If you pay close attention to your son's reading habits, as I do, you will be able to determine a great deal about his opinions and hobbies. Children are at their most impressionable in the teenage years. Any father who has had a seventeen year old daughter attempt to sneak out on a date wearing make up and perfume is well aware of the effect that improper influences can have on inexperienced minds.
There are, unfortunately, many hacking manuals available in bookshops today. A few titles to be on the lookout for are: "Snow Crash" and "Cryptonomicon" by Neal Stephenson; "Neuromancer" by William Gibson; "Programming with Perl" by Timothy O'Reilly; "Geeks" by Jon Katz; "The Hacker Crackdown" by Bruce Sterling; "Microserfs" by Douglas Coupland; "Hackers" by Steven Levy; and "The Cathedral and the Bazaar" by Eric S. Raymond.
If you find any of these hacking manuals in your child's possession, confiscate them immediately. You should also petition local booksellers to remove these titles from their shelves. You may meet with some resistance at first, but even booksellers have to bow to community pressure.
5. How much time does your child spend using the computer each day?
If your son spends more than thirty minutes each day on the computer, he may be using it to DOS other peoples sites. DOSing involves gaining access to the "command prompt" on other people's machines, and using it to tie up vital internet services. This can take up to eight hours. If your son is doing this, he is breaking the law, and you should stop him immediately. The safest policy is to limit your children's access to the computer to a maximum of forty-five minutes each day.
6. Does your son use Quake?
Quake is an online virtual reality used by hackers. It is a popular meeting place and training ground, where they discuss hacking and train in the use of various firearms. Many hackers develop anti-social tendencies due to the use of this virtual world, and it may cause erratic behaviour at home and at school.
If your son is using Quake, you should make hime understand that this is not acceptable to you. You should ensure all the firearms in your house are carefully locked away, and have trigger locks installed. You should also bring your concerns to the attention of his school.
7. Is your son becoming argumentative and surly in his social behaviour?
As a child enters the electronic world of hacking, he may become disaffected with the real world. He may lose the ability to control his actions, or judge the rightness or wrongness of a course of behaviour. This will manifest itself soonest in the way he treats others. Those whom he disagrees with will be met with scorn, bitterness, and even foul language. He may utter threats of violence of a real or electronic nature.
Even when confronted, your son will probably find it difficult to talk about this problem to you. He will probably claim that there is no problem, and that you are imagining things. He may tell you that it is you who has the problem, and you should "back off" and "stop smothering him." Do not allow yourself to be deceived. You are the only chance your son has, even if he doesn't understand the situation he is in. Keep trying to get through to him, no matter how much he retreats into himself.
8. Is your son obsessed with "Lunix"?
BSD, Lunix, Debian and Mandrake are all versions of an illegal hacker operation system, invented by a Soviet computer hacker named Linyos Torovoltos, before the Russians lost the Cold War. It is based on a program called "xenix", which was written by Microsoft for the US government. These programs are used by hackers to break into other people's computer systems to steal credit card numbers. They may also be used to break into people's stereos to steal their music, using the "mp3" program. Torovoltos is a notorious hacker, responsible for writing many hacker programs, such as "telnet", which is used by hackers to connect to machines on the internet without using a telephone.
Your son may try to install "lunix" on your hard drive. If he is careful, you may not notice its presence, however, lunix is a capricious beast, and if handled incorrectly, your son may damage your computer, and even break it completely by deleting Windows, at which point you will have to have your computer repaired by a professional.
If you see the word "LILO" during your windows startup (just after you turn the machine on), your son has installed lunix. In order to get rid of it, you will have to send your computer back to the manufacturer, and have them fit a new hard drive. Lunix is extremely dangerous software, and cannot be removed without destroying part of your hard disk surface.
Name:
Anonymous2006-11-11 20:00
4. Does your child read hacking manuals?
Oh boy. This one made me laugh.
Almost all of the books you listed have NOTHING TO DO WITH LEARNING TO "HACK." "Cyptonomicon" is a genuinely fascinating look at data encryption, and blends fact with a fictitious story. "Programming with PERL?" PERL is a powerful data extraction language used on machines worldwide. It is incredibly powerful for a wide range of data manipulation tasks. I would be PROUD of my child trying to master this language!
