diff --git a/docs/jargon-org.txt b/docs/jargon-org.txt index 5f65672..d136c05 100644 --- a/docs/jargon-org.txt +++ b/docs/jargon-org.txt @@ -19,7 +19,7 @@ Free Documentation License". * Generated -This file last generated Monday, 15 October 2018 02:14PM UTC +This file last generated Monday, 15 October 2018 06:35PM UTC * Glossary ** ( @@ -209,13 +209,13 @@ Used by database people to refer to any random large block of bits that needs to 2. Acronym, Beginning of File. *** BOFH -// , n. [common] Acronym, Bastard Operator From Hell. A system administrator with absolutely no tolerance for luser s. You say you need more filespace? massive-global-delete Seems to me you have plenty left... Many BOFHs (and others who would be BOFHs if they could get away with it) hang out in the newsgroup alt.sysadmin.recovery , although there has also been created a top-level newsgroup hierarchy ( bofh.* ) of their own. Several people have written stories about BOFHs. The set usually considered canonical is by Simon Travaglia and may be found at the Bastard Home Page. BOFHs and BOFH wannabes hang out on scary devil monastery and wield LART s. +// , n. [common] Acronym, Bastard Operator From Hell. A system administrator with a bad attitude towards users, who may apply excessive or unwarranted security policies. *** BRS /BRS/ , n. Syn. Big Red Switch. This abbreviation is fairly common on-line. *** BSD -/BSD/ , n. [abbreviation for Berkeley Software Distribution ] a family of Unix versions for the DEC VAX and PDP-11 developed by Bill Joy and others at Berzerkeley starting around 1977, incorporating paged virtual memory, TCP/IP networking enhancements, and many other features. The BSD versions (4.1, 4.2, and 4.3) and the commercial versions derived from them (SunOS, ULTRIX, and Mt. Xinu) held the technical lead in the Unix world until AT T's successful standardization efforts after about 1986; descendants including Free/Open/NetBSD, BSD/OS and MacOS X are still widely popular. Note that BSD versions going back to 2.9 are often referred to by their version numbers alone, without the BSD prefix. See also Unix. +/BSD/ , n. [abbreviation for Berkeley Software Distribution ] a family of Unix versions for the DEC VAX and PDP-11 developed by Bill Joy and others at Berzerkeley starting around 1977, incorporating paged virtual memory, TCP/IP networking enhancements, and many other features. The BSD versions (4.1, 4.2, and 4.3) and the commercial versions derived from them (SunOS, ULTRIX, and Mt. Xinu) held the technical lead in the Unix world until AT&T's successful standardization efforts after about 1986; descendants including Free/Open/NetBSD, BSD/OS and MacOS X are still widely popular. Note that BSD versions going back to 2.9 are often referred to by their version numbers alone, without the BSD prefix. See also Unix. *** BSOD /BSOD/ Very common abbreviation for Blue Screen of Death. Both spoken and written. @@ -296,7 +296,7 @@ prov. Adding manpower to a late software project makes it later a result of the n. The tendency of the undisciplined C programmer to set arbitrary but supposedly generous static limits on table sizes (defined, if you're lucky, by constants in header files) rather than taking the trouble to do proper dynamic storage allocation. If an application user later needs to put 68 elements into a table of size 50, the afflicted programmer reasons that he or she can easily reset the table size to 68 (or even as much as 70, to allow for future expansion) and recompile. This gives the programmer the comfortable feeling of having made the effort to satisfy the user's (unreasonable) demands, and often affords the user multiple opportunities to explore the marvelous consequences of fandango on core. In severe cases of the disease, the programmer cannot comprehend why each fix of this kind seems only to further disgruntle the user. *** C++ -/C'pluhspluhs/ , n. Designed by Bjarne Stroustrup of AT T Bell Labs as a successor to C. Now one of the languages of choice , although many hackers still grumble that it is the successor to either Algol 68 or Ada (depending on generation), and a prime example of second-system effect. Almost anything that can be done in any language can be done in C++, but it requires a language lawyer to know what is and what is not legal the design is almost too large to hold in even hackers' heads. Much of the cruft results from C++'s attempt to be backward compatible with C. Stroustrup himself has said in his retrospective book The Design and Evolution of C++ (p. 207), Within C++, there is a much smaller and cleaner language struggling to get out. Nowadays we say this of C++. +/C'pluhspluhs/ , n. Designed by Bjarne Stroustrup of AT&T Bell Labs as a successor to C. Now one of the languages of choice , although many hackers still grumble that it is the successor to either Algol 68 or Ada (depending on generation), and a prime example of second-system effect. Almost anything that can be done in any language can be done in C++, but it requires a language lawyer to know what is and what is not legal the design is almost too large to hold in even hackers' heads. Much of the cruft results from C++'s attempt to be backward compatible with C. Stroustrup himself has said in his retrospective book The Design and Evolution of C++ (p. 207), Within C++, there is a much smaller and cleaner language struggling to get out. Nowadays we say this of C++. *** CDA /CDA/ The Communications Decency Act , passed as section 502 of a major telecommunications reform bill on February 8th, 1996 ( Black Thursday ). The CDA made it a federal crime in the USA to send a communication which is obscene, lewd, lascivious, filthy, or indecent, with intent to annoy, abuse, threaten, or harass another person. It also threatened with imprisonment anyone who knowingly makes accessible to minors any message that describes, in terms patently offensive as measured by contemporary community standards, sexual or excretory activities or organs. While the CDA was sold as a measure to protect minors from the putative evils of pornography, the repressive political aims of the bill were laid bare by the Hyde amendment, which intended to outlaw discussion of abortion on the Internet. To say that this direct attack on First Amendment free-speech rights was not well received on the Internet would be putting it mildly. A firestorm of protest followed, including a February 29th 1996 mass demonstration by thousands of netters who turned their home pages black for 48 hours. Several civil-rights groups and computing/telecommunications companies mounted a constitutional challenge. The CDA was demolished by a strongly-worded decision handed down in 8th-circuit Federal court and subsequently affirmed by the U.S. Supreme Court on 26 June 1997 ( White Thursday ). See also Exon. @@ -446,12 +446,12 @@ n. [alt.(sysadmin|tech-support).recovery; abbrev. for Dick Size War ] A contest n. [Usenet; also abbreviated DtR] A cancelbot that cancels cancels. Dave the Resurrector originated when some spam -spewers decided to try to impede spam-fighting by wholesale cancellation of anti-spam coordination messages in the news.admin.net-abuse.usenet newsgroup. *** Death Square -n. The corporate logo of Novell, the people who acquired USL after AT T let go of it (Novell eventually sold the Unix group to SCO). Coined by analogy with Death Star , because many people believed Novell was bungling the lead in Unix systems exactly as AT T did for many years. +n. The corporate logo of Novell, the people who acquired USL after AT&T let go of it (Novell eventually sold the Unix group to SCO). Coined by analogy with Death Star , because many people believed Novell was bungling the lead in Unix systems exactly as AT&T did for many years. *** Death Star -1. The AT T corporate logo, which bears an uncanny resemblance to the Death Star in the Star Wars movies. This usage was particularly common among partisans of BSD Unix in the 1980s, who tended to regard the AT T versions as inferior and AT T as a bad guy. Copies still circulate of a poster printed by Mt. Xinu showing a starscape with a space fighter labeled 4.2 BSD streaking away from a broken AT T logo wreathed in flames. +1. The AT&T corporate logo, which bears an uncanny resemblance to the Death Star in the Star Wars movies. This usage was particularly common among partisans of BSD Unix in the 1980s, who tended to regard the AT&T versions as inferior and AT&T as a bad guy. Copies still circulate of a poster printed by Mt. Xinu showing a starscape with a space fighter labeled 4.2 BSD streaking away from a broken AT&T logo wreathed in flames. -2. AT T's internal magazine, Focus , uses death star to describe an incorrectly done AT T logo in which the inner circle in the top left is dark instead of light a frequent result of dark-on-light logo images. +2. AT&T's internal magazine, Focus , uses death star to describe an incorrectly done AT&T logo in which the inner circle in the top left is dark instead of light a frequent result of dark-on-light logo images. *** Death, X of A construction used to imbue the subject with campy menace, usually with intent to ridicule. The ancestor of this term is a famous Far Side cartoon from the 1980s in which a balloon with a fierce face painted on it is passed off as the Floating Head of Death. Hackers and SF fans have been using the suffix of Death ever since to label things which appear to be vastly threatening but will actually pop like a balloon if you prick them. Such constructions are properly spoken in a tone of over-exagerrated portentiousness: Behold! The Spinning - Pizza - of - Death ! See Blue Screen of Death , Ping O' Death , Spinning Pizza of Death , click of death. Compare Doom, X of. @@ -673,7 +673,7 @@ n. See monty , sense 2. Fidonet alternative to film at 11 , especially in echoes (Fidonet topic areas) where uuencoded GIFs are permitted. Other formats, especially JPEG and MPEG, may be referenced instead. *** GIGO -/gi:goh/ 1. Garbage In, Garbage Out usually said in response to lusers who complain that a program didn't do the right thing when given imperfect input or otherwise mistreated in some way. Also commonly used to describe failures in human decision making due to faulty, incomplete, or imprecise data. 2. +/gi:goh/ Garbage In, Garbage Out usually said in response to users who complain that a program didn't do the right thing when given imperfect input or otherwise mistreated in some way. Also commonly used to describe failures in human decision making due to faulty, incomplete, or imprecise data. *** GIPS /gips/ , /jips/ , n. [analogy with MIPS ] Giga-Instructions per Second (also possibly Gillions of Instructions per Second ; see gillion ). Compare KIPS. @@ -702,7 +702,7 @@ n. [acronym: Gnu Privacy Guard] The GNU implementation of PGP. /GPV/ , n. Abbrev. for General Public Virus in widespread use. *** GWF -n. Common abbreviation for Goober with Firewall. A luser who has equipped his desktop computer with a hypersensitive software firewall or host intrusion detection program, and who gives its alerts absolute credence. ISP tech support and abuse desks dread hearing from such persons, who insist that every packet of abnormal traffic the software detects is a hacker (sic) and, occasionally, threatening lawsuits or prosecution. GWFs have been known to assert that they are being attacked from 127.0.0.1, and that their ISP is criminally negligent for failing to block these attacks. GWF is used similarly to ID10T error and PEBKAC to flag trouble tickets opened by such users. +n. Common abbreviation for Goober with Firewall. A user who has equipped their computer with a hypersensitive software firewall or host intrusion detection program, and who gives its alerts absolute credence. ISP tech support and abuse desks dread hearing from such persons, who insist that every packet of abnormal traffic the software detects is a hacker (sic) and, occasionally, threatening lawsuits or prosecution. GWFs have been known to assert that they are being attacked from 127.0.0.1, and that their ISP is criminally negligent for failing to block these attacks. GWF is used similarly to ID10T error and PEBKAC to flag trouble tickets opened by such users. *** GandhiCon There is a quote from Mohandas Gandhi, describing the stages of establishment resistence to a winning strategy of nonviolent activism, that partisans of open source and especially Linux have embraced as almost an explanatory framework for the behaviors they observe while trying to get corporations and other large institutions to take new ways of doing things seriously: First they ignore you. Then they laugh at you. Then they fight you. Then you win. In hacker usage this quote has miscegenated with the U.S military's DefCon terminology describing defense conditions or degrees of war alert. At One, you're being ignored. At Two, opponents are laughing at you and dismissing the idea that you could ever be a threat. At Three, they're fighting you on the merits and/or attempting to discredit you. At Four, you're winning and they are arguing to save face or stave off complete collapse of their position. @@ -713,9 +713,6 @@ n. (also abbreviated GOF ) [prob. a play on the Gang Of Four who briefly ran Com *** Gates's Law The speed of software halves every 18 months. This oft-cited law is an ironic comment on the tendency of software bloat to outpace the every-18-month doubling in hardware capacity per dollar predicted by Moore's Law. The reference is to Bill Gates; Microsoft is widely considered among the worst if not the worst of the perpetrators of bloat. -*** Gender and Ethnicity -Hackerdom is still predominantly male. However, the percentage of women is clearly higher than the low-single-digit range typical for technical professions, and female hackers are generally respected and dealt with as equals. In the U.S., hackerdom is predominantly Caucasian with strong minorities of Jews (East Coast) and Orientals (West Coast). The Jewish contingent has exerted a particularly pervasive cultural influence (see Food , above, and note that several common jargon terms are obviously mutated Yiddish). The ethnic distribution of hackers is understood by them to be a function of which ethnic groups tend to seek and value education. Racial and ethnic prejudice is notably uncommon and tends to be met with freezing contempt. When asked, hackers often ascribe their culture's gender- and color-blindness to a positive effect of text-only network channels, and this is doubtless a powerful influence. Also, the ties many hackers have to AI research and SF literature may have helped them to develop an idea of personhood that is inclusive rather than exclusive after all, if one's imagination readily grants full human rights to future AI programs, robots, dolphins, and extraterrestrial aliens, mere color and gender can't seem very important any more. - *** General Appearance Although the mainstream media may believe otherwise, hackers do not have any particular uniform or appearance. Anyone you see in the supermarket could be a hacker. Since the majority of people are proletarians the typical hacker just looks like any other prole. Occasionally they may be distinguished by wearing T-shirts or hoodies with software/distro/conference logos on them. At the end of the 20th century hackers were mostly caucasian 20-something dudes from middle class families and living in Europe or the US, but as computing and knowledge became cheaper and more ubiquitous the initially privileged profile gave way to total generality. Today the main distinguishing feature of hackers is being interested in computers and tinkering with them, not any particular physical appearance or economic status. @@ -728,9 +725,6 @@ n. [TMRC] A visionary quality which enables one to ignore the standard approach *** Geographical Distribution In the United States, hackerdom revolves on a Bay Area-to-Boston axis; about half of the hard core seems to live within a hundred miles of Cambridge (Massachusetts) or Berkeley (California), although there are significant contingents in Los Angeles, in the Pacific Northwest, and around Washington DC. Hackers tend to cluster around large cities, especially university towns such as the Raleigh-Durham area in North Carolina or Princeton, New Jersey (this may simply reflect the fact that many are students or ex-students living near their alma maters). -*** Get a life! -imp. Hacker-standard way of suggesting that the person to whom it is directed has succumbed to terminal geekdom (see geek ). Often heard on Usenet , esp. as a way of suggesting that the target is taking some obscure issue of theology too seriously. This exhortation was popularized by William Shatner on a 1987 Saturday Night Live episode in a speech that ended Get a life ! , but it can be traced back at least to Valley Girl slang in 1983. It was certainly in wide use among hackers for years before achieving mainstream currency via the sitcom Get A Life in 1990. - *** Get a real computer! imp. In 1996 when this entry first entered the File, it was the typical hacker response to news that somebody is having trouble getting work done on a system that (a) was single-tasking, (b) had no hard disk, or (c) had an address space smaller than 16 megabytes. In 2003 anything less powerful than a 500MHz Pentium with a multi-gigabyte hard disk would probably be similarly written off. The threshold for real computer rises with time. See bitty box and toy. @@ -930,7 +924,7 @@ Acronym. JavaScript Object Notation. A human readable data format origially crea An object-oriented language originally developed at Sun by James Gosling (and known by the name Oak ) with the intention of being the successor to C++ (the project was however originally sold to Sun as an embedded language for use in set-top boxes). After the great Internet explosion of 1993-1994, was hacked into a byte-interpreted language and became the focus of a relentless hype campaign by Sun, which touted it as the new language of choice for distributed applications. is indeed a stronger and cleaner design than C++ and has been embraced by many in the hacker community but it has been a considerable source of frustration to many others, for reasons ranging from uneven support on different Web browser platforms, performance issues, and some notorious deficiencies in some of the standard toolkits (AWT in particular). Microsoft 's determined attempts to corrupt the language (which it rightly sees as a threat to its OS monopoly) have not helped. As of 2003, these issues are still in the process of being resolved. Despite many attractive features and a good design, it is difficult to find people willing to praise who have tried to implement a complex, real-world system with it (but to be fair it is early days yet, and no other language has ever been forced to spend its childhood under the limelight the way has). On the other hand, has already been a big win in academic circles, where it has taken the place of Pascal as the preferred tool for teaching the basics of good programming to the next generation of hackers. *** Jeff K. -The spiritual successor to B1FF and the archetype of script kiddies. is a sixteen-year-old suburbanite who fancies himself a l33t haX0r , although his knowledge of computers seems to be limited to the procedure for getting Quake up and running. His Web page http://www.somethingawful.com/jeffk/ features a number of hopelessly naive articles, essays, and rants, all filled with the kind of misspellings, studlycaps , and number-for-letter substitutions endemic to the script kiddie and warez d00dz communities. Jeff's offerings, among other things, include hardware advice (such as AMD VERSIS PENTIUM and HOW TO OVARCLOAK YOUR COMPUTAR ), his own Quake clan (Clan 40 OUNSCE), and his own comic strip (Wacky Fun Computar Comic Jokes). Like B1FF, is (fortunately) a hoax. was created by internet game journalist Richard Lowtax Kyanka, whose web site Something Awful (http://www.somethingawful.com) highlights unintentionally humorous news items and Web sites, as a parody of the kind of teenage luser who infests Quake servers, chat rooms, and other places where computer enthusiasts congregate. He is well-recognized in the PC game community and his influence has spread to hacker fora like Slashdot as well. +The spiritual successor to B1FF and the archetype of script kiddies is a sixteen-year-old suburbanite who fancies himself a l33t haX0r, although his knowledge of computers seems to be limited to the procedure for getting Quake up and running. *** Jeopardy-style quoting See top-post. @@ -1121,7 +1115,7 @@ n. [poss. from the Sixties counterculture expression Mongolian clusterfuck for a /muhltiks/ , n. [from MULTiplexed Information and Computing Service ] An early timesharing operating system co-designed by a consortium including MIT, GE, and Bell Laboratories as a successor to CTSS. The design was first presented in 1965, planned for operation in 1967, first operational in 1969, and took several more years to achieve respectable performance and stability. Multics was very innovative for its time among other things, it provided a hierarchical file system with access control on individual files and introduced the idea of treating all devices uniformly as special files. It was also the first OS to run on a symmetric multiprocessor, and the only general-purpose system to be awarded a B2 security rating by the NSA (see Orange Book ). Bell Labs left the development effort in 1969 after judging that second-system effect had bloated Multics to the point of practical unusability. Honeywell commercialized Multics in 1972 after buying out GE's computer group, but it was never very successful: at its peak in the 1980s, there were between 75 and 100 Multics sites, each a multi-million dollar mainframe. One of the former Multics developers from Bell Labs was Ken Thompson, and Unix deliberately