Redo Real Programmer

This commit is contained in:
Bob Mottram 2018-12-24 12:55:36 +00:00
parent 07c42d1d35
commit 24404630f5
4 changed files with 18 additions and 33 deletions

Binary file not shown.

View File

@ -18,7 +18,7 @@ Free Documentation License".
</p>
<H2>Generated</H2>
<p>
This file last generated Sunday, 02 December 2018 12:16PM UTC
This file last generated Monday, 24 December 2018 12:25PM UTC
</p>
<H2>Glossary</H2>
@ -3819,10 +3819,6 @@ This file last generated Sunday, 02 December 2018 12:16PM UTC
<p>
[aka "CC"] A set of public licenses similar in spirit to copyleft or open source licenses but whose application is to works other than software, such as documentation, artwork, audio and video content. Creative commons represents the permeation of ideas which began in the free software movement into other areas of society.
</p>
<H4>credential stuffing</H4>
<p>
To maliciously gain access to user accounts by trying lots of usernames and passwords, which are derrived either from lists of commonly used passwords or obtained from previous database leaks. The attacker uses the often valid heuristic that many users will often use the same login credentials on lots of different sites or is just lazy and uses an easy to guess login, such as their email username and password123.
</p>
<H4>creep</H4>
<p>1. v. To advance, grow, or multiply inexorably. In hackish usage this verb has overtones of menace and silliness, evoking the creeping horrors of low-budget monster movies. </p>

View File

@ -19,7 +19,7 @@ Free Documentation License".
* Generated
This file last generated Sunday, 02 December 2018 12:16PM UTC
This file last generated Monday, 24 December 2018 12:25PM UTC
* Glossary
** (
@ -3201,9 +3201,6 @@ n. The (false) belief that large, innovative software designs can be completely
*** creative commons
[aka "CC"] A set of public licenses similar in spirit to copyleft or open source licenses but whose application is to works other than software, such as documentation, artwork, audio and video content. Creative commons represents the permeation of ideas which began in the free software movement into other areas of society.
*** credential stuffing
To maliciously gain access to user accounts by trying lots of usernames and passwords, which are derrived either from lists of commonly used passwords or obtained from previous database leaks. The attacker uses the often valid heuristic that many users will often use the same login credentials on lots of different sites or is just lazy and uses an easy to guess login, such as their email username and password123.
*** creep
1. v. To advance, grow, or multiply inexorably. In hackish usage this verb has overtones of menace and silliness, evoking the creeping horrors of low-budget monster movies.

View File

@ -1,27 +1,19 @@
Real Programmer
n. [indirectly, from the book Real Men Don't Eat Quiche ] A particular
sub-variety of hacker: one possessed of a flippant attitude toward
complexity that is arrogant even when justified by experience. The
archetypal Real Programmer likes to program on the bare metal and is very
good at same, remembers the binary opcodes for every machine he has ever
programmed, thinks that HLLs are sissy, and uses a debugger to edit his code
because full-screen editors are for wimps. Real Programmers aren't satisfied
with code that hasn't been tuned into a state of tense ness just short of
rupture. Real Programmers never use comments or write documentation: If it
was hard to write , says the Real Programmer, it should be hard to
understand. Real Programmers can make machines do things that were never in
their spec sheets; in fact, they are seldom really happy unless doing so. A
Real Programmer's code can awe with its fiendish brilliance, even as its
crockishness appalls. Real Programmers live on junk food and coffee, hang
line-printer art on their walls, and terrify the crap out of other
programmers because someday, somebody else might have to try to understand
their code in order to change it. Their successors generally consider it a
Good Thing that there aren't many Real Programmers around any more. For a
famous (and somewhat more positive) portrait of a Real Programmer, see The
Story of Mel' in Appendix A. The term itself was popularized by a letter to
the editor in the July 1983 Datamation titled Real Programmers Don't Use
Pascal by Ed Post, still circulating on Usenet and Internet in on-line form.
Typing Real Programmers Don't Use Pascal into a web search engine should
turn up a copy.
n. [indirectly, from the book Real Men Don't Eat Quiche] A particular
sub-variety of hacker, having an over-inflated opinion of their own
skills. Also see the Dunning-Kruger effect from psychology. Real
Programmer etiquette requires constantly demanding that
"Real Programmers do X", where X is something like coding directly
in binary or being able to understand ridiculous regexes.
A modern incarnation of the Real Programmer phenomena is the so-called
"brogrammer", who tries to mask a deficit in skills with absurd levels
of machismo and obsessions with personal status or irrelevant
qualifications.
An article called "Real Programmers Don't Use Pascal" by Ed Post
appeared in a 1982 edition of Datamation. It parodied the style of
the "Real Men" book with an outrageous and highly misogynistic description
of Fortran programmers forgetting their wives names and refusing to
wear high heels.