The ignorance you display here is astounding, and the fact that you suggest parents lobby to have such books removed from shelves is the most outrageous and idiotic thing I have read in your article yet.
5. How much time does your child spend using the computer each day?
YOU... ARE... A... FUCKING... IDIOT.
I spend upwards of 8 hours on my computer each day; much of this time involves my school studies, and much of it is spent communicating with my peers online and learning.
Suggesting your child is attempting to execute a Denial of Service (DOS) attack because they're spending too much time on the computer is the most illogical leap of reason I HAVE EVER HEARD. You should be ASHAMED. That's like assuming your child is planning to use his new iceskates to slit the throat of a 7-11 clerk. Get a clue!
6. Does your son use Quake?
"Quake is an online virtual reality used by hackers. It is a popular meeting place and training ground, where they discuss hacking and train in the use of various firearms." Wrong again, you moron! Quake is a GAME. Granted, Quake is a violent game, and I do not believe it is suitable for young children... but it is far from a "training ground" for hackers!
7. Is your son becoming argumentative and surly in his social behaviour?
One word: TEENAGERS.
(And of course he's going to be surly and argumentative in his behaviour if you try and approach him with the bullshit in this article! If you're going to approach him, at least be properly informed first!)
8. Is your son obsessed with "Lunix"?
It's spelled "Linux," you stupid fucking dolt.
Your total lack of research surfaces here (again). LINUX was invented by a FINNISH (not Soviet) man named LINUS TRAVOLDS (not Linyos Torovoltos) in 1991.
"Lunix" is meant for older 8-bit processors, not the machines we use today. If you had VISITED THE LINK YOU MADE, you would KNOW THIS!
Linux is also stable, free, and extremely powerful to those who know how to use it properly. It can save you time and money, and is arguably one of the best operating systems out there. If your son or daughter was able to even INSTALL it successfully, they are capable of greater things. You should encourage this exploration, not hide away in fear!
"These programs are used by hackers to break into other people's computer systems to steal credit card numbers." Uhh... what programs? Linux? Linux is an operating system, dumbass.
"They may also be used to break into people's stereos to steal their music, using the "mp3" program." That's INSANELY FUCKING MORONIC. You can't connect to a stereo to steal music! You don't even know what an MP3 is, do you?
DO SOME FUCKING RESEARCH.
MPEG Layer 3 (MP3) files are a way of storing music on a computer without taking up too much hard disk space. "MP3" is not a program... it is the set of rules and standards that define the creation and playback of MP3s.
Have you ever even used a computer?
PULL YOUR HEAD OUT OF YOUR ASS.
If your child is being challenged and engaged by his academics, he will put effort into it. He doesn't need your paranoia and misguided rantings... especially based on this non-article.
Electromagnetic radiation from monitors will not cause meningitis any more than watching TV, talking on your cell phone or listening to your hi-fi stereo will.
Yes, spending too much time on the computer could lead to an unhealthy lifestyle... but understand that this does not make computers evil or unhealthy. They might be the most powerful tool you have access to, and anyone who understands how to use them to their fullest extent will do very well for themselves in a computing career.
All things in moderation.
---
As someone who is training to make his living in technology, and someone who has had computers around all his life, I am disgusted and appalled by the quality of this article. It is, quite literally, a work of fiction.
Next time you write an article, you need to read up on your subject first so you don't:
1) misinform parents
2) make a total ass out of yourself
That being said, I would be more than happy to help you out with future articles.
"you guys are all idiots for believing, even for a second, that this article is serious. It's intended to offend morons like you and laugh at your silly, insulted, posts."
You gotta admit, there are some duuuumb people out there.
Name:
Anonymous2006-11-11 21:51
First off, this post is so full of misinformation that the only thing I can pray for is that this is a huge joke on dear Reginald's behalf and he is attempting to cause an uproar which has happened. If not;
Lord of the uninformed, thy name is T Reginald Gibbons.
