Hello All
I recieved a mail from my friend (Regional Engg college Calicut) regarding
askin questions.I think this will help newbies like me !!

Rgds
Din


Hi,
  Here is an article by Eric S. Raymond and Rick Moen. I hope it will
be helpful for *newcomers* to the *real* hacking world.

Regards,
Baiju. M

----------------------------------------------------------------------


How To Ask Questions The Smart Way
==================================

   Eric Raymond and Rick Moen

   Table of Contents
   Introduction
   Before You Ask
   When You Ask
   How To Interpret Answers
   On Not Reacting Like A Loser
   Questions Not To Ask
   Good and Bad Questions
     _________________________________________________________________

Introduction

   In the world of hackers, the kind of answers you get to your technical
   questions  depends  as much on the way you ask the questions as on the
   difficulty  of developing the answer. This guide will teach you how to
   ask  questions  in  a  way  that  is  likely to get you a satisfactory
   answer.

   The  first  thing  to  understand  is  that hackers actually like hard
   problems  and  good,  thought-provoking  questions  about  them. If we
   didn't, we wouldn't be here. If you give us an interesting question to
   chew  on we'll be grateful to you; good questions are a stimulus and a
   gift.  Good  questions  help  us  develop our understanding, and often
   reveal  problems we might not have noticed or thought about otherwise.
   Among hackers, "Good question!" is a strong and sincere compliment.

   Despite  this,  hackers have a reputation for meeting simple questions
   with  what  looks like hostility or arrogance. It sometimes looks like
   we're hostile to newbies and the ignorant. But this isn't really true.

   What  we  are,  unapologetically,  is hostile to people who seem to be
   unwilling  to  to  think  or  do  their  own  homework  before  asking
   questions. People like that are time sinks -- they take without giving
   back,  they  waste  time  we could have spent on another question more
   interesting  and  another  person  more  worthy  of an answer. We call
   people  like  this  "losers"  (and for historical reasons we sometimes
   spell it "lusers").

   We're  (largely)  volunteers. We take time out of busy lives to answer
   questions,  and  at  times  we're  overwhelmed with them. So we filter
   ruthlessly.  In  particular,  we  throw away questions from people who
   appear to be losers in order to spend our question-answering time more
   efficiently, on winners.

   You  don't  want  to be one of the losers. You don't want to seem like
   one,  either.  The best way to get a rapid and responsive answer is to
   ask  it  like  a  winner  --  to  ask  it  like  a person with smarts,
   confidence,  and clues who just happens to need help on one particular
   problem.

   (Improvements  to  this guide are welcome. You can mail suggestions to
   [EMAIL PROTECTED])
     _________________________________________________________________

Before You Ask

   Before  asking a technical question by email, or in a newsgroup, or on
   a website chat board, do the following:
    1. Try to find an answer by reading the manual.
    2. Try to find an answer by reading a FAQ.
    3. Try to find an answer by searching the Web.
    4. Try to find an answer by asking a skilled friend.

   When  you ask your question, display the fact that you have done these
   things  first;  this  will help establish that you're not being a lazy
   sponge  and  wasting  peoples' time. Better yet, display what you have
   learned  from  doing  these  things.  We  like answering questions for
   people who have demonstrated that they can learn from the answers.

   Prepare  your question. Think it through. Hasty-sounding questions get
   hasty answers, or none at all. The more you do to demonstrate that you
   have  put  thought  and effort into solving your problem before asking
   for help, the more likely you are to actually get help.

   Beware  of  asking the wrong question. If you ask one that is based on
   faulty  assumptions,  J. Random Hacker is quite likely to reply with a
   uselessly  literal  answer  while  thinking  "Stupid question...", and
   hoping  that  the experience of getting what you asked for rather than
   what you needed will teach you a lesson.

   On  the  other  hand, making it clear that you are able and willing to
   help  in  the process of developing the solution is a very good start.
   "Can  someone  provide  a pointer?", "What is my example missing?" and
   "Is  there  a  site  I  should  have  checked?" are more likely to get
   answered than "Please post the procedure I should use." because you're
   making  it  clear that you're truly willing to complete the process if
   someone can simply point you in the right direction.

