Relay-Version: version B 2.10 5/3/83; site utzoo.UUCP Posting-Version: version B 2.10.2 9/18/84; site brl-tgr.ARPA Path: utzoo!watmath!clyde!burl!ulysses!gamma!epsilon!zeta!sabre!petrus!bellcore!decvax!genrad!panda!talcott!harvard!seismo!brl-tgr!tgr!FTD%MIT-OZ@MIT-MC.ARPA From: FTD%MIT-OZ@MIT-MC.ARPA (David D. Story) Newsgroups: net.micro Subject: Times have changed at Apple Computer ... Message-ID: <875@brl-tgr.ARPA> Date: Thu, 22-Aug-85 02:29:57 EDT Article-I.D.: brl-tgr.875 Posted: Thu Aug 22 02:29:57 1985 Date-Received: Sat, 24-Aug-85 19:26:10 EDT Sender: news@brl-tgr.ARPA Lines: 11 The term hacker and hack come from Cervantes' Don Quixote. This does not refer to surreptitious schemes of children. Hack/er/ing are usually used in such a sense by the ignorant and disgruntled (sometimes "programmers" but usually their supervisors) mainly because they don't understand the computing culture or they wish higher levels of subdivision to propel their own verbosity and ignorance to financial gainliness. Dave