This song is called Alice’s Internet Flame, and it’s about Alice, and the Internet, but Alice’s Internet Flame is not the name of the Internet, that’s just the name of the song, and that’s why I called the song Alice’s Internet Flame. You can hack anything you want with shell scripts, Perl, and C. You can hack anything you want with shell scripts, Perl and C, Walk right in and begin to hack Just push your stuff right onto the stack You can hack anything you want with shell scripts, Perl, and C. Now it all started two full backups ago, on April 1st, when my friend and I went up to Alice and Bob and the hackers at shack.hack.net. But the hackers don’t actually live on the World Wide Web server, they just go there to post their favorite hacks that they develop on their NetBSD Raspberry Pis. And since shack.hack.net has two six-hunnert-gigabyte disks and no regular sysadmin support, nobody had run ‘fsck’ there for a long time. When we sshed over there and saw the mess the cylinder maps were in, we decided it’d be a friendly gesture to run ‘fsck’ and take the /lost+found files down to /dev/null. So we took the five hundred thousand files full of garbage, put them in the back of a 64-bit Wishbone local bus, took rm’s and kill’s and other implements of destruction, and headed on toward /dev/null. Well, we got there and there was a mode of 0444 and a README file next to /dev/null sayin’, “This Bit Bucket Under Development on April 1st,” and we’d never heard of a bit bucket being under development on April 1st or any other day before, and with tears in our eyes, we surfed into the sunset lookin’ for another place to put the garbage. We didn’t find one until we came to mirrors.kernel.org, and off the side of mirrors.kernel.org was a sixteen terabyte disk, and in the middle of the disk was another heap of /lost+found files. And we decided that one big heap was better than two little heaps, and rather than MGET their files, we decided to MPUT ours. That’s what we did, and logged off of homebox.hack.net, had a Thai dinner that couldn’t be beat, went to sleep(1), and didn’t get up until the next clock tick, when we got a tweet from obie@police.stockbridge.ma.us. He said, “Kid, we found your public key on a file at the bottom of five hunnert gigs of garbage and I just wanted to know if you had any information about it.” And I tweeted back, “Yes sir, Officer Obie, I cannot tell a lie. I put that file under that garbage.” After speakin’ to Obie for about forty-five more tweets back and forth, we finally arrived at the truth of the matter and he said that we had to ssh in and ‘rm -rf’ the garbage, and also had to go down and speak to him at police.stockbridge.ma.us. So we got in the 64-bit Wishbone local bus with the rm’s and kill’s and implements of destruction and headed on toward police.stockbridge.ma.us. Now, friends, there was only one of two things that Obie could’ve done at police.stockbridge.ma.us, and the first was that he could’ve given us a four gig thumb drive for bein’ so brave and honest on Twitter (which wasn’t very likely, and we didn’t expect it), and the other thing was that he could’ve flamed us and told us never to be seen running root programs in the vicinity again, which is what we expected. But when we got to police.stockbridge.ma.us, there was a third arm of the conditional that we hadn’t even counted upon, and we was both immediately SIGTSTPed, and I said, “Obie, I can’t rm the garbage with these here kernel waits activated.” He said: “XOFF, kid, and get in the back of the sendmail queue.” And that’s what we did, sat in the back of the sendmail queue, and SMTP’ed to the left-quote left-quote scene-of-the-crime right-quote right-quote. I wanna tell you ’bout the Internet, where this is happenin’. They got one point two billion hosts, no X.500 directory services, and two or three competing search engines, but when we got to the left-quote left-quote scene-of-the-crime right-quote right-quote, there was five IETF members with three protocol analyzers each, bein’ the biggest hack of the last ten years and everybody wanted to get in the Google News story about it. And they was usin’ up all kinds of digital equipment that they had hangin’ around in the police.stockbridge.ma.us subdomain. They was takin’ backtraces, stack traces, GaAs VLSI integrated circuits, HTML authoring tools, and RISC designs. And they created seventeen 1000 x 1000 pixel 24-bit true color windows with hourglasses and arrows and a scroll bar on the side of each one with a documentation resource explainin’ what each one was, to be used as evidence against us. Took snapshots of the titles, the menus, the cursors, the pop up notification windows, the upper right corner, the lower left corner, and that’s not to mention paging out the Bitmap Unders! After the ordeal, we went back to police.stockbridge.ma.us. Obie said he was gonna isolate us behind a firewall. He said: “Kid, I’m gonna isolate you behind a firewall. I want your RFCs and your