JargonFile/original/html/pt03.html
2014-03-27 18:54:56 +00:00

104 lines
17 KiB
HTML
Raw Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<html xmlns="http://www.w3.org/1999/xhtml"><head><title>Part III. Appendices</title><link rel="stylesheet" href="jargon.css" type="text/css"/><meta name="generator" content="DocBook XSL Stylesheets V1.61.0"/><link rel="home" href="index.html" title="The Jargon File"/><link rel="up" href="index.html" title="The Jargon File"/><link rel="previous" href="Z/zorkmid.html" title="zorkmid"/><link rel="next" href="appendixa.html" title="Appendix A. Hacker Folklore"/></head><body><div class="navheader"><table width="100%" summary="Navigation header"><tr><th colspan="3" align="center">Part III. Appendices</th></tr><tr><td width="20%" align="left"><a accesskey="p" href="Z/zorkmid.html">Prev</a> </td><th width="60%" align="center"> </th><td width="20%" align="right"> <a accesskey="n" href="appendixa.html">Next</a></td></tr></table><hr/></div><div class="part" lang="en"><div class="titlepage"><div><div><h1 class="title"><a id="id3140256"/>Appendices</h1></div></div><div/></div><div class="toc"><p><b>Table of Contents</b></p><dl><dt>A. <a href="appendixa.html">Hacker Folklore</a></dt><dd><dl><dt><a href="meaning-of-hack.html">The Meaning of Hack</a></dt><dt><a href="tv-typewriters.html">TV Typewriters: A Tale of Hackish Ingenuity</a></dt><dt><a href="magic-story.html">A Story About Magic'</a></dt><dt><a href="koans.html">Some AI Koans</a></dt><dd><dl><dt><a href="koans.html#id3141171">Tom Knight and the Lisp Machine</a></dt><dt><a href="koans.html#id3141202">Moon instructs a student</a></dt><dt><a href="koans.html#id3141241">Sussman attains enlightenment</a></dt><dt><a href="koans.html#id3141308">Drescher and the toaster</a></dt></dl></dd><dt><a href="os-and-jedgar.html">OS and JEDGAR</a></dt><dt><a href="story-of-mel.html">The Story of Mel</a></dt></dl></dd><dt>B. <a href="appendixb.html">A Portrait of J. Random Hacker</a></dt><dd><dl><dt><a href="appearance.html">General Appearance</a></dt><dt><a href="dress.html">Dress</a></dt><dt><a href="reading_habits.html">Reading Habits</a></dt><dt><a href="other-interests.html">Other Interests</a></dt><dt><a href="physical.html">Physical Activity and Sports</a></dt><dt><a href="education.html">Education</a></dt><dt><a href="hates.html">Things Hackers Detest and Avoid</a></dt><dt><a href="food.html">Food</a></dt><dt><a href="politics.html">Politics</a></dt><dt><a href="demographics.html">Gender and Ethnicity</a></dt><dt><a href="religion.html">Religion</a></dt><dt><a href="chemicals.html">Ceremonial Chemicals</a></dt><dt><a href="communication_style.html">Communication Style</a></dt><dt><a href="geography.html">Geographical Distribution</a></dt><dt><a href="sex.html">Sexual Habits</a></dt><dt><a href="personality.html">Personality Characteristics</a></dt><dt><a href="weaknesses.html">Weaknesses of the Hacker Personality</a></dt><dt><a href="miscellaneous.html">Miscellaneous</a></dt></dl></dd><dt>C. <a href="appendixc.html">Helping Hacker Culture Grow</a></dt><dt><a href="pt03.html#bibliography">Bibliography</a></dt></dl></div><div class="bibliography"><div class="titlepage"><div><div><h2 class="title"><a id="bibliography"/>Bibliography</h2></div></div><div/></div><p>Here are some other books you can read to help you understand the hacker
mindset.</p><div class="biblioentry"><a id="Hofstadter"/><p>[Hofstadter] <span class="title"><i>Gödel Escher Bach: An Eternal Golden Braid</i>. </span><span class="author"><span class="firstname">Douglas</span> <span class="surname">Hofstadter</span>. </span><span class="copyright">Copyright © 1979. </span><span class="publisher"><span class="publishername">Basic Books. </span></span><span class="isbn">ISBN 0-394-74502-7. </span><p>This book reads like an intellectual Grand Tour of hacker
preoccupations. Music, mathematical logic, programming, speculations
on the nature of intelligence, biology, and Zen are woven into a
brilliant tapestry themed on the concept of encoded self-reference.
