Life hack

Last updated
A keyboard inexpensively hacked with K'Nex pieces to allow an operator suffering from wrist pain to press the
.mw-parser-output .keyboard-key{border:1px solid #aaa;border-radius:0.2em;box-shadow:0.1em 0.1em 0.2em rgba(0,0,0,0.1);background-color:#f9f9f9;background-image:linear-gradient(to bottom,#eee,#f9f9f9,#eee);color:#000;padding:0.1em 0.3em;font-family:inherit;font-size:0.85em}
control,
alt and
| Shift keys with the thumb Modified keyboard (16372763).jpg
A keyboard inexpensively hacked with K'Nex pieces to allow an operator suffering from wrist pain to press the control, alt and ⇧ Shift keys with the thumb

A life hack (or life hacking) is any trick, shortcut, skill, or novelty method that increases productivity and efficiency, in all walks of life. The term was primarily used by computer experts who suffer from information overload or those with a playful curiosity in the ways they can accelerate their workflow in ways other than programming.

Contents

History

The original definition of the term "hack" is "to cut with rough or heavy blows". In the modern vernacular it has often been used to describe an inelegant but effective solution to a specific computing problem, such as quick-and-dirty shell scripts and other command line utilities that filtered, munged and processed data streams like e-mail and RSS feeds. [1] [2] The term was later extended to life hack, in reference to a solution to a problem unrelated to computers that might occur in a programmer's everyday life.[ citation needed ] Examples of these types of life hacks might include utilities to synchronize files, track tasks, remind oneself of events, or filter e-mail.[ citation needed ]

Popularization

The term life hack was coined in 2004 during the O'Reilly Emerging Technology Conference in San Diego, California by technology journalist Danny O'Brien to describe the "embarrassing" scripts and shortcuts productive IT professionals use to get their work done. [1] [3]

O'Brien and blogger Merlin Mann later co-presented a session called "Life Hacks Live" at the 2005 O'Reilly Emerging Technology conference. [4] The two also co-author a column entitled "Life Hacks" for O'Reilly's Make magazine which debuted in February 2005. [5]

The American Dialect Society voted lifehack (one word) as the runner-up for "most useful word of 2005" behind podcast . [6] The word was also added to the Oxford Dictionaries Online in June 2011. [7]

See also

Related Research Articles

<span class="mw-page-title-main">Hacker</span> Person skilled in information technology

A hacker is a person skilled in information technology who achieves goals by non-standard means. Though the term hacker has become associated in popular culture with a security hacker – someone with knowledge of bugs or exploits to break into computer systems and access data which would otherwise be inaccessible to them – hacking can also be utilized by legitimate figures in legal situations. For example, law enforcement agencies sometimes use hacking techniques to collect evidence on criminals and other malicious actors. This could include using anonymity tools to mask their identities online and pose as criminals. Likewise, covert world agencies can employ hacking techniques in the legal conduct of their work. Hacking and cyber-attacks are used extra-legally and illegally by law enforcement and security agencies, and employed by state actors as a weapon of legal and illegal warfare.

<span class="mw-page-title-main">Leet</span> Online slang and alternative orthography

Leet, also known as eleet or leetspeak, is a system of modified spellings used primarily on the Internet. It often uses character replacements in ways that play on the similarity of their glyphs via reflection or other resemblance. Additionally, it modifies certain words on the basis of a system of suffixes and alternative meanings. There are many dialects or linguistic varieties in different online communities.

A script kiddie, skript kiddie, skiddie, kiddie, or skid is an unskilled individual who uses scripts or programs developed by others, primarily for malicious purposes.

<span class="mw-page-title-main">Randal L. Schwartz</span> American programmer and technology writer

Randal L. Schwartz, also known as merlyn, is an American author, system administrator and programming consultant. He has written several books on the Perl programming language, and plays a promotional role within the Perl community. He was a co-host of FLOSS Weekly.

<span class="mw-page-title-main">ChatZilla</span> IRC client

ChatZilla is an IRC client that is part of SeaMonkey. It was previously an extension for Mozilla-based browsers such as Firefox, introduced in 2000. It is cross-platform open source software which has been noted for its consistent appearance across platforms, CSS appearance customization and scripting.

The hacker culture is a subculture of individuals who enjoy—often in collective effort—the intellectual challenge of creatively overcoming the limitations of software systems or electronic hardware, to achieve novel and clever outcomes. The act of engaging in activities in a spirit of playfulness and exploration is termed hacking. However, the defining characteristic of a hacker is not the activities performed themselves, but how it is done and whether it is exciting and meaningful. Activities of playful cleverness can be said to have "hack value" and therefore the term "hacks" came about, with early examples including pranks at MIT done by students to demonstrate their technical aptitude and cleverness. The hacker culture originally emerged in academia in the 1960s around the Massachusetts Institute of Technology (MIT)'s Tech Model Railroad Club (TMRC) and MIT Artificial Intelligence Laboratory. Hacking originally involved entering restricted areas in a clever way without causing any major damage. Some famous hacks at the Massachusetts Institute of Technology were placing of a campus police cruiser on the roof of the Great Dome and converting the Great Dome into R2-D2.

<span class="mw-page-title-main">Timeline of computer viruses and worms</span> Computer malware timeline

This timeline of computer viruses and worms presents a chronological timeline of noteworthy computer viruses, computer worms, Trojan horses, similar malware, related research and events.

O'Reilly Media is an American learning company established by Tim O'Reilly that publishes books, produces tech conferences, and provides an online learning platform. Its distinctive brand features a woodcut of an animal on many of its book covers.