   Never assume you are entitled to an answer. You are not. You will earn
   an  answer,  if you earn it, by asking a question that is substantial,
   interesting,  and thought-provoking -- one that implicitly contributes
   to  the  experience  of  the  community  rather  than merely passively
   demanding knowledge from others.
     _________________________________________________________________

When You Ask

Choose your forum carefully

   Be  sensitive  in choosing where you ask your question. You are likely
   to be ignored, or written off as a loser, if you:

     * post your question to a forum where it is off topic
     * post  a  very  elementary  question  to  a  forum  where  advanced
       technical questions are expected, or vice-versa
     * cross-post to too many different newsgroups

   Hackers  blow off questions that are inappropriately targeted in order
   to  try to protect their communications channels from being drowned in
   irrelevance. You don't want this to happen to you.
     _________________________________________________________________

Write in clear, grammatical, correctly-spelled language

   We've  found  by  experience  that  people who are careless and sloppy
   writers are usually also careless and sloppy thinkers (often enough to
   bet  on, anyway). Answering questions for careless and sloppy thinkers
   is not rewarding; we'd rather spend our time elsewhere.

   So  expressing  your  question  clearly  and well is important. If you
   can't  be  bothered to do that, we can't be bothered to pay attention.
   Spend  the extra effort to polish your language. It doesn't have to be
   stiff or formal -- in fact, hacker culture values informal, slangy and
   humorous language used with precision. But it has to be precise; there
   has to be some indication that you're thinking and paying attention.

   Spell  correctly.  Don't  confuse  "its"  with  "it's" or "loose" with
   "lose".  Don't  TYPE  IN  ALL  CAPS,  this  is  read  as  shouting and
   considered  rude.  If  you  write  like a semi-literate boob, you will
   probably  be  ignored.  Writing like a l33t script kiddie hax0r is the
   absolute  kiss  of  death  and guarantees you will receive nothing but
   stony silence (or, at best, a heaping helping of scorn and sarcasm) in
   return.

   If  you  are asking questions in a forum that does not use your native
   language,  you  will  get  a  limited amount of slack for spelling and
   grammar errors -- but no extra slack at all for sloppy thinking. Also,
   unless  you  know  what  your  respondent's  languages  are,  write in
   English. Busy hackers tend to simply flush questions in languages they
   don't  understand,  and English is the working language of the net. By
   writing  in  English you minimize your chances that your question will
   be discarded unread.
     _________________________________________________________________

Send questions in formats that are easy to understand

   If you make your question artificially hard to read, it is more likely
   to be passed over in favor of one that isn't. So:

     * Send plain text mail, not HTML.
     * Don't   send   mail   in   which   entire  paragraphs  are  single
       multiply-wrapped  lines.  (This makes it too difficult to reply to
       just part of the message.)
     * Never,  ever  expect hackers to be able to read closed proprietary
       document  formats like Microsoft Word. Most hackers react to these
       about as well as you would to having a pile of steaming pig manure
       dumped on your doorstep.
     * If   you're   sending  mail  from  a  Windows  machine,  turn  off
       Microsoft's  stupid  "Smart  Quotes" feature. This is so you avoid
       sprinkling garbage characters through your mail.
     _________________________________________________________________

Use meaningful, specific subject headers

   On  mailing  lists  or  newsgroups,  the subject header is your golden
   opportunity  to  attract  qualified  experts'  attention  in around 50
   characters  or  fewer.  Don't waste it on babble like "Please help me"
   (let  alone  "PLEASE  HELP  ME!!!!"). Don't try to impress us with the
   depth  of  your  anguish;  use  the  space for a super-concise problem
   description instead.

   Stupid:
          HELP! Video doesn't work properly on my laptop!

   Smart:
          XFree86 4.1 misshapen mouse cursor, Fooware MV1005 vid. chipset
     _________________________________________________________________

Be precise and informative about your problem

     * Describe  the  symptoms  of  your  problem  or  bug  carefully and
       clearly.
     * Describe   the  environment  in  which  it  occurs  (machine,  OS,
       application, whatever).
     * Describe  the  research  you did to try and understand the problem
       before you asked the question.
     * Describe  the  diagnostic  steps  you took to try and pin down the
       problem yourself before you asked the question.
     * Describe   any   recent  changes  in  your  computer  or  software
       configuration that might be relevant.

   Do the best you can to anticipate the questions a hacker will ask, and
   to answer them in advance in your request for help.

