Return Styles: Pseud0ch, Terminal, Valhalla, NES, Geocities, Blue Moon. Entire thread

HACKER or CODE MONKEY

Name: Anonymous 2011-05-18 20:28

Are you a HACKER or CODE MONKEY!?

HACKERS use C, Lisp, and Perl.
CODE MONKEYS use C++, Python, and Java.

HACKERS use emacs and vi.
CODE MONKEYS use Notepad++, Eclipse, VS, and XCode.

But BOTH are better than WEB DEVELOPERS, because WEB DEVELOPERS use PHP and Notepad!

Name: Anonymous 2011-05-20 10:47

>>23
Yeah, it's not rocket surgery. Try this: ssh localhost /bin/sh, authenticate and see how usable your terminal is. Now, try this instead: ssh -t localhost /bin/sh.

Big difference. I admin a bunch of boxes that must be connected to via some kind of ssh proxy that seems to invoke the shell as a command, but doesn't indicate it wants a tty.

Long story short: your incredulity puts you in the same class as the genius who setup the broken proxy in the first place.

Newer Posts
Don't change these.
Name: Email:
Entire Thread Thread List