carried through and extended many of Multics' design ideas; indeed, Thompson described the very name Unix as a weak pun on Multics. For this and other reasons, aspects of the Multics design remain a topic of occasional debate among hackers. See also brain-damaged and GCOS. MIT ended its development association with Multics in 1977. Honeywell sold its computer business to Bull in the mid 80s, and development on Multics was stopped in 1988. Four Multics sites were known to be still in use as late as 1998, but the last one (a Canadian military site) was decommissioned in November 2000. There is a Multics page at http://www.stratus.com/pub/vos/multics/tvv/multics.html. *** Murphy's Law -prov. The correct, original Murphy's Law reads: If there are two or more ways to do something, and one of those ways can result in a catastrophe, then someone will do it. This is a principle of defensive design, cited here because it is usually given in mutant forms less descriptive of the challenges of design for luser s. For example, you don't make a two-pin plug symmetrical and then label it THIS WAY UP ; if it matters which way it is plugged in, then you make the design asymmetrical (see also the anecdote under magic smoke ). Edward A. Murphy, Jr. was one of McDonnell-Douglas's test engineers on the rocket-sled experiments that were done by the U.S. Air Force in 1949 to test human acceleration tolerances (USAF project MX981). One experiment involved a set of 16 accelerometers mounted to different parts of the subject's body. There were two ways each sensor could be glued to its mount, and somebody methodically installed all 16 in a replacement set the wrong way around. Murphy then made the original form of his pronouncement, which the test subject (Major John Paul Stapp) mis-quoted (apparently in the more general form Whatever can go wrong, will go wrong) at a news conference a few days later. Within months Murphy's Law had spread to various technical cultures connected to aerospace engineering. Before too many years had gone by variants had passed into the popular imagination, changing as they went. Most of these are variants on Anything that can go wrong, will ; this is more correctly referred to as Finagle's Law. +prov. The correct, original Murphy's Law reads: If there are two or more ways to do something, and one of those ways can result in a catastrophe, then someone will do it. This is a principle of defensive design. Edward A. Murphy, Jr. was one of McDonnell-Douglas's test engineers on the rocket-sled experiments that were done by the U.S. Air Force in 1949 to test human acceleration tolerances (USAF project MX981). One experiment involved a set of 16 accelerometers mounted to different parts of the subject's body. There were two ways each sensor could be glued to its mount, and somebody methodically installed all 16 in a replacement set the wrong way around. Murphy then made the original form of his pronouncement, which the test subject (Major John Paul Stapp) mis-quoted (apparently in the more general form Whatever can go wrong, will go wrong) at a news conference a few days later. Within months Murphy's Law had spread to various technical cultures connected to aerospace engineering. Before too many years had gone by variants had passed into the popular imagination, changing as they went. Most of these are variants on Anything that can go wrong, will; this is more correctly referred to as Finagle's Law. ** N *** NAK @@ -1184,9 +1178,6 @@ n. The first 90% of the code accounts for the first 90% of the development time. 2. n. obs. On ITS, an output spy. See OS and JEDGAR in Appendix A. -*** OS and JEDGAR -This story says a lot about the ITS ethos. On the ITS system there was a program that allowed you to see what was being printed on someone else's terminal. It spied on the other guy's output by examining the insides of the monitor system. The output spy program was called OS. Throughout the rest of the computer science world (and at IBM too) OS means operating system, but among old-time ITS hackers it almost always meant output spy. OS could work because ITS purposely had very little in the way of protection that prevented one user from trespassing on another's areas. Fair is fair, however. There was another program that would automatically notify you if anyone started to spy on your output. It worked in exactly the same way, by looking at the insides of the operating system to see if anyone else was looking at the insides that had to do with your output. This counterspy program was called JEDGAR (a six-letterism pronounced as two syllables: /jedgr/ ), in honor of the former head of the FBI. But there's more. JEDGAR would ask the user for license to kill. If the user said yes, then JEDGAR would actually gun the job of the luser who was spying. Unfortunately, people found that this made life too violent, especially when tourists learned about it. One of the systems hackers solved the problem by replacing JEDGAR with another program that only pretended to do its job. It took a long time to do this, because every copy of JEDGAR had to be patched. To this day no one knows how many people never figured out that JEDGAR had been defanged. Interestingly, there is still a security module named JEDGAR alive as of late 1999 in the Unisys MCP for large systems. It is unknown to us whether the name is tribute or independent invention. - *** OS/2 /O S too/ , n. The anointed successor to MS-DOS for Intel 286- and 386-based micros; proof that IBM/Microsoft couldn't get it right the second time, either. Often called Half-an-OS. Mentioning it is usually good for a cheap laugh among hackers the design was so baroque , and the implementation of 1.x so bad, that three years after introduction you could still count the major apps shipping for it on the fingers of two hands in unary. The 2.x versions were said to have improved somewhat, and informed hackers rated them superior to Microsoft Windows (an endorsement which, however, could easily be construed as damning with faint praise). In the mid-1990s IBM put OS/2 on life support, refraining from killing it outright purely for internal political reasons; by 1999 the success of Linux had effectively ended any possibility of a renaissance. See monstrosity , cretinous , second-system effect. @@ -1249,7 +1240,7 @@ Possibly the single most successful minicomputer design in history, a favorite o n. The most famous computer that never was. PDP-10 computers running the TOPS-10 operating system were labeled DECsystem-10 as a way of differentiating them from the PDP-11. Later on, those systems running TOPS-20 were labeled DECSYSTEM-20 (the block capitals being the result of a lawsuit brought against DEC by Singer, which once made a computer called system-10 ), but contrary to popular lore there was never a PDP-20 ; the only difference between a 10 and a 20 was the operating system and the color of the paint. Most (but not all) machines sold to run TOPS-10 were painted Basil Blue , whereas most TOPS-20 machines were painted Chinese Red (often mistakenly called orange). *** PEBKAC -/pebkak/ [Abbrev., Problem Exists Between Keyboard And Chair ] Used by support people, particularly at call centers and help desks. Not used with the public. Denotes pilot error as the cause of the crash, especially stupid errors that even a luser could figure out. Very derogatory. Usage: Did you ever figure out why that guy couldn't print? Yeah, he kept cancelling the operation before it could finish. PEBKAC. See also ID10T. Compare pilot error , UBD. +/pebkak/ [Abbrev., Problem Exists Between Keyboard And Chair] Used by support people, particularly at call centers and help desks. Not used with the public. Denotes pilot error as the cause of the crash, especially stupid errors. Very derogatory. Usage: Did you ever figure out why that guy couldn't print? Yeah, he kept cancelling the operation before it could finish. PEBKAC. See also ID10T. Compare pilot error, UBD. *** PFY n. [Usenet; common, originally from the BOFH mythos] Abbreviation for Pimply-Faced Youth. A BOFH in training, esp. one apprenticed to an elder BOFH aged in evil. @@ -1595,7 +1586,7 @@ adj. [Usenet, particularly rec.arts.sf.written.robert-jordan ] Abbrev. of tangen [Antihistorical note: On September 23rd, 1992, the L.A. Times ran the following bit in Steve Harvey's Only in L.A.' column: It must have been borrowed from a museum: Solomon Waters of Altadena, a 6-year-old first-grader, came home from his first day of school and excitedly told his mother how he had written on a machine that looks like a computer--but without the TV screen. She asked him if it could have been a typewriter. Yeah! Yeah! he said. That's what it was called. I have since investigated this matter and determined that many of today's teenagers have never seen a slide rule, either.... *** TWENEX -/tweneks/ , n. The TOPS-20 operating system by DEC the second proprietary OS for the PDP-10 preferred by most PDP-10 hackers over TOPS-10 (that is, by those who were not ITS or WAITS partisans). TOPS-20 began in 1969 as Bolt, Beranek Newman's TENEX operating system using special paging hardware. By the early 1970s, almost all of the systems on the ARPANET ran TENEX. DEC purchased the rights to TENEX from BBN and began work to make it their own. The first in-house code name for the operating system was VIROS (VIRtual memory Operating System); when customers started asking questions, the name was changed to SNARK so DEC could truthfully deny that there was any project called VIROS. When the name SNARK became known, the name was briefly reversed to become KRANS; this was quickly abandoned when someone objected that krans meant funeral wreath in Swedish (though some Swedish speakers have since said it means simply wreath ; this part of the story may be apocryphal). Ultimately DEC picked TOPS-20 as the name of the operating system, and it was as TOPS-20 that it was marketed. The hacker community, mindful of its origins, quickly dubbed it TWENEX (a contraction of twenty TENEX ), even though by this point very little of the original TENEX code remained (analogously to the differences between AT T V6 Unix and BSD). DEC people cringed when they heard TWENEX , but the term caught on nevertheless (the written abbreviation 20x was also used). TWENEX was successful and very popular; in fact, there was a period in the early 1980s when it commanded as fervent a culture of partisans as Unix or ITS but DEC's decision to scrap all the internal rivals to the VAX architecture and its relatively stodgy VMS OS killed the DEC-20 and put a sad end to TWENEX's brief day in the sun. DEC attempted to convince TOPS-20 users to convert to VMS , but instead, by the late 1980s, most of the TOPS-20 hackers had migrated to Unix. There is a TOPS-20 home page. +/tweneks/ , n. The TOPS-20 operating system by DEC the second proprietary OS for the PDP-10 preferred by most PDP-10 hackers over TOPS-10 (that is, by those who were not ITS or WAITS partisans). TOPS-20 began in 1969 as Bolt, Beranek Newman's TENEX operating system using special paging hardware. By the early 1970s, almost all of the systems on the ARPANET ran TENEX. DEC purchased the rights to TENEX from BBN and began work to make it their own. The first in-house code name for the operating system was VIROS (VIRtual memory Operating System); when customers started asking questions, the name was changed to SNARK so DEC could truthfully deny that there was any project called VIROS. When the name SNARK became known, the name was briefly reversed to become KRANS; this was quickly abandoned when someone objected that krans meant funeral wreath in Swedish (though some Swedish speakers have since said it means simply wreath ; this part of the story may be apocryphal). Ultimately DEC picked TOPS-20 as the name of the operating system, and it was as TOPS-20 that it was marketed. The hacker community, mindful of its origins, quickly dubbed it TWENEX (a contraction of twenty TENEX ), even though by this point very little of the original TENEX code remained (analogously to the differences between AT&T V6 Unix and BSD). DEC people cringed when they heard TWENEX , but the term caught on nevertheless (the written abbreviation 20x was also used). TWENEX was successful and very popular; in fact, there was a period in the early 1980s when it commanded as fervent a culture of partisans as Unix or ITS but DEC's decision to scrap all the internal rivals to the VAX architecture and its relatively stodgy VMS OS killed the DEC-20 and put a sad end to TWENEX's brief day in the sun. DEC attempted to convince TOPS-20 users to convert to VMS , but instead, by the late 1980s, most of the TOPS-20 hackers had migrated to Unix. There is a TOPS-20 home page. *** TeX /tekh/ , n. An extremely powerful macro -based text formatter written by Donald E. Knuth , very popular in the computer-science community (it is good enough to have displaced Unix troff , the other favored formatter, even at many Unix installations). TeX fans insist on the correct (guttural) pronunciation, and the correct spelling (all caps, squished together, with the E depressed below the baseline; the mixed-case TeX is considered an acceptable kluge on ASCII-only devices). Fans like to proliferate names from the word TeX such as TeXnician (TeX user), TeXhacker (TeX programmer), TeXmaster (competent TeX programmer), TeXhax, and TeXnique. See also CrApTeX. Knuth began TeX because he had become annoyed at the declining quality of the typesetting in volumes I--III of his monumental Art of Computer Programming (see Knuth , also bible ). In a manifestation of the typical hackish urge to solve the problem at hand once and for all, he began to design his own typesetting language. He thought he would finish it on his sabbatical in 1978; he was wrong by only about 8 years. The language was finally frozen around 1985, but volume IV of The Art of Computer Programming is not expected to appear until 2007. The impact and influence of TeX's design has been such that nobody minds this very much. Many grand hackish projects have started as a bit of toolsmith ing on the way to something else; Knuth's diversion was simply on a grander scale than most. TeX has also been a noteworthy example of free, shared, but high-quality software. Knuth offers a monetary award to anyone who found and reported bugs dating from before the 1989 code freeze; as the years wore on and the few remaining bugs were fixed (and new ones even harder to find), the bribe went up. Though well-written, TeX is so large (and so full of cutting edge technique) that it is said to have unearthed at least one bug in every Pascal system it has been compiled with. @@ -1652,13 +1643,13 @@ n. [abbrev., Unsolicited Commercial Email] A widespread, more formal term for em /UDP/ , v.,n. [Usenet] Abbreviation for Usenet Death Penalty. Common (probably now more so than the full form), and frequently verbed. Compare IDP. *** UN*X -n. Used to refer to the Unix operating system (a trademark of AT T, then of Novell, then of Unix Systems Laboratories, then of the Open Group; the source code parted company with it after Novell and was owned by SCO, which was acquired by Caldera) in writing, but avoiding the need for the ugly typography (see also (TM) ). Also used to refer to any or all varieties of Unixoid operating systems. Ironically, lawyers now say that the requirement for the trademark postfix has no legal force, but the asterisk usage is entrenched anyhow. It has been suggested that there may be a psychological connection to practice in certain religions (especially Judaism) in which the name of the deity is never written out in full, e.g., YHWH or G--d is used. See also glob and splat out. +n. Used to refer to the Unix operating system (a trademark of AT&T, then of Novell, then of Unix Systems Laboratories, then of the Open Group; the source code parted company with it after Novell and was owned by SCO, which was acquired by Caldera) in writing, but avoiding the need for the ugly typography (see also (TM) ). Also used to refer to any or all varieties of Unixoid operating systems. Ironically, lawyers now say that the requirement for the trademark postfix has no legal force, but the asterisk usage is entrenched anyhow. It has been suggested that there may be a psychological connection to practice in certain religions (especially Judaism) in which the name of the deity is never written out in full, e.g., YHWH or G--d is used. See also glob and splat out. *** URL /URL/ , /erl/ , n. Uniform Resource Locator, an address widget that identifies a document or resource on the World Wide Web. This entry is here primarily to record the fact that the term is commonly pronounced both /erl/ , and /U-R-L/ (the latter predominates in more formal contexts). *** UTSL -// , n. [Unix] On-line acronym for Use the Source, Luke (a pun on Obi-Wan Kenobi's Use the Force, Luke! in Star Wars ) analogous to RTFS (sense 1), but more polite. This is a common way of suggesting that someone would be better off reading the source code that supports whatever feature is causing confusion, rather than making yet another futile pass through the manuals, or broadcasting questions on Usenet that haven't attracted wizards to answer them. Once upon a time in elder days , everyone running Unix had source. After 1978, AT T's policy tightened up, so this objurgation was in theory appropriately directed only at associates of some outfit with a Unix source license. In practice, bootlegs of Unix source code (made precisely for reference purposes) were so ubiquitous that one could utter it at almost anyone on the network without concern. Nowadays, free Unix clones have become widely enough distributed that anyone can read source legally. The most widely distributed is certainly Linux, with variants of the NET/2 and 4.4BSD distributions running second. Cheap commercial Unixes with source such as BSD/OS are accelerating this trend. +// , n. [Unix] On-line acronym for Use the Source, Luke (a pun on Obi-Wan Kenobi's Use the Force, Luke! in Star Wars ) analogous to RTFS (sense 1), but more polite. This is a common way of suggesting that someone would be better off reading the source code that supports whatever feature is causing confusion, rather than making yet another futile pass through the manuals, or broadcasting questions on Usenet that haven't attracted wizards to answer them. Once upon a time in elder days , everyone running Unix had source. After 1978, AT&T's policy tightened up, so this objurgation was in theory appropriately directed only at associates of some outfit with a Unix source license. In practice, bootlegs of Unix source code (made precisely for reference purposes) were so ubiquitous that one could utter it at almost anyone on the network without concern. Nowadays, free Unix clones have become widely enough distributed that anyone can read source legally. The most widely distributed is certainly Linux, with variants of the NET/2 and 4.4BSD distributions running second. Cheap commercial Unixes with source such as BSD/OS are accelerating this trend. *** UUOC Stands for Useless Use of cat ; the reference is to the Unix command cat (1) , not the feline animal. As received wisdom on comp.unix.shell observes, The purpose of cat is to concatenate (or catenate ) files. If it's only one file, concatenating it with nothing at all is a waste of time, and costs you a process. Nevertheless one sees people doing catfile|some_commandanditsargs... instead of the equivalent and cheaper filesome_commandanditsargs... or (equivalently and more classically) some_commandanditsargs... file Since 1995, occasional awards for UUOC have been given out, usually by Perl luminary Randal L. Schwartz. There is a web page devoted to this and other similar awards. @@ -1670,7 +1661,7 @@ Stands for Useless Use of cat ; the reference is to the Unix command cat (1) , n n. Something that has to be done to break a network program (typically a mailer) on a non-Unix system so that it will interoperate with Unix systems. The hack may qualify as Unix brain damage if the program conforms to published standards and the Unix program in question does not. Unix brain damage happens because it is much easier for other (minority) systems to change their ways to match non-conforming behavior than it is to change all the hundreds of thousands of Unix systems out there. An example of Unix brain damage is a kluge in a mail server to recognize bare line feed (the Unix newline) as an equivalent form to the Internet standard newline, which is a carriage return followed by a line feed. Such things can make even a hardened jock weep. *** Unix conspiracy -n. [ITS] According to a conspiracy theory long popular among ITS and TOPS-20 fans, Unix's growth is the result of a plot, hatched during the 1970s at Bell Labs, whose intent was to hobble AT T's competitors by making them dependent upon a system whose future evolution was to be under AT T's control. This would be accomplished by disseminating an operating system that is apparently inexpensive and easily portable, but also relatively unreliable and insecure (so as to require continuing upgrades from AT T). This theory was lent a substantial impetus in 1984 by the paper referenced in the back door entry. In this view, Unix was designed to be one of the first computer viruses (see virus ) but a virus spread to computers indirectly by people and market forces, rather than directly through disks and networks. Adherents of this Unix virus theory like to cite the fact that the well-known quotation Unix is snake oil was uttered by DEC president Kenneth Olsen shortly before DEC began actively promoting its own family of Unix workstations. (Olsen now claims to have been misquoted.) If there was ever such a conspiracy, it got thoroughly out of the plotters' control after 1990. AT T sold its Unix operation to Novell around the