No subscription or hidden extras
Read through the most famous quotes by topic #hacker
I think all artists struggle to represent the geometry of life in their own way, just like writers deal with archetypes. There are only so many stories that you can tell, but an infinite number of storytellers. ↗
It is only the inadequacy of the criminal code that saves the hackers from very serious prosecution. ↗
... there was one new metallic monstrosity stacked in one corner that she hadn’t seen the last time she was a visitor to his strange chamber, it appeared to be a mass of hard drives all fused together, but they looked too sophisticated to be merely hard drives. “What on earth is that?” “That’s my Kung Fu,” he said proudly, patting the top of the futuristic-looking stack. “Is that what you wanted to show me?” “No, but it’s impressive, isn’t it?” “If you say so.” Steves sighed and shook his head, so few people could appreciate the intellectual complexity of an almost untraceable hacking device. ↗
#computers #funny #geek #geek-humor #humor
Dear 2600: I think my girlfriend has been cheating on me and I wanted to know if I could get her password to Hotmail and AOL. I am so desperate to find out. Any help would be appreciated. Thanks. And this is yet another popular category of letter we get. You say any help would be appreciated? Let’s find out if thats true. Do you think someone who is cheating on you might also be capable of having a mailbox you don’t know about? Do you think that even if you could get into the mailbox she uses that she would be discussing her deception there, especially if we live in a world where Hotmail and AOL passwords are so easily obtained? Finally, would you feel better if you invaded her privacy and found out that she was being totally honest with you? Whatever problems are going on in this relationship are not going to be solved with subterfuge. If you can’t communicate openly, there’s not much there to salvage. ↗
A critical factor in its success was that the X developers were willing to give the sources away for free in accordance with the hacker ethic, and able to distribute them over the Internet. ↗