   Simon  Tatham  has  written  an excellent essay entitled How to Report
   Bugs Effectively. I strongly recommend that you read it.
     _________________________________________________________________

Describe the problem's symptoms, not your guesses

   It's  not  useful  to  tell  hackers  what  you  think is causing your
   problem.  (If  your diagnostic theories were such hot stuff, would you
   be  consulting  them  for help?) So, make sure you're telling them the
   raw  symptoms of what goes wrong, rather than your interpretations and
   theories. Let them do the interpretation and diagnosis.

   Stupid:
          I'm  getting  back-to-back SIG11 errors on kernel compiles, and
          suspect  a  hairline  crack  on  one of the motherboard traces.
          What's the best way to check for those?

   Smart:
          My  home-built  K6/233 on an FIC-PA2007 motherboard (VIA Apollo
          VP2  chipset)  with  256MB  Corsair  PC133 SDRAM starts getting
          frequent  SIG11  errors  about 20 minutes after power-on during
          the  course  of  kernel  compiles,  but  never  in the first 20
          minutes. Rebooting doesn't restart the clock, but powering down
          overnight  does. Swapping out all RAM didn't help. The relevant
          part of a typical compile session log follows.
     _________________________________________________________________

Describe your problem's symptoms in chronological order

   The  most useful clues in figuring out something that went wrong often
   lie  in the events immediately prior. So, your account should describe
   precisely  what  you  did, and what the machine did, leading up to the
   blowup.  In  the  case of command-line processes, having a session log
   (e.g., using the script utility) and quoting the relevant twenty or so
   lines is very useful.

   If  the program that blew up on you has diagnostic options (such as -v
   for verbose), try to think carefully about selecting options that will
   add useful debugging information to the transcript.

   If  your account ends up being long (more than about four paragraphs),
   it might be useful to succinctly state the problem up top, then follow
   with the chronological tale. That way, hackers will know what to watch
   for in reading your account.
     _________________________________________________________________

Don't ask people to reply by private email

   Hackers  believe  solving  problems  should  be  a public, transparent
   process  during  which  a  first  try  at  an answer can and should be
   corrected  if someone more knowledgeable notices that it is incomplete
   or   incorrect.  Also,  they  get  some  of  their  reward  for  being
   respondents from being seen to be competent and knowledgeable by their
   peers.

   When  you ask for a private reply, you are disrupting both the process
   and the reward. Don't do this. It's the respondent's choice whether to
   reply  privately -- and if he does, it's usually because he thinks the
   question is too obvious or ill-formed to be interesting to others.

   There  is  one  limited  exception  to  to this rule. If you think the
   question  is such that you are likely to get a lot of answers that are
   all  pretty  similar,  then  the  magic  words  are "email me and I'll
   summarize  the answers for the group". It is courteous to try and save
   the  mailing  list  or  newsgroup  a  flood of substantially identical
   postings -- but you have to keep the promise to summarize.
     _________________________________________________________________

Prune pointless queries

   Resist   the   temptation   to   close  your  request  for  help  with
   semantically-null questions like "Can anyone help me?" or "Is there an
   answer?"  First,  if  you've  written your problem description halfway
   competently, such tacked-on questions are at best superfluous. Second,
   given  the  foregoing, the question verges on being actively annoying,
   inviting dismissive albeit logically impeccable answers like "Yes" and
   "No"
     _________________________________________________________________

Courtesy never hurts, and sometimes helps

   Be courteous. Use "Please" and "Thanks in advance". Make it clear that
   you appreciate the time people spend helping you for free.

   To  be  honest, this isn't as important as (and cannot substitute for)
   being   grammatical,   clear,   precise   and   descriptive,  avoiding
   proprietary formats etc.; hackers in general would rather get somewhat
   brusque  but  technically sharp bug reports than polite vagueness. (If
   this puzzles you, remember that we value a question by what it teaches
   us.)

   However,  if you've got your technical ducks in a row, politeness does
   increase your chances of getting a useful answer.
     _________________________________________________________________

Follow up with a brief note on the solution

   Send  a  note after the problem has been solved to all who helped you;
   let  them know how it came out and thank them again for their help. If
   the problem attracted general interest in a mailing list or newsgroup,
   it's appropriate to post the followup there.

   Your  followup doesn't have to be long and involved; a simple "Howdy -
   it  was  a  failed  network  cable! Thanks, everyone. - Bill" would be
   better than nothing. In fact, a short and sweet summary is better than
   a long dissertation unless the solution has real technical depth.