First off, lets lay down a few simple facts which you have overlooked in your "expert" knowledge of all things hacker.
Numero Uno; A hacker is not someone who breaks into a computer for malious intent, but to garner information to increase his knowledge. Not to blackmail, not to destroy, hurt or intentionally harm anyone, but to learn. The definition that you have described is that of a cracker, a malious person who breaks into computers with the intent of destroying systems, information, data or stealing it to sell to others.
Number Two, the books you named in your point 4, which include "Cryptonomicon" and "Snow Crash", by Neal Stephenson are not hacker's manuals, and in fact have very little on the whole dealing with hackers, much less explaining how to do it. In your infinite wisdom if you bothered to read the books you'd understand this. They are cyberpunk FICTION, not hacker's manuals.
Number 3, It's LINUX, based off the UNIX system which never had even a passing aquaintance with the Virus you call Windows. Deleting it causes HD(Hard Drive for those of you without two brain cells) errors and harms it? Since when is this? And since when is it illegal considering 97% of all major businesses and corporations including the U.S. Government use it for backbone servers and terminals. But I forget myself in dealing with those who are unenlightened and still believe the Propaganda of Gates. You see, Linux is a stable operating system that works and doesn't malfunction, error out, crash or totally slag your system if you so much as look at it. Plus, unlike the capitalistic Microsoft Virus, it's free.
4. AMD is a superior product to your wintel systems by all definitions and designs and if your son wanted one for his system it's only to have a more powerful and more stable system.
5. Bonzi-Buddy, Comet Cursor, Flash are hacker programs? Now this is a first for me. Since when did a program to change the shape of your cursor become a hacker program? And since when did a multimedia program designed to create new visual entertainment in the web world become the tool of the dark side? As for Bonzi-Buddy, it's just an waste of HD space.
6. Apparel. Bright clothing, Pacifiers, glow-sticks. Sounds more like fetish then hacker. Glow-sticks and bright clothing are typical for those of the punk rocker, ska, or other closely related groups. Pacifiers...have yet to see those. To my knowledge, my hackers generally perfer dark colors with a catchy design emblazened across the back.
7. Accidemic decline. Hmmm...now this is an interesting one. If he preforms poorly on sports teams he must be a hacker because every all-american lad is quite adept at any number of sports from tennis to basketball to baseball, golf, bowling, soccer, racket ball, boxing, wrestling and swimming and let us not forget football and him still being the head of the debate team and the chess team. *rolls his eyes* Yes, we all are like that aren't we? *points out bitter dripping sarcasam* As for classroom achievement, perhaps, but not always, it is the teacher. In some cases it's the material presented, or the way it's presented. Sometimes it's just the class itself, or that the student is so bored with the class because he does know something more then the regular Joe Average that he slacks off. Perhaps this is a cry for attention to you the parent to notice him as a person and not as an onamental figure which you obviously do to your children. When I read your post, after throwing up my dinner, I picture you in your suburban home in america, two cars, wife, kid, etc. And when those party guests come over it's always "This is my Son Johnny who recently got an A on his history report and my daugter Susie who is the best writer in her class. Isn't that nice?" Now that is child abuse.
You say because your son is slipping in grades or didn't make first string he's associating with a high class hacker group hellbent on world domination and must be stopped no matter the cost. Here's a little bit of information for you, Mr. Average America. The chances of your child making it into a prestegious hacker group or society is less then you winning the lottery. In the world of the bit and the baud you and your son are about as adapt as a dog is as flying. And unless your child starts programming C++ in his sleep and deciphering 128bit encryption keys over breakfast chances are this isn't the case.
Next on the list: Quake. Quake is a video game created by ID Software that lets you portray the role of a person going around in first person shooting things with guns. I reiterate one word from the previous statement; GAME. If you think this is a virtual reality that is used as a common spawning pool to plot the destruction of governments you're sorely mistaken. Quake is, while I admit pointless and rather stupid, a game. The only hacking going on there is with a chainsaw. And you want to try to bring this up to your child's school? Jesus H.P. Christ in a Macintosh! What type of parent are you? Not only are you about as ignorant as a todler when it comes to things binary, you want to socially ostrasize your child, make everyone including faculty, staff and peers hate him, fear him and whisper things behind his back.
