====
Introduction
====
In the hacker world, what kind of answer can you get when it is proposed a technical issue? This depends on the excavation answer
The difficulty is also dependent on what you ask. This guide is intended to help you improve your skills to get your most
Want answer.
First of all, you must understand that hackers only prefer arduous tasks, or can inspire their thinking. If
Otherwise, are we going to do? If you have a good question worthy of chewing the taste, we will feel
The exhaustion. A good problem is that incentives, it is a thick gift, you can improve our understanding, and usually expose us to
Never realize or think about problems. For hackers, "Ask!" Is a strong call from the heart.
Thumbs up.
Although the hacker has a despise simple problem and unsophisticated bad name, sometimes it seems that we have a new hand,
It is actually not that happened to poorer, but it is actually not that.
We don't want to cover some people's contempt - they don't want to think, or don't complete them before you ask questions.
What to do. This kind of person will only murder - they are only willing to ask, never pay, do not consume our time
And we can use time to use the time in more interesting questions or more worth answering. We call such a
Artificial "Loser" (due to historical reasons, we sometimes spell "lusers").
We also know that many people just want to use the software we have written, and there is nothing interest in technical details. Most people
We do, the computer is just a tool, a means of achieving the purpose; they have more important things to do
There is more important life. We understand this, and we don't expect everyone to other we are crazy.
The problem is interested. However, the style of our answering questions is for such a group of people - they are interested, and wish
Actively participate in the problem solving. This will not change, nor should it change; if we change, we will lose me.
They are proud of the efficiency.
We have a large extent belong to volunteers, with a busy life to solve the answer, and often
Question is overwhelmed. So we ruthlessly filter out some topics, especially those who look like a loser.
In order to make more efficient use of time to answer the victorious problem.
If you think that we are too arrogant, let you not be cool, let you wrote, you can think about it. We and
Didn't ask you to succumb to us - in fact, most people in our favorite fair trade, as long as
You pay a small effort to meet the minimum requirements, we will welcome you to join us. but
Let us help those who are unwilling to help themselves. If you can't accept this "discrimination"
, We recommend that you spend money to find a business company to sign a technical support agreement, don't give help to hackers.
If you decide to help us, of course, I don't want to be considered a loser, and I don't want to be a member of the loser.
The best way to get an effective answer is true like the winner - smart, confident, and solve the problem.
The idea is just that occasionally needs a little help on a specific issue.
(Welcomes improvements to this guide. Any suggestion, please e-mail to esr@thyrsus.com, however, please
It means that this article is not a general guide for the network etiquette, I usually refuse to get useful answers in the technical forum.
Suggestions. )
(Of course, if you write Chinese, it is best to send it to DHGRAND@hotmail.com ;-)
=========
Before question
=========
Check that you have to do it before the technical issue is made by email, newsgroups or chat rooms:
1. Read the manual, try to find an answer yourself.
2. Look in the answer in FAQ (a well-maintained FAQ can include :).
3. Search online (personal recommendation google ~~~).
4. I am in listening to your friends.
When you ask questions, you must first explain what you have before this; this will help to establish your shape.
Like: You are not a beggar who is looking for alone, and does not want to waste others. Can explain you from these
What happened to school. If the questioner can learn something from the answer, we are more happy to answer his
problem.
Thoughtful thinking, ready for your problem, the grass rate can only get an answer to the grass rate, or you can't get it.
Any answer. The more you show your efforts to solve the problem before seeking help, the you can get a substantive help.
help.
Be careful, don't ask questions. If your problem is based on wrong assumption, ordinary hackers (J. Random
Hacker usually uses meaningless literal explanation to reply you, thinking about "stupid problem ...", hope
You will learn from the question's answer (not the answer you want).
Never think of being qualified to get answers, you don't have this eligibility. After all, you didn't pay any report for this service.
Claim. You have to go to "earn" back to an answer, rely on a connotation, interesting, thinking
Using the problem - a problem with a potential contribution to the experience of the community, not just the passive from others
Knowledge - to earn this answer.
On the other hand, you are willing to do something in the process of finding the answer, it is a very good start. "Who can
Give some prompt? "," What is missing in this example? " "And" Where should I check? "ratio"
Please post the exact process "It is easier to get a reply. Because you look for the right direction,
You have the ability and determination to complete it.
