Home
Idioms
Top 1000 Words
Top 5000 Words


Example sentences for "hackers"

Lexicographically close words:
hack; hackamore; hackberry; hacked; hacker; hacking; hackle; hackled; hackles; hackling
  1. Yet this premise dominated the everyday behavior of the TX-0 hackers, as well as the generations of hackers that came after them.

  2. Once they passed through that door and sat behind the console of a million-dollar computer, hackers had power.

  3. Bureaucrats hide behind arbitrary rules (as opposed to the logical algorithms by which machines and computer programs operate): they invoke those rules to consolidate power, and perceive the constructive impulse of hackers as a threat.

  4. Marvin Minsky Playful and brilliant MIT prof who headed the AI lave and allowed the hackers to run free.

  5. Bill Gates Cocky wizard, Harvard dropout who wrote Altair BASIC, and complained when hackers copied it.

  6. McKenzie early on recognized that the interactive nature of the TX-0 was inspiring a new form of computer programming, and the hackers were its pioneers.

  7. Because of the limited memory space of the TX-0 (a handicap that extended to all computers of that era), hackers came to deeply appreciate innovative techniques which allowed programs to do complicated tasks with very few instructions.

  8. Although professors and administrators outnumbered hackers two-to-one inside the AI Lab, the hacker ethic prevailed.

  9. Hackers had built it as a protest to Project MAC's original operating system, the Compatible Time Sharing System, CTSS, and named it accordingly.

  10. Hackers were equally quick to send a message if the mistake repeated itself.

  11. In letting hackers write the systems themselves, AI Lab administrators guaranteed that only hackers would feel comfortable using the PDP-6.

  12. Hackers spoke openly about changing the world through software, and Stallman learned the instinctual hacker disdain for any obstacle that prevented a hacker from fulfilling this noble cause.

  13. At the time, hackers felt the CTSS design too restrictive, limiting programmers' power to modify and improve the program's own internal architecture if needed.

  14. According to Sussman, the hackers never broke any doors to retrieve terminals.

  15. Using this feature, Stallman was able to watch how programs written by hackers processed instructions as they ran.

  16. I apologize for the whirlwind summary of ITS' genesis, an operating system many hackers still regard as the epitome of the hacker ethos.

  17. Joining five or six other hackers in their nightly quest for Chinese food, he would jump inside a beat-up car and head across the Harvard Bridge into nearby Boston.

  18. Indeed, by the time of Stallman's arrival at the AI Lab, hackers and the AI Lab administration had coevolved into something of a symbiotic relationship.

  19. In exchange for fixing the machines and keeping the software up and running, hackers earned the right to work on favorite pet projects.

  20. If a faculty member made the mistake of locking away a terminal for the night, hackers were quick to correct the error.

  21. Like teenage hot-rodders, most hackers viewed tinkering with machines as its own form of entertainment.

  22. The ethnic distribution of hackers is understood by them to be a function of which ethnic groups tend to seek and value education.

  23. It was obviously a homebrew job, added by one of the lab's hardware hackers (no one knows who).

  24. This kind of hack is easier to explain to non-hackers than the programming kind.

  25. A visible minority of Southwestern and Pacific Coast hackers prefers Mexican.

  26. Though hackers often have poor person-to-person communication skills, they are as a rule extremely sensitive to nuances of language and very precise in their use of it.

  27. However, the percentage of women is clearly higher than the low-single-digit range typical for technical professions, and female hackers are generally respected and dealt with as equals.

  28. Unsurprisingly, hackers also tend towards self-absorption, intellectual arrogance, and impatience with people and tasks perceived to be wasting their time.

  29. Hackers were as curious about the security people as the security people were about their prey.

  30. People in the underground recognised him as a liability, both because of what many hackers saw as his loose morals and because he was boastful of his activities.

  31. He was enthralled by an article he discovered describing how several hackers claimed to have moved a satellite around in space simply by hacking computers.

  32. Had the Melbourne hackers stolen half a million dollars from Citibank?

  33. All of which made Bellcore a good target for hackers trying to prove their prowess.

  34. As a Telecom contractor, Gavin had the kind of access to computers and networks which most hackers could only dream about.

  35. But not nearly so cool as the half dozen hackers and phreakers who happened to be on the telephone bridge Par frequented when the master of X.

  36. The information received by The Australian amounts to a confession on the part of the Australian hackers to involvement in the break-in of the US Citibank network as well as advice on phreaking .

  37. In sharing information about their own countries' computers and networks, hackers helped each other venture further and further abroad.

