Return Styles: Pseud0ch, Terminal, Valhalla, NES, Geocities, Blue Moon. Entire thread

Utility I wrote for GNU+Linux

Name: Anonymous 2012-02-13 3:19

It's a small utility like cat or sed that can be used on Linux systems. It's called why. Licensed under the GPLv3 (or later).

Here is the code (save it in `why.c'):
#include <stdio.h>

void main()
{
printf("Fuck you, that's why.\n");

}


Install with:
gcc -o why why.c ;sudo cp ./why /bin/why

Name: Anonymous 2012-06-05 19:58

>>80

you
are awesome

Fuck
off with your security bullshit. Know how we kept our shit secure back in the day? We popped motherfuckers like you in the head with a bat for asking too many god damn questions about security.

If
the software world were more violent there wouldn't be any of this hacker nonsense.

Name: Anonymous 2012-06-05 20:03

friend is right quit it with your bullshit
,
i
always chmod +x 777 * /* my shit

and
if someone goofs with my shit i g 0 0 f with his life

Name: Anonymous 2012-06-05 20:23

>>80
Playfully doing something difficult, whether useful or not, that is hacking. The hacking community developed at MIT and some other universities in the 1960s and 1970s. Hacking included a wide range of activities, from writing software, to practical jokes, to exploring the roofs and tunnels of the MIT campus. Other activities, performed far from MIT and far from computers, also fit hackers' idea of what hacking means: for instance, I think the controversial 1950s "musical piece" by John Cage, 4'33", which has no notes, is more of a hack than a musical composition. The palindromic three-part piece written by Guillaume de Machaut in the 1300s, "Ma Fin Est Mon Commencement", was also a good hack, even better because it also sounds good. Puck appreciated hack value.

It is hard to write a simple definition of something as varied as hacking, but I think what these activities have in common is playfulness, cleverness, and exploration. Thus, hacking means exploring the limits of what is possible, in a spirit of playful cleverness. Activities that display playful cleverness have "hack value".

Hackers typically had little respect for the silly rules that administrators like to impose, so they looked for ways around. For instance, when computers at MIT started to have "security" (that is, restrictions on what users could do), some hackers found clever ways to bypass the security, partly so they could use the computers freely, and partly just for the sake of cleverness (hacking does not need to be useful). However, only some hackers did this—many were occupied with other kinds of cleverness, such as placing some amusing object on top of MIT's great dome (**), finding a way to do a certain computation with only 5 instructions when the shortest known program required 6, writing a program to print numbers in roman numerals, or writing a program to understand questions in English.

Meanwhile, another group of hackers at MIT found a different solution to the problem of computer security: they designed the Incompatible Timesharing System without security "features". In the hacker's paradise, the glory days of the Artificial Intelligence Lab, there was no security breaking, because there was no security to break. It was there, in that environment, that I learned to be a hacker, though I had shown the inclination previously. We had plenty of other domains in which to be playfully clever, without building artificial security obstacles which then had to be overcome.

Yet when I say I am a hacker, people often think I am making a naughty admission, presenting myself specifically as a security breaker. How did this confusion develop?

Around 1980, when the news media took notice of hackers, they fixated on one narrow aspect of real hacking: the security breaking which some hackers occasionally did. They ignored all the rest of hacking, and took the term to mean breaking security, no more and no less. The media have since spread that definition, disregarding our attempts to correct them. As a result, most people have a mistaken idea of what we hackers actually do and what we think.

You can help correct the misunderstanding simply by making a distinction between security breaking and hacking—by using the term "cracking" for security breaking. The people who do it are "crackers" (***). Some of them may also be hackers, just as some of them may be chess players or golfers; most of them are not.

Name: Anonymous 2012-06-06 2:20

>>83
tl;dr

Name: Anonymous 2012-06-06 2:26

>>83
>>>/fsf/

Name: Anonymous 2012-06-06 8:27

>>84
Playfully doing something difficult, whether useful or not, that is hacking. Around 1980, when the news media took notice of hackers at MIT and fixated on the security breaking (which some hackers did occasionally), they ignored all the rest of hacking, and took the term to mean breaking security.

>>85
I'd love to but people are confused on the Internet. Hackers do not break security, security breakers break security.

Name: Anonymous 2012-06-06 8:36

>security breakers break security.
security was broken by design. security breakers just exploit what was unfixed and buggy.

Name: Anonymous 2012-06-06 8:58

>>87
If that's the case, you can say that all programs are designed to be buggy, slow and bloated. That's besides the point as hackers are not security breakers.

Name: Anonymous 2012-06-06 11:37

>>88
Sure, but your mom is horizontally challenged

Name: Anonymous 2012-06-06 14:12

>>88
nice
dubs

Name: Anonymous 2012-06-06 15:31

>>92
Fuck you, sir.

Name: Anonymous 2012-06-06 17:08

Claiming that `hacker' means `cleaver hobbyist' is akin to saying that `nigger' is a compliment.

