Adequacy front page
Stories Diaries Polls Users
Google

Web Adequacy.org
Home About Topics Rejects Abortions
This is an unofficial archive site only. It is no longer maintained. You can not post comments. You can not make an account. Your email will not be read. Please read this page or the footnote if you have questions.
 The Condensed History Of How Computers Actually Came To Be

 Author:  Topic:  Posted:
Jun 11, 2002
 Comments:

People use them all the time, even when we don't know it. There all around us, everywhere. They hold our society as we know it in their "hands." Their computers, we think we know them, but how well do we know them?

shame

More stories about Shame
How you FOOL's are making kids want to DIE
Hackers; Victims of media stereotype
overprotecting your kids
Infinite vs. Finite- The real battle
This site seems anti-linux yet I have found a fault

This is a quick (and breif) story of how modern computers actually came to be. They weren't developed in some high-tech building in silicon valley, it all started in a small rural community shortly after automated telephone services were introduced. A man, which goes by the name of Captain Crunch, discovered that using a certain pich on a flute that he found in cereal - he could call places for free. He eventualy replaced the flute with a small electronic device called a "blue box." This device quickly spread and a society was formed. Now over the years it grew and eventaully they abandoned the blue box and began on computers. By now they had already been dubed hackers, after the number of hours they spent "hacking" away at figuring things out. Hackers were the first to invent many things, the first home pc (founders of Apple Computers,) the internet, and e-mail. Now you may be surprised at who are hackers, Bill Gates is one (he was actually arrested early on for using the blue box), so are the three founders of Macintosh as I stated before. Nowadays a faction of hacers has developed, we call them Crackers. They are the ones that steal information, spread viruses, and crash hard-drives. Now you might be asking,then what is a hacker?? Well now a hacker is just someone who, well, "uses" computers. They are people who want to know everything that a computer can do, what their weaknesses are, or if we can beat the computer. Personnally I hack for 1. curiosity and 2. the challenge of outsmarting, outwitting, and outplaying the computers. Now I know how to use, make, and control viruses - but I know this to protect myself. With this knowledge I can stop anything that might threaten my computer.

Excuse my poor sentence structure but I had to rush this, so ya. ~Sarix14

[editor's note, by Peter Johnson] Our response follows:

From: shoeboy <shoeboy@adequacy.org>
To: ben_the_bear@hotmail.com
Subject: Your Adequacy.org submission

Greeting H0a0c0k0e0r,

Is perl your language of choice? I was just reading your story entitled "The Condensed History Of How Computers Actually Came To Be" and felt certain that you were "just another perl hacker."

It's been my experience that most people write code the same way they write English. Some are verbose, some are terse and some are overly concerned with structure. You just plain suck. Your prose appears to have congealed rather than having been composed. It's the English equivalent of the following:

#! /usr/bin/perl
@k = unpack "a"x5,'x_,d@';@o = unpack "a"x19,'Q8>tUxLm\@`Y%N@cIq]';
while ($i<19){print chr((ord($o[$i])-ord($k[$i++%5])+91)%91+32);}

Like an obfuscated perl script, your submission is ugly, unreadable and accomplishes nothing useful. I'm not sure why you bothered to submit it as it only served to convince us that you cannot write.

We are sorry, but your submission is simply not fit for publication on Adequacy.org. We suggest you try executing it with "perl -e" instead.

Yours,
--Shoeboy
More God Than Man


the curiousest things... (none / 0) (#1)
by Anonymous Reader on Mon Jul 8th, 2002 at 01:59:06 AM PST
Is there really any difference in substance between the drivel above and the high-level intellectual material you're posting on the front page? It seems the only standard for getting recognition on this website as a writer is the quality of one's sentence structure. In any case I commend your crack team of journalists. I feel empowered, now armed with the knowledge that I must protect my soul from the vast sewage treatment facility soul-stealing conspiracy and my children from the Soviet spies crafting nefarious and corruptive hacker operating systems. Many thanks and kisses.


The problem (none / 0) (#3)
by Anonymous Reader on Tue Aug 13th, 2002 at 12:27:00 PM PST
The problem is that the person who wrote the submission is actually a 12 years old boy in his basement, thinking he may get recongnition from real hackers by writing this. Unfortunately, it seems Slashdot refused to post it, so he ended up submitting in on adequacy.

And there's also that it's absolutely false. It's not about "How computers came to be", but it's rather about How the computer-lamerz came to be".


I agree that hacker and h4XX0rz/crackers/black hat are different; this submition is just too false.


 
Here (none / 0) (#2)
by Anonymous Reader on Fri Aug 9th, 2002 at 10:45:55 PM PST
I think he thought that you all wouldnt read over the whole thing if you just see the title and post it. Because of course you would never post anything pro hacking.


 

All trademarks and copyrights on this page are owned by their respective companies. Comments are owned by the Poster. The Rest ® 2001, 2002, 2003 Adequacy.org. The Adequacy.org name, logo, symbol, and taglines "News for Grown-Ups", "Most Controversial Site on the Internet", "Linux Zealot", and "He just loves Open Source Software", and the RGB color value: D7D7D7 are trademarks of Adequacy.org. No part of this site may be republished or reproduced in whatever form without prior written permission by Adequacy.org and, if and when applicable, prior written permission by the contributing author(s), artist(s), or user(s). Any inquiries are directed to legal@adequacy.org.