All Academic, Inc. Research Logo

Info/CitationFAQResearchAll Academic Inc.
Document

Defiant Programming: The Culture of Easter Eggs and its Fandom
Unformatted Document Text:  5 granted non-programmers and laypeople access to the Easter eggs. The hunt for Easter eggs has since garnered a huge following online. Now, there are hundreds of web sites dedicated to the search for, cataloging and creating Easter eggs. The fans of this phenomenon are fascinated by the potential of hidden options, by exploring new and secret eggs, especially the most subversive or provocative Easter eggs which illustrate the programmers’ sense of humor. Some of the best known Easter eggs are those hidden within popular games such as Tomb Raider II, where a certain sequence of keystrokes and commands causes Lara Croft to turn into a monster, or those hidden within the ubiquitous Microsoft applications, such as Microsoft Office. For example, Microsoft Excel 97 contained a hidden 3D-flight simulation culminating in a monument crediting the programmers. While early Easter eggs were usually simple to access, by typing in a word or command known only to the programmer, the activation procedures for current Easter eggs have become increasingly elaborate. These usually involve a series of uncomplicated, yet completely random commands, which must be followed precisely and without deviation in order to activate the Easter egg correctly. For example, the instructions for activating the “Lara/Monster” Easter egg in Tomb Raider II are as follows: Go to level 3 - Turn around 5 times - Shoot 8 times with the shotgun - Jump up 3 times - Minimize the Tomb Raider II window - Maximize the window – ‘Dive' with insert 4 times - type in ALT+TAB+scary and run into a wall. Poof! Now Lara is a giant dragon. (from eeggs.com) The instructions for activating the 3D-flight simulation Easter egg in Microsoft Excel 97 are:

Authors: Temkin, Einat.
first   previous   Page 6 of 27   next   last



background image
5
granted non-programmers and laypeople access to the Easter eggs. The hunt for Easter
eggs has since garnered a huge following online. Now, there are hundreds of web sites
dedicated to the search for, cataloging and creating Easter eggs. The fans of this
phenomenon are fascinated by the potential of hidden options, by exploring new and
secret eggs, especially the most subversive or provocative Easter eggs which illustrate the
programmers’ sense of humor. Some of the best known Easter eggs are those hidden
within popular games such as Tomb Raider II, where a certain sequence of keystrokes
and commands causes Lara Croft to turn into a monster, or those hidden within the
ubiquitous Microsoft applications, such as Microsoft Office. For example, Microsoft
Excel 97 contained a hidden 3D-flight simulation culminating in a monument crediting
the programmers.
While early Easter eggs were usually simple to access, by typing in a word or
command known only to the programmer, the activation procedures for current Easter
eggs have become increasingly elaborate. These usually involve a series of
uncomplicated, yet completely random commands, which must be followed precisely and
without deviation in order to activate the Easter egg correctly. For example, the
instructions for activating the “Lara/Monster” Easter egg in Tomb Raider II are as
follows:
Go to level 3 - Turn around 5 times - Shoot 8 times with the shotgun - Jump
up 3 times - Minimize the Tomb Raider II window - Maximize the window –
‘Dive' with insert 4 times - type in ALT+TAB+scary and run into a wall.
Poof! Now Lara is a giant dragon. (from eeggs.com)
The instructions for activating the 3D-flight simulation Easter egg in Microsoft Excel 97
are:


Convention
All Academic Convention can solve the abstract management needs for any association's annual meeting.
Submission - Custom fields, multiple submission types, tracks, audio visual, multiple upload formats, automatic conversion to pdf.
Review - Peer Review, Bulk reviewer assignment, bulk emails, ranking, z-score statistics, and multiple worksheets!
Reports - Many standard and custom reports generated while you wait. Print programs with participant indexes, event grids, and more!
Scheduling - Flexible and convenient grid scheduling within rooms and buildings. Conflict checking and advanced filtering.
Communication - Bulk email tools to help your administrators send reminders and responses. Use form letters, a message center, and much more!
Management - Search tools, duplicate people management, editing tools, submission transfers, many tools to manage a variety of conference management headaches!
Click here for more information.

first   previous   Page 6 of 27   next   last

©2012 All Academic, Inc.