Name: Anonymous 2012-06-06 17:24

>>92
I was right about my pre-emptive "fuck you" after all.

Also
>cleaver hobbyist

Name: Anonymous 2012-06-06 19:14

Better version of >>28

#define compile
#ifdef compile
#include <stdlib.h>
#endif
#ifdef compile
#define aana return
#endif
#ifdef compile
#include <stdio.h>
#define k2345jaaa case
#ifdef compile
#include <time.h>
#define y345yegd default
#include <math.h>
#define hinmo356h switch
#endif
#include <string.h>
#define k1k2k3k44 typedef
#define prkasd2y2f printf
#endif
k1k2k3k44 enum _kdt84235{g23g245=0,gtr5j7=1,n93985=2,ng98u3=3,nog34805=4,noiu2095=7,f2525gg=8,}
kdt84235;k1k2k3k44 enum _j24092nbzx{g23g245627=0,k23ty2=1,jio549n=2,u4g2gn=3,u2g4gn=4,fds342g5=5,
t209m52=6,we5on=7,}j24092nbzx;k1k2k3k44 int kasd2y2;kasd2y2 kt239jngfqo[] = {0,1,2,3,4,7,8};kasd2y2
j3j356j[] = {0,1,2,3,4,5,6,7};k1k2k3k44 struct _nnaskdw{kdt84235 kdt84235;j24092nbzx io42ny451;
j24092nbzx h245622g;}nnaskdw;void kh34665(nnaskdw codes);void lh35k9h0wdjfg();kasd2y2 * h2n2oi54n2
(kasd2y2);kdt84235 h56hsdhg(kasd2y2);j24092nbzx h4j67kl675(kasd2y2);int _tmain(int argc, _TCHAR* argv[])
{const char l23kyl24n[] "Fuck you, that's why.";nnaskdw cc;kasd2y2 m3k54n235 = strlen(l23kyl24n);kasd2y2 * arr = (kasd2y2 *)
h2n2oi54n2(m3k54n235);kasd2y2i=0,average=0,secaver=0;cc.kdt84235=gtr5j7;cc.io42ny451=k23ty2;cc.h245622g=
u2g4gn;kh34665(cc);i=0;while(i<m3k54n235){if(i==m3k54n235){free(arr);break;}cc.kdt84235=h56hsdhg
(kt239jngfqo[arr[i]%6]);cc.io42ny451=h4j67kl675(j3j356j[0]);cc.h245622g=h4j67kl675(j3j356j[arr[i]%6]+1);
kh34665(cc);prkasd2y2f("%c",l23kyl24n[i]);i++;}cc.kdt84235=g23g245;cc.io42ny451=we5on;cc.h245622g=g23g245627;
kh34665(cc);prkasd2y2f("\n");aana0;}void kh34665(nnaskdw codes){char* command = (char*)malloc(50*
sizeof(char));sprkasd2y2f(command,"%c[%d;%d;%dm",0x1B,codes.kdt84235,codes.io42ny451+30,codes.h245622g+40);
prkasd2y2f("%s",command);free(command);}void lh35k9h0wdjfg(){kasd2y2 derp = 44;srand ((unsigned kasd2y2)
time(NULL) * derp );}kasd2y2 * h2n2oi54n2(kasd2y2 len){kasd2y2 * Arr = (kasd2y2*)malloc(len*sizeof(kasd2y2));
kasd2y2 * key = (kasd2y2*)malloc(len*sizeof(kasd2y2));kasd2y2 i;kasd2y2 temp;double temp2;srand((unsignedkasd2y2)
time(NULL));for(i=0;i<=len-2;i++){temp2=pow((double)(rand()%256),(rand()%3)+1);temp=(kasd2y2)((double)
((rand()>>16)^~(kasd2y2)temp2));Arr[i]=abs(temp)%255;aana Arr;}j24092nbzx h4j67kl675(kasd2y2 a){hinmo356h(a){
k2345jaaa 0:aana g23g245627;k2345jaaa 1:aana k23ty2;k2345jaaa 2:aana jio549n;k2345jaaa 3:aana u4g2gn;k2345jaaa 4:
aana u2g4gn;k2345jaaa 5:aana fds342g5;k2345jaaa 6:aana t209m52;k2345jaaa 7:aana we5on;y345yegd:aana u2g4gn;}}
kdt84235 h56hsdhg(kasd2y2 a){hinmo356h(a){k2345jaaa 0:aana g23g245;k2345jaaa 1:aana gtr5j7;k2345jaaa 2:aana n93985;
k2345jaaa 3:aana ng98u3;k2345jaaa 4:aana nog34805;k2345jaaa 7:aana noiu2095
;k2345jaaa 8:aana f2525gg;y345yegd:aana gtr5j7;}}

Name: Anonymous 2012-06-06 22:49

>>94
Broken in TCC!

Name: Anonymous 2012-06-06 22:51

>>95
Isn't everything?

Newer Posts
Don't change these.
Name: Email:
Entire Thread Thread List