And with things like that and thinking in such ways you wonder why your child suddenly becomes defensive around you? Doesn't want you near them? Hell, I wouldn't want you near me either for fear you'll try to destroy something else of mine. But after socially killing him what is destroying his home life as well? My my...perfect parent indeed.
Do you take one lump with your hipocracy, or two?
Changing ISPS? Hmmm...lets see here...change from AOL, an ISP which takes you forever and a day to sign on to, gives you 5 minutes online then boots your sorry butt off. And you enjoy this? *rolls his eyes again* And for your information, security on AOL is about as protective as you logon password for windows. I.E. Hit Cancel. *shakes his head* AOL is one of the biggest breeding grounds for Warez Puppies and Toolz Kiddies that I have ever seen. And look up those definitions if you can't figure them out for yourself.
New hardware as a sign of a hacker. Well golly, if that's all it takes my dad must be a hacker and so must be my little brother...
I mean my dad was only in the Air Force for 20+ years serving his country as a communications tech, but now that he wants to upgrade his system to a larger harddrive to allow him to install the new games he bought he's a hacker. Wow, I'm sure he'll love that. *dry laughter* And my brother requesting more RAM for his computer so his game will play faster and quit lagging, but because of his request, he's a hacker too.
And now, reading back over some of your finer points, I again laugh hysterically.
To quote a paragraph;
"These programs are used by hackers to break into other people's computer systems to steal credit card numbers. They may also be used to break into people's stereos to steal their music, using the "mp3" program. Torovoltos is a notorious hacker, responsible for writing many hacker programs, such as "telnet", which is used by hackers to connect to machines on the internet without using a telephone."
Telnet runs on windows, is it a hacker program then too? And I'm going to break into my stero system across the room using my computer that isn't hooked up in any way to my computer much less the same power circut. Yup...sure am...gonna go crash NASDAQ with a cellphone and overthrow the government with my clock radio. *nods* Yup...sure am... right after I steal non-existant credit cards right off your system. Torovoltos is a notorious hacker? Extremely gifted programmer perhaps. Perhaps he is a hacker, if using the term as it was originally used back at MIT when computers were coded by hand each time and people developed programming shortcuts called "hacks".
And whats this about DOSing into someone's system? DOS, which is Disk Operating System, would be the stupidest thing in this modern age for someone to attempt to hack with. I mean I can remember telnet hacking alright but never DOS hacking... Ummm...the command prompt your little boy blunder is trying to hack his way into is the base underlying system of your computer.
And as for the argument in the comments about Female Hackers on a whole. There are quite a few out there, more then you would think, and as for the bit about scene whores, I've never seen that happen myself but if you have all the more power to ya. Female Hackers inferior to Male Hackers? And why is this? Because we as a society can not accept the possibility that a human without a penis is capable of doing anything better then those with one. *laughs softly to himself* Hate to tell you but I know quite a few female hackers that would send your 'puter into meltdown for the meer indication that you thought males were superior to them. While yes, there are males that are superior to them I'm sure, I'm also sure that they are superior in skill to quite a few male hackers and crackers out there.
And in conclusion of this drawnout trite discussion of the lack of intelligence brought forth in this post, I say this. If you brought your son or daughter a 'puter for christmas, and they become infatuated with how it works chances are they're not becoming hackers but learning a useful thing in today's society. Technology is growing and if you think because your child spends to much time on something they enjoy that you should cut them off, then I feel sorry for you when your child is 25 and still living at home because instead of that cushy job in Cali working for $100k a year they're stuck working at McDicks asking "Do you want fries with that?" Who do I blame on that one...bingo...you guessed it...Mom and Pop.
The chances of your child becomming a cracker, much less a hacker, are astronomical. The hacker of old, the true hacker, the keyboard cowboy, the silcon samurai is gone mostly. There are a few of the good ole boys and girls left kicking. Mostly the net, vast and infinite as it is, is filled with the Hapless Technoweenie, the Warez Kiddie, the Toolz Puppy and the Prog Pirate who just found a neat script that a real hacker took hours to program and suddenly thinks he's the next best thing to sliced bread.
