you close your eyes?", Sussman asked his teacher.
X
X   "So that the room will be empty."
X
X   At that moment, Sussman was enlightened.
X
X                                    
X* * *
X
X   A disciple of another sect once came to Drescher as he was
Xeating his morning meal.
X
X   "I would like to give you this personality test", said the
Xoutsider, "because I want you to be happy."
X
X   Drescher took the paper that was offered him and put it
Xinto the toaster, saying:
X
X   "I wish the toaster to be happy, too."
X
XOS and JEDGAR
X*************
X
XThis story says a lot about the style of the ITS culture. 
X
XOn the ITS system there was a program that allowed you to see what is
Xbeing printed on someone else's terminal.  It worked by "spying" on
Xthe other guy's output, by examining the insides of the monitor
Xsystem.  The output spy program was called OS.  Throughout the rest of
Xthe computer science (and also at IBM) OS means "operating system",
Xbut among old-time ITS hackers it almost always meant "output spy".
X
XOS could work because ITS purposely had very little in the way of
X"protection" that prevented one user from interfering with another.
XFair is fair, however.  There was another program that would
Xautomatically notify you if anyone started to spy on your output.  It
Xworked in exactly the same way, by looking at the insides of the
Xoperating system to see if anyone else was looking at the insides that
Xhad to do with your output.  This "counterspy" program was called
XJEDGAR (pronounced as two syllables: /jed'gr/), in honor of the former
Xhead of the FBI.
X
XBut there's more. The rest of the story is that JEDGAR would ask the
Xuser for "license to kill".  If the user said yes, then JEDGAR would
Xactually gun the job of the luser who was spying.  However, people
Xfound this made life too violent, especially when tourists learned
Xabout it.  One of the systems hackers solved the problem by replacing
XJEDGAR with another program that only pretended to do its job.  It
Xtook a long time to do this, because every copy of JEDGAR had to be
Xpatched, and to this day no one knows how many people never figured
Xout that JEDGAR had been defanged.
X
XAppendix B: A Portrait of J. Random Hacker
X******************************************
X
XThis profile reflects detailed comments on an earlier `trial balloon'
Xversion from about a hundred USENET respondents.  Where comparatives
Xare used, the implicit `other' is a randomly selected group from the
Xnon-hacker population of the same size as hackerdom.
X
X
XGeneral appearance:
X-------------------
X
XIntelligent.  Scruffy.  Intense.  Abstracted.  Interestingly for a
Xsedentary profession, more hackers run to skinny than fat; both
Xextremes are more common than elswhere.  Tans are rare.
X
X
XDress:
X------
X
XCasual, vaguely post-hippy; T-shirts, jeans, running shoes,
XBirkenstocks (or bare feet).  Long hair, beards and moustaches are
Xcommon.  High incidence of tie-die and intellectual or humorous
X`slogan' T-shirts (only rarely computer related, that's too obvious).
X
XA substantial minority runs to `outdoorsy' clothing --- hiking boots
X("in case a mountain should suddenly spring up in the machine room",
Xas one famous parody put it), khakis, lumberjack or chammy shirts and
Xthe like.
X
XVery few actually fit the National-Lampoon-Nerd stereotype, though it
Xlingers on at MIT and may have been more common before 1975.  These
Xdays, backpacks are more common than briefcases, and the hacker `look'
Xis more whole-earth than whole-polyester.
X
XHackers dress for comfort, function, and minimal maintenance hassles
Xrather than for appearance (some, unfortunately, take this to extremes
Xand neglect personal hygiene).  They have a very low tolerance of
Xsuits or other `business' attire, in fact it is not uncommon for
Xhackers to quit a job rather than conform to dress codes.
X
XFemale hackers never wear visible makeup and many use none at all.
X
X
XReading habits:
X---------------
X
XOmnivorous, but usually includes lots of science and science fiction.
