Remove spaces
This commit is contained in:
parent
4e850da551
commit
c1257f5339
@ -1,6 +1,6 @@
|
||||
B1FF
|
||||
|
||||
/bif/ , BIFF , n. The most famous pseudo , and the prototypical newbie.
|
||||
/bif/ , BIFF , n. The most famous pseudo, and the prototypical newbie.
|
||||
Articles from B1FF feature all uppercase letters sprinkled liberally with
|
||||
bangs, typos, cute misspellings (EVRY BUDY LUVS GOOD OLD BIFF CUZ KL DOOD AN
|
||||
HE RITES REEL AWESUM THINGZ IN CAPITULL LETTRS LIKE THIS!!!), use (and often
|
||||
@ -11,8 +11,7 @@ to come from a variety of sites. However, BITNET seems to be the most
|
||||
frequent origin. The theory that B1FF is a denizen of BITNET is supported by
|
||||
B1FF's (unfortunately invalid) electronic mail address: B1FF@BIT.NET. [1993:
|
||||
Now It Can Be Told! My spies inform me that B1FF was originally created by
|
||||
Joe Talmadge jat@cup.hp.com , also the author of the infamous and
|
||||
Joe Talmadge jat@cup.hp.com, also the author of the infamous and
|
||||
much-plagiarized Flamer's Bible. The BIFF filter he wrote was later passed
|
||||
to Richard Sexton, who posted BIFFisms much more widely. Versions have since
|
||||
been posted for the amusement of the net at large. See also Jeff K.
|
||||
|
||||
|
@ -1,5 +1,4 @@
|
||||
B5
|
||||
|
||||
// [common] Abbreviation for Babylon 5 , a science-fiction TV series as
|
||||
// [common] Abbreviation for Babylon 5, a science-fiction TV series as
|
||||
revered among hackers as was the original Star Trek.
|
||||
|
||||
|
@ -1,6 +1,6 @@
|
||||
BCPL
|
||||
|
||||
// , n. [abbreviation, Basic Combined Programming Language ) A programming
|
||||
// , n. [abbreviation, Basic Combined Programming Language) A programming
|
||||
language developed by Martin Richards in Cambridge in 1967. It is remarkable
|
||||
for its rich syntax, small size of compiler (it can be run in 16k) and
|
||||
extreme portability. It reached break-even point at a very early stage, and
|
||||
@ -10,4 +10,3 @@ having lost count. It has only one data type (a machine word) which can be
|
||||
used as an integer, a character, a floating point number, a pointer, or
|
||||
almost anything else, depending on context. BCPL was a precursor of C, which
|
||||
inherited some of its features.
|
||||
|
||||
|
@ -1,8 +1,7 @@
|
||||
BDFL
|
||||
|
||||
Benevolent Dictator For Life. Guido , considered in his role as the project
|
||||
Benevolent Dictator For Life. Guido, considered in his role as the project
|
||||
leader of Python. People who are feeling temporarily cheesed off by one of
|
||||
his decisions sometimes leave off the B. The mental image that goes with
|
||||
this, of a cigar-chomping caudillo in gold braid and sunglasses, is
|
||||
extremely funny to anyone who has ever met Guido in person.
|
||||
|
||||
|
@ -1,9 +1,8 @@
|
||||
BFI
|
||||
|
||||
/BFI/ , n. See brute force and ignorance. Also encountered in the variants
|
||||
BFMI , brute force and massive ignorance and BFBI brute force and bloody
|
||||
BFMI, brute force and massive ignorance and BFBI brute force and bloody
|
||||
ignorance. In some parts of the U.S. this abbreviation was probably
|
||||
reinforced by a company called Browning-Ferris Industries in the
|
||||
waste-management business; a large BFI logo in white-on-blue could be seen
|
||||
on the sides of garbage trucks.
|
||||
|
||||
|
@ -9,7 +9,7 @@ other hackers. Consider this BNF for a U.S. postal address: postal-address
|
||||
::= name-part street-address zip-part personal-part ::= name | initial .
