JargonFile/original/html/miscellaneous.html
2014-03-27 18:54:56 +00:00

8 lines
2.1 KiB
HTML
Raw Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<html xmlns="http://www.w3.org/1999/xhtml"><head><title>Miscellaneous</title><link rel="stylesheet" href="jargon.css" type="text/css"/><meta name="generator" content="DocBook XSL Stylesheets V1.61.0"/><link rel="home" href="index.html" title="The Jargon File"/><link rel="up" href="appendixb.html" title="Appendix B. A Portrait of J. Random Hacker"/><link rel="previous" href="weaknesses.html" title="Weaknesses of the Hacker Personality"/><link rel="next" href="appendixc.html" title="Appendix C. Helping Hacker Culture Grow"/></head><body><div class="navheader"><table width="100%" summary="Navigation header"><tr><th colspan="3" align="center">Miscellaneous</th></tr><tr><td width="20%" align="left"><a accesskey="p" href="weaknesses.html">Prev</a> </td><th width="60%" align="center">Appendix B. A Portrait of J. Random Hacker</th><td width="20%" align="right"> <a accesskey="n" href="appendixc.html">Next</a></td></tr></table><hr/></div><div class="sect1" lang="en"><div class="titlepage"><div><div><h2 class="title" style="clear: both"><a id="miscellaneous"/>Miscellaneous</h2></div></div><div/></div><p>Hackers are more likely to have cats than dogs (in fact, it is widely
grokked that cats have the hacker nature). Many drive incredibly decrepit
heaps and forget to wash them; richer ones drive spiffy Porsches and RX-7s and
then forget to have them washed. Almost all hackers have terribly bad
handwriting, and often fall into the habit of block-printing everything like
junior draftsmen.</p></div><div class="navfooter"><hr/><table width="100%" summary="Navigation footer"><tr><td width="40%" align="left"><a accesskey="p" href="weaknesses.html">Prev</a> </td><td width="20%" align="center"><a accesskey="u" href="appendixb.html">Up</a></td><td width="40%" align="right"> <a accesskey="n" href="appendixc.html">Next</a></td></tr><tr><td width="40%" align="left" valign="top">Weaknesses of the Hacker Personality </td><td width="20%" align="center"><a accesskey="h" href="index.html">Home</a></td><td width="40%" align="right" valign="top"> Appendix C. Helping Hacker Culture Grow</td></tr></table></div></body></html>