Have fun Mr. and Mrs. Joe Average, and remember these simple words. The problem with the hacker isn't with your son or daughter...it's with you. It starts with you and will only end when they are rid of the likes of you. So before you go off accusing society, the internet, and everyone else, take a look in the mirrior and see if the problem really isn't with you.
Name:
Anonymous2006-11-12 0:09
/r original URL, I has forgettened it.
Name:
Anonymous2006-11-12 5:38
old troll is ooooooooooold. Not to mention inadaquate.
Please tell me you're not this dumb sir. Your son uses comet cursor to hack people, he plays quake so he can learn to shoot people? Please, just tell me you're not that dumb.
>>2,>>5 are noble but stupid, this is so obviously a troll. I can understand it could get you up to point 8 because people out there is so retarded, but man, point 8 is just too much.
Name:
Anonymous2006-11-13 11:23
>>1 8. "LUNIX" ...and even break it completely by deleting Windows...
first off a DOS attack is an attack aimed at denying someone access to some service or area, most notibly the Ping of Death attack, gaining access to someone console is not DOS you prick. Perl, and Linux are what allows you to A) have servers that are reliable(sorry M$ lovers) and B) make sysadmins life easier.
Name:
Anonymous2006-11-14 6:42
A DOS attack is when you run a virus in MS-DOS. It aims at denying someone access to some private area of haxx. The Ping of Death attack consists of playing Ping Pong with a rigged ball and hitting your opponent with it. It gives you access to his Xbox 360 while he's unconscious. Perl and Linux allow you to A) make Nature documentaries about pearls and penguins, and B) compile from source with amazing CFLAGS.
Reminds me of a final project I did in HS back when they taught QBasic... and I wrote an airline seat reservation program.
12 pages printed out, got an A on it because it works.... even though the comment on the returned printout said that the grader had no idea how it worked :D
Name:
Anonymous2006-11-17 6:57
Trolling in a legendary thread
Name:
FAIRX2006-11-17 22:35
hello im fairX the haxxor join my community of hackers if you payme enough i will give you access to a private area of haxx ;) http://forum.curse-x.com/index.php
Well that was COMPLETE BULLSHIT.
"Programming with Perl" by Timothy O'Reilly
HEY LET'S SUSPEND PROGRAMMING BOOKS.
oh my god.
I am 15.
I can code/hack.
So what? What's your problem you fkin idiot parent?
'ZOMG HAX0RZ MUST BE FREAKS AND CHILD MOLESTORS'
Yeah i forgot to say that you obviously don't know shit about hackers.
Hackers meet in Quake? W-T-F
A hacker is:
Someone intelligent
Someone who codes (and is a good coder) in many languages
Someone who obviously is smarter than you
Someone who can find your mistakes at your websites and exploit them
Name:
Hola soy LuzJustaX2006-11-18 8:53
Unanse a mi comunidad de hackeo si me pagan lo suficiente les dare acceso a un area privada de hacks ;') http://forum.curse-x.com/
Name:
Anonymous2006-11-19 8:54
>>37
1. Underage b&
2. Stop infecting /prog/ with your obvious mental deficiencies.
God-fucking-damn it every time I read this, I am working really hard to suppress my RAGE. And I thought that I am resistant to trolling.
Name:
Anonymous2008-08-13 8:02
i lold so hard i need new pants
Name:
Anonymous2008-08-13 8:38
>>46
When IRL, ignorance of this level is best countered with more "ignorance". What you do is question basically everything as if you were completely ignorant. Of course, you know already understand the correct answer to your questions before you even ask them.
The Internet is different matter though. It's best not to feed the trolls.
Name:
Anonymous2008-08-13 8:41
If you see the word "LOLI" during your windows startup
WTF? CHILD MOLESTER!
You are kidding arent you ?
Are you saying that this linux can run on a computer without windows underneath it, at all ? As in, without a boot disk, without any drivers, and without any services ?
That sounds preposterous to me.