|
||||
name-part ::= personal-part last-name [ jr-part ] EOL | personal-part
|
||||
name-part street-address ::=[ apt ] house-num street-name EOL zip-part
|
||||
::= town-name , state-code ZIP-code EOL This translates into English as:
|
||||
::= town-name, state-code ZIP-code EOL This translates into English as:
|
||||
A postal-address consists of a name-part, followed by a street-address part,
|
||||
followed by a zip-code part. A personal-part consists of either a first name
|
||||
or an initial followed by a dot. A name-part consists of either: a
|
||||
@ -26,9 +26,8 @@ unspecified. These are presumed to be obvious from context or detailed
|
||||
somewhere nearby. See also parse. 2. Any of a number of variants and
|
||||
extensions of BNF proper, possibly containing some or all of the regexp
|
||||
wildcards such as * or +. In fact the example above isn't the pure form
|
||||
invented for the Algol-60 report; it uses [] , which was introduced a few
|
||||
invented for the Algol-60 report; it uses [], which was introduced a few
|
||||
years later in IBM's PL/I definition but is now universally recognized. 3.
|
||||
In science-fiction fandom , a Big-Name Fan (someone famous or notorious).
|
||||
Years ago a fan started handing out black-on-green BNF buttons at SF
|
||||
conventions; this confused the hacker contingent terribly.
|
||||
|
||||
|
@ -1,6 +1,6 @@
|
||||
BSD
|
||||
|
||||
/BSD/ , n. [abbreviation for Berkeley Software Distribution ] a family of
|
||||
/BSD/ , n. [abbreviation for Berkeley Software Distribution] a family of
|
||||
Unix versions for the DEC VAX and PDP-11 developed by Bill Joy and others at
|
||||
Berzerkeley starting around 1977, incorporating paged virtual memory, TCP/IP
|
||||
networking enhancements, and many other features. The BSD versions (4.1,
|
||||
|
@ -1,10 +1,9 @@
|
||||
BUAF
|
||||
|
||||
// , n. [abbreviation, from alt.fan.warlord ] Big Ugly ASCII Font a special
|
||||
// , n. [abbreviation, from alt.fan.warlord] Big Ugly ASCII Font a special
|
||||
form of ASCII art. Various programs exist for rendering text strings into
|
||||
block, bloob, and pseudo-script fonts in cells between four and six
|
||||
character cells on a side; this is smaller than the letters generated by
|
||||
older banner (sense 2) programs. These are sometimes used to render one's
|
||||
name in a sig block , and are critically referred to as BUAF s. See
|
||||
name in a sig block, and are critically referred to as BUAF s. See
|
||||
warlording.
|
||||
|
||||
|
@ -1,7 +1,6 @@
|
||||
BUAG
|
||||
|
||||
// , n. [abbreviation, from alt.fan.warlord ] Big Ugly ASCII Graphic.
|
||||
Pejorative term for ugly ASCII art , especially as found in sig block s. For
|
||||
// , n. [abbreviation, from alt.fan.warlord] Big Ugly ASCII Graphic.
|
||||
Pejorative term for ugly ASCII art, especially as found in sig blocks. For
|
||||
some reason, mutations of the head of Bart Simpson are particularly common
|
||||
in the least imaginative sig block s. See warlording.
|
||||
|
||||
in the least imaginative sig blocks. See warlording.
|
||||
|
@ -1,7 +1,7 @@
|
||||
Bad Thing
|
||||
|
||||
n. [very common; always pronounced as if capitalized. Orig. fr. the 1930
|
||||
Sellar Yeatman parody of British history 1066 And All That , but
|
||||
Sellar Yeatman parody of British history 1066 And All That, but
|
||||
well-established among hackers in the U.S. as well.] Something that can't
|
||||
possibly result in improvement of the subject. This term is always
|
||||
capitalized, as in Replacing all of the DSL links with bicycle couriers
|
||||
@ -11,4 +11,3 @@ come from the book referenced in the etymology, which discusses rulers who
|
||||
were Good Kings but Bad Things. This has apparently created a mainstream
|
||||
idiom on the British side of the pond. It is very common among American
|
||||
hackers, but not in mainstream usage in the U.S. Compare Bad and Wrong.
