J. Random Hacker
|“||A mythical figure like the Unknown Soldier; the archetypal hacker nerd. This term is one of the oldest in the hacker's jargon, apparently going back to MIT in the 1960s. may originally have been inspired by ‘J. Fred Muggs’, a show-biz chimpanzee whose name was a household word back in the early days of TMRC, and was probably influenced by ‘J. Presper Eckert’ (one of the co-inventors of the electronic computer)".||”|
"J. Random Hacker" is a popular placeholder name in a number of books and articles in programming. J. Random Hacker even authored a book about ease of malicious hacking, Adventures of a Wi-Fi Pirate. Also, J. Random Hacker was a main developer of I2P software.
Over time, J. Random X has become a popular cliché, a snowclone, in computer lore, with more types of "random" (meaning "arbitrary") categories of people, such as "J. Random Newbie", J. Random User, or J. Random Luser.
- Alice and Bob, placeholder names often used when discussing computer security
- Appendix B. A Portrait of J. Random Hacker, from the Jargon File
- The Art of Unix Programming by Eric S. Raymond, p. 457
- Beginning Python, by Peter Norton et al., p. 322
- J. Random Hacker, Adventures of a Wi-Fi Pirate (2005) ISBN 1-930919-62-X
- The Art of Unix Programming by Eric S. Raymond, Section "The tale of J. Random Newbie"
- TCP/IP Clearly Explained, by Peter Loshin, p. 116
|This vocabulary-related article is a stub. You can help Wikipedia by expanding it.|
|This computing article is a stub. You can help Wikipedia by expanding it.|