at various Perl conferences and is eventually also published online. In email, Usenet, and message board postings, "Just another Perl hacker" (JAPH) programs...
98 KB (9,761 words) - 10:50, 13 July 2025
Obfuscated Perl Contest. Short obfuscated Perl programs may be used in signatures of Perl programmers. These are JAPHs ("Just another Perl hacker"). Cryptographers...
18 KB (1,668 words) - 18:48, 29 May 2025
words The Perl Journal, limit of 256 bytes) Obfuscated code Just another Perl hacker The 3rd Annual Obfuscated Perl Contest Felix Gallo – Perl Journal (You...
2 KB (253 words) - 02:41, 9 October 2024
equivalent to "Hello, World!" for old hardware) Foobar Java Pet Store Just another Perl hacker Outline of computer science TPK algorithm Coding Langbridge, James...
27 KB (1,940 words) - 05:23, 2 July 2025
World!" program Quine Trabb Pardo–Knuth algorithm Man or boy test Just another Perl hacker Data compression Calgary corpus Canterbury corpus Silesia corpus...
10 KB (1,118 words) - 19:57, 5 February 2025
Pugs (compiler) (category Articles with example Perl code)
selectall_hashref('SELECT * FROM Test', 'Pumpking'); # Just another Pugs hacker say "Just another $res<Audrey><Project> hacker"; Several factors have been suggested as...
6 KB (656 words) - 13:16, 11 January 2025
Randal L. Schwartz (category Perl writers)
Perl Journal. He popularized the Just another Perl hacker signature programs. He is a founding board member of the Perl Mongers, the worldwide Perl grassroots...
10 KB (962 words) - 23:29, 18 January 2025
Web Consortium. Retrieved 6 June 2010. Bowers, Neil. "Weblint: Just Another Perl Hack" (PDF). Canon Research Centre Europe. CiteSeerX 10.1.1.54.7191....
12 KB (797 words) - 22:08, 14 June 2025
Common Lisp John Scholes – Direct functions Randal L. Schwartz – Just another Perl hacker Adi Shamir – cocreated RSA algorithm (being the S in that name)...
49 KB (4,266 words) - 05:11, 13 July 2025
Consortium. Retrieved 17 June 2010. Bowers, N. (1998). "Weblint: just another perl hack" (PDF). 1998 USENIX Annual Technical Conference (USENIX ATC 98)...
84 KB (9,599 words) - 11:02, 14 July 2025
World!" program Quine Trabb Pardo–Knuth algorithm Man or boy test Just another Perl hacker Data compression Calgary corpus Canterbury corpus Silesia corpus...
9 KB (666 words) - 03:12, 8 February 2024
webserver. Perl golf Just another Perl hacker Obfuscated Perl Contest There's more than one way to do it (TMTOWTDI) Perl Foundation Perl Mongers Perl Monks...
31 KB (3,908 words) - 06:40, 20 May 2025
Audrey Tang (category Perl writers)
people want to describe me with online." Tang is a leader of the Haskell and Perl programming language communities, and is the core member of g0v. Tang was...
29 KB (2,477 words) - 18:58, 8 May 2025
August 2010. Bowers, Neil; Canon Research Centre Europe. "Weblint: Just Another Perl Hack". CiteSeerX 10.1.1.54.7191. Lie, Håkon Wium; Bos, Bert (April 1997)...
49 KB (3,820 words) - 10:07, 27 May 2025
Not allowed in C#. // dictionary.Item("J. Random Hacker") = "553-1337"; dictionary["J. Random Hacker"] = "553-1337"; The dictionary can also be initialized...
88 KB (10,857 words) - 13:12, 25 May 2025
Plain Old Documentation (category Perl)
to document the Perl programming language as well as Perl modules and programs. Pod is designed to be a simple, clean language with just enough syntax to...
8 KB (1,097 words) - 09:55, 27 May 2025
application: x & f means the same thing as f x. Perl uses the ampersand as a sigil to refer to subroutines: In Perl 4 and earlier, it was effectively required...
35 KB (3,393 words) - 23:57, 2 July 2025
Function object (category Articles with example Perl code)
modern (and some older) languages, e.g. C++, Eiffel, Groovy, Lisp, Smalltalk, Perl, PHP, Python, Ruby, Scala, and many others, support first-class function...
36 KB (4,383 words) - 17:09, 4 May 2025
$ perl -pe 's/\r?\n|\r/\r\n/g' inputfile > outputfile # Convert to DOS $ perl -pe 's/\r?\n|\r/\n/g' inputfile > outputfile # Convert to UNIX $ perl -pe...
39 KB (4,387 words) - 20:13, 30 June 2025
implementations at Rosetta Code Pascal/Delphi port Math::Random::ISAAC, a Perl module implementation of the algorithm isaac.js, a JavaScript implementation...
5 KB (567 words) - 09:26, 15 May 2025
Aaron Swartz (section Hacks)
August 4, 2013. Retrieved January 29, 2013. "Convicted hacker Stephen Watt on Aaron Swartz: 'It's just not justice'". VentureBeat. January 25, 2013. Archived...
192 KB (16,465 words) - 18:39, 11 July 2025
recursively for the whole acronym. In computing, an early tradition in the hacker community, especially at MIT, was to choose acronyms and abbreviations that...
17 KB (1,782 words) - 05:37, 5 July 2025
Comment (computer programming) (redirect from HACK (tag))
goes in these lines is just for the human reader =end puts "not a comment" Instead of a regular block commenting construct, Perl uses literate programming...
46 KB (5,121 words) - 13:13, 31 May 2025
programming languages, including Ada, Python, Gambas, Ruby, PHP, JavaScript, Perl, Object REXX (ooRexx) and Rust. As the new version, ncurses is a free and...
10 KB (882 words) - 21:33, 23 May 2025
convention is Destroy. Objective-C: destructor method is named dealloc. Perl: destructor method is named DESTROY; in the Moose object system extension...
11 KB (1,130 words) - 05:01, 26 April 2025
other wiki projects. Originally, Wikipedia ran on UseModWiki written in Perl by Clifford Adams (Phase I), which initially required CamelCase for article...
323 KB (27,849 words) - 02:52, 13 July 2025
routine". Archived from the original on 19 December 2007. "File::Glob - Perl extension for BSD glob routine". metacpan.org. Archived from the original...
24 KB (1,926 words) - 11:12, 9 July 2025
required. $ perl \progra~1\wepcrack\wepcrack\.pl ivfile.log This command asks WEPCrack to determine the key from the log file. Aircrack is another program...
4 KB (498 words) - 22:14, 24 September 2024
language design, as a proof of concept, as software art, as a hacking interface to another language (particularly functional programming or procedural programming...
26 KB (2,852 words) - 21:52, 21 June 2025
was created by the infamous hacker Phiber Optik, in 1992, while waiting for a Manhattan grand jury indictment for hacking activities. At this time, customers...
25 KB (2,545 words) - 15:22, 3 September 2024