XThe typical hacker household might subscribe to "Analog",
X"Scientific American", "Co-Evolution_Quarterly" and
X"Smithsonian".  Hackers often have a reading range that astonishes
X`liberal arts' people but tend not to talk about it as much.  Many
Xhackers spend as much of their spare time reading as the average
XAmerican burns up watching TV, and often keep shelves and shelves of
Xwell-thumbed books in their homes.
X
X
XOther interests:
X----------------
X
XSome hobbies are widely shared and recognized as going with the
Xculture, including: science fiction.  Music (see the MUSIC entry).
XMedievalism.  Chess, go, wargames and intellectual games of all kinds.
XRole-playing games such as Dungeons and Dragons used to be extremely
Xpopular among hackers but have lost a bit of their former luster as
Xthey moved into the mainstream and became heavily commercialized.
XLogic puzzles.  Ham radio.  Other interests that seem to correlate
Xless strongly but positively with hackerdom include: linguistics and
Xtheater teching.
X
X
XPhysical Activity and Sports:
X-----------------------------
X
XMany (perhaps even most) hackers don't do sports at all and are
Xdeterminedly anti-physical.
X
XAmong those that do, they are almost always self-competitive ones
Xinvolving concentration, stamina and micromotor skills; martial arts,
Xbicycling, kite-flying, hiking, rock-climbing, sailing, caving,
Xjuggling.
X
XHackers avoid most team sports like the plague (volleyball is a
Xnotable and unexplained exception).
X
X
XEducation:
X----------
X
XNearly all hackers past their teens are either college-degreed or
Xself-educated to an equivalent level.  The self-taught hacker is often
Xconsidered (at least by other hackers) to be better-motivated and more
Xrespected than his B.Sc. counterpart.  Academic areas from which
Xpeople often gravitate into hackerdom include (besides the obvious
Xcomputer science and electrical engineering) physics, mathematics,
Xelectrical engineering, linguistics, and philosophy.
X
X
XThings hackers detest and avoid:
X--------------------------------
X
XIBM mainframes.  Smurfs and other forms of offensive cuteness.
XBureaucracies.  Stupid people.  Easy listening music.  Television
X(except for cartoons, movies, the old _Star_Trek_ and the new
X_Simpsons_).  Business suits.  Dishonesty.  Incompetence.  Boredom.
XBASIC.  Character-based menu interfaces.
X
X
XFood:
X-----
X
XEthnic.  Spicy.  Oriental, esp.  Chinese and most especially Szechuan,
XHunan and Mandarin (hackers consider Cantonese vaguely declasse).
XThai food has experienced flurries of popularity.  Where available
Xhigh-quality Jewish delicatessen food is much esteemed.  A visible
Xminority of Midwestern and Southwestern hackers prefers Mexican.
X
XFor those all-night hacks, pizza and microwaved burritos are big.
XInterestingly, though the mainstream culture has tended to think of
Xhackers as incorrigible junk-food junkies, many have at least mildly
Xhealth-foodist attitudes and are fairly discriminating about what they
Xeat.  This may be generational; anecdotal evidence suggests that the
Xstereotype was more on the mark ten years ago.
X
X
XPolitics:
X---------
X
XVaguely left of center, except for the strong libertarian contingent
Xwhich rejects conventional left-right politics entirely.  The only
Xsafe generalization is that almost all hackers are anti-authoritarian,
Xthus both conventional conservatism and "hard" leftism are rare.
XHackers are far more likely than most non-hackers to either a) be
Xaggressively apolitical, or b) entertain peculiar or idiosyncratic
Xpolitical ideas and actually try to live by them day-to-day.
X
X
XGender & Ethnicity:
X-------------------
X
XHackerdom is still predominently male.  However, the proportion of
Xwomen is clearly higher than the low-single-digit range typical for
Xtechnical professions.
X
XHackerdom is predominantly Caucasian with a strong minority of Jews
X(east coast) and Asians (west coast).  The Jewish contingent has
Xexerted a particularly pervasive cultural influence (see Food, and
Xnote that several common slang terms are obviously mutated Yiddish).