same time Linux and other free-Unix distributions were beginning to make noise. +n. [ITS] According to a conspiracy theory long popular among ITS and TOPS-20 fans, Unix's growth is the result of a plot, hatched during the 1970s at Bell Labs, whose intent was to hobble AT&T's competitors by making them dependent upon a system whose future evolution was to be under AT&T's control. This would be accomplished by disseminating an operating system that is apparently inexpensive and easily portable, but also relatively unreliable and insecure (so as to require continuing upgrades from AT&T). This theory was lent a substantial impetus in 1984 by the paper referenced in the back door entry. In this view, Unix was designed to be one of the first computer viruses (see virus ) but a virus spread to computers indirectly by people and market forces, rather than directly through disks and networks. Adherents of this Unix virus theory like to cite the fact that the well-known quotation Unix is snake oil was uttered by DEC president Kenneth Olsen shortly before DEC began actively promoting its own family of Unix workstations. (Olsen now claims to have been misquoted.) If there was ever such a conspiracy, it got thoroughly out of the plotters' control after 1990. AT&T sold its Unix operation to Novell around the same time Linux and other free-Unix distributions were beginning to make noise. *** Usenet /yoosnet/ , /yooznet/ , n. [from Users' Network ; the original spelling was USENET, but the mixed-case form is now widely preferred] A distributed bboard (bulletin board) system supported mainly by Unix machines. Originally implemented in 1979--1980 by Steve Bellovin, Jim Ellis, Tom Truscott, and Steve Daniel at Duke University and the University of North Carolina, it has swiftly grown to become international in scope and is now probably the largest decentralized information utility in existence. As of late 2002, it hosts over 100,000 newsgroups and an unguessably huge volume of new technical articles, news, discussion, chatter, and flamage every day (and that leaves out the graphics...). By the year the Internet hit the mainstream (1994) the original UUCP transport for Usenet was fading out of use almost all Usenet connections were over Internet links. A lot of newbies and journalists began to refer to Internet newsgroups as though Usenet was and always had been just another Internet service. This ignorance greatly annoys experienced Usenetters. @@ -2230,7 +2221,7 @@ n. [Usenet] The finger, in the sense of digitus impudicus. This comes from an an 4. More generally, a (possibly incorrect) mental state of belief. I have a bit set that says that you were the last guy to hack on EMACS. (Meaning I think you were the last guy to hack on EMACS, and what I am about to say is predicated on this, so please stop me if this isn't true. ) I just need one bit from you is a polite way of indicating that you intend only a short interruption for a question that can presumably be answered yes or no. A bit is said to be set if its value is true or 1, and reset or clear if its value is false or 0. One speaks of setting and clearing bits. To toggle or invert a bit is to change it, either from 0 to 1 or from 1 to 0. See also flag , trit , mode bit. The term bit first appeared in print in the computer-science sense in a 1948 paper by information theorist Claude Shannon, and was there credited to the early computer scientist John Tukey (who also seems to have coined the term software ). Tukey records that bit evolved over a lunch table as a handier alternative to bigit or binit , at a conference in the winter of 1943-44. *** bit bang -n. Transmission of data on a serial line, when accomplished by rapidly tweaking a single output bit, in software, at the appropriate times. The technique is a simple loop with eight OUT and SHIFT instruction pairs for each byte. Input is more interesting. And full duplex (doing input and output at the same time) is one way to separate the real hackers from the wannabee s. Bit bang was used on certain early models of Prime computers, presumably when UARTs were too expensive, and on archaic Z80 micros with a Zilog PIO but no SIO. In an interesting instance of the cycle of reincarnation , this technique returned to use in the early 1990s on some RISC architectures because it consumes such an infinitesimal part of the processor that it actually makes sense not to have a UART. Compare cycle of reincarnation. Nowadays it's used to describe I2C, a serial protocol for monitoring motherboard hardware. +n. Transmission of data on a serial line, when accomplished by rapidly tweaking a single output bit, in software, at the appropriate times. The technique is a simple loop with eight OUT and SHIFT instruction pairs for each byte. Input is more interesting. And full duplex (doing input and output at the same time) is one way to separate the real hackers from the wannabees. Bit bang was used on certain early models of Prime computers, presumably when UARTs were too expensive, and on archaic Z80 micros with a Zilog PIO but no SIO. In an interesting instance of the cycle of reincarnation , this technique returned to use in the early 1990s on some RISC architectures because it consumes such an infinitesimal part of the processor that it actually makes sense not to have a UART. Compare cycle of reincarnation. Nowadays it's used to describe I2C, a serial protocol for monitoring motherboard hardware. *** bit bashing n. (alt.: bit diddling or bit twiddling ) Term used to describe any of several kinds of low-level programming characterized by manipulation of bit , flag , nybble , and other smaller-than-character-sized pieces of data; these include low-level device control, encryption algorithms, checksum and error-correcting codes, hash functions, some flavors of graphics programming (see bitblt ), and assembler/compiler code generation. May connote either tedium or a real technical challenge (more usually the former). The command decoding for the new tape driver looks pretty solid but the bit-bashing for the control registers still has bugs. See also mode bit. @@ -2313,6 +2304,9 @@ Synonymous with nuke (sense 3). Sometimes the message Unable to kill all process *** bletcherous /blech'@r@s/ , adj. Disgusting in design or function; esthetically unappealing. This word is seldom used of people. This keyboard is bletcherous! (Perhaps the keys don't work very well, or are misplaced.) See losing , cretinous , bagbiting , bogus , and random. The term bletcherous applies to the esthetics of the thing so described; similarly for cretinous. By contrast, something that is losing or bagbiting may be failing to meet objective criteria. See also bogus and random , which have richer and wider shades of meaning than any of the above. +*** bling +The aesthetic appearance of a system can be described as "bling heavy" if it contains a lot of fancy animations, slick screen transitions and exquisitely designed icons and fonts. "You can bling the heck out of this desktop environment". + *** blinkenlights /blink'@nli:tz/ , n. [common] Front-panel diagnostic lights on a computer, esp. a dinosaur. Now that dinosaurs are rare, this term usually refers to status lights on a modem, network hub, or the like. This term derives from the last word of the famous blackletter-Gothic sign in mangled pseudo-German that once graced about half the computer rooms in the English-speaking world. One version ran in its entirety as follows: ACHTUNG!ALLESLOOKENSPEEPERS! Allestouristenundnon-technischenlookenpeepers! Dascomputermachineistnichtfuergefingerpokenundmittengrabben. Isteasyschnappenderspringenwerk,blowenfusenundpoppencorken mitspitzensparken.Istnichtfuergewerkenbeidasdumpkopfen. Dasrubberneckensichtseerenkeependascotten-pickenenhansindas pocketsmuss;relaxenundwatchendasblinkenlichten. This silliness dates back at least as far as 1955 at IBM and had already gone international by the early 1960s, when it was reported at London University's ATLAS computing site. There are several variants of it in circulation, some of which actually do end with the word blinkenlights. In an amusing example of turnabout-is-fair-play, German hackers have developed their own versions of the blinkenlights poster in fractured English, one of which is reproduced here: ATTENTION Thisroomisfullfilledmitspecialelectronischeequippment. Fingergrabbingandpressingthecnoeppkesfromthecomputersis allowedfordieexpertsonly!Soallthe lefthanders stayaway anddonotdisturbenthebrainstormingvonhereworking intelligencies.Otherwiseyouwillbeoutthrownandkicked anderswhere!Also:pleasekeepstillandonlywatchenastaunished theblinkenlights. See also geef. Old-time hackers sometimes get nostalgic for blinkenlights because they were so much more fun to look at than a blank panel. Sadly, very few computers still have them (the three LEDs on a PC keyboard certainly don't count). The obvious reasons (cost of wiring, cost of front-panel cutouts, almost nobody needs or wants to interpret machine-register states on the fly anymore) are only part of the story. Another part of it is that radio-frequency leakage from the lamp wiring was beginning to be a problem as far back as transistor machines. But the most fundamental fact is that there are very few signals slow enough to blink an LED these days! With slow CPUs, you could watch the bus register or instruction counter tick, but even at 33/66/150MHz (let alone gigahertz speeds) it's all a blur. Despite this, a couple of relatively recent computer designs of note have featured programmable blinkenlights that were added just because they looked cool. The Connection Machine, a 65,536-processor parallel computer designed in the mid-1980s, was a black cube with one side covered with a grid of red blinkenlights; the sales demo had them evolving life patterns. A few years later the ill-fated BeBox (a personal computer designed to run the BeOS operating system) featured twin rows of blinkenlights on the case front. When Be, Inc. decided to get out of the hardware business in 1996 and instead ported their OS to the PowerPC and later to the Intel architecture, many users suffered severely from the absence of their beloved blinkenlights. Before long an external version of the blinkenlights driven by a PC serial port became available; there is some sort of plot symmetry in the fact that it was assembled by a German. Finally, a version updated for the Internet has been seen on news.admin.net-abuse. @@ -2401,7 +2395,7 @@ n. Any one of the fat cables that lurk under the floor in a dinosaur pen. Possib 3. Obsolete but still working hardware, especially when used of an old, bulky, quirky system; originally a term of annoyance, but became more and more affectionate as the hardware became more and more obsolete. Auctioneers use this term for a large, undesirable object such as a washing machine; actual boating enthusiasts, however, use mooring anchor for frustrating (not actually useless) equipment. *** bob -n. At Demon Internet , all tech support personnel are called Bob. (Female support personnel have an option on Bobette ). This has nothing to do with Bob the divine drilling-equipment salesman of the Church of the SubGenius. Nor is it acronymized from Brother Of BOFH , though all parties agree it could have been. Rather, it was triggered by an unusually large draft of new tech-support people in 1995. It was observed that there would be much duplication of names. To ease the confusion, it was decided that all support techs would henceforth be known as Bob , and identity badges were created labelled Bob 1 and Bob 2. ( No, we never got any further reports a witness). The reason for Bob rather than anything else is due to a luser calling and asking to speak to Bob , despite the fact that no Bob was currently working for Tech Support. Since we all know the customer is always right , it was decided that there had to be at least one Bob on duty at all times, just in case. This sillyness snowballed inexorably. Shift leaders and managers began to refer to their groups of bobs. Whole ranks of support machines were set up (and still exist in the DNS as of 1999) as bob1 through bobN. Then came alt.tech-support.recovery , and it was filled with Demon support personnel. They all referred to themselves, and to others, as bob , and after a while it caught on. There is now a Bob Code describing the Bob nature. +n. In the 1990s at an early ISP called Demon Internet, all tech support personnel are called either Bob (masc) or Bobette (fem). This has nothing to do with Bob the divine drilling-equipment salesman of the Church of the SubGenius. Nor is it acronymized from Brother Of BOFH , though all parties agree it could have been. Rather, it was triggered by an unusually large draft of new tech-support people in 1995. It was observed that there would be much duplication of names. To ease the confusion, it was decided that all support techs would henceforth be known as Bob or Bobette, and identity badges were created labelled Bob 1 and Bob 2. (No, we never got any further reports a witness). The reason for Bob/Bobette rather than anything else is due to a someone calling and asking to speak to Bob, despite the fact that no Bob was currently working for Tech Support. Since we all know the customer is always right, it was decided that there had to be at least one Bob on duty at all times, just in case. This sillyness snowballed inexorably. Shift leaders and managers began to refer to their groups of bobs. Whole ranks of support machines were set up (and still exist in the DNS as of 1999) as bob1 through bobN. Then came alt.tech-support.recovery, and it was filled with Demon support personnel. They all referred to themselves, and to others, as bob, and after a while it caught on. There is now a Bob Code describing the Bob nature. *** bodge Syn. kludge or hack (sense 1). I'll bodge this in now and fix it later. @@ -2791,7 +2785,7 @@ n. A metal box about the size of a lunchbox (or in some models a large wastebask To hand off execution to a child or successor without going through the OS command interpreter that invoked it. The state of the parent program is lost and there is no returning to it. Though this facility used to be common on memory-limited micros and is still widely supported for backward compatibility, the jargon usage is semi-obsolescent; in particular, most Unix programmers will think of this as an exec. Oppose the more modern subshell. 2. n. A series of linked data areas within an operating system or application. Chain rattling is the process of repeatedly running through the linked data areas searching for one which is of interest to the executing program. The implication is that there is a very large number of links on the chain. *** chainik -/chi:nik/ [Russian, literally teapot ] Almost synonymous with muggle. Implies both ignorance and a certain amount of willingness to learn, but does not necessarily imply as little experience or short exposure time as newbie and is not as derogatory as luser. Both a novice user and someone using a system for a long time without any understanding of the internals can be referred to as chainiks. Very widespread term in Russian hackish, often used in an English context by Russian-speaking hackers esp. in Israel (e.g. Our new colleague is a complete chainik ). FidoNet discussion groups often had a chainik subsection for newbies and, well, old chainiks (eg. su.asm.chainik, ru.linux.chainik, ru.html.chainik). Public projects often have a chainik mailing list to keep the chainiks off the developers' and experienced users' discussions. Today, the word is slowly slipping into mainstream Russian due to the Russian translation of the popular yellow-black covered foobar for dummies series, which (correctly) uses chainik for dummy , but its frequent (though not excessive) use is still characteristic hacker-speak. +/chi:nik/ [Russian, literally teapot ] Almost synonymous with muggle. Implies both ignorance and a certain amount of willingness to learn, but does not necessarily imply as little experience or short exposure time as newbie. Both a novice user and someone using a system for a long time without any understanding of the internals can be referred to as chainiks. Very widespread term in Russian hackish, often used in an English context by Russian-speaking hackers esp. in Israel (e.g. Our new colleague is a complete chainik ). FidoNet discussion groups often had a chainik subsection for newbies and, well, old chainiks (eg. su.asm.chainik, ru.linux.chainik, ru.html.chainik). Public projects often have a chainik mailing list to keep the chainiks off the developers' and experienced users' discussions. Today, the word is slowly slipping into mainstream Russian due to the Russian translation of the popular yellow-black covered foobar for dummies series, which (correctly) uses chainik for dummy , but its frequent (though not excessive) use is still characteristic hacker-speak. *** channel n. [IRC] The basic unit of discussion on IRC. Once one joins a channel, everything one types is read by others on that channel. Channels are named with strings that begin with a # sign and can have topic descriptions (which are generally irrelevant to the actual subject of discussion). Some notable channels are #initgame , #hottub , callahans , and #report. At times of international crisis, #report has hundreds of members, some of whom take turns listening to various news services and typing in summaries of the news, or in some cases, giving first-hand accounts of the action (e.g., Scud missile attacks in Tel Aviv during the Gulf War in 1991). @@ -2854,6 +2848,9 @@ n. Someone or something that is chomping; a loser. See loser , bagbiter , chomp. *** chug vi. To run slowly; to grind or grovel. The download is chugging like crazy. +*** class +Hackers tend to come from the working or middle classes. They tend not to originate from the upper part of the middle class, since the offspring of wealthy elites tend to be discouraged from pursuing anything which might resemble engineering. In terms of class composition anyone you see in the street or in a supermarket could potentially be a hacker. They don't wear any particular uniform or look like any particular stereotype. Most hackers are working class, with no capital income, but some get offered shares in companies or go into fintech and become partially or wholly bourgeois. + *** clean Used of hardware or software designs, implies elegance in the small , that is, a design or implementation that may not hold any surprises but does things in a way that is reasonably intuitive and relatively easy to comprehend from the outside. The antonym is grungy or crufty. 2. v. To remove unneeded or undesired files in a effort to reduce clutter: I'm cleaning up my account. I cleaned up the garbage and now have 100 Meg free on that partition. @@ -3151,11 +3148,11 @@ A cryptographer who deliberately builds in a backdoor (or bugdoor) into their al The art and science of creating cryptographic algorithms which contain back doors or bug doors, sometimes also known as "secure golden key", "front door" or "key escrow". *** crash -1. n. A sudden, usually drastic failure. Most often said of the system (q.v., sense 1), esp. of magnetic disk drives (the term originally described what happens when the air gap of a hard disk collapses). Three lusers lost their files in last night's disk . A disk that involves the read/write heads dropping onto the surface of the disks and scraping off the oxide may also be referred to as a head , whereas the term system usually, though not always, implies that the operating system or other software was at fault. +1. n. A sudden, usually drastic failure. Most often said of the system (q.v., sense 1), esp. of magnetic disk drives (the term originally described what happens when the air gap of a hard disk collapses). A disk that involves the read/write heads dropping onto the surface of the disks and scraping off the oxide may also be referred to as a head, whereas the term system usually, though not always, implies that the operating system or other software was at fault. -2. v. To fail suddenly. Has the system just ed? Something ed the OS! See down. Also used transitively to indicate the cause of the (usually a person or a program, or both). Those idiots playing SPACEWAR ed the system. +2. v. To fail suddenly. Has the system just crashed? Something crashed the OS! See down. Also used transitively to indicate the cause of the crash (usually a person or a program, or both). Those idiots playing SPACEWAR crashed the system. -3. vi. Sometimes said of people hitting the sack after a long hacking run ; see gronk out. +3. vi. Sometimes said of people hitting the sack after a long hacking run; see gronk out. *** crash and burn vi.,n. A spectacular crash, in the mode of the conclusion of the car-chase scene in the movie Bullitt and many subsequent imitators (compare die horribly ). The construction crash-and-burn machine is reported for a computer used exclusively for alpha or beta testing, or reproducing bugs (i.e., not for development). The implication is that it wouldn't be such a disaster if that machine crashed, since only the testers would be inconvenienced. @@ -3709,7 +3706,7 @@ adj. Simplified, with a strong connotation of over simplified. Often, a marketro 2. A backup. This usage is typical only at large timesharing installations. *** dumpster diving -1. The practice of sifting refuse from an office or technical installation to extract confidential data, especially security-compromising information ( dumpster is an Americanism for what is elsewhere called a skip ). Back in AT T's monopoly days, before paper shredders became common office equipment, phone phreaks (see phreaking ) used to organize regular dumpster runs against phone company plants and offices. Discarded and damaged copies of AT T internal manuals taught them much. The technique is still rumored to be a favorite of crackers operating against careless targets. +1. The practice of sifting refuse from an office or technical installation to extract confidential data, especially security-compromising information ( dumpster is an Americanism for what is elsewhere called a skip ). Back in AT&T's monopoly days, before paper shredders became common office equipment, phone phreaks (see phreaking ) used to organize regular dumpster runs against phone company plants and offices. Discarded and damaged copies of AT&T internal manuals taught them much. The technique is still rumored to be a favorite of crackers operating against careless targets. 