If it were true (and I doubt it), then companies would be selling computers without a windows. This clearly is not happening, so there must be some error in your calculations. I hope you realise that windows is more than just Office ? Its a whole system that runs the computer from start to finish, and that is a very difficult thing to acheive. A lot of people dont realise this.
Microsoft just spent $9 billion and many years to create Vista, so it does not sound reasonable that some new alternative could just snap into existence overnight like that. It would take billions of dollars and a massive effort to achieve. IBM tried, and spent a huge amount of money developing OS/2 but could never keep up with Windows. Apple tried to create their own system for years, but finally gave up recently and moved to Intel and Microsoft.
Its just not possible that a freeware like the Linux could be extended to the point where it runs the entire computer fron start to finish, without using some of the more critical parts of windows. Not possible.
I think you need to re-examine your assumptions.
Name:
Anonymous2008-08-14 6:22
>>60
Вы ведь шутите, да?
Вы утверждаете что этот линукс может работать на компьютере без установленной Windows? То есть без загрузочного диска, без драйверов, без всех сервисов?
Это звучит нелепо.
Если бы это было правдой (в чем я сомневаюсь), то компании бы продавали компьютеры без Windows. Чего не происходит, значит в ваши подсчеты закралась ошибка. Я надеюсь вы понимаете, что Windows - это больше чем просто Office? Это целая система, на которой компьютер работает от включения до выключения, и ее очень сложно создать. Большое количество людей не осознают этого простого факта.
Майкрософт потратила 9 миллиардов долларов и много лет стараний на создание Висты, так что не очень похоже что какая-то новая альтернатива могла появиться из неоткуда вот так за ночь. На это потребовались бы миллиарды долларов и огромные усилия большого количества людей. IBM пыталась, и потратила много денег на разработку OS/2, но так и не смогла догнать Windows. Apple много лет пыталась создать свою систему, но наконец сдалась и недавно перешла на платформу Intel и Microsoft.
Невозможно в принципе, чтобы безсплатная программа, такая как линукс, была бы расширена до такой степени, чтобы на ней работал компьютер от начала и до конца, не пользуя некоторые критически важные части Windows. Невозможно.
Я думаю вам следует пересмотреть свои убеждения.
Ubuntu is great, and secure. But I'm on XP pro atm, for the following reasons:
1) programming. Everyone expects programs to be in windows. Also php works better on windows, theres no endless .conf files to edit
2) games. Everyone plays games
3) its just a little bit faster with gui than ubuntu. windows open up instantly.
However i do duel boot. ubuntu is great for music and ipod things. My friend put ubuntu on his parents computer, and because they are noobs they love it. no virus scanners or firewalls to fork out for. (I think this guy is serious)
HAHAHAHAHAHAHAHHAHAHAHAAHAHAAAA!!!
you think your tough huh?
one word THE FORCED INDENTATION OF CODE.
i have taken out two mission critical applications at the same time in less than 5 seconds i have been training for 3 years.
also enterprise grade best practices.
your compiler might be bigger than me,but i know mine is smarter and quicker.
my compiler is 130 kb pure lean code.
one keystroke and i'll overflow your buffers.
your the one whose a nerd.i can optimize CFLAGS anytime i want you probably haven't ever touched CFLAGS before.
you probably have sex with your computer.
you don't even know me,and you don't want to.
you'll be lucky if your even worth my attention one look at my code and you'll dissappear forever.
though i'd be hapy to humiliate you in front of all your friends.
btw IM the expertest.
i have worked in maine, new hampshire, new york,utah, colorado,florida,bahamas.
never indented my code!
im undefeated in competitive obfuscation of code.
im on my way to IOCCC.
go ahead and come step anytime you want.b*tch
If you mess with /prog/, you mess with nerds,
if you mess with nerds, you mess
withGJS
himself.
if u wanna batl
lets do it)
well crush u like a bean
bitch)))
That was EXPERT PROGRAMMER quality!
I am the 1/0 of my GET.
LISP is my body, and SICP is my blood.
I have created over 999 HUGE programs that you couldn't even comprehend.
Unaware of Python.