=========
How to ask questions
=========
----------------
Care to choose the forum
----------------
Carefully choose to ask questions. If you are likely to be described below, you are likely to be ignored or as a failure.
By:
1. Issues in the forum in the wind horse
2. In the discussion of advanced skills, it posted very primary questions;
3. Posted at too many different news groups
The hackers usually cut off the problem of the wrong place to protect their communities that have not been submerged by a lot of posts. you do not
Will hope that your post is cut off.
In general, the problem is sent to a well-selected public forum, which is more likely to be used than the closed small circle.
answer. This phenomenon has a variety of reasons, one of which is the public forum has more potential questions; another
The reason is that there is more audience in the public forum. Hackers are more willing to make tricks - rather than one or two
- Benefit from answering.
----------------
Try to use the mailing list
----------------
If a project has its own development mailing list, you should send the problem to this mailing list instead of a developer.
Even if you are very clear, who is best to answer your questions. Check the project documentation and project homepage, find this item
Destination Mail list address, this reason is four:
1. Any problem worth asking a developer is worth mentioning to the entire development group. Converse, if you recognize
It is not worth mentioning in the mailing list for this issue, there is no reason to use it to harass any developer.
2. Ask questions on the mailing list to share the developer's workload. A developer (especially when he is the project
In the case of a person), you may have no time to answer your questions. 3. Most mailing lists have historical archives, and they can retrieve in the search engine. People can
Find your questions and answers, don't ask in the list over and over again.
4. If a problem is often proposed, developers can improve documents or improved software accordingly to reduce users
Confusion. And if the problem is always proposed in private, there will be no one has a whole grasp of this.
If you can't find the item list address of the project, you can only see the project maintainer, then write to the maintor.
In this case, don't think that the mailing list does not exist. Show you in your letter that you have tried to find, still no
Find the list of emails. In addition, you don't mind transfer this news to others. (Most people think that private letters should
This is private, even if there is nothing confidential. Allow your news to be forwarded to others, gave it
Letter a choice to handle your email. )
----------------------------
Use the vocabulary, the syntax is correct, spelling
----------------------------
We found out from experience, careful writers are often horses and tigers (I dare to make package). Answer thick
The problem of my heart is not worth it, we would rather spend other things else.
Therefore, it is very important to clearly express your problems. If you are suspected of doing this, we will also be lazy
you. Pay attention to your use of your use, don't have to formally formally formally - in fact, the values of hacker culture
It is not subject to the session. Accurately use slang and humorous language, but don't use it; you must indicate you
Thinking, paying attention.
Correct spelling, punctuation and case is important. Don't put "ITS" and "IT's" or "LOOSE" and
"Lose" is confused. Don't use all uppercase forms, this is considered to be exciting loudly (all write
Also, where, because this will bring difficulties to read. Alan Cox can use all lowercase, but you can't
).
More general, if your question is written like a half illiteracy, you are likely to be ignored. If you write like a
Peek (cracking enthusiast) or grayscale (only the troubles of ready-made tools) is definitely yourself, guarantee
In addition to ruthless boycots, you can't get anything (or the best ending is a big pile of hardships. "
help").
If you ask questions in using non-nominal forums, you can make a bad mistake in spelling and grammar - but I can't think about it.
I have a horse tiger (all right, we can figure out the differences of the two). In addition, unless you know your answer.
What language is used, otherwise please use English. Hackers in a hurry often skip their problems they don't understand.
, English is a working language on the network. Use English to reduce your problem until you are abandoned
.
------------------
Send a problem with easy read format
------------------
If artificially causing your question, it is difficult to read and understand, it will be easier to be ignored. So you want:
1. Use a plain text message, do not use HTML (Turn off HTML is not difficult).
2. You can usually be attached to the MIME attachment, but must have real content (such as additional source files or patches)
), Not just a file template generated by your mail client (for example, a copy of your message).
3. Do not put all the questions in a full segment of non-stop. (This will make the respondents difficult to answer one
Some questions, even if you can answer all the questions, I also want to have a clear one :). Very likely
The recipient can only read the letter on a text display of 80 character widths, so it is necessary to set the row surround mode within 80 characters.
4. Do not use mime quoted-printable encoding in English forum; this encoding format is ASCII
The language that cannot be expressed is very necessary, but many mail agents do not support it, at this time, ""
= 20 "Symbols are separated by text, and it is difficult to see and distract.