|
||||
|
||||
|
@ -8,7 +8,6 @@ and (rare praise) Good and Right. These terms entered common use at Durham
|
||||
c.1994 and may have been imported from elsewhere; they are also in use at
|
||||
Oxford, and the emphatic form Evil and Bad and Wrong (abbreviated EBW) is
|
||||
reported from there. There are standard abbreviations: they start with B R,
|
||||
a typo for Bad and Wrong. Consequently, B W is actually Bad and Right , G R
|
||||
= Good and Wrong , and G W = Good and Right. Compare evil and rude , Good
|
||||
Thing , Bad Thing.
|
||||
|
||||
a typo for Bad and Wrong. Consequently, B W is actually Bad and Right, G R
|
||||
= Good and Wrong , and G W = Good and Right. Compare evil and rude, Good
|
||||
Thing, Bad Thing.
|
||||
|
@ -6,6 +6,5 @@ night to solve some unique problem. It usually has nonexistent, incomplete,
|
||||
or incorrect documentation, has been tested on at least two examples, and
|
||||
core dumps when anyone else attempts to use it. This term was frequently
|
||||
applied to early versions of the dbx (1) debugger. See also Berzerkeley.
|
||||
Note to British and Commonwealth readers: that's /berklee/ , not /barklee/
|
||||
Note to British and Commonwealth readers: that's /berklee/, not /barklee/
|
||||
as in British Received Pronunciation.
|
||||
|
||||
|
@ -3,7 +3,6 @@ Berzerkeley
|
||||
/b@rzerklee/ , n. [from berserk , via the name of a now-deceased record
|
||||
label; poss. originated by famed columnist Herb Caen] Humorous distortion of
|
||||
Berkeley used esp. to refer to the practices or products of the BSD Unix
|
||||
hackers. See software bloat , Berkeley Quality Software. Mainstream use of
|
||||
hackers. See software bloat, Berkeley Quality Software. Mainstream use of
|
||||
this term in reference to the cultural and political peculiarities of UC
|
||||
Berkeley as a whole has been reported from as far back as the 1960s.
|
||||
|
||||
|
@ -1,8 +1,7 @@
|
||||
BiCapitalization
|
||||
|
||||
n. The act said to have been performed on trademarks (such as PostScript ,
|
||||
NeXT, NeWS , VisiCalc, FrameMaker, TK!solver, EasyWriter) that have been
|
||||
n. The act said to have been performed on trademarks (such as PostScript,
|
||||
NeXT, NeWS, VisiCalc, FrameMaker, TK!solver, EasyWriter) that have been
|
||||
raised above the ruck of common coinage by nonstandard capitalization. Too
|
||||
many marketroid types think this sort of thing is really cute, even the
|
||||
2,317th time they do it. Compare studlycaps , InterCaps.
|
||||
|
||||
2,317th time they do it. Compare studlycaps, InterCaps.
|
||||
|
@ -10,5 +10,4 @@ switch on an IBM 360/91 actually fired a non-conducting bolt into the main
|
||||
power feed; the BRSes on more recent mainframes physically drop a block into
|
||||
place so that they can't be pushed back in. People get fired for pulling
|
||||
them, especially inappropriately (see also molly-guard ). Compare power
|
||||
cycle , three-finger salute ; see also scram switch.
|
||||
|
||||
cycle, three-finger salute; see also scram switch.
|
||||
|
@ -4,6 +4,5 @@ Black Screen of Death
|
||||
A failure mode of Microsloth Windows. On an attempt to launch a DOS box, a
|
||||
networked Windows system not uncommonly blanks the screen and locks up the
|
||||
PC so hard that it requires a cold boot to recover. This unhappy phenomenon
|
||||
is known as The Black Screen of Death. See also Blue Screen of Death , which
|
||||
is known as The Black Screen of Death. See also Blue Screen of Death, which
|
||||
has become rather more common.