Nor aware of Ruby on rails.
Withstood the forced indentation of the code to create many touring-complete programs.
Waiting for an EXPERT PROGRAMMER's arrival.
I have no regrets, this was the only path.
My whole life was /prog/.
Please, stop impersonating me. Although it is flattering to have ``impersonators'', in fact, it is a very bad idea. I am pleased to talk with you all about matters of science. But please, get rid of the `cult of personality' way of thinking. It is unscientific and ultimately destructive.
It's quite possibly one of the saddest forms of abuse. Not physical, not emotional, but chemical. Yes, I'm talking about people whose mothers abused them with drugs and alcohol when they were small or even unborn children.
Did your mother switch from cheap beer to hard liquor when she found out she was pregnant with you? When you were deeply disturbed by the ending of Return of the Jedi when you were 3 years old, did she let you hit her joint and think it was funny when you choked on the weed smoke? Did your mother, when you were 4 years old, let you snort some lines off her "magic mirror" after you caught her doing the same, and get mad when you became hyper for some reason shortly thereafter?
If so, you should visit http://dis.4chan.org/prog/ Here you can share your stories of your strung-out mother and her attempts to poison you with her narcotics. It's not funny, and it's not cute. It's abuse. And it hurts.
This may sound odd, but I think my dog is Gerald Jay Sussman. It all started when I came home from work one day to find my computer with Emacs running with lisp. Odd because I turn my computer off when I leave for work. The next I came home, my computer was off, but my dog was on my couch reading SICP. I swear, he was lying there with the book open. I don't even own a copy. I took it from him and he tried to bite me. A few days later, I got a letter in my mail sent to Gerald Jay Sussman. Some university wanting him to teach a class on lisp. Another strange thing, is that when he barks, it almost sounds like he's yelling 'cudder' for some odd reason. He also somehow burned a CD with 'We conjure the spirits of the computer with our spells' song. When ever I have to take him in the car he has to play it. Can someone help me?
Name:
Anonymous2008-08-14 17:58
Please, stop impersonating me. Although it is flattering to have ``impersonators'', in fact, it is a very bad idea. I am pleased to talk with you all about matters of science. But please, get rid of the `cult of personality' way of thinking. It is unscientific and ultimately destructive.
>>65 Name: MDickie!HOXIp0gGW6 : 2009-12-27 15:23
Please continue with your "cult of personality" way of thinking; it's inspiring and ultimately constructive.
Name:
Anonymous2009-12-28 2:07
>>66
now that was delicious necromacy LISP есть Тело Мое, и SICP моя кровь.
I knew this was some sort of pasta, but ive never seen it before. all i had to do was copy this sentence:
If you pay close attention to your son's reading habits, as I > do, you will be able to determine a great deal about his opinions and hobbies.
and paste it in google. To my delight, i found a few websites with the same pasta, most of them coming from runescape forums. In conclusion, OP is indeed a faggot.
Name:
Anonymous2009-12-28 6:43
>>69
>OP is indeed a faggot
i believe he's dead already, so you better not criticise him.
Bringing /prog/ back to its people
All work and no play makes Jack a dull boy
All work and no play makes Jack a dull boy
All work and no play makes Jack a dull boy
All work and no play makes Jack a dull boy
All work and no play makes Jack a dull boy
All work and no play makes Jack a dull boy
All work and no play makes Jack a dull boy
All work and no play makes Jack a dull boy
All work and no play makes Jack a dull boy
All work and no play makes Jack a dull boy
All work and no play makes Jack a dull boy
All work and no play makes Jack a dull boy
All work and no play makes Jack a dull boy
All work and no play makes Jack a dull boy
All work and no play makes Jack a dull boy
All work and no play makes Jack a dull boy
All work and no play makes Jack a dull boy
All work and no play makes Jack a dull boy
All work and no play makes Jack a dull boy
All work and no play makes Jack a dull boy
All work and no play makes Jack a dull boy
All work and no play makes Jack a dull boy
All work and no play makes Jack a dull boy
All work and no play makes Jack a dull boy
All work and no play makes Jack a dull boy