Lions Book.” I said, “Obie, I can understand your wantin’ my protocol descriptions, so I don’t have any documentation about the firewall, but what do you want my perfectly legal obsolete V6 kernel source for?” and he said, “Kid, we don’t want any unexpected panics.” I said, “Obie, did you think I was gonna firestorm your local network for litterin’?” Obie said he was makin’ sure, and, friends, Obie was, ’cause he took out the CTRL and ALT keys so I couldn’t give a three-finger salute and warm-boot, and he disconnected my Ethernet cable so I couldn’t speak the BOOTP protocol to a friendly host and reload the OS image over the network. Obie was makin’ sure, and it was about four or five hours later that RMS — (remember RMS? This here’s not a song about RMS) — RMS came by and, with a few grumpy e-mails to Obie on the side, bailed us out of chroot(2), and we went up to prep.ai.mit.edu, had another Thai dinner that couldn’t be beat, and didn’t get up until the next evening, when we all had to go before the Internet Architecture Board. We walked in, sat down, Obie came in with the seventeen 24-bit true color windows with hourglasses and arrows and documentation resources, sat down. Man came in, said, “All rise!” We all stood up, and Obie stood up with the seventeen 24-bit true color windows with hourglasses and arrows and documentation resources, and the IETF Chair walked in with an iPhone 3GS, and he sat down. We sat down. Obie looked at the bitty box, and then at the seventeen 24-bit true color windows with hourglasses and arrows and documentation resources, and looked at the bitty box, and then at the 24-bit true color windows with hourglasses and arrows and documentation resources, and began to cry. Because Obie came to the realization that it was a typical case of form factor incompatibility, and there wasn’t nothin’ he could do about it, and the chair wasn’t gonna look at the seventeen 24-bit true color windows with hourglasses and arrows and documentation resources, explainin’ what each one was, to be used as evidence against us. And we was fined five bitcoins and had to rebuild the complete Google index...by hand. But that’s not what I came to tell you about. Came to talk about the Net. They got a server on the Milnet called simtel20.army.mil, where you FTP in, you get your files inspected, detected, neglected and rejected! I went down and got my FTP session one day, and I walked in, sat down (hung out on #hottub the night before, so I looked and felt my best when I went in that morning, ’cause I wanted to look like the SOA Application from Armonk. I wanted to feel like the all-, I wanted to be the SOA Application from Armonk), and I SYNed up, sat down, I was hung, wedged, broken, crashed, screwed, and all kinds of mean, nasty, ugly things. And I SYNed up, I logged in, the daemon gave me a 230 protocol reply that said: “Kid, see the C++ hackers at X3J16.” I went up there, I said, “Avatar, I wanna lose. I mean, I wanna, I wanna lose. Lose. I wanna, I wanna see, I wanna see hacks and kludges and abstract types and virtual functions in my code! Eat dead power supplies with cables between my teeth! I mean lose! lose! lose! lose!” And I started jumpin’ up and down, yellin’ “LOSE! LOSE!” and Stallman walked in and started jumpin’ up and down with me, and we was both jumpin’ up and down, yellin’, “LOSE! LOSE! LOSE! LOSE!!” and some net.god came over, gave me an acm.org mail address, sent me down the hall, said “You’re the new moderator of comp.dcom.telecom.” Didn’t feel too good about it. Proceeded down through gopherspace, gettin’ more inspections, rejections (this IS the Net), detections, neglections, and all kinds of stuff that they was doin’ to me there, and I was there for five years... ten years... fifteen years... I was there for a long time goin’ through all kinds of mean, nasty, kludgy things, and I was havin’ a tough time there, and they was inspectin’, injectin’, every single part of me, and they was leavin’ no port unbound! Proceeded through, and I finally came to see the very last suit. I walked in, sat down, after a whole big thing there. I walked up, and said, “What do you want?” He said, “Kid, we only got one question. Have you ever been SIGTSTPed?” And I proceeded to tell him the story of the five hunnert gigs of garbage with full orchestration and sixteen-part harmony and stuff like that, He stopped me right there and said, “Kid, have you ever been flamed on news.admin?” And I proceeded to tell him the story of the seventeen 24-bit true color windows with hourglasses and arrows and documentation resources, and he stopped me right there and said, “Kid, I want you to go over and sit down on that bench that says ‘Internet Society’... NOW, KID!” And I walked over to the bench there, and there’s... The Internet Society is where they put you if you may not be moral enough to join Google after creatin’ your TCP implementation, and there was all kinds of mean, nasty, ugly-lookin’ people on the bench