Relay-Version: version B 2.10 5/3/83; site utzoo.UUCP
Posting-Version: version B 2.10.2 9/18/84; site brl-tgr.ARPA
Path: utzoo!watmath!clyde!burl!ulysses!gamma!epsilon!zeta!sabre!petrus!bellcore!decvax!genrad!panda!talcott!harvard!seismo!brl-tgr!tgr!FTD%MIT-OZ@MIT-MC.ARPA
From: FTD%MIT-OZ@MIT-MC.ARPA (David D. Story)
Newsgroups: net.micro
Subject: Times have changed at Apple Computer ...
Message-ID: <875@brl-tgr.ARPA>
Date: Thu, 22-Aug-85 02:29:57 EDT
Article-I.D.: brl-tgr.875
Posted: Thu Aug 22 02:29:57 1985
Date-Received: Sat, 24-Aug-85 19:26:10 EDT
Sender: news@brl-tgr.ARPA
Lines: 11


	The term hacker and hack come from Cervantes' Don
	Quixote. This does not refer to surreptitious schemes
	of children. Hack/er/ing are usually used in such a
	sense by the ignorant and disgruntled (sometimes
	"programmers" but usually their supervisors) mainly
	because they don't understand the computing culture
	or they wish higher levels of subdivision to propel
	their own verbosity and ignorance to financial gainliness.

				Dave