5. Never expect the hacker to read the file format of the closed ownership, such as the soft Word format.
Most hackers respond to this is like a pig manure that you are full of hot baking on the ladder (meaning who is not going to enter.
Your door - Translator Note).
6. If you send an email through a computer that install Windows, close the soft and stupid "intelligent reference" work
can. This will make you free from junk characters in the email.
----------------------------
Use rich use, describe accurate title
----------------------------
In the mailing list or news group, the topic title within about 50 words is the golden gold for the attention of senior experts.
opportunity. Don't use your chatter "help" (more don't say "help !!!!!" This is dissentful.
Waves this opportunity. Don't want to use your pain to touch us, don't use space instead of problems.
Description, even is an extremely short description.
Stupid question:
Help! My lap is not displayed normally!
Smart problem:
XFree86 4.1 The mouse cursor deformation, the display chip of the FooWare MV1005.
If you ask questions in your reply, remember to modify the content headline, indicating that there is a problem. A look
It is difficult to attach importance to "Re: Test" or "Re: New Bug". In addition, quote and delete
Leave the contents of the previous article leaves a clue to the new readers.
------------------
Accurate description, large information
------------------
1. Carefully describe the symptoms.
2. Provide a problem that occurs (machine configuration, operating system, application, and other).
3. Explain how you study and understand this problem before you ask questions.
4. Note What steps you have taken before you ask questions.
5. Russen has recently made hardware, software changes that may have an impact.
Try to think about how a hacker will ask you, give him an answer when you ask questions.
Simon Tatham wrote an excellent essay called "How to Effective Report Bug". Strongly recommend you to read
A read.
------------
Not too much
------------
You need to provide accurate and effective information. This is not asking you to simply put into tons of error code or data.
Full dump is extracted into your question. If you have a large and complicated test condition, try to cut it smaller
The better.
There is at least three points everywhere. First, showing your efforts to simplify the problem, this can make you
The opportunity to answer is increased; second, simplify the problem to increase the opportunity to get useful answers; third, refining
During your Bug report, maybe you can find a problem or make corrections.
------------------
Just say symptoms, don't talk about guess
------------------
Tell the hacker that you think there is no help. (If your inference is so effective,
Is it helpful to others? Therefore, be sure that your original original this tells the symptoms of their questions, don't add you.
Strong understanding and inference. Let hackers diagnose it.
Stupid question:
I met a SIG11 error again in the kernel compilation, I suspect that a flying line is on the board of the motherboard.
What should this be the best? Smart problem:
A set of k6 / 233 systems I made, the motherboard is FIC-PA2007 (VIA Apollo VP2 chipset), 256MB
Corsair PC133 SDRAM, frequently generating SIG11 errors in the kernel compilation, 20 minutes from the boot
In this case, never happened within 20 minutes before booting. It is also useless to restart, but it will be connected one night.
Work for 20 minutes. All memory has changed, no effect. Typical compilation records in the relevant part ....
------------------
Symptom symptoms in time
------------------
The most helpful clues to find out the problem, often a series of operations before the problem, so your description
Should include operation steps, as well as the computer's reaction until the problem is generated. In the case of a command line operation,
Save an operational record (for example, using scripting tools), and reference related to about 20 commands will be greatly helpful
.
If the crash has a diagnostic option (for example with -v to detailed mode), try to carefully consider the selection options
Add useful debug information in operation records.
If your description is very long (more than four paragraphs), there will be helpful in the beginning of the shortcomings, next time
Details in order. This hacker knows what to find in your instructions.
----------------
Don't ask private reply
----------------
The hackers think that the problem should have an open and transparent process. As long as any more people have noticed the answer
Impermatics or incorrectly, this initial answer can be corrected and should be corrected. At the same time, through ability and
Knowledge is taken to pay attention to everyone, and the answer is the reward you should have.
If you ask the other party to answer you privately, this has destroyed the entire process and also destroyed the reward system. Don't mention this
Seeking, this is the right of the respondent, by him to choose whether or not to reply privately - if he chooses to do this, usually because
For him, this answer is too obvious or adversely affected, others will not be interested.
There is only one limited exception: if you expect to receive a lot of similar answers, you can say: "Send the answer
Give me, let me summarize it. "A list of mail lists or newsgroups will be rescued from a large number of repetitive posts.
There is a gentleman's style - but please remember, fulfill your commitment to summarize.