   Besides  being  courteous and informative, this sort of followup helps
   everybody  who  assisted  feel a satisfying sense of closure about the
   problem.  If  you  are  not a techie or hacker yourself, trust us that
   this feeling is very important to the gurus and experts you tapped for
   help.  Problem  narratives  that trail off into unresolved nothingness
   are  frustrating  things;  hackers itch to see them resolved. The good
   karma  that  scratching that itch earns you will be very, very helpful
   to you next time you need to pose a question.
     _________________________________________________________________

How To Interpret Answers

RTFM and STFW: How To Tell You've Seriously Screwed Up

   There  is  an  ancient and hallowed tradition: if you get a reply that
   reads  "RTFM",  the person who sent it thinks you should have Read The
   F***ing Manual. He is almost certainly right. Go read it.

   RTFM has a younger relative. If you get a reply that reads "STFW", the
   person who sent it thinks you should have Searched The F***ing Web. He
   is almost certainly right. Go search it.

   Often,  the  person  sending either of these replies has the manual or
   the  web page with the information you need open, and is looking at it
   as he types. These replies mean that he thinks (a) the information you
   read  is easy to find, and (b) you will learn more if you seek out the
   information than if you have it spoon-fed to you.

   You  shouldn't be offended by this; by hacker standards, he is showing
   you  a  rough  kind  of respect simply by not ignoring you. You should
   instead thank him for his grandmotherly kindness.
     _________________________________________________________________

If you don't understand...

   If  you  don't understand the answer, do not immediately bounce back a
   demand  for clarification. Use the same tools that you used to try and
   answer  your  original  question  (manuals,  FAQs,  the  Web,  skilled
   friends)   to   understand   the  answer.  If  you  need  to  ask  for
   clarification, exhibit what you have learned.

   For  example,  suppose  I tell you: "It sounds like you've got a stuck
   zentry; you'll need to clear it." Then:

   Here's a bad followup question: "What's a zentry?"

   Here's a good followup question: "OK, I read the man page and zentries
   are  only mentioned under the -z and -p switches. Neither of them says
   anything  about  clearing zentries. Is it one of these or am I missing
   something here?"
     _________________________________________________________________

On Not Reacting Like A Loser

   Odds  are,  you'll screw up a few times, on hacker community forums --
   in  ways  detailed  in  this  article,  or similar. And you'll be told
   exactly how you screwed up, possibly with colourful asides. In public.

   When  this  happens,  the  worst  thing  you can do is whine about the
   experience,  claim  to have been verbally assaulted, demand apologies,
   scream,  hold  your  breath,  threaten  lawsuits, complain to people's
   employers, leave the toilet seat up, etc. Instead, here's what you do:

   Get over it. It's normal. In fact, it's healthy and appropriate.

   Community  standards do not maintain themselves: They're maintained by
   people  actively  applying  them, visibly, in public. Don't whine that
   all  criticism  should have been conveyed via private mail: That's not
   how  it  works.  Nor  is  it  useful  to insist you've been personally
   insulted  when  someone comments that one of your claims was wrong, or
   that his views differ. Those are loser attitudes.

   There  have  been  hacker forums where, out of some misguided sense of
   hyper-courtesy, participants are banned from posting any fault-finding
   with another's posts, and told "Don't say anything if you're unwilling
   to  help the user." The resulting departure of clueful participants to
   elsewhere  causes  them  to descend into meaningless babble and become
   useless as technical forums.

   Exaggeratedly "friendly" (in that fashion) or useful: Pick one.

   Remember:  When  that hacker tells you that you've screwed up, and (no
   matter  how  gruffly) tells you not to do it again, he's acting out of
   concern for (1) you and (2) his community. It would be much easier for
   him  to ignore you and filter you out of his life. If you can't manage
   to be grateful, at least have a little dignity, don't whine, and don't
   expect  to  be  treated  like  a  fragile  doll  just because you're a
   newcomer  with  a  theatrically  hypersensitive  soul and delusions of
   entitlement.
     _________________________________________________________________

Questions Not To Ask

   Here  are some classic stupid questions, and what hackers are thinking
   when they don't answer them.