The perfect left-brain companion to
<i class="citetitle">Illuminatus</i>.</p></p></div><div class="biblioentry"><a id="Shea-ampersand-Wilson"/><p>[Shea-ampersand-Wilson] <span class="title"><i>The Illuminatus! Trilogy</i>. </span><span class="authorgroup"><span class="firstname">Robert</span> <span class="surname">Shea</span> and <span class="firstname">Robert</span> <span class="othername">Anton</span> <span class="surname">Wilson</span>. </span><span class="publisher"><span class="publishername">DTP. </span></span><span class="isbn">ISBN 0440539811. </span><p>(Originally in three volumes: <i class="citetitle">The Eye in the
Pyramid</i>, <i class="citetitle">The Golden Apple</i>, and
<i class="citetitle">Leviathan</i>).</p><p>This work of alleged fiction is an incredible berserko-surrealist
rollercoaster of world-girdling conspiracies, intelligent dolphins, the fall
of Atlantis, who really killed JFK, sex, drugs, rock'n'roll, and the Cosmic
Giggle Factor. First published in three volumes, but there is now a
one-volume trade paperback, carried by most chain bookstores under SF. The
perfect right-brain companion to Hofstadter's <i class="citetitle">Göodel, Escher,
Bach</i>. See <a href="E/Eris.html"><i class="glossterm">Eris</i></a>,
<a href="D/Discordianism.html"><i class="glossterm">Discordianism</i></a>, <a href="R/random-numbers.html"><i class="glossterm">random numbers</i></a>,
<a href="C/Church-of-the-SubGenius.html"><i class="glossterm">Church of the SubGenius</i></a>.</p></p></div><div class="biblioentry"><a id="Adams"/><p>[Adams] <span class="title"><i>The Hitchhiker's Guide to the Galaxy</i>. </span><span class="author"><span class="firstname">Douglas</span> <span class="surname">Adams</span>. </span><span class="publisher"><span class="publishername">Pocket Books. </span></span><span class="copyright">Copyright © 1981. </span><span class="isbn">ISBN
0-671-46149-4. </span><p>This Monty Python in
Space spoof of SF genre traditions has been popular among
hackers ever since the original British radio show. Read it if only
to learn about Vogons (see <a href="B/bogon.html"><i class="glossterm">bogon</i></a>) and the
significance of the number 42 (see <a href="R/random-numbers.html"><i class="glossterm">random numbers</i></a>)
— and why the winningest chess program of 1990 was called
Deep Thought.</p></p></div><div class="biblioentry"><a id="Geoffrey"/><p>[Geoffrey] <span class="title"><i>The Tao of Programming</i>. </span><span class="author"><span class="firstname">James</span> <span class="surname">Geoffrey</span>. </span><span class="publisher"><span class="publishername">Infobooks. </span></span><span class="copyright">Copyright © 1987. </span><span class="isbn">ISBN 0-931137-07-1. </span><p>This gentle, funny spoof of the <i class="citetitle">Tao Te
Ching</i> contains much that is illuminating about the hacker
way of thought. “<span class="quote">When you have learned to snatch the error code
from the trap frame, it will be time for you to
leave.</span></p></p></div><div class="biblioentry"><a id="Levy"/><p>[Levy] <span class="title"><i>Hackers</i>. </span><span class="author"><span class="firstname">Steven</span> <span class="surname">Levy</span>. </span><span class="publisher"><span class="publishername">Anchor/Doubleday. </span></span><span class="copyright">Copyright © 1984. </span><span class="isbn">ISBN 0-385-19195-2. </span><p>Levy's book is at its best in describing the early MIT hackers
at the Model Railroad Club and the early days of the microcomputer revolution.