----------------
Understand what you want to ask
----------------
There is no margin, and there is almost no time black hole. People who can give you useful answers are also the busiest people.
(They are busy because they must do most of them. Such people don't have a cold in black cave for unwaffled time
Therefore, it can also be said that they have a bad cold to have no margin.
If you express what you need to answer what you need to answer (provide suggestions, send a code, check your patch or
Others), it is most likely to get useful answers. This will set a time and energy limit for easy answers.
It is very good to concentrate on helping you.
To understand the world of experts living, we must imagine professional skills as abundant resources, and the time to reply is poor
Surgents. Solve your problem, the less time you need, the more you can take an answer from a busy expert port.
Therefore, the structure of the optimization problem, try to reduce the experts to solve the time it needs, will have a lot of help
- This is often distinguished from this usual and simplified issues. So, ask "I want to better understand X, can I give some prompts?"
Usually compared to "Can you explain X?" Better. If your code can't work, ask what is
Between the party, it is much better than you ask for someone else. ---------------------------------------------------------------------------------------------------------------------------------------
Don't ask questions that should be solved by yourself.
---------------------------------------------------------------------------------------------------------------------------------------
Hackers are always good at distinguishing which issues should be solved by yourself; because most of us have solved themselves
This kind of problem is decided. Similarly, these problems have to be done by you, you will learn from the middle. You can ask for a point
Tips, but do not require a complete solution.
----------------
Remove meaningless questions
----------------
Don't use meaningless words to end your questions, for example, "Can someone help me?" Or "Is there an answer?". First of all:
If you are not very suitable for the problem, this is more painful. Second: Due to this question, it is a snake
Foot, hackers will be tired of you - and usually use logically correct answers to represent their contempt, for example
"Yes, someone can help you" or "no, no answer".
----------------------------
Humility is not harmful, and often help
----------------------------
Gift, use "please" and "first thank you first." Let everyone know that you spend time a matter of time.
Help the heart gratitude.
To tell the truth, although this is not like grammar, it is clearly accurate description, avoiding private formats, etc.
It can't be used to replace them); hackers are generally preferred to directly and technical kens reports, and
Not a courteous nonsense (if this makes you confuse, please remember, we measure the standard of a problem value
The quasi is: it can let us learn how much).
However, if you have a lot of problems, you can't solve it, and the courtesy will increase your opportunity to get useful answers.
(We note that since this guide is released, the only serious defective feedback from the Senior Hacker is
This article is known in advance. Some hackers feel that "thank you", I will not thank anything.
People. Our suggestions are: all thank you. )
---------------------------------------------------------------------------------------------------------------------------------------
After the problem is solved, add a short description
---------------------------------------------------------------------------------------------------------------------------------------
After the problem is resolved, send someone to all people who have helped you, let them know how the problem is solved, and then
Thank you once. If the problem has attracted extensive attention in newsgroups or email, it should be
There is a supplementary description there.
Supplementary instructions don't have to be long or deep; a simple sentence "Hello, it turned out to be a problem with the network! Thank you big
Home - Bill "is more powerful than anything. In fact, unless the conclusion is really technical, it will be short
Love's summary is better than the academic papers. Explain how the problem is solved, but you don't have to solve the problem.
The process is repeated.
In addition to representing politeness and feedback, this supplement helps others search in mailing list / newsgroups / forum
Sorps have a complete solution you have helped, which may also be useful to them.
Finally (at least?), This supplement helps all people who have provided help have been satisfied. If you
I am not a man or a hacker, I believe us, this feeling is for those tutors you ask for help or
Experts are very important. The problem will be discouraged for a long time; the hackers are eager to see the problem is resolved.
. Good people have good news, meet their desire, you will taste the sweetness when you post new questions.
============
How to understand the answer
============ --------------------
RTFM and STFW: Don't bother me.
--------------------
There is an old and sacred tradition: if you receive "RTFM (Read The Fucking Manual)"
Reply, the respondent thinks you should read the TMD manual. Of course, basically he is right, you should read it.
RTFM has a young relative. If the answer is "STFW (SEARCH THE FUCKING WEB",
The answer thinks you should go to TMD online search. Basically, he is also right, you will go.
Usually, one of these two sentences to answer your person will give you a manual or a URL that you need content.
And they are reading when they hit these words. These replies mean that the answer is considered (1). You need
The information is very easy to get; (2). You can search for this information than filling you to make you learn more.