  38. Both Scott and Ed swore up and down that they weren't hackers or phreakers, and they certainly weren't Par.

  39. He wanted to set the record straight with Fitzgerald, to let him know what hackers were really on about.

  40. The Australian hackers include a number of Melbourne people, some teenagers, suspected or already convicted of crimes including fraud, drug use and car theft.

  41. Hackers would always find out about bugs one way or another and the best way to keep them out of your system was to secure it properly in the first place.

  42. Par, the Australian hackers and other assorted American phreakers and hackers visited the bridge frequently.

  43. She also happened to be in a relationship--and that relationship was with Electron, one of the best Australian hackers of the late 1980s.

  44. Hackers can be shy, even reclusive, but when they do talk, hackers tend to brag, boast and strut.

  45. Most hackers start young, come and go, then drop out at age 22--the age of college graduation.

  46. There were some hackers who could really steal.

  47. Hackers often find that their existing equipment, due to the monopoly tactics of computer companies, is inefficient for their purposes.

  48. Hackers seem to believe that governmental agencies and large corporations are blundering about in cyberspace like eyeless jellyfish or cave salamanders.

  49. Hackers long for recognition as a praiseworthy cultural archetype, the postmodern electronic equivalent of the cowboy and mountain man.

  50. Not only do hackers privately believe this as an article of faith, but they have been known to write ardent manifestos about it.

  51. Nowadays, the cheapest and quickest way to get help with this fractious piece of machinery was to join one of Terminus's discussion groups on the Internet, where friendly and knowledgeable hackers would help you for free.

  52. That scofflaw teenage hackers (or their parents) should have marijuana in their homes is probably not a shocking revelation, but the surprisingly common presence of illegal firearms in hacker dens is a bit disquieting.

  53. This has sometimes happened by accident, as naive hackers blunder onto police boards and blithely begin offering telephone codes.

  54. The Phrack editors were as obsessively curious about other hackers as hackers were about machines.

  55. It should be frankly admitted that hackers ARE frightening, and that the basis of this fear is not irrational.

  56. Police want to believe that all hackers are thieves.

  57. The government's fear of hackers was compounded by a fear of pornography and the fear of terrorism.

  58. Unsubstantiated and bungled raids on young hackers and their families turned law enforcement into the Keystone Cops of cyberspace and the US Justice Department into a sworn enemy of the shareware community's most valuable members.

  59. Today, SEX parties are popular among hackers and others (of course, these are no longer limited to exchanges of genetic software).

  60. Despite what this term might suggest, Sun was founded by hackers and still enjoys excellent relations with hackerdom; usage is more often in exasperation than outright loathing.

  61. The variant `RETI' is found among former Z80 hackers (almost nobody programs these things in assembler anymore).

  62. Common term for the R&D department at many software and computer companies (where hackers in commercial environments are likely to be found).

  63. Hackers recognize the term but don't generally use it.

  64. Mainly used by hackers in the microcomputer world.

  65. The high school kids who broke it were Brazilian Linux hackers who lived in a *favela* -- a kind of squatter's slum.

  66. As a result of the negative publicity hackers have gotten over the last few years, the Conference issued a statement disavowing the propagation and creation of computer viruses.

  67. Hackers have caused constant trouble to computer systems over the years, and incidents have been increasing in both number and severity.

  68. Unless they left a trail, which good hackers don't, they'll get away with this Scott free.

  69. We now know that that these Germans are part of an underground group known as CHAOS, an acronym for Computer Hackers Against Open Systems, whatever the heck that means.

  70. Your articles keep saying that hackers cause all the trouble on computers.

  71. Upon reports that computer hackers have had access to First State's computers and records for some time, and can change their contents at will, the stock market reacted negatively by a sell-off.

  72. Morris and Chase were hackers who caused a bunch of damage.

  73. You first say that hackers are the guys in the white hats and then you admit that you are one of those criminal types who invades the privacy of others.

  74. I suppose hackers are innocent of that too.

  75. The threatening words came from a deranged group of computer hackers who thought it would be great sport to endanger the lives of our astronauts, waste millions of taxpayer dollars, retard military space missions and make a mockery of NASA.

  76. In late 1988, a group of West German hackers and computer pro- grammers thought it would be great fun to build their own comput- er virus.

  77. The German war code was hacked, and nations are very eager to confer honor upon other hackers of distinction: scientists who break the secrets of genetic codes, or spies who discover the secrets of the enemy.

  78. The answer to hackers is not a code of punishment of medieval or industrial inspiration, but transparency that will, in the long run, undermine possible criminal motivations.

  79. Hackers find it odd that this usage confuses {mundane}s.


  80. The above list will hopefully give you a few useful examples demonstrating the appropriate usage of "hackers" in a variety of sentences. We hope that you will now be able to make sentences using this word.