|
||||
|
||||
|
@ -6,7 +6,6 @@ extreme fragility and bugginess of Microsoft Windows, misbehaving
|
||||
applications can readily crash the OS (and the OS sometimes crashes itself
|
||||
spontaneously). The Blue Screen of Death, sometimes decorated with hex error
|
||||
codes, is what you get when this happens. (Commonly abbreviated BSOD. ) The
|
||||
following entry from the Salon Haiku Contest , seems to have predated
|
||||
following entry from the Salon Haiku Contest, seems to have predated
|
||||
popular use of the term: WindowsNTcrashed. IamtheBlueScreenofDeath
|
||||
Noonehearsyourscreams.
|
||||
|
||||
|
@ -1,6 +1,5 @@
|
||||
Bohr bug
|
||||
|
||||
/bohr buhg/ , n. [from quantum physics] A repeatable bug ; one that
|
||||
/bohr buhg/ , n. [from quantum physics] A repeatable bug; one that
|
||||
manifests reliably under a possibly unknown but well-defined set of
|
||||
conditions. Antonym of heisenbug ; see also mandelbug , schroedinbug.
|
||||
|
||||
conditions. Antonym of heisenbug; see also mandelbug, schroedinbug.
|
||||
|
@ -3,16 +3,15 @@ Borg
|
||||
n. In Star Trek: The Next Generation the Borg is a species of cyborg that
|
||||
ruthlessly seeks to incorporate all sentient life into itself; their slogan
|
||||
is You will be assimilated. Resistance is futile. In hacker parlance, the
|
||||
Borg is usually Microsoft , which is thought to be trying just as ruthlessly
|
||||
Borg is usually Microsoft, which is thought to be trying just as ruthlessly
|
||||
to assimilate all computers and the entire Internet to itself (there is a
|
||||
widely circulated image of Bill Gates as a Borg). Being forced to use
|
||||
Windows or NT is often referred to as being Borged. Interestingly, the
|
||||
Halloween Documents reveal that this jargon is live within Microsoft itself.
|
||||
See also Evil Empire , Internet Exploiter. Other companies, notably Intel
|
||||
See also Evil Empire, Internet Exploiter. Other companies, notably Intel
|
||||
and UUNet, have also occasionally been equated to the Borg. In IETF circles,
|
||||
where direct pressure from Microsoft is not a daily reality, the Borg is
|
||||
sometimes Cisco. This usage commemorates their tendency to pay any price to
|
||||
hire talent away from their competitors. In fact, at the Spring 1997 IETF, a
|
||||
large number of ex-Cisco employees, all former members of Routing Geeks,
|
||||
showed up with t-shirts printed with Recovering Borg.
|
||||
|
||||
|
@ -11,5 +11,4 @@ book on software engineering. The myth in question has been most tersely
|
||||
expressed as Programmer time is fungible and Brooks established conclusively
|
||||
that it is not. Hackers have never forgotten his advice (though it's not the
|
||||
whole story; see bazaar ); too often, management still does. See also
|
||||
creationism , second-system effect , optimism.
|
||||
|
||||
creationism, second-system effect, optimism.
|
||||
|
@ -2,10 +2,9 @@ Bzzzt! Wrong.
|
||||
|
||||
/bzt rong/ , excl. [common; Usenet/Internet; punctuation varies] From a
|
||||
Robin Williams routine in the movie Dead Poets Society spoofing radio or TV
|
||||
quiz programs, such as Truth or Consequences , where an incorrect answer
|
||||
quiz programs, such as Truth or Consequences, where an incorrect answer
|
||||
earns one a blast from the buzzer and condolences from the interlocutor. A
|
||||
way of expressing mock-rude disagreement, usually immediately following an
|
||||
included quote from another poster. The less abbreviated *Bzzzzt*, wrong,
|
||||
but thank you for playing is also common; capitalization and emphasis of the
|
||||
buzzer sound varies.