Don't be unhappy for this; in accordance with the standard of hackers, he has not regards the requirements of you, it is already able to get ridiculous
Show your attention to you. You should express our gratitude to his grandmother.
------------
Still don't understand
------------
If you are not very understanding, don't immediately ask the other party to explain. I like you to solve the problem before you have tried it.
(Using the manual, FAQ, the master, the master, the master is used to understand it. If you really need the other party to explain,
I remember what you have learned.
For example, if I answer you: "It seems that ZENTRY is blocked; you should clear it first."
Rear:
A worse follow-up question: "What is ZENTRY?"
Smart questioning should be like this: "Oh ~~~ I have seen help but only -z and -p two parameters mentioned.
ZENTRY and there are no clear explanations: ? " ------------ Endlessly ------------ Many of the hacker circles have difficulty in fighting and unfolding. More appropriate, this is a straightforward, not talking nonsense The product of the communication method, this communication mode is derived from the solution of people concerned - how many people feel warm Stylish but still paste - the nature. If you feel that you are treated with rude, please stay calm. If someone has a crude wild, there will be a list / Newsgroup / forum's elders find him talk, if not, and you are full of temper, it is likely to The words and deeds are the hacker community behavioral standard license, and you are considered to be fault. This will not be good for you to get information. Or help. On the other hand, you can also have a rough words and mentality without any reason. The other side of the above phenomenon is that people Allow the truly feliners, and analyze their inappropriate words and deeds with a sharp speech. If you really decide this Do it, take care of your own components. Reasonable rudeness and a meaningful meaning There is only a fine line between the war, and the hacker who has lost the collision is not a few; if you are a novice or Outside the door, the opportunity to not commit this fault is very embarrassing. If you want to get information, not to come trouble, don't take risks Reply, the hand is best taken from the keyboard. (Some people claim that most hackers have mild symptoms of lonely or social disorder syndrome, and indeed lacks The "common people" brain tissue structure of social behavior. This may be true, maybe not. If you It is not a hacker, then, people we imagine that there is a defective person who will help you face our weird. Have something to do Say, we don't care; we are happy to live according to your own ideas, and always keep a quite doubtful attitude toward medical concept. ) In the next section, we will talk about another topic; "Rude" that may be encountered when you walk in the wrong way. ================ Never like a loser ================ It is very likely that your forums in the hacker community will be subject to many public attacks - with the various ways mentioned herein or Similar methods, and it is likely to have a wide range of bypass sides to tell you how you hate you. If the nightmares come true, what you can do is complaining, complaining that you are attacked by personal attacks, ask each other Apologize, scream, breathe, threaten to complain to each other, tell his boss, do not set a toilet seat, etc. and many more. However, you should do this: Let's go, this is not very dense. In fact, it is appropriate and beneficial (mainly health:). The community's norms do not rely on communities, but to actively promote their people to maintain, this maintenance is open, show Observe. Don't complain that all criticism should be transferred through private letter, it shouldn't be the same. Others finger If you have a mistake, or when he has different views, he insists that he is shame you are useless. This Some are the attitude of the loser. There are some hacker forums, for the misunderstanding of highly self-modest, prohibiting participants from posting for the post And notified "If you don't want to help users, shut up.", They think that the topic of participants It will only make them intoxicated in the meaningless chatter, thereby losing the meaning of the technical forum. Exaggerated "Friendly" (in that way) is also useful help: You choose. Remember: When hackers say you are very annoying, (either with how much language) warns you, don't do it again, his It is not targeted (1) you, and (2) his community. He can easily ignore you, take you from him. Wipe in the sight. If you can't accept your gratitude to him, at least you should show your gas, don't complain Don't expect just because you are a newcomer, you have the drama sensitive fragile nerve and self-sealing rights, and Treatment of broken dolls. ========== Think twice ========== The following is a few classic and stupid problems, as well as the hacker thinks in the heart of refusing to answer: Question: Where can I find the X program? Question: My program / configuration / SQL declaration is useless Question: My windows has problems, can you help me? Question: I have problems when I installed Linux (or X), can you help me? Question: How can I crack the root account / steal OP privilege / read the email? Question: Where can I find the X program? Answer: Just find it, the idiots - the one of the search engine. Scorpio! Someone will not use Google? Question: My program (configuration, SQL declaration) does not answer: This is not a problem, I am not interested in finding your true problem - if I want me to ask you 20 questions If I find it out - I have something