X
XHackers as a group are about as color-blind as anyone could ask for,
Xand ethnic prejudice of any kind tends to be met with extreme
Xhostility; the ethnic distribution of hackers is understood by them to
Xbe a function of who tends to seek and get higher education.
X
XIt has been speculated that hackish gender- and color-blindness is
Xpartly a positive effect of ASCII-only network channels.
X
X
XReligion:
X---------
X
XAgnostic.  Atheist.  Non-observant Jewish.  Neo-pagan.  Very commonly
Xthree or more of these are combined in the same person.  Conventional
Xfaith-holding Christianity is rare though not unknown (at least on the
Xeast coast, more hackers wear yarmulkes than crucifixes).
X
XEven hackers who identify with a religious affiliation tend to be
Xrelaxed about it, hostile to organized religion in general and all
Xforms of religious bigotry in particular.  Many enjoy `parody'
Xreligions such as Discordianism and the Church of the SubGenius.
X
XAlso, many hackers are influenced to varying degrees by Zen Buddhism
Xor (less commonly) Taoism, and blend them easily with their `native'
Xreligions.
X
XThere is a definite strain of mystical, almost Gnostic sensibility
Xthat shows up even among those hackers not actively involved with
Xneo-paganism, Discordianism, or Zen.  Hacker folklore that pays homage
Xto `wizards' and speaks of incantations and demons has too much
Xpsychological truthfulness about it to be entirely a joke.
X
X
XCeremonial chemicals:
X---------------------
X
XMost hackers don't smoke tobacco and use alcohol in moderation if at
Xall (though there is a visible contingent of exotic-beer fanciers).
XLimited use of `soft' drugs (esp. psychedelics such as marijuana, LSD,
Xpsilocybin etc) used to be relatively common and is still regarded
Xwith more tolerance than in the mainstream culture.  Use of `downers'
Xand opiates, on the other hand, appears to be particularly rare;
Xhackers seem in general to dislike drugs that `dumb them down'.  On
Xthe other hand, many hackers regularly wire up on caffeine and sugar
Xfor all-night hacking runs.
X
X
XCommunication style:
X--------------------
X
XSee the dictionary notes on `Hacker speech style'.  Though hackers
Xoften have poor person-to-person communication skills, they are as a
Xrule extremely sensitive to nuances of language and very precise in
Xtheir use of it.  They are often better at written communication than
Xspoken.
X
X
XGeographical Distribution:
X--------------------------
X
XIn the U.S., hackerdom revolves on a Bay Area/Boston axis; about half
Xof the hard core seems to live within a hundred miles of Cambridge or
XBerkeley.  Hackers tend to cluster around large cities, especially
X`university towns' such as the Raleigh/Durham area in North Carolina
Xor Princeton, New Jersey (this may simply reflect the fact that many
Xare students or ex-students living near their alma maters).
X
X
XSexual habits:
X--------------
X
XHackerdom tolerates a much wider range of sexual and lifestyle
Xvariation than the mainstream culture.  It includes a relatively large
Xgay contingent.  Hackers are more likely to live in polygynous or
Xpolyandrous relationships, practice open marriage or live in communes
Xor group houses.  In this as in some other respects (see Dress)
Xhackerdom semi-consciously maintains `counterculture' values.
X
X
XPersonality Characteristics:
X----------------------------
X
XThe most obvious common `personality' characteristics of hackers are
Xhigh intelligence, consuming curiosity, and facility with intellectual
Xabstractions.  Also, most hackers are `neophiles', stimulated by and
Xappreciative of novelty (especially intellectual novelty).  Most are
Xalso relatively individualistic and anti-conformist.
X
XContrary to stereotype, hackers are *not* usually intellectually
Xnarrow; they tend to be interested in any subject that can provide
Xmental stimulation, and can often discourse knowledegeably and even
Xinterestingly on any number of obscure subjects --- assuming you can
Xget them to talk at all as opposed to, say, going back to hacking.