   Q: Where can I find program X?
   Q: I'm having problems with my Windows machine. Can you help?
   Q: I'm having problems installing Linux or X. Can you help?
   Q: How can I crack root/steal channel-ops privileges/read someone's
          email?

   Q: Where can I find program X?

   A:  The  same  place  I'd  find  it, fool -- at the other end of a web
   search. Ghod, doesn't everybody know how to use Google yet?

   Q: I'm having problems with my Windows machine. Can you help?

   A: Yes. Throw out that Microsoft trash and install Linux.

   Q: I'm having problems installing Linux or X. Can you help?

   A:  No. I'd need hands-on access to your machine to troubleshoot this.
   Go ask your local Linux user group for hands-on help.

   Q:  How  can  I crack root/steal channel-ops privileges/read someone's
   email?

   A:  You're  a  lowlife  for  wanting to do such things and a moron for
   asking a hacker to help you.
     _________________________________________________________________

Good and Bad Questions

   Finally,  I'm  going to illustrate how to ask questions in a smart way
   by  example; pairs of questions about the same problem, one asked in a
   stupid way and one in a smart way.

   Stupid: Where can I find out stuff about the Foonly Flurbamatic?
          This question just begs for "STFW" as a reply.

   Smart: I used Google to try to find "Foonly Flurbamatic 2600" on the
          Web, but I got no useful hits. Does anyone know where I can
          find programming information on this device?
          This  one  has  already SFTWed, and sounds like he might have a
          real problem.

   Stupid: I can't get the code from project foo to compile. Why is it
          broken?
          He assumes that somebody else screwed up. Arrogant of him.

   Smart: The code from project foo doesn't compile under Nulix version
          6.2. I've read the FAQ, but it doesn't have anything in it
          about Nulix-related problems. Here's a transcript of my
          compilation attempt; is it something I did?
          He's specified the environment, he's read the FAQ, he's showing
          the  error,  and and he's not assuming his problems are someone
          else's fault. This guy might be worth some attention.

   Stupid: I'm having problems with my motherboard. Can anybody help?
          J.  Random Hacker's response to this is likely to be "Right. Do
          you  need  burping  and diapering, too?" followed by a punch of
          the delete key.

   Smart: I tried X, Y, and Z on the S2464 motherboard. When that didn't
          work, I tried A, B, and C. Note the curious symptom when I
          tried C. Obviously the florbish is grommicking, but the results
          aren't what one might expect. What are the usual causes of
          grommicking on MP motherboards? Anybody got ideas for more
          tests I can run to pin down the problem?
          This  person,  on the other hand, seems worthy of an answer. He
          has  exhibited problem-solving intelligence rather than waiting
          for an answer to drop from on high.

   In  the  last  question,  notice  the  subtle but important difference
   between  demanding  "Give me an answer" and "Please help me figure out
   what additional diagnostics I can run to achieve enlightenment."

   In  fact,  the  form  of that last question is closely based on a real
   incident  that  happened  in  August  2001 on the linux-kernel mailing
   list.  I  was  the  one  asking  the  question that time. I was seeing
   mysterious  lockups  on  a  Tyan  S2464  motherboard.  The listmembers
   supplied the critical information I needed to solve them.

   By  asking  the  question in the way I did, I gave people something to
   chew  on;  I  made  it easy and attractive for them to get involved. I
   demonstrated respect for my peers' ability and invited them to consult
   with  me  as  a peer. I demonstrated respect for their time by telling
   them the blind alleys I had already run down.

   Afterwards,  when I thanked everyone and remarked how well the process
   had  worked, an lkml member observed that he thought it had worked not
   because I'm a "name" on that list, but because I asked the question in
   the proper form.

   We  hackers  are in some ways a very ruthless meritocracy; I'm certain
   he  was  right,  and  that if I had behaved like a sponge I would have
   been  flamed  or  ignored  no  matter who I was. His suggestion that I
   write  up  the whole incident as an instruction to others led directly
   to the composition of this guide.

------------------------------------------------------------


_______________________________________
CREC LUG mailing list (LUGlist)
[EMAIL PROTECTED]
http://tux.reccal.ernet.in/mailman/listinfo/lug
http://202.41.105.20/mailman/listinfo/lug




I'd change the world,but God won't give me the source code


_________________________________________________________
Do You Yahoo!?
Get your free @yahoo.com address at http://mail.yahoo.com


Reply via email to