2. The practice of raiding the dumpsters behind buildings where producers and/or consumers of high-tech equipment are located, with the expectation (usually justified) of finding discarded but still-valuable equipment to be nursed back to health in some hacker's den. Experienced dumpster-divers not infrequently accumulate basements full of moldering (but still potentially useful) cruft. @@ -3804,6 +3801,9 @@ n. Syn. epoch. Webster's Unabridged makes these words almost synonymous, but era 2. Allowing your own research effort to be placed on the critical path of some other project (be it a research effort or not). +*** ethnicity +The ethnicity of hackers varies depending upon where you are and it tends to follow whatever is normative for the region. So if you're in Europe or North America it's overwhelmingly Caucasian. In those areas anyone non-Caucasian tends to be kept out of commercial software development due to entrenched discrimination. + *** eurodemo /yoorodem`o/ a demo , sense 4 Prev Up Next error 33 Home evil @@ -3844,7 +3844,7 @@ To copy data from a system without authorisation. Typically referring to the obt n. A memo pad, palmtop computer, or written notes. Hold on while I write that to external memory. The analogy is with store or DRAM versus nonvolatile disk storage on computers. *** eye candy -/i: kand`ee/ , n. [from mainstream slang ear candy ] A display of some sort that's presented to lusers to keep them distracted while the program performs necessary background tasks. Give 'em some eye candy while the back-end slurps that BLOB into core. Reported as mainstream usage among players of graphics-heavy computer games. We're also told this term is mainstream slang for soft pornography, but that sense does not appear to be live among hackers. +/i: kand`ee/ , n. [from mainstream slang ear candy ] A display of some sort. In mainstream usage among players of graphics-heavy computer games. Can also be used in the context of desktop operating system appearance, as in: "KDE Plasma has a lot of eye candy". Also see bling. *** eyeball search n.,v. To look for something in a mass of code or data with one's own native optical sensors, as opposed to using some sort of pattern matching software like grep or any other automated search tool. Also called a vgrep ; compare vdiff. @@ -4192,7 +4192,7 @@ adj. [common] Said of a capability of a programming language or hardware that is *** for the rest of us 1. Used to describe a spiffy product whose affordability shames other comparable products, or (more often) used sarcastically to describe spiffy but very overpriced products. -2. Describes a program with a limited interface, deliberately limited capabilities, non-orthogonality, inability to compose primitives, or any other limitation designed to not confuse a naive user. This places an upper bound on how far that user can go before the program begins to get in the way of the task instead of helping accomplish it. Used in reference to Macintosh software which doesn't provide obvious capabilities because it is thought that the poor lusers might not be able to handle them. Becomes the rest of them when used in third-party reference; thus, Yes, it is an attractive program, but it's designed for The Rest Of Them means a program that superficially looks neat but has no depth beyond the surface flash. See also WIMP environment , Macintrash , point-and-drool interface , user-friendly. +2. Describes a program with a limited interface, deliberately limited capabilities, non-orthogonality, inability to compose primitives, or any other limitation designed to not confuse a naive user. This places an upper bound on how far that user can go before the program begins to get in the way of the task instead of helping accomplish it. Used in reference to Macintosh software which doesn't provide obvious capabilities because they are thought to exceed the capabilities of average users. Becomes the rest of them when used in third-party reference; thus, Yes, it is an attractive program, but it's designed for The Rest Of Them means a program that superficially looks neat but has no depth beyond the surface flash. See also WIMP environment, Macintrash, point-and-drool interface, user-friendly. *** for values of A common rhetorical maneuver at MIT is to use any of the canonical random numbers as placeholders for variables. The max function takes 42 arguments, for arbitrary values of 42.: There are 69 ways to leave your lover, for 69 = 50. This is especially likely when the speaker has uttered a random number and realizes that it was not recognized as such, but even non-random numbers are occasionally used in this fashion. A related joke is that equals 3 for small values of and large values of 3. Historical note: at MIT this usage has traditionally been traced to the programming language MAD (Michigan Algorithm Decoder), an Algol-58-like language that was the most common choice among mainstream (non-hacker) users at MIT in the mid-60s. It inherited from Algol-58 a control structure FOR VALUES OF X = 3, 7, 99 DO. .. that would repeat the indicated instructions for each value in the list (unlike the usual FOR that only works for arithmetic sequences of values). MAD is long extinct, but similar for-constructs still flourish (e.g., in Unix's shell languages). @@ -4401,6 +4401,9 @@ Originally from a quote on the PBS show Scientific American Frontiers (week of M *** gen /jen/ , n.,v. Short for generate , used frequently in both spoken and written contexts. +*** gender +Currently (2018) about 25% women in commercial software development. FOSS projects are more difficult to assess due to the common use of pseudonyms, but the percentage is probably similar. Before 1970 people writing software code were more like 50% women or above, and this early change in gender composition has now been well documented. + *** gender mender n. [common] A cable connector shell with either two male or two female connectors on it, used to correct the mismatches that result when some loser didn't understand the RS232C specification and the distinction between DTE and DCE. Used esp. for RS-232C parts in either the original D-25 or the IBM PC's bogus D-9 format. Also called gender bender , gender blender , sex changer , and even homosexual adapter; however, there appears to be some confusion as to whether a male homosexual adapter has pins on both sides (is doubly male) or sockets on both sides (connects two males). @@ -4527,6 +4530,9 @@ v. [common] To search the Web using the Google search engine, http://www.google. *** google juice n. A hypothetical substance which attracts the index bots of Google.com. In common usage, a web page or web site with high placement in the results of a particular search on Google or frequent placement in the results of a various searches is said to have a lot of google juice or good google juice. Also used to compare web pages or web sites, for example CrackMonkey has more google juice than KPMG. See also juice , kilogoogle. +*** googler +A software engineer who works at Google. Overpaid. Possibly overtly sexist. Likely to be a suit and talk like suits. Probably deficient in hacker ethics. Syn for a failed hacker who went to the dark side. + *** gopher n. [obs.] A type of Internet service first floated around 1991 and obsolesced around 1995 by the World Wide Web. Gopher presents a menuing interface to a tree or graph of links; the links can be to documents, runnable programs, or other gopher menus arbitrarily far across the net. Some claim that the gopher software, which was originally developed at the University of Minnesota, was named after the Minnesota Gophers (a sports team). Others claim the word derives from American slang gofer (from go for , dialectal go fer ), one whose job is to run and fetch things. Finally, observe that gophers dig long tunnels, and the idea of tunneling through the net to find information was a defining metaphor for the developers. Probably all three things were true, but with the first two coming first and the gopher-tunnel metaphor serendipitously adding flavor and impetus to the project as it developed out of its concept stage. @@ -4562,7 +4568,7 @@ vi.,n. [from SF fandom] A mass expedition to an oriental restaurant, esp. one wh 2. By extension, the non-data bits in any self-describing format. A GIF file contains, among other things, green bytes describing the packing method for the image. Compare out-of-band , zigamorph , fence (sense 1). *** green card -n. [after the IBM System/360 Reference Data card] A summary of an assembly language, even if the color is not green and not a card. Less frequently used now because of the decrease in the use of assembly language. I'll go get my green card so I can check the addressing mode for that instruction. The original green card became a yellow card when the System/370 was introduced, and later a yellow booklet. An anecdote from IBM refers to a scene that took place in a programmers' terminal room at Yorktown in 1978. A luser overheard one of the programmers ask another Do you have a green card? The other grunted and passed the first a thick yellow booklet. At this point the luser turned a delicate shade of olive and rapidly left the room, never to return. In fall 2000 it was reported from Electronic Data Systems that the green card for 370 machines has been a blue-green booklet since 1989. +n. [after the IBM System/360 Reference Data card] A summary of an assembly language, even if the color is not green and not a card. Less frequently used now because of the decrease in the use of assembly language. I'll go get my green card so I can check the addressing mode for that instruction. The original green card became a yellow card when the System/370 was introduced, and later a yellow booklet. In fall 2000 it was reported from Electronic Data Systems that the green card for 370 machines has been a blue-green booklet since 1989. *** green lightning 1. Apparently random flashing streaks on the face of 3278-9 terminals while a new symbol set is being downloaded. This hardware bug was left deliberately unfixed, as some genius within IBM suggested it would let the user know that something is happening. That, it certainly does. Later microprocessor-driven IBM color graphics displays were actually programmed to produce green lightning! @@ -4672,7 +4678,7 @@ n. Amiga equivalent of panic in Unix (sometimes just called a guru or guru event ** H *** ha ha only serious -A phrase (often seen abbreviated as HHOS) that aptly captures the flavor of much hacker discourse. Applied especially to parodies, absurdities, and ironic jokes that are both intended and perceived to contain a possibly disquieting amount of truth, or truths that are constructed on in-joke and self-parody. This lexicon contains many examples of ha-ha-only-serious in both form and content. Indeed, the entirety of hacker culture is often perceived as ha-ha-only-serious by hackers themselves; to take it either too lightly or too seriously marks a person as an outsider, a wannabee , or in larval stage. For further enlightenment on this subject, consult any Zen master. See also hacker humor , and koan. +A phrase (often seen abbreviated as HHOS) that aptly captures the flavor of much hacker discourse. Applied especially to parodies, absurdities, and ironic jokes that are both intended and perceived to contain a possibly disquieting amount of truth, or truths that are constructed on in-joke and self-parody. This lexicon contains many examples of ha-ha-only-serious in both form and content. Indeed, the entirety of hacker culture is often perceived as ha-ha-only-serious by hackers themselves; to take it either too lightly or too seriously marks a person as an outsider, a wannabee, or in larval stage. For further enlightenment on this subject, consult any Zen master. See also hacker humor, and koan. *** hack 1. n. Originally, a quick job that produces what is needed, but not well. @@ -4776,7 +4782,7 @@ n. Syn. hackishness ; this word is considered sillier. n. [Combination of "hacker" and "activist"] A term used to describe a hacker whose activity has overtly political aims. In the mainstream media "hacktivist" is often used as a synonym for "computer criminal" or "terrorist" since regimes who don't like innovation are typically hostile towards the idea of any political change taking place - especially if cleverly augmented by technology. *** hair -n. [back-formation from hairy ] The complications that make something hairy. Decoding TECO commands requires a certain amount of hair. Often seen in the phrase infinite hair , which connotes extreme complexity. Also in hairiferous (tending to promote hair growth): GNUMACS elisp encourages lusers to write complex editing modes. Yeah, it's pretty hairiferous all right. +n. [back-formation from hairy ] The complications that make something hairy. Decoding TECO commands requires a certain amount of hair. Often seen in the phrase infinite hair, which connotes extreme complexity. Also in hairiferous (tending to promote hair growth): EMACS elisp is pretty hairiferous all right. *** hairball 1. [Fidonet] A large batch of messages that a store-and-forward network is failing to forward when it should. Often used in the phrase Fido coughed up a hairball today , meaning that the stuck messages have just come unstuck, producing a flood of mail where there had previously been drought. @@ -4938,7 +4944,7 @@ n. [scientific computation] An extra option added to a routine without changing /hi: mohbee/ , n. The high half of a 512K PDP-10 's physical address space; the other half was of course the low moby. This usage has been generalized in a way that has outlasted the PDP-10 ; for example, at the 1990 Washington D.C. Area Science Fiction Conclave (Disclave), when a miscommunication resulted in two separate wakes being held in commemoration of the shutdown of MIT's last ITS machines, the one on the upper floor was dubbed the high moby and the other the low moby. All parties involved grok ked this instantly. See moby. *** highly -adv. [scientific computation] The preferred modifier for overstating an understatement. As in: highly nonoptimal , the worst possible way to do something; highly nontrivial , either impossible or requiring a major research project; highly nonlinear , completely erratic and unpredictable; highly nontechnical , drivel written for luser s, oversimplified to the point of being misleading or incorrect (compare drool-proof paper ). In other computing cultures, postfixing of in the extreme might be preferred. +adv. [scientific computation] The preferred modifier for overstating an understatement. As in: highly nonoptimal, the worst possible way to do something; highly nontrivial, either impossible or requiring a major research project; highly nonlinear, completely erratic and unpredictable. In other computing cultures, postfixing of in the extreme might be preferred. *** hing // , n. [IRC] Fortuitous typo for hint , now in wide intentional use among players of initgame. Compare newsfroup , filk. @@ -4967,7 +4973,7 @@ n. A region in an otherwise flat entity which is not actually present. For examp n. [Linux] Notional substance said to be sprinkled by Linus onto other people's contributions. With this ritual, he blesses them, officially making them part of the kernel. First used in November 1998 just after Linus had handed the maintenance of the stable kernel over to Alan Cox. *** holy wars -n. [from Usenet , but may predate it; common] n. flame wars over religious issues. The paper by Danny Cohen that popularized the terms big-endian and little-endian in connection with the LSB-first/MSB-first controversy was entitled On Holy Wars and a Plea for Peace. Great holy wars of the past have included ITS vs.: Unix , Unix vs.: VMS , BSD Unix vs.: System V, C vs.: Pascal , C vs.: FORTRAN, etc. In the year 2003, popular favorites of the day are KDE vs, GNOME, vim vs. elvis, Linux vs. [Free|Net|Open]BSD. Hardy perennials include EMACS vs.: vi , my personal computer vs.: everyone else's personal computer, ad nauseam. The characteristic that distinguishes holy wars from normal technical disputes is that in a holy war most of the participants spend their time trying to pass off personal value choices and cultural attachments as objective technical evaluations. This happens precisely because in a true holy war, the actual substantive differences between the sides are relatively minor. See also theology. +n. [from Usenet , but may predate it; common] n. flame wars over religious issues. The paper by Danny Cohen that popularized the terms big-endian and little-endian in connection with the LSB-first/MSB-first controversy was entitled On Holy Wars and a Plea for Peace. Great holy wars of the past have included ITS vs Unix, Unix vs VMS, BSD Unix vs System V, C vs Rust, Python vs Perl, init vs systemd, vim vs Emacs, etc. The characteristic that distinguishes holy wars from normal technical disputes is that in a holy war most of the participants spend their time trying to pass off personal value choices and cultural attachments as objective technical evaluations. This happens precisely because in a true holy war, the actual substantive differences between the sides are relatively minor. See also theology. *** home box n. A hacker's personal machine, especially one he or she owns. Yeah? Well, my home box runs a full 4. @@ -5305,11 +5311,11 @@ The practice of submitting patches to a project simply for the purpose of gaming n. [MUD, IRC; very common] When used without qualification this is synonymous with netlag. Curiously, people will often complain I'm really lagged when in fact it is their server or network connection that is lagging. *** lamer -1. Synonym for luser , not used much by hackers but common among warez d00dz , crackers, and phreaker s. A person who downloads much, but who never uploads. (Also known as leecher ). Oppose elite. Has the same connotations of self-conscious elitism that use of luser does among hackers. +1. Someone who is not very good at their craft. Perhaps a wannabe. -2. Someone who tries to crack a BBS. +2. Trying but failing at something. "I tried to install this but failed. Is it broken or am I just too lame?". -3. Someone who annoys the sysop or other BBS users for instance, by posting lots of silly messages, uploading virus-ridden software, frequently dropping carrier, etc. Crackers also use it to refer to cracker wannabee s. In phreak culture, a lamer is one who scams codes off others rather than doing cracks or really understanding the fundamental concepts. In warez d00dz culture, where the ability to wave around cracked commercial software within days of (or before) release to the commercial market is much esteemed, the lamer might try to upload garbage or shareware or something incredibly old (old in this context is read as a few years to anything older than 3 days). Lamer is also much used in the IRC world in a similar sense to the above. This term seems to have originated in the Commodore-64 scene in the mid 1980s. It was popularized among Amiga crackers of the mid-1980s by Lamer Exterminator , the most famous and feared Amiga virus ever, which gradually corrupted non-write-protected floppy disks with bad sectors. The bad sectors, when looked at, were overwritten with repetitions of the string LAMER!. +3. A system which is designed or operates in a significantly suboptimal manner. "Microsoft Windows is utterly lame". *** language lawyer n. A person, usually an experienced or senior software engineer, who is intimately familiar with many or most of the numerous restrictions and features (both useful and esoteric) applicable to one or more computer programming languages. A language lawyer is distinguished by the ability to show you the five sentences scattered through a 200-plus-page manual that together imply the answer to your question if only you had thought to look there. Compare wizard , legal , legalese. @@ -5490,9 +5496,6 @@ n. [primarily British, from Gilbert Sullivan's lord high executioner ] The perso *** lose lose interj. A reply to or comment on an undesirable situation. I accidentally deleted all my files! Lose, lose. -*** loser -n. An unexpectedly bad situation, program, programmer, or person. Someone who habitually loses. (Even winners can lose occasionally.) Someone who knows not and knows not that he knows not. Emphatic forms are real loser , total loser , and complete loser (but not ** moby loser , which would be a contradiction in terms). See luser. - *** losing adj. Said of anything that is or causes a lose or lossage. The compiler is losing badly when I try to use templates. @@ -5525,9 +5528,6 @@ n. [IBM] Customers who can be relied upon to accept release 1 versions of softwa *** lurker n. One of the silent majority in an electronic forum; one who posts occasionally or not at all but is known to read the group's postings regularly. This term is not pejorative and indeed is casually used reflexively: Oh, I'm just lurking. Often used in the lurkers , the hypothetical audience for the group's flamage -emitting regulars. When a lurker speaks up for the first time, this is called delurking. The creator of the popular science-fiction TV series Babylon 5 has ties to SF fandom