X
XHackers are `control freaks' in a way that has nothing to do with the
Xusual coercive or authoritarian connotations of the term.  In the same
Xway that children delight in making model trains go forward and back
Xby moving a switch, hackers love making complicated things like
Xcomputers do nifty stuff for them.  But it has to be *their*
Xnifty stuff; they don't like tedium or nondeterminism.  Accordingly
Xthey tend to be careful and orderly in their intellectual lives and
Xchaotic elsewhere.  Their code will be beautiful, even if their desks
Xare buried in three feet of crap.
X
XHackers are generally only very weakly motivated by conventional
Xrewards such as social approval or money.  They tend to be attracted
Xby challenges and excited by interesting toys, and to judge the
Xinterest of work or other activities in terms of the challenges
Xoffered and the toys they get to play with.
X
XIn terms of Myers-Briggs and equivalent psychometric systems,
Xhackerdom appears to concentrate the relatively rare INTJ and INTP
Xtypes; that is, introverted, intuitive and thinker types (as opposed
Xto the extroverted-sensate personalities the predominate in the
Xmainstream culture).  ENT[JP] types are also concentrated among
Xhackers but are in a minority.
X
X
XWeaknesses of the hacker personality:
X-------------------------------------
X
XRelatively little ability to identify emotionally with other people.
XThis may be because hackers generally aren't much like `other people'.
XUnsurprisingly, there is also a tendency to self-absorption,
Xintellectual arrogance, and impatience with people and tasks perceived
Xto be wasting one's time.  As a result, many hackers have difficulty
Xmaintaining stable relationships.
X
XAs cynical as hackers sometimes wax about the amount of idiocy in the
Xworld, they tend at bottom to assume that everyone is as rational,
X`cool', and imaginative as they consider themselves.  This bias often
Xcontributes to weakness in communication skills.  Hackers tend to be
Xespecially poor at confrontations and negotiation.
X
XHackers are often monumentally disorganized and sloppy about dealing
Xwith the physical world.  Bills don't get paid on time, clutter piles
Xup to incredible heights in homes and offices, and minor maintenance
Xtasks get deferred indefinitely.
X
XThe sort of person who uses phrases like `incompletely socialized'
Xusually thinks hackers are.  Hackers regard such people with contempt
Xwhen they notice them at all.
X
X
XMiscellaneous:
X--------------
X
XHackers are more likely to keep cats than dogs.  Many drive incredibly
Xdecrepit heaps and forget to wash them; richer ones drive spiffy
XPorsches and RX-7s and then forget to wash them.
X
XAppendix C: Bibliography
X************************
X
XHere are some other books you can read to help you understand the
Xhacker mindset.
X
X     Godel, Escher, Bach: An Eternal Golden Braid
X     Hofstadter, Douglas
X     Basic Books, New York 1979
X     ISBN 0-394-74502-7
X
XThis book reads like an intellectual Grand Tour of hacker
Xpreoccupations.  Music, mathematical logic, programming, speculations
Xon the nature of intelligence, biology, and Zen are woven into a
Xbrilliant tapestry themed on the concept of encoded self-reference.
XThe perfect left-brain companion to _Illuminatus_.
X
X     Illuminatus (three vols)
X         1.  The Golden Apple 
X         2.  The Eye in the Pyramid
X         3.  Leviathan
X     Shea, Robert & Wilson, Robert Anton
X     Dell Books, New York 1975
X     ISBN 0-440-{14688-7,34691-6,14742-5}
X
XThis work of alleged fiction is an incredible berserko-surrealist
Xrollercoaster of world-girdling conspiracies, intelligent dolphins,
Xthe fall of Atlantis, who really killed JFK, sex, drugs, rock and roll
Xand the Cosmic Giggle Factor.  First published in 3 volumes, but
Xthere's now a one-volume trade paperback carried by most chain
Xbookstores under SF.  The perfect right-brain companion to Hofstadter's
X"Godel, Escher, Bach: An Eternal Golden Braid".  See <Eris>,
X<Discordianism>, <random numbers>, <Church Of The Sub-Genius>.