He never understood Unix or the networksthough, and his enshrinement of
Richard Stallman as “<span class="quote">the last true hacker</span>” turns out (thankfully)
to have been quite misleading. Despite being a bit dated and containing some
minor errors (many fixed in the paperback edition), this remains a useful and
stimulating book that captures the feel of several important hacker
subcultures.</p></p></div><div class="biblioentry"><a id="Kelly-Bootle"/><p>[Kelly-Bootle] <span class="title"><i>The Computer Contradictionary</i>. </span><span class="author"><span class="firstname">Stan</span> <span class="surname">Kelly-Bootle</span>. </span><span class="publisher"><span class="publishername">MIT Press. </span></span><span class="copyright">Copyright © 1995. </span><span class="isbn">ISBN 0-262-61112-0. </span><p>This pastiche of Ambrose Bierce's famous work is similar in
format to the Jargon File (and quotes several entries from TNHD-2) but
somewhat different in tone and intent. It is more satirical and less
anthropological, and is largely a product of the author's literate and quirky
imagination. For example, it defines <span class="firstterm">computer
science</span> as “<span class="quote">a study akin to numerology and astrology, but
lacking the precision of the former and the success of the latter</span>” and
<span class="firstterm">implementation</span> as “<span class="quote">The fruitless
struggle by the talented and underpaid to fulfill promises made by the rich
and ignorant</span>”; <span class="firstterm">flowchart</span> becomes
<span class="quote">to obfuscate a problem with esoteric cartoons</span>”. Revised and
expanded from <i class="citetitle">The Devil's DP Dictionary</i>, McGraw-Hill
1981, ISBN 0-07-034022-6; that work had some stylistic influence on
TNHD-1.</p></p></div><div class="biblioentry"><a id="Jennings"/><p>[Jennings] <span class="title"><i>The Devouring Fungus: Tales from the Computer Age</i>. </span><span class="author"><span class="firstname">Karla</span> <span class="surname">Jennings</span>. </span><span class="publisher"><span class="publishername">Norton. </span></span><span class="copyright">Copyright © 1990. </span><span class="isbn">ISBN 0-393-30732-8. </span><p>The author of this pioneering compendium knits together a
great deal of computer- and hacker-related folklore with good writing and a
few well-chosen cartoons. She has a keen eye for the human aspects of the
lore and is very good at illuminating the psychology and evolution of
hackerdom. Unfortunately, a number of small errors and awkwardnesses suggest
that she didn't have the final manuscript checked over by a native speaker;
the glossary in the back is particularly embarrassing, and at least one
classic tale (the Magic Switch story, retold here under <a href="magic-story.html" title="A Story About Magic'">A Story About Magic</a> in Appendix A) is given in
incomplete and badly mangled form. Nevertheless, this book is a win overall
and can be enjoyed by hacker and non-hacker alike.</p></p></div><div class="biblioentry"><a id="Kidder"/><p>[Kidder] <span class="title"><i>The Soul of a New Machine</i>. </span><span class="author"><span class="firstname">Tracy</span> <span class="surname">Kidder</span>. </span><span class="publisher"><span class="publishername">Avon. </span></span><span class="copyright">Copyright © 1982. </span><span class="isbn">ISBN 0-380-59931-7. </span><p>This book (a 1982 Pulitzer Prize winner) documents the
adventure of the design of a new Data General computer, the MV-8000 Eagle. It
is an amazingly well-done portrait of the hacker mindset — although
largely the hardware hacker — done by a complete outsider. It is a bit
thin in spots, but with enough technical information to be entertaining to the
serious hacker while providing non-technical people a view of what day-to-day
life can be like — the fun, the excitement, the disasters. During one
period, when the microcode and logic were glitching at the nanosecond level,
one of the overworked engineers departed the company, leaving behind a note on
his terminal as his letter of resignation: “<span class="quote">I am going to a commune in
Vermont and will deal with no unit of time shorter than a
season.</span></p></p></div><div class="biblioentry"><a id="Libes"/><p>[Libes] <span class="title"><i>Life with UNIX: a Guide for Everyone</i>. </span><span class="author"><span class="firstname">Don</span> <span class="surname">Libes</span>. </span><span class="author"><span class="firstname">Sandy</span> <span class="surname">Ressler</span>. </span><span class="publisher"><span class="publishername">Prentice-Hall. </span></span><span class="copyright">Copyright © 1989. </span><span class="isbn">ISBN 0-13-536657-7. </span><p>The authors of this book set out to tell you all the things
about Unix that tutorials and technical books won't. The result is gossipy,