and the hacker culture. In that series, the use of the term lurker for a homeless or displaced person is a conscious reference to the jargon term. -*** luser -/loozr/ , n. [common] A user ; esp. one who is also a loser. ( luser and loser are pronounced identically.) This word was coined around 1975 at MIT. Under ITS, when you first walked up to a terminal at MIT and typed Control-Z to get the computer's attention, it printed out some status information, including how many people were already using the computer; it might print 14 users , for example. Someone thought it would be a great joke to patch the system to print 14 losers instead. There ensued a great controversy, as some of the users didn't particularly want to be called losers to their faces every time they used the computer. For a while several hackers struggled covertly, each changing the message behind the back of the others; any time you logged into the computer it was even money whether it would say users or losers. Finally, someone tried the compromise lusers , and it stuck. Later one of the ITS machines supported luser as a request-for-help command. ITS died the death in mid-1990, except as a museum piece; the usage lives on, however, and the term luser is often seen in program comments and on Usenet. Compare mundane , muggle , newbie , chainik. - ** M *** macdink /makdink/ , vt. [from the Apple Macintosh, which is said to encourage such behavior] To make many incremental and unnecessary cosmetic changes to a program or file. Often the subject of the macdinking would be better off without them. When I left at 11PM last night, he was still macdinking the slides for his presentation. See also fritterware , window shopping. @@ -5848,7 +5848,7 @@ n. Syn. mudhead. More common in Great Britain, possibly because system administr n. Commonly used to refer to a MUD player who eats, sleeps, and breathes MUD. Mudheads have been known to fail their degrees, drop out, etc., with the consolation, however, that they made wizard level. When encountered in person, on a MUD, or in a chat system, all a mudhead will talk about is three topics: the tactic, character, or wizard that is supposedly always unfairly stopping him/her from becoming a wizard or beating a favorite MUD; why the specific game he/she has experience with is so much better than any other; and the MUD he or she is writing or going to write because his/her design ideas are so much better than in any existing MUD. See also wannabee. To the anthropologically literate, this term may recall the Zuni/Hopi legend of the mudheads or koyemshi , mythical half-formed children of an unnatural union. Figures representing them act as clowns in Zuni sacred ceremonies. Others may recall the High School Madness sequence from the Firesign Theatre album Don't Crush That Dwarf, Hand Me the Pliers , in which there is a character named Mudhead. *** muggle -A non- wizard. Not as disparaging as luser ; implies vague pity rather than contempt. In the universe of Rowling's enormously (and deservedly) popular children's series, muggles and wizards inhabit the same modern world, but each group is ignorant of the commonplaces of the others' existence most muggles are unaware that wizards exist, and wizards (used to magical ways of doing everything) are perplexed and fascinated by muggle artifacts. In retrospect it seems completely inevitable that hackers would adopt this metaphor, and in hacker usage it readily forms compounds such as muggle-friendly. Compare luser , mundane , chainik , newbie. +A non- wizard. Implies vague pity rather than contempt. In the universe of Rowling's popular children's series, muggles and wizards inhabit the same modern world, but each group is ignorant of the commonplaces of the others' existence most muggles are unaware that wizards exist, and wizards (used to magical ways of doing everything) are perplexed and fascinated by muggle artifacts. In retrospect it seems completely inevitable that hackers would adopt this metaphor, and in hacker usage it readily forms compounds such as muggle-friendly. Compare mundane, chainik, newbie, wannabe. *** multitask n. Often used of humans in the same meaning it has for computers, to describe a person doing several things at once (but see thrash ). The term multiplex , from communications technology (meaning to handle more than one channel at the same time), is used similarly. @@ -5883,7 +5883,7 @@ n. Exploration of security holes of someone else's computer for thrills, notorie n. A display hack dating back to the PDP-1 (ca. 1962, reportedly discovered by Jackson Wright), which employs a trivial computation (repeatedly plotting the graph Y = X XOR T for successive values of T see HAKMEM items 146--148) to produce an impressive display of moving and growing squares that devour the screen. The initial value of T is treated as a parameter, which, when well-chosen, can produce amazing effects. Some of these, later (re)discovered on the LISP machine, have been christened munching triangles (try AND for XOR and toggling points instead of plotting them), munching w's , and munching mazes. More generally, suppose a graphics program produces an impressive and ever-changing display of some basic form, foo, on a display terminal, and does it using a relatively simple program; then the program (or the resulting display) is likely to be referred to as munching foos. [This is a good example of the use of the word foo as a metasyntactic variable. *** munchkin -/muhnchkin/ , n. [from the squeaky-voiced little people in L. Frank Baum's The Wizard of Oz ] A teenage-or-younger micro enthusiast hacking BASIC or something else equally constricted. A term of mild derision munchkins are annoying but some grow up to be hackers after passing through a larval stage. The term urchin is also used. See also wannabee , bitty box. +/muhnchkin/ , n. [from the squeaky-voiced little people in L. Frank Baum's The Wizard of Oz ] A teenage-or-younger micro enthusiast hacking BASIC or something else equally constricted. A term of mild derision munchkins are annoying but some grow up to be hackers after passing through a larval stage. The term urchin is also used. See also wannabee, bitty box. *** mundane 1. A person who is not in science fiction fandom. @@ -5933,7 +5933,7 @@ vi. See like nailing jelly to a tree. 2. Said of an algorithm that doesn't take advantage of some superior but advanced technique, e.g., the bubble sort. It may imply naivete on the part of the programmer, although there are situations where a naive algorithm is preferred, because it is more important to keep the code comprehensible than to go for maximum performance. I know the linear search is naive, but in this case the list typically only has half a dozen items. Compare brute force. *** naive user -n. A luser. Tends to imply someone who is ignorant mainly owing to inexperience. When this is applied to someone who has experience, there is a definite implication of stupidity. +n. Tends to imply someone who is ignorant mainly owing to inexperience. *** nakamoto scheme Originally coined by Preston Byrne, in which the modus operandi of Bitcoin is considered to be sufficiently dissimilar to a pyramid scheme to warrant the creation of a new term. In a pyramid scheme there is typically one villain at the top, but within a system like Bitcoin the prime mover is the algorithm and not any particular individual - even its original inventor. Like a pyramid scheme, the algorithm determines from the outset how value gets distributed within the system. What superficially appears impartial and coldly mathematical has a predetermined social outcome. @@ -6049,7 +6049,7 @@ n. (also net address ) As used by hackers, means an address on the network (see n. A state of complete network overload; the network equivalent of thrash ing. This may be induced by a Chernobyl packet. See also broadcast storm , kamikaze packet. Network meltdown is often a result of network designs that are optimized for a steady state of moderate load and don't cope well with the very jagged, bursty usage patterns of the real world. One amusing instance of this is triggered by the popular and very bloody shoot-'em-up game Doom on the PC. When used in multiplayer mode over a network, the game uses broadcast packets to inform other machines when bullets are fired. This causes problems with weapons like the chain gun which fire rapidly it can blast the network into a meltdown state just as easily as it shreds opposing monsters. *** newbie -/n[y]oobee/ , n. [very common; orig. from British public-school and military slang variant of new boy ] A Usenet neophyte. This term surfaced in the newsgroup talk.bizarre but is now in wide use (the combination clueless newbie is especially common). Criteria for being considered a newbie vary wildly; a person can be called a newbie in one newsgroup while remaining a respected regular in another. The label newbie is sometimes applied as a serious insult to a person who has been around Usenet for a long time but who carefully hides all evidence of having a clue. See B1FF ; see also gnubie. Compare chainik , luser. +/n[y]oobee/ , n. A new user of some system. This term surfaced in the Usenet newsgroup talk.bizarre but is now in wide use (the combination clueless newbie is especially common). Criteria for being considered a newbie vary wildly; a person can be called a newbie in one newsgroup while remaining a respected regular in another. The label newbie is sometimes applied as a serious insult to a person who has been around Usenet for a long time but who carefully hides all evidence of having a clue. See B1FF; see also gnubie. Compare chainik. *** newgroup wars /n[y]oogroop worz/ , n. [Usenet] The salvos of dueling newgroup and rmgroup messages sometimes exchanged by persons on opposite sides of a dispute over whether a newsgroup should be created net-wide, or (even more frequently) whether an obsolete one should be removed. These usually settle out within a week or two as it becomes clear whether the group has a natural constituency (usually, it doesn't). At times, especially in the completely anarchic alt hierarchy, the names of newsgroups themselves become a form of comment or humor; e.g., the group alt.swedish.chef.bork.bork.bork which originated as a birthday joke for a Muppets fan, or any number of specialized abuse groups named after particularly notorious flamer s, e.g., alt.weemba. @@ -6280,7 +6280,7 @@ Your condition when your machine has been cracked by a root exploit, and the att The protocol notionally being used by Internet data attempting to traverse a physical gap or break in the network, such as might be caused by a fiber-seeking backhoe. I see why you're dropping packets. You seem to have a packet over air problem. Prev Up Next P.O.D. *** padded cell -n. Where you put lusers so they can't hurt anything. A program that limits a luser to a carefully restricted subset of the capabilities of the host system (for example, the rsh (1) utility on USG Unix). Note that this is different from an iron box because it is overt and not aimed at enforcing security so much as protecting others (and the luser) from the consequences of the luser's boundless naivete (see naive ). Also padded cell environment. +Also known as jailware. Proprietary software is often a padded cell. A padded cell may be nice in appearance. It may have attractive features and some convenience factor, but it still robs the user of essential freedoms. Much Apple software is like this. High on bling, low on freedom. *** page in 1. To become aware of one's surroundings again after having paged out (see page out ). Usually confined to the sarcastic comment: Eric pages in, film at 11 ! @@ -6523,9 +6523,6 @@ n. A chip designer who spends most of his or her time at the physical layout lev 3. [all-caps, as POP ] Point of Presence, a bank of dial-in lines allowing customers to make (local) calls into an ISP. This is borderline techspeak. -*** poser -n. [from French poseur ] A wannabee ; not hacker slang, but used among crackers, phreaks and warez d00dz. Not as negative as lamer or leech. Probably derives from a similar usage among punk-rockers and metalheads, putting down those who talk the talk but don't walk the walk. - *** post v. To send a message to a mailing list or newsgroup. @@ -6665,7 +6662,7 @@ n. [Unix] A daemon that is run periodically (typically once a week) to seek out n. A backgammon prime (six consecutive occupied points) with one point missing. This term is an esoteric pun derived from number theory: a number that passes a certain kind of primality test may be called a pseudoprime (all primes pass any such test, but so do some composite numbers), and any number that passes several is, in some sense, almost certainly prime. The hacker backgammon usage stems from the idea that a pseudoprime is almost as good as a prime: it will do the same job unless you are unlucky. *** pseudosuit -/soodohs[y]oot`/ , n. A suit wannabee; a hacker who has decided that he wants to be in management or administration and begins wearing ties, sport coats, and (shudder!) suits voluntarily. It's his funeral. See also lobotomy. +/soodohs[y]oot`/ , n. A suit wannabee; a hacker who has decided that he wants to be in management or administration and begins wearing ties, sport coats, and (shudder!) suits voluntarily. It's his funeral. See also googler. *** psychedelicware /si:`k@del'ikweir/ , n. [UK] Syn. display hack. See also smoking clover. @@ -6838,7 +6835,7 @@ n. A mode that allows a program to transfer bits directly to or from an I/O devi /RC fi:l/ , n. [Unix: from runcom files on the CTSS system 1962-63, via the startup script /etc/rc ] Script file containing startup instructions for an application program (or an entire operating system), usually a text file containing commands of the sort that might have been invoked manually once the system was running but are to be executed automatically each time the system starts up. See also dot file , profile (sense 1). *** read-only user -n. Describes a luser who uses computers almost exclusively for reading Usenet, bulletin boards, and/or email, rather than writing code or purveying useful information. See twink , terminal junkie , lurker. +Someone who operates in consumer mode only. They never create anything, only "consume" content. See twink, terminal junkie, lurker. *** real adj. Not simulated. Often used as a specific antonym to virtual in any of its jargon senses. @@ -6858,7 +6855,7 @@ adj. Describes an application which requires a program to respond to stimuli wit *** real user 1. A commercial user. One who is paying real money for his computer usage. -2. A non-hacker. Someone using the system for an explicit purpose (a research project, a course, etc.) other than pure exploration. See user. Hackers who are also students may also be real users. I need this fixed so I can do a problem set. I'm not complaining out of randomness, but as a real user. See also luser. +2. A non-hacker. Someone using the system for an explicit purpose (a research project, a course, etc.) other than pure exploration. See user. Hackers who are also students may also be real users. I need this fixed so I can do a problem set. I'm not complaining out of randomness, but as a real user. *** reality check 1. The simplest kind of test of software or hardware; doing the equivalent of asking it what 2 + 2 is and seeing if you get 4. The software equivalent of a smoke test. @@ -6907,7 +6904,7 @@ v. To design or implement a tool equivalent to an existing one or part of one, w /ki:/ , n. [Case Western Reserve University] Yet another hackish parody religion (see also Church of the SubGenius , Discordianism ). In the mid-70s, the canonical Introduction to Programming courses at CWRU were taught in Algol, and student exercises were punched on cards and run on a Univac 1108 system using a homebrew operating system named CHI. The religion had no doctrines and but one ritual: whenever the worshiper noted that a digital clock read 11:08, he or she would recite the phrase It is 11:08; ABS, ALPHABETIC, ARCSIN, ARCCOS, ARCTAN. The last five words were the first five functions in the appropriate chapter of the Algol manual; note the special pronunciations /obz/ and /arksin/ rather than the more common /ahbz/ and /arksi:n/. Using an alarm clock to warn of 11:08's arrival was considered harmful. *** religious issues -n. Questions which seemingly cannot be raised without touching off holy wars , such as What is the best operating system (or editor, language, architecture, shell, mail reader, news reader)? , What about that Heinlein guy, eh? , What should we add to the new Jargon File? See holy wars ; see also theology , bigot , and compare rathole. This term is a prime example of ha ha only serious. People actually develop the most amazing and religiously intense attachments to their tools, even when the tools are intangible. The most constructive thing one can do when one stumbles into the crossfire is mumble Get a life! and leave unless, of course, one's own unassailably rational and obviously correct choices are being slammed. +n. Questions which seemingly cannot be raised without touching off holy wars, such as What is the best operating system (or editor, language, architecture, shell, mail reader, news reader)? See holy wars; see also theology , bigot , and compare rathole. People actually develop the most amazing and religiously intense attachments to their tools, even when the tools are intangible. *** replicator n. Any construct that acts to produce copies of itself; this could be a living organism, an idea (see meme ), a program (see quine , worm , wabbit , fork bomb , and virus ), a pattern in a cellular automaton (see life , sense 1), or (speculatively) a robot or nanobot. It is even claimed by some that Unix and C are the symbiotic halves of an extremely successful replicator; see Unix conspiracy. @@ -6958,9 +6955,6 @@ adj. Terminally baroque. Used to imply that a program has become so encrusted wi *** rogue n. A Dungeons-and-Dragons-like game using character graphics, written under BSD Unix and subsequently ported to other Unix systems. The original BSD curses (3) screen-handling package was hacked together by Ken Arnold primarily to support games, and the development of rogue (6) popularized its use; it has since become one of Unix's most important and heavily used application libraries. Nethack, Omega, Larn, Angband, and an entire subgenre of computer dungeon games (all known as roguelikes ) all took off from the inspiration provided by rogue (6) ; the popular Windows game Diablo, though graphics-intensive, has very similar play logic. See also nethack , moria , Angband. 2. -*** room-temperature IQ -quant. [IBM] 80 or below (nominal room temperature is 72 degrees Fahrenheit, 22 degrees Celsius). Used in describing the expected intelligence range of the luser. Well, but how's this interface going to play with the room-temperature IQ crowd? See drool-proof paper. This is a much more insulting phrase in countries that use Celsius thermometers. - *** root 1. [Unix] The superuser account (with user name root ) that ignores permission bits, user number 0 on a Unix system. The term avatar is also used. @@ -7473,7 +7467,7 @@ n. [encountered among users of object-oriented languages that use inheritance, s *** spam 1. To crash a program by overrunning a fixed-size buffer with excessively large input data. See also buffer overflow , overrun screw , smash the stack. -2. To cause a newsgroup to be flooded with irrelevant or inappropriate messages. You can spam a newsgroup with as little as one well- (or ill-) planned message (e.g. asking What do you think of abortion? on soc.women ). This is often done with cross-post ing (e.g. any message which is cross-posted to alt.rush-limbaugh and alt.politics.homosexuality will almost inevitably spam both groups). This overlaps with troll behavior; the latter more specific term has become more common. +2. To cause a newsgroup to be flooded with irrelevant or inappropriate messages. This overlaps with troll behavior; the latter more specific term has become more common. 