there. Microkernel hackers. Intercal hackers. PEM hackers!! PEM hackers sittin’ right there on the bench next to me! And there was mean and nasty and ugly and horrible cracker-type guys sitting on the bench next to me. And the meanest, ugliest, nastiest one... the hairiest PEM hacker of them all... was comin’ over to me, and he was mean and ugly and nasty and horrible and all kinds of things, and he sat down next to me. He said: “Originator-Key-Asymmetric: MFkwCgYEVQgBAQICAgADSwAwSAJBALeWW4xDV4i7+b6+UyPn5RtObb1cJ7VkACDq pKb9/DClgTKIm08lCfoilvi9Wl4SODbR1+1waHhiGmeZO8OdgLUCAwEAAQ==?” I said, “I didn’t get nothin’. I had to rebuild the Google index.” He said: “MIC-Info: RSA-MD5,RSA, FLASUPgMya8JR/d6RA0KR0aKdLctxDI7ykGbCBZBqaeEh2JfQwErpSmzMCzWsMbU 7SSnV1C2Vi4bfFuMxAB6qQ==?” And I said, “Littering...” And they all moved away from me on the bench there, with the hairy eyeball and all kinds of mean, nasty things, till I said, “And making gratuitous modifications to Linux sources...” And they all came back, shook my hand, and we had a great time on the bench talkin’ about microkernels, Spritely file systems, IP version 6 routing, and all kinds of groovy things that we was talkin’ about on the bench, and everything was fine. We was drinking Coke smoking all kinds of things, until the sysape came over, had some paper in his hand, held it up and said: “KIDS-THIS-LOG FILE’S-GOT-FORTY-SEVEN-EVENT- CLASSES-THIRTY-SEVEN-SEVERITY-LEVELS- FIFTY-EIGHT-MAGIC-WORDS-WE-WANT-TO-KNOW-THE- DETAILS-OF-THE-HACK-THE-TIME-OF-THE-HACK- AND-ANY-OTHER-KIND-OF-THING-YOU-GOT-TO-SAY- PERTAINING-TO-AND-ABOUT-THE-HACK-ANY- OTHER-KIND-OF-THING-YOU-GOT-TO-SAY- WE-WANT-TO-KNOW-THE-OS-CD-ROM’S-VERSION- NUMBER-AND-ANY-OTHER-KIND-OF-THING...” And he talked for forty-five minutes and nobody understood a word that he said. But we had fun rolling the mice around and clickin’ on the buttons there. And I filled out the web form usin’ the four-level macro defining macros, and typed it in there, just like it was, and everything was fine. And I put down my keyboard, and I switched buffers, and there, there in the other buffer, centered in the other buffer, away from everything else in the buffer, in parentheses, capital letters, backquotated, in 43-point Splashface, read the following words: “Kid, have you GUIed yourself?” I went over to the sysape. Said, “Mister, you got a lot of damn gall to ask me if I’ve GUIed myself! I mean, I mean, I mean that just, I’m sittin’ here on the bench, I mean I’m sittin’ here on the ISOC bench, ’cause you want to know if I’m losing enough to join aol.com, run 16-bit Windows apps, use IRC, and insert CR-LFs into text files, after bein’ on mailing lists so obscure I can’t even name them to you?” He looked at me and said, “Kid, we don’t like your kind! We’re gonna send your subnet mask off to rs.internic.net!” And, friends, somewhere in Washington, enshrined on some 5.25 inch floppy disk, is a study in ones and zeros of my brain-damaged programming style... And the only reason I’m singin’ you the song now is ’cause you may know somebody in a similar situation. Or you may be in a similar situation, and if you’re in a situation like that, there’s only one thing you can do, and that’s log in to the Net wherever you are, just log in and type “Net, you can hack anything you want with Perl scripts, shell, and C.” And log out. You know, if one person, just one person, does it, they may think he’s really dangerous and they won’t flame him. And if two people do it, in harmony, they may think they’re both Perl hackers and they won’t flame either of them. And if three people do it! Can you imagine three people loggin’ in, singin’ a bar of “Alice’s Usenet Flame” and loggin’ out? They may think it’s an re-implementation of sendmail! And can you imagine fifty people a day? I said FIFTY people a day, loggin’ in, singin’ a bar of “Alice’s Usenet Flame” and loggin’ out? Friends, they may think it’s a MOVEMENT, and that’s what it is: THE INTERNET GLOBAL ANTI-LOSSAGE MOVEMENT! And all you gotta do to join is to sing it the next time it comes around on the /var/spool/news/in.coming directory. With feelin’. So we’ll wait for it to come in on the in.coming directory here and sing it when it does. Here it comes. You can hack anything you want with shell scripts, Perl, and C. You can hack anything you want with shell scripts, Perl and C, Walk right in and begin to hack Just push your stuff right onto the stack You can hack anything you want with shell scripts, Perl, and C. That was horrible. If you want to end NSA privacy violations and stuff you got to sing loud. I’ve been singing this song now for twenty five minutes. I could sing it for another twenty five minutes. I’m not proud. Or tired. So we’ll wait till it comes around again, and this time with sixteen part harmony and feeling. We’re just waitin’ for it to come around is what we’re doing. All right now. [repeat chorus, ending with] But don’t forget to fix the bugs With shell scripts, Perl, and C!