[169736] in North American Network Operators' Group
Re: How to catch a cracker in the US?
daemon@ATHENA.MIT.EDU (Joe Loiacono)
Thu Mar 13 15:29:41 2014
In-Reply-To: <6582.1394734174@turing-police.cc.vt.edu>
To: Valdis.Kletnieks@vt.edu
From: Joe Loiacono <jloiacon@csc.com>
Date: Thu, 13 Mar 2014 15:29:14 -0400
Cc: North American Network Operators Group <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org
Another use of 'hacking' has been around in software for awhile ...
Newsgroups: comp.lang.perl.misc
Subject: Re: Who is Just another Perl hacker?
From: merlyn@stonehenge.com (Randal L. Schwartz)
Message-ID: <M1HFPVH2JQ.FSF@HALFDOME.HOLDIT.COM>
>>>>> "Juho" == Juho Cederstrom writes:
Juho> But when do I become Just another Perl hacker? Who are they? I've
read
Juho> the FAQ, but it doesn't answer my question. If I replace my email
Juho> signature with JAPH, do I break some kind of law?
Juho> Or is Just another Perl Hacker a person who just hacks Perl?
Well, this ol' JAPH thing started back in 88-ish when I was posting to
a bunch of different newsgroups, and would sign each message somewhat
individualized above the "-- " cut. For a while, it was stuff like:
Valdis.Kletnieks@vt.edu wrote on 03/13/2014 02:09:34 PM:
> To the contrary - there was a period of time when "hacker" included
those who
> were responsible for creative hacks that followed the rules *as they
actually
> were*, not as they were generally believed to be.