A CAPTCHA is a type of challenge–response test used in computing to determine whether the user is human in order to deter bot attacks and spam.

<span class="mw-page-title-main">Phishing</span> Form of social engineering

Phishing is a form of social engineering and scam where attackers deceive people into revealing sensitive information or installing malware such as ransomware. Phishing attacks have become increasingly sophisticated and often transparently mirror the site being targeted, allowing the attacker to observe everything while the victim is navigating the site, and transverse any additional security boundaries with the victim. As of 2020, it is the most common type of cybercrime, with the FBI's Internet Crime Complaint Center reporting more incidents of phishing than any other type of computer crime.

Danny Goodman is a computer programmer, technology consultant, and an author of over three dozen books and hundreds of magazine articles on computer-related topics. He is best known as the author of The Complete HyperCard Handbook, The JavaScript Bible, and Dynamic HTML. His The Complete AppleScript Handbook is also notable as an important early work on the AppleScript programming language.

<span class="mw-page-title-main">Rael Dornfest</span> American computer programmer and author

Rael Dornfest is an American computer programmer and author. He was a technical fellow and CTO of Charity: Water, and was previously an engineer at Twitter. He was founder and chief executive officer of Values of N, creator of "I Want Sandy" and "Stikkit: Little Yellow Notes that Think." Previously, he was chief technology officer at O'Reilly Media. He began working for Twitter after they bought the assets of his company Values of N.

<span class="mw-page-title-main">Web 2.0</span> World Wide Web sites that use technology beyond the static pages of earlier Web sites

Web 2.0 refers to websites that emphasize user-generated content, ease of use, participatory culture and interoperability for end users.

<span class="mw-page-title-main">Hackathon</span> Event in which groups of software developers work at an accelerated pace

A hackathon is an event where people engage in rapid and collaborative engineering over a relatively short period of time such as 24 or 48 hours. They are often run using agile software development practices, such as sprint-like design wherein computer programmers and others involved in software development, including graphic designers, interface designers, product managers, project managers, domain experts, and others collaborate intensively on engineering projects, such as software engineering.

A security hacker is someone who explores methods for breaching defenses and exploiting weaknesses in a computer system or network. Hackers may be motivated by a multitude of reasons, such as profit, protest, information gathering, challenge, recreation, or evaluation of a system weaknesses to assist in formulating defenses against potential hackers.

<span class="mw-page-title-main">Wireless security</span> Aspect of wireless networks

Wireless security is the prevention of unauthorized access or damage to computers or data using wireless networks, which include Wi-Fi networks. The term may also refer to the protection of the wireless network itself from adversaries seeking to damage the confidentiality, integrity, or availability of the network. The most common type is Wi-Fi security, which includes Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA). WEP is an old IEEE 802.11 standard from 1997. It is a notoriously weak security standard: the password it uses can often be cracked in a few minutes with a basic laptop computer and widely available software tools. WEP was superseded in 2003 by WPA, a quick alternative at the time to improve security over WEP. The current standard is WPA2; some hardware cannot support WPA2 without firmware upgrade or replacement. WPA2 uses an encryption device that encrypts the network with a 256-bit key; the longer key length improves security over WEP. Enterprises often enforce security using a certificate-based system to authenticate the connecting device, following the standard 802.11X.

<span class="mw-page-title-main">Richard Stallman</span> American free software activist and GNU Project founder (born 1953)

Richard Matthew Stallman, also known by his initials, rms, is an American free software movement activist and programmer. He campaigns for software to be distributed in such a manner that its users have the freedom to use, study, distribute, and modify that software. Software that ensures these freedoms is termed free software. Stallman launched the GNU Project, founded the Free Software Foundation (FSF) in October 1985, developed the GNU Compiler Collection and GNU Emacs, and wrote all versions of the GNU General Public License.

<span class="mw-page-title-main">Scunthorpe problem</span> Problem caused by profanity filters on the Internet

The Scunthorpe problem is the unintentional blocking of online content by a spam filter or search engine because their text contains a string of letters that appear to have an obscene or otherwise unacceptable meaning. Names, abbreviations, and technical terms are most often cited as being affected by the issue.

A userscript is a program, usually written in JavaScript, for modifying web pages to augment browsing. Uses include adding shortcut buttons and keyboard shortcuts, controlling playback speeds, adding features to sites, and enhancing the browsing history.

Digital Forensics Framework (DFF) was a computer forensics open-source software. It is used by professionals and non-experts to collect, preserve and reveal digital evidence without compromising systems and data.

References

  1. 1 2 "Interview: father of "life hacks" Danny O'Brien". Lifehacker.com. 2005-03-17. Retrieved 2010-03-11.
  2. "Cory Doctorow's notes from Danny O'Brien's first Life Hacks presentation" . Retrieved 2010-03-11.
  3. "O'Reilly Emerging Technology Conference 2004". Conferences.oreillynet.com. 1999-02-22. Archived from the original on 2007-09-18. Retrieved 2010-03-11.
  4. "O'Reilly Emerging Technology Conference 2005". Conferences.oreillynet.com. 1999-02-22. Archived from the original on 2007-09-10. Retrieved 2010-03-11.
  5. "Life hacks". Makezine.com. Archived from the original on 2012-05-27. Retrieved 2012-07-01.
  6. "Words of the Year 2005.pdf" (PDF). Retrieved 2010-03-11.
  7. "'NSFW,' 'ZOMG,' and 'Twittersphere' added to dictionary". today.com. 3 June 2011. Retrieved 2015-10-22.