X
X     The Hitchhiker's Guide to the Galaxy
X     Douglas Adams
X     Pocket Books 1981, New York
X     ISBN 0-671-46149-4
X
XThis Monty-Python-in-Space spoof of SF genre traditions has been
Xpopular among hackers ever since the original British radio show.
XRead it if only to learn about Vogons (see <bogons>) and the
Xsignificance of the number 42 (see <random numbers>) --- also why the
Xwinningest chess program of 1990 was called "Deep Thought".
X
X     The Tao of Programming
X     James Geoffrey
X     Infobooks 1987, Santa Monica,
X     ISBN 0-931137-07-1
X
XThis gentle, funny spoof of the "Tao Te Ching" contains much that is
Xilluminating about the hacker way of thought. "When you have learned
Xto snatch the error code from the trap frame, it will be time for you
Xto leave."
X
X     Hackers
X     Steven Levy
X     Anchor/Doubleday 1984, New York
X     ISBN 0-385-19195-2
X
XLevy's book is at its best in describing the early MIT hackers at the
XModel Railroad Club and the early days of the microcomputer
Xrevolution.  He never understood UNIX or the networks, though, and his
Xenshrinement of Richard Stallman as "the last true hacker" turns out
X(thankfully) to have been quite misleading.
X
X     The Cuckoo's Egg
X     Clifford Stoll
X     Doubleday 1989, New York
X     ISBN 0-385-24946-2
X
XClifford Stoll's absorbing tale of how he tracked Markus Hess and the
XChaos Club cracking-ring nicely illustrates the difference between
X`hacker' and `cracker'.  And Stoll's portrait of himself and his lady
XBarbara and his friends at Berkeley and on the Internet paints a
Xmarvelously vivid picture of how hackers and the people around them
Xlike to live and what they think.
X
X     The Devil's DP Dictionary
X     by Stan Kelly-Bootle
X     McGraw-Hill Inc, 1981
X     ISBN 0-07-034022-6
X
XThis pastiche of Ambrose Bierce's famous work is similar in format to
Xthe Jargon File (and quotes several entries from jargon-1) but
Xsomewhat different in tone and intent.  It is more satirical and less
Xanthropological, and largely a product of the author's literate and
Xquirky imagination.  For example, it defines "computer science" as
X"A study akin to numerology and astrology, but lacking the precision
Xof the former and the success of the latter"; also as "The boring
Xart of coping with a large number of trivialities."
X
X     The Devouring Fungus: Tales from the Computer Age
X     by Karla Jennings
X     W.  W. Norton 1990, New York
X     ISBN 0-393-30732-8
X
XThe author of this pioneering compendium knits together a great deal
Xof computer and hacker-related folklore with good writing and a few
Xwell-chosen cartoons.  She has a keen eye for the human aspects of the
Xlore and is very good at illuminating the psychology and evolution of
Xhackerdom.  Unfortunately, a number of small errors and awkwardnesses
Xsuggest that she didn't have the final manuscript vetted by a hackish
Xinsider; the glossary in the back is particularly embarrassing, and at
Xleast one classic tale (the Magic Switch story in this file's Appendix
XA) is given in incomplete and badly mangled form.  Nevertheless, this
Xbook is a win overall and can be enjoyed by hacker and non-hacker
Xalike.
X
X     True Names...and Other Dangers
X     by Vernor Vinge
X     Baen Books 1987, New York
X     ISBN 0-671-65363
X
XHacker demigod Richard Stallman believes the title story of this book
X"expresses the spirit of hacking best".  This may well be true; it's
Xcertainly difficult to recall anyone doing a better job.  The other
Xstories in this collection are also fine work by an author who is
Xperhaps one of today's very best practitioners of the hard-SF genre.
X
SHAR_EOF
chmod 0644 jsplit.ak || echo "restore of jsplit.ak fails"
if [ $TOUCH = can ]
then
    touch -am 0103154591 jsplit.ak
fi
exit 0



More information about the Comp.unix.internals mailing list