more interesting. When you see this problem, my reaction is There are often three kinds: 1. Do you have anything to add? 2. It's really bad, I hope you can get it. 3. Do you have any birds with me? Question: My windows has problems, can you help me? Answer: Can you, throw away the soft rubbish, change Linux. Question: I have problems when I installed Linux (or X), can you help me? Answer: You can't, I only personally get a problem in your computer. Still going to find your local The Linux user group seeks the guidance of handlers (you can find the list of users here). Question: How can I crack the root account / steal OP privilege / read someone else's mail? Answer: I want to do this, indicating that you are a man; if you want to find a hacker to help you, you are an idiot! ============== Good problem, bad problem ============== Finally, I will give some examples to explain how smart questions; the two questions in the same question are put together One is stupid, the other is wise. Stupid question: Where can I find information about FOONLY FLURBAMATIC? This question is nothing to get the answer "STFW". Smart question: I have searched "Fooly FluRbamatic 2600" with Google, but I didn't find useful. result. Who knows where to find information on this kind of equipment? This problem has been STFW, it seems that he really encounters trouble. Stupid question: I can't compile the source code I found from the Foo project. How is it so bad? He feels all the faults of others, this arrogant guy Smart question: The Foo project code cannot be compiled by the Nulix 6.2. I have read FAQ, but there is no There is a question related to Nulix. This is the record of my compilation process. Is there anything wrong with me? ? He talked about the environment and also read FAQ, but also pointed a mistake, and he did not push the responsibility of the problem to others. On the head, this guy is worth paying attention. Stupid question: I have a problem with my motherboard. Who will help me? Ordinary hackers answer to this type of question is usually: "Okay, have you to take back and change diaper?", Then press the delete key. Smart question: I tried X, Y and Z on the S2464 motherboard, but I didn't work, I tried A, B and C again. Please note that when I try C's strange phenomenon. It is obvious that contraction occurs in the sideband transmission, but the result is unexpected. What is the usual reason that causes a sideband leak on a multiprocessor motherboard? Who has a good idea, I should do something? Can you find a problem? This guy, from another perspective, worth answering him. He shows the ability to solve the problem, not It is sitting waiting for the answer. In the last question, pay attention to "tell me the answer" and "give me the revelation, point out what diagnosis I should do. Work "is subtle and important. In fact, the latter problem is derived from a real question on the list of Linux kernels in August 2001. I (ERIC) is the person who made a question. I observed this unable to explain on the TYAN S2464 motherboard. Locking phenomenon, list members provide important information about solving that problem. Through my question method, I gave you something worthy of playing; I make people easily participate in and attracted Come in. I show yourself with their equivalent ability, inviting them to discuss with me. I tell them The detour I have walked to avoid you will waste time, this is a respect for the value of others. Later, when I expressed their gratitude to everyone, appreciate this set of programs (referring to the discussion in the mailing - Translator Note ) When working very well, a Linux kernel list (LKML) member said that the problem is Solving is not because I am "celebrity" in this list, but because I use the right way to ask questions. Our hackers are guys with rich knowledge but lack of people; I believe he is right. If I ask questions like a beggar, no matter who I am, I will be annoying some people or Ignore them. he I suggest me to write down this matter and give some guidance to the people who write this guide. ================ What should I do if I can't find an answer? ================ If you still don't get an answer, please don't think we can't help you. Sometimes I just see your problem. Know the answer. No response does not mean that you are ignored, although it is difficult to distinguish this difference. In general, a simple repeating post problem is a very bad idea. This will be regarded as meaningless noisy. You can get help through other channels, which are usually more suitable for beginners. There are many online and local user groups, from fanatical software enthusiasts (even if they may never write Over any software). Usually people build such groups to help each other and help newers. In addition, you can seek help from many commercial companies, regardless of the company or small (Red Hat and Linuxcare is two most common examples). Don't be frustrated for payable to get help! after all Make your car engine cylinder seal is burst - completely like this - you have to send it to repair shop And pay for maintenance. Even if the software doesn't spend a penny, you can't force technical support to always be free. . For popular software, as linux, each developer will have at least 10,000 users. not at all A help call from tens of thousands of users may be processed by one person. You know, even if you want to pay for help, Compared with you must purchase similar software, what you pay is also negligible (usually closed source code software) Technical support costs are much higher than that of open source software, and the content is not so rich).