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
C++
|
||||
|
||||
/C'pluhspluhs/ , n. Designed by Bjarne Stroustrup of AT&T Bell Labs as a
|
||||
successor to C. Now one of the languages of choice , although many hackers
|
||||
successor to C. Now one of the languages of choice, although many hackers
|
||||
still grumble that it is the successor to either Algol 68 or Ada (depending
|
||||
on generation), and a prime example of second-system effect. Almost anything
|
||||
that can be done in any language can be done in C++, but it requires a
|
||||
|
@ -1,6 +1,6 @@
|
||||
CDA
|
||||
|
||||
/CDA/ The Communications Decency Act , passed as section 502 of a major
|
||||
/CDA/ The Communications Decency Act, passed as section 502 of a major
|
||||
telecommunications reform bill on February 8th, 1996 ( Black Thursday ). The
|
||||
CDA made it a federal crime in the USA to send a communication which is
|
||||
obscene, lewd, lascivious, filthy, or indecent, with intent to annoy, abuse,
|
||||
|
@ -1,6 +1,5 @@
|
||||
CI$
|
||||
|
||||
// , n. Hackerism for CIS , CompuServe Information Service. The dollar sign
|
||||
// , n. Hackerism for CIS, CompuServe Information Service. The dollar sign
|
||||
refers to CompuServe's rather steep line charges. Often used in sig block s
|
||||
just before a CompuServe address. Syn. Compu$erve.
|
||||
|
||||
|
@ -2,6 +2,5 @@ COBOL fingers
|
||||
|
||||
/kohbol finggrz/ , n. Reported from Sweden, a (hypothetical) disease one
|
||||
might get from coding in COBOL. The language requires code verbose beyond
|
||||
all reason (see candygrammar ); thus it is alleged that programming too much
|
||||
all reason (see candygrammar); thus it is alleged that programming too much
|
||||
in COBOL causes one's fingers to wear down to stubs by the endless typing.
|
||||
|
||||
|
@ -9,4 +9,4 @@ without ritual expressions of disgust or horror. One popular one is Edsger
|
||||
W. Dijkstra's famous observation that The use of COBOL cripples the mind;
|
||||
its teaching should, therefore, be regarded as a criminal offense. (from
|
||||
Selected Writings on Computing: A Personal Perspective ) See also fear and
|
||||
loathing , software rot.
|
||||
loathing, software rot.
|
||||
|
@ -5,7 +5,7 @@ would cause the referenced label to act as a sort of trapdoor, so that if
|
||||
the program ever reached it control would quietly and automagically be
|
||||
transferred to the statement following the COME FROM. COME FROM was first
|
||||
proposed in R. Lawrence Clark's A Linguistic Contribution to GOTO-less
|
||||
programming , which appeared in a 1973 Datamation issue (and was reprinted
|
||||
programming, which appeared in a 1973 Datamation issue (and was reprinted
|
||||
in the April 1984 issue of Communications of the ACM ). This parodied the
|
||||
then-raging structured programming holy wars (see considered harmful ).
|
||||
Mythically, some variants are the assigned COME FROM and the computed COME
|
||||
@ -31,6 +31,5 @@ promised to anyone so deranged as to use it in production code. More
|
||||
horrible things had already been perpetrated in production languages,
|
||||
however; doubters need only contemplate the ALTER verb in COBOL. COME FROM
|
||||
was supported under its own name for the first time 15 years later, in
|
||||
C-INTERCAL (see INTERCAL , retrocomputing ); knowledgeable observers are
|
||||
C-INTERCAL (see INTERCAL, retrocomputing ); knowledgeable observers are
|
||||
still reeling from the shock.
|
||||
|
||||
|
@ -10,6 +10,5 @@ enjoying the perfect flying weather in his private plane (another variant
|
||||
has it that Gary's wife was much more interested in packing her suitcases
|
||||
for an upcoming vacation than in clinching a deal with IBM). Many of CP/M's
|
||||
features and conventions strongly resemble those of early DEC operating
|
||||
systems such as TOPS-10 , OS/8, RSTS, and RSX-11. See MS-DOS , operating
|
||||
systems such as TOPS-10, OS/8, RSTS, and RSX-11. See MS-DOS, operating
|
||||
system.
|
||||
|
||||
|
@ -1,6 +1,6 @@
|
||||
CPU Wars
|
||||
|
||||
/CPU worz/ , n. A 1979 large-format comic by Chas Andres chronicling the
|
||||
/CPU worz/, n. A 1979 large-format comic by Chas Andres chronicling the
|
||||
attempts of the brainwashed androids of IPM (Impossible to Program Machines)
|
||||
to conquer and destroy the peaceful denizens of HEC (Human Engineered
|
||||
Computers). This rather transparent allegory featured many references to
|
||||
@ -11,4 +11,3 @@ letter of appreciation on IBM company stationery from the head of IBM's
|
||||
Thomas J. Watson Research Laboratories (at that time one of the few islands
|
||||
of true hackerdom in the IBM archipelago). The lower loop of the B in the
|
||||
IBM logo, it is said, had been carefully whited out. See eat flaming death.
