Step 2: Go to this site: http://tinyurl.com/ynkurk
and sign up. Make sure to uncheck the box that lets them send you email offers and garbage.
Step 3: Go to the search page at that site and input any search. (internet hate machine, etc.)
Step 4: Set Firefox to autoreload the page every 5 seconds.
Step 5: ?????
Step 6: Profit! I won a $5 gift certificate in the first 15 minutes. It might take longer, but if you just set it up and leave it every day, you get tons of free shit. (Make sure to check your "My Prizes" page periodically)
Name:
Anonymous2007-11-27 4:54
How to reach SATORI without actually doing anything (well, not really)
3. try to write something EXPERT PROGRAMMER quality in Scheme.
SET YOUR BRAIN TO THINK FOR AT LEAST 15-20 SECONDS, ANY SHORTER AND THE SUSSMAN WILL DETECT YOUR SHENANIGANS AND SHUT THE DOOR TO SATORI, BE PATIENT.
4. ????
5. PROFIT! I left the thing running for a few hours, got another car (which is a cudder). Leave it up all day and reach SATORI!
Name:
Anonymous2007-11-27 5:03
>cudder
>>6
This is what happens when you try to go the discount route to satori
Name:
Anonymous2007-11-27 5:12
>>4
Hacking in the sense grown-ups use it doesn't have anything to do with breaking into computers.
Name:
Anonymous2007-11-27 6:41
>>8
The word hacker as referenced here [http://www.catb.org/hacker-emblem/] is uncommon, obsolete usage except in certain small groups. When talking about computer systems, the modern use of the verb "to hack" always involves some sort of security bypass.
>>9
It depends a lot. When someone says "kernel hacker" or "Lisp hacker", everyone who isn't a total retard understands you're talking about the non malicious kind.
Name:
Anonymous2007-11-27 10:44
>>9
Certain "small" groups, like everyone with an actual interest in computer science?
The only people who abuse the term to refer to cracking (without the qualifier of "black hat", which is a compromise most people are happy with) are the media, script kiddies, and clueless Javafags..
Name:
Anonymous2007-11-27 11:20
>>13
Yes, because you've just qualified the word with another that changes its most common meaning. Similar to the difference between, for example, "cup" and "furry cup".
Name:
Anonymous2007-11-27 11:24
>>14
Yes, that's a small group. And I know plenty of computer scientists who would associate the word primarily with computer security. Just because a small minority hang on to an archaic meaning doesn't mean that they are right and everyone else is wrong.
Name:
Anonymous2007-11-27 11:56
PROTIP: The word "hacker" was most likely coined from car mods.
Name:
Anonymous2007-11-27 12:01
/prog/ needs a BAN HAMMER for shitfuckers who can't fucking code. We're not your teacher, faggots.
the media misunderstood the meaning of hacker. they used that term to describe one that uses their technical knowledge in computer networks to get unauthorized access to some networked system.
HI, I'M PAUL GRAHAM, FOUNDER AND CEO OF Y COMBINATOR. I HAVE MADE MANY INSIGHTFUL STATEMENTS IN MY ESSAY ENTITLED "YOUR MOTHER AND THE 48 VERY SMART PEOPLE" AND WOULD LIKE TO THANK TREVOR BLACKWELL, ROBERT MORRIS AND JESSICA LIVINGSTON FOR HAVING READ DRAFTS OF THIS ESSAY, WHICH YOU WILL BE ABLE TO FIND WITH 21 OTHERS ESSAYS IN MY UPCOMING BOOK "HACKERS AND YOUR SISTER". I GUARANTEE IT.
Paul Graham has to be one of the most overrated programmers around. All he ever did was found a successful start-up, but this was in the dot-com boon when a monkey could have done the same. Lisp was tried and found lacking, I would be much more interested in an article by any of the Bell Labs guys.
Name:
Anonymous2007-11-28 9:46
Linus Torvalds has to be one of the most overrated programmers around. All he ever did was code a successful kernel, but this was in the dot-com boon when a monkey could have done the same. C was tried and found lacking, I would be much more interested in an article by any of the BSD guys.
Name:
Anonymous2007-11-28 10:26
Fatal error! Message could not be posted.
Please post threads less often!
Name:
Anonymous2007-11-28 12:55
NO CAPS NOOB!!!
Name:
Anonymous2007-11-28 13:53
sometimes when i want to explain hacking to normals i use analogies involving pretty much anything
for example, you can repair a car by reading a manual but only by understanding how and why the car works can you create your own solutions to obscure problems or even find vulnerabilities in it's construction
for example, you can use a cdr by reading SICP but only by understanding how and why your other car works can you create your own solutions to obscure problems or even find shortcuts to Satori.
Name:
Anonymous2007-11-28 15:08
for example, you can use lisp and pretend you're doing functional programming, but you can only use Haskell once you've achieved demi-godhood.