3. To send many identical or nearly-identical messages separately to a large number of Usenet newsgroups. This is more specifically called ECP , Excessive Cross-Posting. This is one sure way to infuriate nearly everyone on the Net. See also velveeta and jello. @@ -7481,7 +7475,7 @@ n. [encountered among users of object-oriented languages that use inheritance, s 5. To mass-mail unrequested identical or nearly-identical email messages, particularly those containing advertising. Especially used when the mail addresses have been culled from network traffic or databases without the consent of the recipients. Synonyms include UCE , UBE. As a noun, spam refers to the messages so sent. -6. Any large, annoying, quantity of output. For instance, someone on IRC who walks away from their screen and comes back to find 200 lines of text might say Oh no, spam. The later definitions have become much more prevalent as the Internet has opened up to non-techies, and to most people senses 3 4 and 5 are now primary. All three behaviors are considered abuse of the net, and are almost universally grounds for termination of the originator's email account or network connection. In these senses the term spam has gone mainstream, though without its original sense or folkloric freight there is apparently a widespread myth among lusers that spamming is what happens when you dump cans of Spam into a revolving fan. Hormel, the makers of Spam, have published a surprisingly enlightened position statement on the Internet usage. +6. Any large, annoying, quantity of output. For instance, someone on IRC who walks away from their screen and comes back to find 200 lines of text might say Oh no, spam. The later definitions have become much more prevalent as the Internet has opened up to non-techies, and to most people senses 3 4 and 5 are now primary. All three behaviors are considered abuse of the net, and are almost universally grounds for termination of the originator's email account or network connection. Hormel, the makers of Spam, published a surprisingly enlightened position statement on the Internet usage. *** spam bait n. Email addresses included in, or comprising the entirety of, a Usenet message so that spammers mining a newsgroup with an address harvester will collect them. These addresses can be people who have offended or annoyed the poster, or who are included so that a spammer will spam an official, thereby causing himself trouble. One particularly effective form of spam bait is the address of a teergrube. @@ -7888,7 +7882,7 @@ n. Computer-science journals and other publications, vaguely gestured at to answ 2. Technical fine points of an abstruse nature, esp. those where the resolution is of theoretical interest but is relatively marginal with respect to actual use of a design or system. Used esp. around software issues with a heavy AI or language-design component, such as the smart-data vs. smart-programs dispute in AI. *** theory -n. The consensus, idea, plan, story, or set of rules that is currently being used to inform a behavior. This usage is a generalization and (deliberate) abuse of the technical meaning. What's the theory on fixing this TECO loss? What's the theory on dinner tonight? ( Chinatown, I guess. ) What's the current theory on letting lusers on during the day? The theory behind this change is to fix the following well-known screw.... +n. The consensus, idea, plan, story, or set of rules that is currently being used to inform a behavior. This usage is a generalization and (deliberate) abuse of the technical meaning. What's the theory on fixing this TECO loss? What's the theory on dinner tonight? (Chinatown, I guess.) What's the current theory on letting users loose on this new feature? The theory behind this change is to fix the following well-known screw. *** thinko /thingkoh/ , n. [by analogy with typo ] A momentary, correctable glitch in mental processing, especially one involving recall of information learned by rote; a bubble in the stream of consciousness. Syn. braino ; see also brain fart. Compare mouso. @@ -8028,9 +8022,9 @@ n. Term used on GEnie, Usenet and other electronic fora to describe the tendency n. Syn. forum. *** tourist -1. [ITS] A guest on the system, especially one who generally logs in over a network from a remote location for comm mode , email, games, and other trivial purposes. One step below luser. ITS hackers often used to spell this turist , perhaps by some sort of tenuous analogy with luser (this usage may also have expressed the ITS culture's penchant for six-letterisms, and/or been some sort of tribute to Alan Turing). Compare twink , lurker , read-only user. +1. [ITS] A guest on the system, especially one who generally logs in over a network from a remote location for comm mode, email, games, and other common purposes. ITS hackers often used to spell this turist, perhaps by some sort of tenuous analogy with user (this usage may also have expressed the ITS culture's penchant for six-letterisms, and/or been some sort of tribute to Alan Turing). Compare twink, lurker, read-only user. -2. [IRC] An IRC user who goes from channel to channel without saying anything; see channel hopping. +2. [IRC] A chat system user who goes from channel to channel without saying anything; see channel hopping. *** tourist information n. Information in an on-line display that is not immediately useful, but contributes to a viewer's gestalt of what's going on with the software or hardware behind it. Whether a given piece of info falls in this category depends partly on what the user is looking for at any given time. The bytes free information at the bottom of an MS-DOS or Windows dir display is tourist information; so (most of the time) is the TIME information in a Unix ps (1) display. @@ -8092,7 +8086,7 @@ v. To sift through large volumes of data (e.g., Usenet postings, FTP archives, o 4. Any problem one has already solved (some claim that hackish trivial usually evaluates to I've seen it before ). Hackers' notions of triviality may be quite at variance with those of non-hackers. See nontrivial , uninteresting. The physicist Richard Feynman, who had the hacker nature to an amazing degree (see his essay Los Alamos From Below in Surely You're Joking, Mr. Feynman! ), defined trivial theorem as one that has already been proved. *** troff -/Trof/ , /trof/ , n. [Unix] The gray eminence of Unix text processing; a formatting and phototypesetting program, written originally in PDP-11 assembler and then in barely-structured early C by the late Joseph Ossanna, modeled after the earlier ROFF which was in turn modeled after the Multics and CTSS program RUNOFF by Jerome Saltzer ( that name came from the expression to run off a copy ). A companion program, nroff , formats output for terminals and line printers. In 1979, Brian Kernighan modified troff so that it could drive phototypesetters other than the Graphic Systems CAT. His paper describing that work ( A Typesetter-independent troff, AT T CSTR #97) explains troff's durability. After discussing the program's obvious deficiencies a rebarbative input syntax, mysterious and undocumented properties in some areas, and a voracious appetite for computer resources and noting the ugliness and extreme hairiness of the code and internals, Kernighan concludes: None of these remarks should be taken as denigrating Ossanna's accomplishment with TROFF. It has proven a remarkably robust tool, taking unbelievable abuse from a variety of preprocessors and being forced into uses that were never conceived of in the original design, all with considerable grace under fire. The success of TeX and desktop publishing systems have reduced troff 's relative importance, but this tribute perfectly captures the strengths that secured troff a place in hacker folklore; indeed, it could be taken more generally as an indication of those qualities of good programs that, in the long run, hackers most admire. +/Trof/ , /trof/ , n. [Unix] The gray eminence of Unix text processing; a formatting and phototypesetting program, written originally in PDP-11 assembler and then in barely-structured early C by the late Joseph Ossanna, modeled after the earlier ROFF which was in turn modeled after the Multics and CTSS program RUNOFF by Jerome Saltzer ( that name came from the expression to run off a copy ). A companion program, nroff , formats output for terminals and line printers. In 1979, Brian Kernighan modified troff so that it could drive phototypesetters other than the Graphic Systems CAT. His paper describing that work (A Typesetter-independent troff, AT&T CSTR #97) explains troff's durability. After discussing the program's obvious deficiencies a rebarbative input syntax, mysterious and undocumented properties in some areas, and a voracious appetite for computer resources and noting the ugliness and extreme hairiness of the code and internals, Kernighan concludes: None of these remarks should be taken as denigrating Ossanna's accomplishment with TROFF. It has proven a remarkably robust tool, taking unbelievable abuse from a variety of preprocessors and being forced into uses that were never conceived of in the original design, all with considerable grace under fire. The success of TeX and desktop publishing systems have reduced troff 's relative importance, but this tribute perfectly captures the strengths that secured troff a place in hacker folklore; indeed, it could be taken more generally as an indication of those qualities of good programs that, in the long run, hackers most admire. *** troglodyte 1. A hacker who never leaves his cubicle. The term gnoll (from Dungeons Dragons) is also reported. @@ -8106,7 +8100,7 @@ n. [Rice University] Programming with the lights turned off, sunglasses on, and Generally annoying people on the internet, whose primary motivation is to cause disruption, distress or anger. The name comes from the grumpy and chaos-loving character from folklore and fantasy. Trolls typically have no interest in the topic or thread under which they are posting. The usual advice when encountering trolls is to ignore and/or block them, but this is sometimes not an easy solution. When unleashed within a forum, stream or mailing list trolls can quickly cause enough dissarray to destroy communities which took years to build and as such they should be recognized as an existential threat to software projects if they're not quickly dealt with. Hired trolls may also be used for political purposes by governments or corporations to disrupt rival organisations and spread fear, uncertainty and doubt. Also see shitposting. *** tron -v. [NRL, CMU; prob. fr. the movie Tron ] To become inaccessible except via email or talk (1) , especially when one is normally available via telephone or in person. Frequently used in the past tense, as in: Ran seems to have tronned on us this week or Gee, Ran, glad you were able to un-tron yourself. One may also speak of tron mode ; compare spod. Note that many dialects of BASIC have a TRON/TROFF command pair that enables/disables line number tracing; this has no obvious relationship to the slang usage. +v. [NRL, CMU; prob. fr. the movie Tron ] To become inaccessible except via email or talk (1) , especially when one is normally available via telephone or in person. Frequently used in the past tense, as in: Ran seems to have tronned on us this week or Gee, Ran, glad you were able to un-tron yourself. One may also speak of tron mode. Note that many dialects of BASIC have a TRON/TROFF command pair that enables/disables line number tracing; this has no obvious relationship to the slang usage. *** troughie /trawfee/ , n. [British BBS scene] Synonym for leech , sense 1. The implied metaphor is that of a pig at a trough. @@ -8142,7 +8136,7 @@ vt. [from automotive or musical usage] To optimize a program or system for a par n. See geek. *** turist -/toorist/ , n. Var. sp. of tourist , q.v. Also in adjectival form, turistic. Poss. influenced by luser and Turing. +/toorist/ , n. Var. sp. of tourist , q.v. Also in adjectival form, turistic. Poss. influenced by user and Turing. *** tweak 1. To change slightly, usually in reference to a value. Also used synonymously with twiddle. If a program is almost correct, rather than figure out the precise problem you might just keep tweaking it until it works. See frobnicate and fudge factor ; also see shotgun debugging. @@ -8250,11 +8244,7 @@ n. Technically, a machine's time since last reboot; jargonically, how long a hac n. See munchkin. *** user -1. Someone doing real work with the computer, using it as a means rather than an end. Someone who pays to use a computer. See real user. - -2. A programmer who will believe anything you tell him. One who asks silly questions. [GLS observes: This is slightly unfair. It is true that users ask questions (of necessity). Sometimes they are thoughtful or deep. Very often they are annoying or downright stupid, apparently because the user failed to think for two seconds or look in the documentation before bothering the maintainer.] See luser. - -3. Someone who uses a program from the outside, however skillfully, without getting into the internals of the program. One who reports bugs instead of just going ahead and fixing them. The general theory behind this term is that there are two classes of people who work with a program: there are implementors (hackers) and luser s. The users are looked down on by hackers to some extent because they don't understand the full ramifications of the system in all its glory. (The few users who do are known as real winners. ) The term is a relative one: a skilled hacker may be a user with respect to some program he himself does not hack. A LISP hacker might be one who maintains LISP or one who uses LISP (but with the skill of a hacker). A LISP user is one who uses LISP, whether skillfully or not. Thus there is some overlap between the two terms; the subtle distinctions must be resolved by context. +n. Someone who uses a computer system. Within the conventional client/server paradigm there are two classes of people: those who administrate the system and those who use it. The term user is very conventional, going back to the early days of time-sharing mainframes, but may be controversial in some contexts due to having other negative associations, such as "drug user" or someone who exploits other people for cynical and self-serving reasons, as in "he was just a user". A possible alternative to user is "member". *** user-friendly adj. Programmer-hostile. Generally used by hackers in a critical tone, to describe systems that hold the user's hand so obsessively that they make it painful for the more experienced and knowledgeable to get any work done. See menuitis , drool-proof paper , Macintrash , user-obsequious. @@ -8346,7 +8336,7 @@ n. Praise or thanks. Used universally in the Linux community. Originally this te n. The jargonic equivalent of the bit bucket at shops using IBM's VM/CMS operating system. VM/CMS officially supports a whole bestiary of virtual card readers, virtual printers, and other phantom devices; these are used to supply some of the same capabilities Unix gets from pipes and I/O redirection. *** virus -n. [from the obvious analogy with biological viruses, via SF] A cracker program that searches out other programs and infects them by embedding a copy of itself in them, so that they become Trojan horse s. When these programs are executed, the embedded virus is executed too, thus propagating the infection. This normally happens invisibly to the user. Unlike a worm , a virus cannot infect other computers without assistance. It is propagated by vectors such as humans trading programs with their friends (see SEX ). The virus may do nothing but propagate itself and then allow the program to run normally. Usually, however, after propagating silently for a while, it starts doing things like writing cute messages on the terminal or playing strange tricks with the display (some viruses include nice display hack s). Many nasty viruses, written by particularly perversely minded cracker s, do irreversible damage, like nuking all the user's files. In the 1990s, viruses became a serious problem, especially among Windows users; the lack of security on these machines enables viruses to spread easily, even infecting the operating system (Unix machines, by contrast, are immune to such attacks). The production of special anti-virus software has become an industry, and a number of exaggerated media reports have caused outbreaks of near hysteria among users; many lusers tend to blame everything that doesn't work as they had expected on virus attacks. Accordingly, this sense of virus has passed not only into techspeak but into also popular usage (where it is often incorrectly used to denote a worm or even a Trojan horse ). See phage ; compare back door ; see also Unix conspiracy. +n. [from the obvious analogy with biological viruses, via SF] A cracker program that searches out other programs and infects them by embedding a copy of itself in them, so that they become Trojan horse s. When these programs are executed, the embedded virus is executed too, thus propagating the infection. This normally happens invisibly to the user. Unlike a worm , a virus cannot infect other computers without assistance. It is propagated by vectors such as humans trading programs with their friends (see SEX ). The virus may do nothing but propagate itself and then allow the program to run normally. Usually, however, after propagating silently for a while, it starts doing things like writing cute messages on the terminal or playing strange tricks with the display (some viruses include nice display hack s). Many nasty viruses, written by particularly perversely minded cracker s, do irreversible damage, like nuking all the user's files. In the 1990s, viruses became a serious problem, especially among Windows users; the lack of security on these machines enables viruses to spread easily, even infecting the operating system (Unix machines, by contrast, are immune to such attacks). The production of special anti-virus software has become an industry, and a number of exaggerated media reports have caused outbreaks of near hysteria among users; many lusers tend to blame everything that doesn't work as they had expected on virus attacks. See phage; compare back door; see also Unix conspiracy. *** visionary 1. One who hacks vision, in the sense of an Artificial Intelligence researcher working on the problem of getting computers to see things using TV cameras. (There isn't any problem in sending information from a TV camera to a computer. The problem is, how can the computer be programmed to make use of the camera information? See SMOP , AI-complete. ) @@ -8421,7 +8411,7 @@ A form of game cheat especially associated with first-person shooters like Quake /wangk/ , n.,v.,adj. [Columbia University: prob.: by mutation from Commonwealth slang v. wank , to masturbate] Used much as hack is elsewhere, as a noun denoting a clever technique or person or the result of such cleverness. May describe (negatively) the act of hacking for hacking's sake ( Quit wanking, let's go get supper! ) or (more positively) a wizard. Adj. wanky describes something particularly clever (a person, program, or algorithm). Conversations can also get wanky when there are too many wanks involved. This excess wankiness is signalled by an overload of the wankometer (compare bogometer ). When the wankometer overloads, the conversation's subject must be changed, or all non-wanks will leave. Compare neep-neeping (under neep-neep ). Usage: U.S. only. In Britain and the Commonwealth this word is extremely rude and is best avoided unless one intends to give offense. Adjectival wanky is less offensive and simply means stupid or broken (this is mainstream in Great Britain). *** wannabee -/won'@bee/ , n. (also, more plausibly, spelled wannabe ) [from a term recently used to describe Madonna fans who dress, talk, and act like their idol; prob.: originally from biker slang] A would-be hacker. The connotations of this term differ sharply depending on the age and exposure of the subject. Used of a person who is in or might be entering larval stage , it is semi-approving; such wannabees can be annoying but most hackers remember that they, too, were once such creatures. When used of any professional programmer, CS academic, writer, or suit , it is derogatory, implying that said person is trying to cuddle up to the hacker mystique but doesn't, fundamentally, have a prayer of understanding what it is all about. Overuse of terms from this lexicon is often an indication of the wannabee nature. Compare newbie. Historical note: The wannabee phenomenon has a slightly different flavor now (1993) than it did ten or fifteen years ago. When the people who are now hackerdom's tribal elders were in larval stage , the process of becoming a hacker was largely unconscious and unaffected by models known in popular culture communities formed spontaneously around people who, as individuals , felt irresistibly drawn to do hackerly things, and what wannabees experienced was a fairly pure, skill-focused desire to become similarly wizardly. Those days of innocence are gone forever; society's adaptation to the advent of the microcomputer after 1980 included the elevation of the hacker as a new kind of folk hero, and the result is that some people semi-consciously set out to be hackers and borrow hackish prestige by fitting the popular image of hackers. Fortunately, to do this really well, one has to actually become a wizard. Nevertheless, old-time hackers tend to share a poorly articulated disquiet about the change; among other things, it gives them mixed feelings about the effects of public compendia of lore like this one. +/won'@bee/ , n. Someone who wants to be a hacker. A novice or rookie. *** war dialer n. [originally from wargames dialer , a reference to the movie War Games ] A cracking tool, a program that calls a given list or range of phone numbers and records those which answer with handshake tones (and so might be entry points to computer or telecommunications systems). Some of these programs have become quite sophisticated, and can now detect modem, fax, or PBX tones and log each one separately. The war dialer is one of the most important tools in the phreaker 's kit. These programs evolved from early demon dialer s. @@ -8650,9 +8640,6 @@ n. A small microwave dish antenna used for cross-campus private network circuits 2. [proposed] A variety of hard-shell equipment case with heavy interior padding and/or shaped carrier cutouts in a foam-rubber matrix; mundanely called a flight case. Used for delicate test equipment, electronics, and musical instruments. -*** womble -n. [Unisys UK: from British puppet-show characters] A user who has great difficulty in communicating their requirements and/or in using the resulting software. Extreme case of luser. An especially senior or high-ranking womble is referred to as Great-Uncle Bulgaria. Compare Aunt Tillie. - *** wonky /wongkee/ , adj. [from Australian slang] Yet another approximate synonym for broken. Specifically connotes a malfunction that produces behavior seen as crazy, humorous, or amusingly perverse. That was the day the printer's font logic went wonky and everybody's listings came out in Tengwar. Also in wonked out. See funky , demented , bozotic. diff --git a/docs/jargon.1.gz b/docs/jargon.1.gz index b2cff2d..4687f1a 100644 Binary files a/docs/jargon.1.gz and b/docs/jargon.1.gz differ diff --git a/docs/jargon.html b/docs/jargon.html index 7ae79ae..22a5eb4 100644 --- a/docs/jargon.html +++ b/docs/jargon.html @@ -18,7 +18,7 @@ Free Documentation License".