|
||||
|
||||
|
@ -2,7 +2,7 @@ CRC handbook
|
||||
|
||||
Any of the editions of the Chemical Rubber Company Handbook of Chemistry and
|
||||
Physics ; there are other CRC handbooks, such as the CRC Standard
|
||||
Mathematical Tables and Formulae , but the is the chemistry and physics
|
||||
Mathematical Tables and Formulae, but the is the chemistry and physics
|
||||
reference. It is massive tome full of mathematical tables, physical
|
||||
constants of thousands of alloys and chemical compounds, dielectric
|
||||
strengths, vapor pressure, resistivity, and the like. Hackers have
|
||||
@ -12,4 +12,3 @@ and would feel vaguely bereft if they couldn't look up the magnetic
|
||||
susceptibility of potassium permanganate at a moment's notice. On hackers'
|
||||
bookshelves, the is rather likely to keep company with an unabridged Oxford
|
||||
English Dictionary and a good atlas.
|
||||
|
||||
|
@ -2,8 +2,7 @@ CTSS
|
||||
|
||||
/CTSS/ , n. Compatible Time-Sharing System. An early (1963) experiment in
|
||||
the design of interactive timesharing operating systems, ancestral to
|
||||
Multics , Unix , and ITS. The name ITS (Incompatible Time-sharing System)
|
||||
Multics, Unix, and ITS. The name ITS (Incompatible Time-sharing System)
|
||||
was a hack on CTSS, meant both as a joke and to express some basic
|
||||
differences in philosophy about the way I/O services should be presented to
|
||||
user programs.
|
||||
|
||||
|
@ -1,5 +1,5 @@
|
||||
Camel Book
|
||||
|
||||
n. Universally recognized nickname for the book Programming Perl , by Larry
|
||||
n. Universally recognized nickname for the book Programming Perl, by Larry
|
||||
Wall and Randal L. Schwartz, O'Reilly and Associates 1991.
|
||||
The definitive reference on Perl.
|
||||
|
@ -2,7 +2,7 @@ Cancelmoose[tm]
|
||||
|
||||
/kanselmoos/ [Usenet] The archetype and model of all good spam -fighters.
|
||||
Once upon a time, the 'Moose would send out spam-cancels and then post
|
||||
notice anonymously to news.admin.policy , news.admin.misc , and
|
||||
notice anonymously to news.admin.policy, news.admin.misc, and
|
||||
alt.current-events.net-abuse. The 'Moose stepped to the fore on its own
|
||||
initiative, at a time (mid-1994) when spam-cancels were irregular and
|
||||
disorganized, and behaved altogether admirably fair, even-handed, and quick
|
||||
@ -15,4 +15,3 @@ http://www.cm.org/. ) By early 1995, others had stepped into the spam-cancel
|
||||
business, and appeared to be comporting themselves well, after the 'Moose's
|
||||
manner. The 'Moose has now gotten out of the business, and is more
|
||||
interested in ending spam (and cancels) entirely.
|
||||
|
||||
|
@ -1,9 +1,8 @@
|
||||
Chernobyl packet
|
||||
|
||||
/chernohb@l pak'@t/ , n. A network packet that induces a broadcast storm
|
||||
and/or network meltdown , in memory of the April 1986 nuclear accident at
|
||||
and/or network meltdown, in memory of the April 1986 nuclear accident at
|
||||
Chernobyl in Ukraine. The typical scenario involves an IP Ethernet datagram
|
||||
that passes through a gateway with both source and destination Ether and IP
|
||||
address set as the respective broadcast addresses for the subnetworks being
|
||||
gated between. Compare Christmas tree packet.
|
||||
|
||||
|
Loading…
x
Reference in New Issue
Block a user