diff --git a/docs/jargon.1.gz b/docs/jargon.1.gz index 704f999..db684a0 100644 Binary files a/docs/jargon.1.gz and b/docs/jargon.1.gz differ diff --git a/docs/jargon.html b/docs/jargon.html index 7a82531..7c84d6d 100644 --- a/docs/jargon.html +++ b/docs/jargon.html @@ -18,7 +18,7 @@ Free Documentation License".
-This file last generated Sunday, 02 December 2018 12:16PM UTC +This file last generated Monday, 24 December 2018 12:25PM UTC
[aka "CC"] A set of public licenses similar in spirit to copyleft or open source licenses but whose application is to works other than software, such as documentation, artwork, audio and video content. Creative commons represents the permeation of ideas which began in the free software movement into other areas of society.
-- To maliciously gain access to user accounts by trying lots of usernames and passwords, which are derrived either from lists of commonly used passwords or obtained from previous database leaks. The attacker uses the often valid heuristic that many users will often use the same login credentials on lots of different sites or is just lazy and uses an easy to guess login, such as their email username and password123. -
1. v. To advance, grow, or multiply inexorably. In hackish usage this verb has overtones of menace and silliness, evoking the creeping horrors of low-budget monster movies.
diff --git a/docs/jargon.org b/docs/jargon.org index 3188d09..5140ada 100644 --- a/docs/jargon.org +++ b/docs/jargon.org @@ -19,7 +19,7 @@ Free Documentation License". * Generated -This file last generated Sunday, 02 December 2018 12:16PM UTC +This file last generated Monday, 24 December 2018 12:25PM UTC * Glossary ** ( @@ -3201,9 +3201,6 @@ n. The (false) belief that large, innovative software designs can be completely *** creative commons [aka "CC"] A set of public licenses similar in spirit to copyleft or open source licenses but whose application is to works other than software, such as documentation, artwork, audio and video content. Creative commons represents the permeation of ideas which began in the free software movement into other areas of society. -*** credential stuffing -To maliciously gain access to user accounts by trying lots of usernames and passwords, which are derrived either from lists of commonly used passwords or obtained from previous database leaks. The attacker uses the often valid heuristic that many users will often use the same login credentials on lots of different sites or is just lazy and uses an easy to guess login, such as their email username and password123. - *** creep 1. v. To advance, grow, or multiply inexorably. In hackish usage this verb has overtones of menace and silliness, evoking the creeping horrors of low-budget monster movies. diff --git a/entries/Real Programmer.txt b/entries/Real Programmer.txt index bc73430..00b449c 100644 --- a/entries/Real Programmer.txt +++ b/entries/Real Programmer.txt @@ -1,27 +1,19 @@ Real Programmer -n. [indirectly, from the book Real Men Don't Eat Quiche ] A particular -sub-variety of hacker: one possessed of a flippant attitude toward -complexity that is arrogant even when justified by experience. The -archetypal Real Programmer likes to program on the bare metal and is very -good at same, remembers the binary opcodes for every machine he has ever -programmed, thinks that HLLs are sissy, and uses a debugger to edit his code -because full-screen editors are for wimps. Real Programmers aren't satisfied -with code that hasn't been tuned into a state of tense ness just short of -rupture. Real Programmers never use comments or write documentation: If it -was hard to write , says the Real Programmer, it should be hard to -understand. Real Programmers can make machines do things that were never in -their spec sheets; in fact, they are seldom really happy unless doing so. A -Real Programmer's code can awe with its fiendish brilliance, even as its -crockishness appalls. Real Programmers live on junk food and coffee, hang -line-printer art on their walls, and terrify the crap out of other -programmers because someday, somebody else might have to try to understand -their code in order to change it. Their successors generally consider it a -Good Thing that there aren't many Real Programmers around any more. For a -famous (and somewhat more positive) portrait of a Real Programmer, see The -Story of Mel' in Appendix A. The term itself was popularized by a letter to -the editor in the July 1983 Datamation titled Real Programmers Don't Use -Pascal by Ed Post, still circulating on Usenet and Internet in on-line form. -Typing Real Programmers Don't Use Pascal into a web search engine should -turn up a copy. +n. [indirectly, from the book Real Men Don't Eat Quiche] A particular +sub-variety of hacker, having an over-inflated opinion of their own +skills. Also see the Dunning-Kruger effect from psychology. Real +Programmer etiquette requires constantly demanding that +"Real Programmers do X", where X is something like coding directly +in binary or being able to understand ridiculous regexes. +A modern incarnation of the Real Programmer phenomena is the so-called +"brogrammer", who tries to mask a deficit in skills with absurd levels +of machismo and obsessions with personal status or irrelevant +qualifications. + +An article called "Real Programmers Don't Use Pascal" by Ed Post +appeared in a 1982 edition of Datamation. It parodied the style of +the "Real Men" book with an outrageous and highly misogynistic description +of Fortran programmers forgetting their wives names and refusing to +wear high heels. \ No newline at end of file