RE: TBTF for 1/12/98: Immune response

Joe Barrera (joebar@MICROSOFT.com)
Wed, 14 Jan 1998 09:44:12 -0800


No, real hackers grab the Free BSD tape and implement the missing stuff
themselves.

Or, they pick up the Mach 3 kernel and implement their own Unix subsystem
from scratch.

Or, they toggle in the whole OS, in one pass, designing and coding as they
go, not needing paper and pen for notes because they have the whole thing in
their head.

Etc. (apologies for continuing this thread)

- Joe

Joseph S. Barrera III <joebar@acm.org>
<http://research.microsoft.com/~joebar/>
Phone, Office: (415) 778-8227; Cellular: (415) 601-3719; Home: (650)
588-4801
The opinions expressed in this message are my own personal views.

-----Original Message-----
From: Joachim Feise [SMTP:jfeise@ics.uci.edu]
Sent: Wednesday, January 14, 1998 9:15 AM
To: fork@xent.ics.uci.edu
Subject: Re: TBTF for 1/12/98: Immune response

Robert Harley wrote:
>
> > | 1997's best seller was not a book, it was Red Hat Linux 5.0.
[...]
>
> Heh, heh.
>
> Note that Red Hat 5.0 came out on December 1st.
>
> Note also that in the Linux Counter's survey (23000 responses)
> 3.68% reported their source as a Red Hat CD whereas, for instance,
> 41.05% (including me) installed by ftp.
>
Red Hat is for wimps (and Newbies).
Real hackers use Slackware (not that I mean to brag...)

-Joe
--
Joachim Feise Microsoft Certified Solution
Developer
mailto:jfeise@acm.org
http://www.ics.uci.edu/~jfeise/
mailto:jfeise@ics.uci.edu
mailto:jfeise@ecs.com

---------------------------------------------------------------------