From f66f609f77232113ee94f952dce6e4cad0e1e91f Mon Sep 17 00:00:00 2001 From: Bob Mottram Date: Tue, 16 Oct 2018 14:26:19 +0100 Subject: [PATCH] Line length --- entries/Personality Characteristics.txt | 3 +-- entries/personal surveillance device.txt | 3 ++- 2 files changed, 3 insertions(+), 3 deletions(-) diff --git a/entries/Personality Characteristics.txt b/entries/Personality Characteristics.txt index 8320312..c6efa3e 100644 --- a/entries/Personality Characteristics.txt +++ b/entries/Personality Characteristics.txt @@ -3,7 +3,7 @@ Personality Characteristics Contrary to stereotype, hackers are not usually intellectually narrow; they tend to be interested in any subject that can provide mental stimulation, and can often discourse knowledgeably and even interestingly on any number -of obscure subjects if you can get them to talk at all, as opposed to, say, +of obscure subjects if you can get them to talk at all, as opposed to, say, going back to their hacking. It is noticeable (and contrary to many outsiders' expectations) that the better a hacker is at hacking, the more likely he or she is to have outside interests at which he or she is more @@ -25,4 +25,3 @@ psychometric systems, hackerdom appears to concentrate the relatively rare INTJ and INTP types; that is, introverted, intuitive, and thinker types (as opposed to the extroverted-sensate personalities that predominate in the mainstream culture). - diff --git a/entries/personal surveillance device.txt b/entries/personal surveillance device.txt index 2dce923..036bfbe 100644 --- a/entries/personal surveillance device.txt +++ b/entries/personal surveillance device.txt @@ -1,3 +1,4 @@ personal surveillance device -Alternative name for a mobile phone, due to their extensive personal data collection and exfiltration capabilities. +Alternative name for a mobile phone, due to their extensive personal data +collection and exfiltration capabilities.