funny, opinionated, downright weird in spots, and invaluable. Along the way
they expose you to enough of Unix's history, folklore and humor to qualify as
a first-class source for these things. Because so much of today's hackerdom
is involved with Unix, this in turn illuminates many of its in-jokes and
preoccupations.</p></p></div><div class="biblioentry"><a id="Vinge"/><p>[Vinge] <span class="title"><i>True Names ... and Other Dangers</i>. </span><span class="author"><span class="firstname">Vernor</span> <span class="surname">Vinge</span>. </span><span class="publisher"><span class="publishername">Baen Books. </span></span><span class="copyright">Copyright © 1987. </span><span class="isbn">ISBN 0-671-65363-6. </span><p>Hacker demigod Richard Stallman used to say that the title
story of this book “<span class="quote">expresses the spirit of hacking best</span>”. Until
the subject of the next entry came out, it was hard to even nominate another
contender. The other stories in this collection are also fine work by an
author who has since won multiple Hugos and is one of today's very best
practitioners of hard SF.</p></p></div><div class="biblioentry"><a id="Stephenson"/><p>[Stephenson] <span class="title"><i>Snow Crash</i>. </span><span class="author"><span class="firstname">Neal</span> <span class="surname">Stephenson</span>. </span><span class="publisher"><span class="publishername">Bantam. </span></span><span class="copyright">Copyright © 1992. </span><span class="isbn">ISBN 0-553-56261-4. </span><p>Stephenson's epic, comic cyberpunk novel is deeply knowing
about the hacker psychology and its foibles in a way no other author of
fiction has ever even approached. His imagination, his grasp of the relevant
technical details, and his ability to communicate the excitement of hacking
and its results are astonishing, delightful, and (so far)
unsurpassed.</p></p></div><div class="biblioentry"><a id="Markoff-ampersand-Hafner"/><p>[Markoff-ampersand-Hafner] <span class="title"><i>Cyberpunk: Outlaws and Hackers on the Computer Frontier</i>. </span><span class="author"><span class="firstname">Katie</span> <span class="surname">Hafner</span>. </span><span class="author"><span class="firstname">John</span> <span class="surname">Markoff</span>. </span><span class="publisher"><span class="publishername">Simon &amp;
Schuster. </span></span><span class="copyright">Copyright © 1991. </span><span class="isbn">ISBN 0-671-68322-5. </span><p> This book gathers narratives about the careers of three
notorious crackers into a clear-eyed but sympathetic portrait of hackerdom's
dark side. The principals are Kevin Mitnick, “<span class="quote">Pengo</span>” and
<span class="quote">Hagbard</span>” of the Chaos Computer Club, and Robert T. Morris (see
<a href="R/RTM.html"><i class="glossterm">RTM</i></a>, sense 2). Markoff and Hafner focus as much on
their psychologies and motivations as on the details of their exploits, but
don't slight the latter. The result is a balanced and fascinating account,
particularly useful when read immediately before or after Cliff Stoll's <a href="pt03.html#Stoll">The Cuckoo's Egg</a>. It is especially instructive to
compare RTM, a true hacker who blundered, with the sociopathic phone-freak
Mitnick and the alienated, drug-addled crackers who made the Chaos Club
notorious. The gulf between <a href="W/wizard.html"><i class="glossterm">wizard</i></a> and
<a href="W/wannabee.html"><i class="glossterm">wannabee</i></a> has seldom been made more
obvious.</p></p></div><div class="biblioentry"><a id="Stoll"/><p>[Stoll] <span class="title"><i>The Cuckoo's Egg</i>. </span><span class="author"><span class="firstname">Clifford</span> <span class="surname">Stoll</span>. </span><span class="publisher"><span class="publishername">Doubleday. </span></span><span class="copyright">Copyright © 1989. </span><span class="isbn">ISBN 0-385-24946-2. </span><p>Clifford Stoll's absorbing tale of how he tracked Markus Hess
and the Chaos Club cracking ring nicely illustrates the difference between
hacker' and cracker'. Stoll's portrait of himself, his lady
Martha, and his friends at Berkeley and on the Internet paints a marvelously
vivid picture of how hackers and the people around them like to live and how
they think.</p></p></div></div></div><div class="navfooter"><hr/><table width="100%" summary="Navigation footer"><tr><td width="40%" align="left"><a accesskey="p" href="Z/zorkmid.html">Prev</a> </td><td width="20%" align="center"><a accesskey="u" href="index.html">Up</a></td><td width="40%" align="right"> <a accesskey="n" href="appendixa.html">Next</a></td></tr><tr><td width="40%" align="left" valign="top">zorkmid </td><td width="20%" align="center"><a accesskey="h" href="index.html">Home</a></td><td width="40%" align="right" valign="top"> Appendix A. Hacker Folklore</td></tr></table></div></body></html>