in reply to Fighting the denigration of hacking
Example:
I was doing some performance testing, and I found that the odbc.ini file on a server kept getting corrupted when the system was under heavy load. I filed a bug on it, but I didn't want to halt testing until I could get a fix. I wrote a quick perl script to check the file every second to see if it existed and replace it if it was corrupted. With this hack in place I was able to continue testing.
A few builds later, the problem had been fixed. I assumed that someone had gone into the code, found the cause, and fixed the fault that caused the file corruption. Wrong. My hack was simply rolled into the code base. That is the danger of hacking code: temporary fixes often become permanant.
"What do I want? I'm an American. I want more."
|
---|