Word: hacker
(lookup in dictionary)
(lookup stats)
Dates: during 1980-1989
Sort By: most recent first
(reverse)
...although dedicated word processors are a thing of the past, most personal computer users are still living in the dark ages; they use their computers only for writing papers and letters. The Happy Hacker certainly regrets this. The Happy Hacker regrets a lot of things recently, but he especially hates to see things with a lot of potential wasted over misunderstandings...
...library has many other programs and books, and even contains items such as a Lotus 1-2-3 tutorial on cassette. As with any library, there are a lot of materials that seem pretty pointless to the Happy Hacker. But some programs, and especially the reference manuals and books can be especially useful. Check...
...determined to avoid such unseemliness. To shield its investigation from political gossip as well as foreign intelligence services, the committee will move into a new $350,000 suite in the Hart Office Building that is designed to be leakproof. Staff members will talk on bug-proof telephones, type on hacker-proof word processors and sign out research material from a "secure documents room." The offices will be protected by code-locked doors staffed around the clock by armed guards. Exterior walls will be implanted with electronic sensors to detect intruders...
...obtain a copy of Kermit for $5 from the Science Center supply room, or can get a more sophisticated program such as Procomm (similar in cost to Red Ryder) from friends. Those unable to obtain a terminal program from other sources should send a blank disk to the Happy Hacker at 14 Plympton St. and wait about a week for delivery...
...mainframe to your computer. From a Class 4 account, Mac users simply type MACPUT filename and then set their communications program to receive a file. When the program has been put onto a Mac disk, it will need to be converted with a program called BINHEX (available from hacker friends...