Generated

-This file last generated Monday, 15 October 2018 02:14PM UTC +This file last generated Monday, 15 October 2018 06:35PM UTC

Glossary

@@ -251,7 +251,7 @@ This file last generated Monday, 15 October 2018 02:14PM UTC

2. Acronym, Beginning of File.

BOFH

- // , n. [common] Acronym, Bastard Operator From Hell. A system administrator with absolutely no tolerance for luser s. You say you need more filespace? massive-global-delete Seems to me you have plenty left... Many BOFHs (and others who would be BOFHs if they could get away with it) hang out in the newsgroup alt.sysadmin.recovery , although there has also been created a top-level newsgroup hierarchy ( bofh.* ) of their own. Several people have written stories about BOFHs. The set usually considered canonical is by Simon Travaglia and may be found at the Bastard Home Page. BOFHs and BOFH wannabes hang out on scary devil monastery and wield LART s. + // , n. [common] Acronym, Bastard Operator From Hell. A system administrator with a bad attitude towards users, who may apply excessive or unwarranted security policies.

BRS

@@ -259,7 +259,7 @@ This file last generated Monday, 15 October 2018 02:14PM UTC

BSD

- /BSD/ , n. [abbreviation for Berkeley Software Distribution ] a family of Unix versions for the DEC VAX and PDP-11 developed by Bill Joy and others at Berzerkeley starting around 1977, incorporating paged virtual memory, TCP/IP networking enhancements, and many other features. The BSD versions (4.1, 4.2, and 4.3) and the commercial versions derived from them (SunOS, ULTRIX, and Mt. Xinu) held the technical lead in the Unix world until AT T's successful standardization efforts after about 1986; descendants including Free/Open/NetBSD, BSD/OS and MacOS X are still widely popular. Note that BSD versions going back to 2.9 are often referred to by their version numbers alone, without the BSD prefix. See also Unix. + /BSD/ , n. [abbreviation for Berkeley Software Distribution ] a family of Unix versions for the DEC VAX and PDP-11 developed by Bill Joy and others at Berzerkeley starting around 1977, incorporating paged virtual memory, TCP/IP networking enhancements, and many other features. The BSD versions (4.1, 4.2, and 4.3) and the commercial versions derived from them (SunOS, ULTRIX, and Mt. Xinu) held the technical lead in the Unix world until AT&T's successful standardization efforts after about 1986; descendants including Free/Open/NetBSD, BSD/OS and MacOS X are still widely popular. Note that BSD versions going back to 2.9 are often referred to by their version numbers alone, without the BSD prefix. See also Unix.

BSOD

@@ -364,7 +364,7 @@ This file last generated Monday, 15 October 2018 02:14PM UTC

C++

- /C'pluhspluhs/ , n. Designed by Bjarne Stroustrup of AT T Bell Labs as a successor to C. Now one of the languages of choice , although many hackers still grumble that it is the successor to either Algol 68 or Ada (depending on generation), and a prime example of second-system effect. Almost anything that can be done in any language can be done in C++, but it requires a language lawyer to know what is and what is not legal the design is almost too large to hold in even hackers' heads. Much of the cruft results from C++'s attempt to be backward compatible with C. Stroustrup himself has said in his retrospective book The Design and Evolution of C++ (p. 207), Within C++, there is a much smaller and cleaner language struggling to get out. Nowadays we say this of C++. + /C'pluhspluhs/ , n. Designed by Bjarne Stroustrup of AT&T Bell Labs as a successor to C. Now one of the languages of choice , although many hackers still grumble that it is the successor to either Algol 68 or Ada (depending on generation), and a prime example of second-system effect. Almost anything that can be done in any language can be done in C++, but it requires a language lawyer to know what is and what is not legal the design is almost too large to hold in even hackers' heads. Much of the cruft results from C++'s attempt to be backward compatible with C. Stroustrup himself has said in his retrospective book The Design and Evolution of C++ (p. 207), Within C++, there is a much smaller and cleaner language struggling to get out. Nowadays we say this of C++.

CDA

@@ -551,12 +551,12 @@ This file last generated Monday, 15 October 2018 02:14PM UTC

Death Square

- n. The corporate logo of Novell, the people who acquired USL after AT T let go of it (Novell eventually sold the Unix group to SCO). Coined by analogy with Death Star , because many people believed Novell was bungling the lead in Unix systems exactly as AT T did for many years. + n. The corporate logo of Novell, the people who acquired USL after AT&T let go of it (Novell eventually sold the Unix group to SCO). Coined by analogy with Death Star , because many people believed Novell was bungling the lead in Unix systems exactly as AT&T did for many years.

Death Star

-

1. The AT T corporate logo, which bears an uncanny resemblance to the Death Star in the Star Wars movies. This usage was particularly common among partisans of BSD Unix in the 1980s, who tended to regard the AT T versions as inferior and AT T as a bad guy. Copies still circulate of a poster printed by Mt. Xinu showing a starscape with a space fighter labeled 4.2 BSD streaking away from a broken AT T logo wreathed in flames.

+

1. The AT&T corporate logo, which bears an uncanny resemblance to the Death Star in the Star Wars movies. This usage was particularly common among partisans of BSD Unix in the 1980s, who tended to regard the AT&T versions as inferior and AT&T as a bad guy. Copies still circulate of a poster printed by Mt. Xinu showing a starscape with a space fighter labeled 4.2 BSD streaking away from a broken AT&T logo wreathed in flames.

-

2. AT T's internal magazine, Focus , uses death star to describe an incorrectly done AT T logo in which the inner circle in the top left is dark instead of light a frequent result of dark-on-light logo images.

+

2. AT&T's internal magazine, Focus , uses death star to describe an incorrectly done AT&T logo in which the inner circle in the top left is dark instead of light a frequent result of dark-on-light logo images.

Death, X of

A construction used to imbue the subject with campy menace, usually with intent to ridicule. The ancestor of this term is a famous Far Side cartoon from the 1980s in which a balloon with a fierce face painted on it is passed off as the Floating Head of Death. Hackers and SF fans have been using the suffix of Death ever since to label things which appear to be vastly threatening but will actually pop like a balloon if you prick them. Such constructions are properly spoken in a tone of over-exagerrated portentiousness: Behold! The Spinning - Pizza - of - Death ! See Blue Screen of Death , Ping O' Death , Spinning Pizza of Death , click of death. Compare Doom, X of. @@ -824,7 +824,7 @@ This file last generated Monday, 15 October 2018 02:14PM UTC

GIGO

- /gi:goh/ 1. Garbage In, Garbage Out usually said in response to lusers who complain that a program didn't do the right thing when given imperfect input or otherwise mistreated in some way. Also commonly used to describe failures in human decision making due to faulty, incomplete, or imprecise data. 2. + /gi:goh/ Garbage In, Garbage Out usually said in response to users who complain that a program didn't do the right thing when given imperfect input or otherwise mistreated in some way. Also commonly used to describe failures in human decision making due to faulty, incomplete, or imprecise data.

