RE: TBTF for 1/12/98: Immune response

Joe Barrera (
Wed, 14 Jan 1998 09:44:12 -0800

No, real hackers grab the Free BSD tape and implement the missing stuff

Or, they pick up the Mach 3 kernel and implement their own Unix subsystem
from scratch.

Or, they toggle in the whole OS, in one pass, designing and coding as they
go, not needing paper and pen for notes because they have the whole thing in
their head.

Etc. (apologies for continuing this thread)

- Joe

Joseph S. Barrera III <>
Phone, Office: (415) 778-8227; Cellular: (415) 601-3719; Home: (650)
The opinions expressed in this message are my own personal views.

-----Original Message-----
From: Joachim Feise []
Sent: Wednesday, January 14, 1998 9:15 AM
Subject: Re: TBTF for 1/12/98: Immune response

Robert Harley wrote:
> > | 1997's best seller was not a book, it was Red Hat Linux 5.0.
> Heh, heh.
> Note that Red Hat 5.0 came out on December 1st.
> Note also that in the Linux Counter's survey (23000 responses)
> 3.68% reported their source as a Red Hat CD whereas, for instance,
> 41.05% (including me) installed by ftp.
Red Hat is for wimps (and Newbies).
Real hackers use Slackware (not that I mean to brag...)

Joachim Feise Microsoft Certified Solution