Original files version 4.4.7

This commit is contained in:
Bob Mottram
2014-03-27 18:54:56 +00:00
parent c632ed8d67
commit cb847ea893
2578 changed files with 26300 additions and 0 deletions

View File

@@ -0,0 +1,7 @@
<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<html xmlns="http://www.w3.org/1999/xhtml"><head><title>Miscellaneous</title><link rel="stylesheet" href="jargon.css" type="text/css"/><meta name="generator" content="DocBook XSL Stylesheets V1.61.0"/><link rel="home" href="index.html" title="The Jargon File"/><link rel="up" href="appendixb.html" title="Appendix B. A Portrait of J. Random Hacker"/><link rel="previous" href="weaknesses.html" title="Weaknesses of the Hacker Personality"/><link rel="next" href="appendixc.html" title="Appendix C. Helping Hacker Culture Grow"/></head><body><div class="navheader"><table width="100%" summary="Navigation header"><tr><th colspan="3" align="center">Miscellaneous</th></tr><tr><td width="20%" align="left"><a accesskey="p" href="weaknesses.html">Prev</a> </td><th width="60%" align="center">Appendix B. A Portrait of J. Random Hacker</th><td width="20%" align="right"> <a accesskey="n" href="appendixc.html">Next</a></td></tr></table><hr/></div><div class="sect1" lang="en"><div class="titlepage"><div><div><h2 class="title" style="clear: both"><a id="miscellaneous"/>Miscellaneous</h2></div></div><div/></div><p>Hackers are more likely to have cats than dogs (in fact, it is widely
grokked that cats have the hacker nature). Many drive incredibly decrepit
heaps and forget to wash them; richer ones drive spiffy Porsches and RX-7s and
then forget to have them washed. Almost all hackers have terribly bad
handwriting, and often fall into the habit of block-printing everything like
junior draftsmen.</p></div><div class="navfooter"><hr/><table width="100%" summary="Navigation footer"><tr><td width="40%" align="left"><a accesskey="p" href="weaknesses.html">Prev</a> </td><td width="20%" align="center"><a accesskey="u" href="appendixb.html">Up</a></td><td width="40%" align="right"> <a accesskey="n" href="appendixc.html">Next</a></td></tr><tr><td width="40%" align="left" valign="top">Weaknesses of the Hacker Personality </td><td width="20%" align="center"><a accesskey="h" href="index.html">Home</a></td><td width="40%" align="right" valign="top"> Appendix C. Helping Hacker Culture Grow</td></tr></table></div></body></html>