サクサク読めて、アプリ限定の機能も多数!
トップへ戻る
衆院選
www.catb.org/~esr
random numbers: n. When one wishes to specify a large but random number of things, and the context is inappropriate for N, certain numbers are preferred by hacker tradition (that is, easily recognized as placeholders). These include the following: Long described at MIT as ‘the least random number’; see also 23. This may be Discordian in origin, or it may be related to some in-jokes about 17 and “y
www.catb.org
A notorious ‘second-system effect‘ often afflicts the successors of small experimental prototypes. The urge to add everything that was left out the first time around all too frequently leads to huge and overcomplicated design. Less well known, because less common, is the ‘third-system effect’; sometimes, after the second system has collapsed of its own weight, there is a chance to go back to simpl
One fine day in January 2017 I was reminded of something I had half-noticed a few times over the previous decade. That is, younger hackers don’t know the bit structure of ASCII and the meaning of the odder control characters in it. This is knowledge every fledgling hacker used to absorb through their pores. It’s nobody’s fault this changed; the obsolescence of hardware terminals and the near-obsol
The “hacking” we'll be talking about in this document is exploratory programming in an open-source environment. If you think “hacking” has anything to do with computer crime or security breaking and came here to learn that, you can go away now. There's nothing for you here. Translations of this document are available in: Hungarian Hacking is primarily[1] a style of programming, and following the r
The project repository is at https://gitlab.com/esr/src. If you appreciate this code (and especially if you make money by using it) please support me on Patreon. Recent Changes Repair the src list -f case that Emacs VC uses. Supporters This work is funded by... My Bronze supporters: Martin Hohenberg, Jae Yang, Daniel Garber, Kyle Burkholder, Mike Nichols, Mark Ping, Tom Taylor, Arnold F. Williams,
The project repository is at https://gitlab.com/esr/reposurgeon. Project statistics are available at OpenHub. This is packaged for Debian and derivatives as: reposurgeon There is a project IRC channel. If you appreciate this code (and especially if you make money by using it) please support me on Patreon. Recent Changes Improve repotool documentation. All documentation is spellchecked. Supporters
This page is about a technique for reducing the memory footprint of programs in compiled languages with C-like structures - manually repacking these declarations for reduced size. To read it, you will require basic knowledge of the C programming language. You need to know this technique if you intend to write code for memory-constrained embedded systems, or operating-system kernels. It is useful i
(i) Make each program do one thing well. To do a new job, build afresh rather than complicate old programs by adding new features. (ii) Expect the output of every program to become the input to another, as yet unknown, program. Don't clutter output with extraneous information. Avoid stringently columnar or binary input formats. Don't insist on interactive input. (iii) Design and build software, ev
This book and its on-line version are distributed under the terms of the Creative Commons Attribution-NoDerivs 1.0 license, with the additional proviso that the right to publish it on paper for sale or other for-profit use is reserved to Pearson Education, Inc. A reference copy of this license may be found at http://creativecommons.org/licenses/by-nd/1.0/legalcode. AIX, AS/400, DB/2, OS/2, System/
Link to "Things Every Hacker Once Knew." Mention USB-stick distros. Many updated translation links.
The GPSD project pages are now on GitLab. If you keep links to them, please adjust accordingly. You should be automatically redirected to the current location of hardware.html in 5 seconds. If you are not, go here: https://gpsd.gitlab.io/gpsd/hardware.html
Translations: Brazilo-Portuguese Chinese (Traditional) Czech Dutch Estonian French Georgian German Greek Hindi Hungarian Indonesion Japanese Lithuanian Polish Portuguese Russian Spanish Ukrainian Uzbek If you want to copy, mirror, translate, or excerpt this document, please see my copying policy. Many project websites link to this document in their sections on how to get help. That's fine, it's th
You can browse my newest book here. If you like it, please order a paper copy. You can get it from Amazon or Barnes & Noble, or direct from Addison-Wesley. Why this book? The Art of Unix Programming attempts to capture the engineering wisdom and philosophy of the Unix community as it's applied today — not merely as it has been written down in the past, but as a living "special transmission, outsid
This book and its on-line version are distributed under the terms of the Creative Commons Attribution-NoDerivs 1.0 license, with the additional proviso that the right to publish it on paper for sale or other for-profit use is reserved to Pearson Education, Inc. A reference copy of this license may be found at http://creativecommons.org/licenses/by-nd/1.0/legalcode.
Unix tradition encourages the use of command-line switches to control programs, so that options can be specified from scripts. This is especially important for programs that function as pipes or filters. Three conventions for how to distinguish command-line options from ordinary arguments exist; the original Unix style, the GNU style, and the X toolkit style. In the original Unix tradition, comman
yak shaving [MIT AI Lab, after 2000: orig. probably from a Ren & Stimpy episode.] Any seemingly pointless activity which is actually necessary to solve a problem which solves a problem which, several levels of recursion later, solves the real problem you're working on.
Table of Contents Welcome to the Jargon FileI. Introduction1. Hacker Slang and Hacker Culture2. Of Slang, Jargon, and Techspeak3. Revision History4. Jargon ConstructionVerb DoublingSoundalike SlangThe -P ConventionOvergeneralizationSpoken inarticulationsAnthropomorphizationComparatives5. Hacker Writing Style6. Email Quotes and Inclusion Conventions7. Hacker Speech Style8. International Style9. Cra
The Linux folks have their penguin and the BSDers their daemon. Perl's got a camel, FSF fans have their gnu and OSI's got an open-source logo. What we haven't had, historically, is an emblem that represents the entire hacker community of which all these groups are parts. This is a proposal that we adopt one — the glider pattern from the Game of Life. About half the hackers this idea was alpha-test
The Jargon File, version 4.4.8 This page indexes all the WWW resources associated with the Jargon File and its print version, The New Hacker's Dictionary. It's as official as anything associated with the Jargon File gets. On 23 October 2003, the Jargon File achieved the dubious honor of being cited in the SCO-vs.-IBM lawsuit. See the FUD entry for details. Browse the Jargon File. What's new in the
Copyright Permission is granted to copy, distribute and/or modify this document under the terms of the Open Publication License, version 2.0.
The Loginataka Translations: Czech Polish Indonesian Ukrainian Speak, O Guru: How can I become a Unix Wizard? O, Nobly Born: know that the Way to Wizardhood is long, and winding, and Fraught with Risks. Thou must Attune thyself with the Source, attaining the arcane Knowledge and Conversation of the System Libraries and Internals. Yea; and such an all-consuming Time and Energy Sink is this as to gr
Welcome to my piece of the Web. I maintain quite a lot of open-source software, FAQs, and HTML documents, so this site is rather complex. It's mostly validated HTML and light on the graphics, though. You won't have to wait an eon for any of the pages to load. If the software and FAQs I maintain are valuable to you (and especially if my software makes you money) please leave me a tip at Patreon or
$Date$ Sex Tips For Geeks Hackers don't have to be helpless chum in the dating-game shark pool. We have some advantages; with a little understanding of human ethology we can learn how to use them effectively. This page collects articles that were inspired by A.J.'s troubles in the User Friendly comic strip, and which subsequently appeared in Iambe's advice column on that site. Introduction How To
次のページ
このページを最初にブックマークしてみませんか?
『www.catb.org』の新着エントリーを見る
j次のブックマーク
k前のブックマーク
lあとで読む
eコメント一覧を開く
oページを開く