GIPS

@@ -860,7 +860,7 @@ This file last generated Monday, 15 October 2018 02:14PM UTC

GWF

- n. Common abbreviation for Goober with Firewall. A luser who has equipped his desktop computer with a hypersensitive software firewall or host intrusion detection program, and who gives its alerts absolute credence. ISP tech support and abuse desks dread hearing from such persons, who insist that every packet of abnormal traffic the software detects is a hacker (sic) and, occasionally, threatening lawsuits or prosecution. GWFs have been known to assert that they are being attacked from 127.0.0.1, and that their ISP is criminally negligent for failing to block these attacks. GWF is used similarly to ID10T error and PEBKAC to flag trouble tickets opened by such users. + n. Common abbreviation for Goober with Firewall. A user who has equipped their computer with a hypersensitive software firewall or host intrusion detection program, and who gives its alerts absolute credence. ISP tech support and abuse desks dread hearing from such persons, who insist that every packet of abnormal traffic the software detects is a hacker (sic) and, occasionally, threatening lawsuits or prosecution. GWFs have been known to assert that they are being attacked from 127.0.0.1, and that their ISP is criminally negligent for failing to block these attacks. GWF is used similarly to ID10T error and PEBKAC to flag trouble tickets opened by such users.

GandhiCon

@@ -874,10 +874,6 @@ This file last generated Monday, 15 October 2018 02:14PM UTC

The speed of software halves every 18 months. This oft-cited law is an ironic comment on the tendency of software bloat to outpace the every-18-month doubling in hardware capacity per dollar predicted by Moore's Law. The reference is to Bill Gates; Microsoft is widely considered among the worst if not the worst of the perpetrators of bloat.

-

Gender and Ethnicity

-

- Hackerdom is still predominantly male. However, the percentage of women is clearly higher than the low-single-digit range typical for technical professions, and female hackers are generally respected and dealt with as equals. In the U.S., hackerdom is predominantly Caucasian with strong minorities of Jews (East Coast) and Orientals (West Coast). The Jewish contingent has exerted a particularly pervasive cultural influence (see Food , above, and note that several common jargon terms are obviously mutated Yiddish). The ethnic distribution of hackers is understood by them to be a function of which ethnic groups tend to seek and value education. Racial and ethnic prejudice is notably uncommon and tends to be met with freezing contempt. When asked, hackers often ascribe their culture's gender- and color-blindness to a positive effect of text-only network channels, and this is doubtless a powerful influence. Also, the ties many hackers have to AI research and SF literature may have helped them to develop an idea of personhood that is inclusive rather than exclusive after all, if one's imagination readily grants full human rights to future AI programs, robots, dolphins, and extraterrestrial aliens, mere color and gender can't seem very important any more. -

General Appearance

Although the mainstream media may believe otherwise, hackers do not have any particular uniform or appearance. Anyone you see in the supermarket could be a hacker. Since the majority of people are proletarians the typical hacker just looks like any other prole. Occasionally they may be distinguished by wearing T-shirts or hoodies with software/distro/conference logos on them. At the end of the 20th century hackers were mostly caucasian 20-something dudes from middle class families and living in Europe or the US, but as computing and knowledge became cheaper and more ubiquitous the initially privileged profile gave way to total generality. Today the main distinguishing feature of hackers is being interested in computers and tinkering with them, not any particular physical appearance or economic status. @@ -894,10 +890,6 @@ This file last generated Monday, 15 October 2018 02:14PM UTC

In the United States, hackerdom revolves on a Bay Area-to-Boston axis; about half of the hard core seems to live within a hundred miles of Cambridge (Massachusetts) or Berkeley (California), although there are significant contingents in Los Angeles, in the Pacific Northwest, and around Washington DC. Hackers tend to cluster around large cities, especially university towns such as the Raleigh-Durham area in North Carolina or Princeton, New Jersey (this may simply reflect the fact that many are students or ex-students living near their alma maters).

-

Get a life!

-

- imp. Hacker-standard way of suggesting that the person to whom it is directed has succumbed to terminal geekdom (see geek ). Often heard on Usenet , esp. as a way of suggesting that the target is taking some obscure issue of theology too seriously. This exhortation was popularized by William Shatner on a 1987 Saturday Night Live episode in a speech that ended Get a life ! , but it can be traced back at least to Valley Girl slang in 1983. It was certainly in wide use among hackers for years before achieving mainstream currency via the sitcom Get A Life in 1990. -

Get a real computer!

imp. In 1996 when this entry first entered the File, it was the typical hacker response to news that somebody is having trouble getting work done on a system that (a) was single-tasking, (b) had no hard disk, or (c) had an address space smaller than 16 megabytes. In 2003 anything less powerful than a 500MHz Pentium with a multi-gigabyte hard disk would probably be similarly written off. The threshold for real computer rises with time. See bitty box and toy. @@ -1149,7 +1141,7 @@ This file last generated Monday, 15 October 2018 02:14PM UTC

Jeff K.

- The spiritual successor to B1FF and the archetype of script kiddies. is a sixteen-year-old suburbanite who fancies himself a l33t haX0r , although his knowledge of computers seems to be limited to the procedure for getting Quake up and running. His Web page http://www.somethingawful.com/jeffk/ features a number of hopelessly naive articles, essays, and rants, all filled with the kind of misspellings, studlycaps , and number-for-letter substitutions endemic to the script kiddie and warez d00dz communities. Jeff's offerings, among other things, include hardware advice (such as AMD VERSIS PENTIUM and HOW TO OVARCLOAK YOUR COMPUTAR ), his own Quake clan (Clan 40 OUNSCE), and his own comic strip (Wacky Fun Computar Comic Jokes). Like B1FF, is (fortunately) a hoax. was created by internet game journalist Richard Lowtax Kyanka, whose web site Something Awful (http://www.somethingawful.com) highlights unintentionally humorous news items and Web sites, as a parody of the kind of teenage luser who infests Quake servers, chat rooms, and other places where computer enthusiasts congregate. He is well-recognized in the PC game community and his influence has spread to hacker fora like Slashdot as well. + The spiritual successor to B1FF and the archetype of script kiddies is a sixteen-year-old suburbanite who fancies himself a l33t haX0r, although his knowledge of computers seems to be limited to the procedure for getting Quake up and running.

Jeopardy-style quoting

@@ -1368,7 +1360,7 @@ This file last generated Monday, 15 October 2018 02:14PM UTC

Murphy's Law

- prov. The correct, original Murphy's Law reads: If there are two or more ways to do something, and one of those ways can result in a catastrophe, then someone will do it. This is a principle of defensive design, cited here because it is usually given in mutant forms less descriptive of the challenges of design for luser s. For example, you don't make a two-pin plug symmetrical and then label it THIS WAY UP ; if it matters which way it is plugged in, then you make the design asymmetrical (see also the anecdote under magic smoke ). Edward A. Murphy, Jr. was one of McDonnell-Douglas's test engineers on the rocket-sled experiments that were done by the U.S. Air Force in 1949 to test human acceleration tolerances (USAF project MX981). One experiment involved a set of 16 accelerometers mounted to different parts of the subject's body. There were two ways each sensor could be glued to its mount, and somebody methodically installed all 16 in a replacement set the wrong way around. Murphy then made the original form of his pronouncement, which the test subject (Major John Paul Stapp) mis-quoted (apparently in the more general form Whatever can go wrong, will go wrong) at a news conference a few days later. Within months Murphy's Law had spread to various technical cultures connected to aerospace engineering. Before too many years had gone by variants had passed into the popular imagination, changing as they went. Most of these are variants on Anything that can go wrong, will ; this is more correctly referred to as Finagle's Law. + prov. The correct, original Murphy's Law reads: If there are two or more ways to do something, and one of those ways can result in a catastrophe, then someone will do it. This is a principle of defensive design. Edward A. Murphy, Jr. was one of McDonnell-Douglas's test engineers on the rocket-sled experiments that were done by the U.S. Air Force in 1949 to test human acceleration tolerances (USAF project MX981). One experiment involved a set of 16 accelerometers mounted to different parts of the subject's body. There were two ways each sensor could be glued to its mount, and somebody methodically installed all 16 in a replacement set the wrong way around. Murphy then made the original form of his pronouncement, which the test subject (Major John Paul Stapp) mis-quoted (apparently in the more general form Whatever can go wrong, will go wrong) at a news conference a few days later. Within months Murphy's Law had spread to various technical cultures connected to aerospace engineering. Before too many years had gone by variants had passed into the popular imagination, changing as they went. Most of these are variants on Anything that can go wrong, will; this is more correctly referred to as Finagle's Law.

N

NAK

@@ -1444,10 +1436,6 @@ This file last generated Monday, 15 October 2018 02:14PM UTC

1. [Operating System] n. An abbreviation heavily used in email, occasionally in speech.

2. n. obs. On ITS, an output spy. See OS and JEDGAR in Appendix A.

-

OS and JEDGAR

-

- This story says a lot about the ITS ethos. On the ITS system there was a program that allowed you to see what was being printed on someone else's terminal. It spied on the other guy's output by examining the insides of the monitor system. The output spy program was called OS. Throughout the rest of the computer science world (and at IBM too) OS means operating system, but among old-time ITS hackers it almost always meant output spy. OS could work because ITS purposely had very little in the way of protection that prevented one user from trespassing on another's areas. Fair is fair, however. There was another program that would automatically notify you if anyone started to spy on your output. It worked in exactly the same way, by looking at the insides of the operating system to see if anyone else was looking at the insides that had to do with your output. This counterspy program was called JEDGAR (a six-letterism pronounced as two syllables: /jedgr/ ), in honor of the former head of the FBI. But there's more. JEDGAR would ask the user for license to kill. If the user said yes, then JEDGAR would actually gun the job of the luser who was spying. Unfortunately, people found that this made life too violent, especially when tourists learned about it. One of the systems hackers solved the problem by replacing JEDGAR with another program that only pretended to do its job. It took a long time to do this, because every copy of JEDGAR had to be patched. To this day no one knows how many people never figured out that JEDGAR had been defanged. Interestingly, there is still a security module named JEDGAR alive as of late 1999 in the Unisys MCP for large systems. It is unknown to us whether the name is tribute or independent invention. -

OS/2

/O S too/ , n. The anointed successor to MS-DOS for Intel 286- and 386-based micros; proof that IBM/Microsoft couldn't get it right the second time, either. Often called Half-an-OS. Mentioning it is usually good for a cheap laugh among hackers the design was so baroque , and the implementation of 1.x so bad, that three years after introduction you could still count the major apps shipping for it on the fingers of two hands in unary. The 2.x versions were said to have improved somewhat, and informed hackers rated them superior to Microsoft Windows (an endorsement which, however, could easily be construed as damning with faint praise). In the mid-1990s IBM put OS/2 on life support, refraining from killing it outright purely for internal political reasons; by 1999 the success of Linux had effectively ended any possibility of a renaissance. See monstrosity , cretinous , second-system effect. @@ -1531,7 +1519,7 @@ This file last generated Monday, 15 October 2018 02:14PM UTC

PEBKAC

- /pebkak/ [Abbrev., Problem Exists Between Keyboard And Chair ] Used by support people, particularly at call centers and help desks. Not used with the public. Denotes pilot error as the cause of the crash, especially stupid errors that even a luser could figure out. Very derogatory. Usage: Did you ever figure out why that guy couldn't print? Yeah, he kept cancelling the operation before it could finish. PEBKAC. See also ID10T. Compare pilot error , UBD. + /pebkak/ [Abbrev., Problem Exists Between Keyboard And Chair] Used by support people, particularly at call centers and help desks. Not used with the public. Denotes pilot error as the cause of the crash, especially stupid errors. Very derogatory. Usage: Did you ever figure out why that guy couldn't print? Yeah, he kept cancelling the operation before it could finish. PEBKAC. See also ID10T. Compare pilot error, UBD.

PFY

@@ -1933,7 +1921,7 @@ This file last generated Monday, 15 October 2018 02:14PM UTC

TWENEX

- /tweneks/ , n. The TOPS-20 operating system by DEC the second proprietary OS for the PDP-10 preferred by most PDP-10 hackers over TOPS-10 (that is, by those who were not ITS or WAITS partisans). TOPS-20 began in 1969 as Bolt, Beranek Newman's TENEX operating system using special paging hardware. By the early 1970s, almost all of the systems on the ARPANET ran TENEX. DEC purchased the rights to TENEX from BBN and began work to make it their own. The first in-house code name for the operating system was VIROS (VIRtual memory Operating System); when customers started asking questions, the name was changed to SNARK so DEC could truthfully deny that there was any project called VIROS. When the name SNARK became known, the name was briefly reversed to become KRANS; this was quickly abandoned when someone objected that krans meant funeral wreath in Swedish (though some Swedish speakers have since said it means simply wreath ; this part of the story may be apocryphal). Ultimately DEC picked TOPS-20 as the name of the operating system, and it was as TOPS-20 that it was marketed. The hacker community, mindful of its origins, quickly dubbed it TWENEX (a contraction of twenty TENEX ), even though by this point very little of the original TENEX code remained (analogously to the differences between AT T V6 Unix and BSD). DEC people cringed when they heard TWENEX , but the term caught on nevertheless (the written abbreviation 20x was also used). TWENEX was successful and very popular; in fact, there was a period in the early 1980s when it commanded as fervent a culture of partisans as Unix or ITS but DEC's decision to scrap all the internal rivals to the VAX architecture and its relatively stodgy VMS OS killed the DEC-20 and put a sad end to TWENEX's brief day in the sun. DEC attempted to convince TOPS-20 users to convert to VMS , but instead, by the late 1980s, most of the TOPS-20 hackers had migrated to Unix. There is a TOPS-20 home page. + /tweneks/ , n. The TOPS-20 operating system by DEC the second proprietary OS for the PDP-10 preferred by most PDP-10 hackers over TOPS-10 (that is, by those who were not ITS or WAITS partisans). TOPS-20 began in 1969 as Bolt, Beranek Newman's TENEX operating system using special paging hardware. By the early 1970s, almost all of the systems on the ARPANET ran TENEX. DEC purchased the rights to TENEX from BBN and began work to make it their own. The first in-house code name for the operating system was VIROS (VIRtual memory Operating System); when customers started asking questions, the name was changed to SNARK so DEC could truthfully deny that there was any project called VIROS. When the name SNARK became known, the name was briefly reversed to become KRANS; this was quickly abandoned when someone objected that krans meant funeral wreath in Swedish (though some Swedish speakers have since said it means simply wreath ; this part of the story may be apocryphal). Ultimately DEC picked TOPS-20 as the name of the operating system, and it was as TOPS-20 that it was marketed. The hacker community, mindful of its origins, quickly dubbed it TWENEX (a contraction of twenty TENEX ), even though by this point very little of the original TENEX code remained (analogously to the differences between AT&T V6 Unix and BSD). DEC people cringed when they heard TWENEX , but the term caught on nevertheless (the written abbreviation 20x was also used). TWENEX was successful and very popular; in fact, there was a period in the early 1980s when it commanded as fervent a culture of partisans as Unix or ITS but DEC's decision to scrap all the internal rivals to the VAX architecture and its relatively stodgy VMS OS killed the DEC-20 and put a sad end to TWENEX's brief day in the sun. DEC attempted to convince TOPS-20 users to convert to VMS , but instead, by the late 1980s, most of the TOPS-20 hackers had migrated to Unix. There is a TOPS-20 home page.

TeX

@@ -2006,7 +1994,7 @@ This file last generated Monday, 15 October 2018 02:14PM UTC

UN*X

- n. Used to refer to the Unix operating system (a trademark of AT T, then of Novell, then of Unix Systems Laboratories, then of the Open Group; the source code parted company with it after Novell and was owned by SCO, which was acquired by Caldera) in writing, but avoiding the need for the ugly typography (see also (TM) ). Also used to refer to any or all varieties of Unixoid operating systems. Ironically, lawyers now say that the requirement for the trademark postfix has no legal force, but the asterisk usage is entrenched anyhow. It has been suggested that there may be a psychological connection to practice in certain religions (especially Judaism) in which the name of the deity is never written out in full, e.g., YHWH or G--d is used. See also glob and splat out. + n. Used to refer to the Unix operating system (a trademark of AT&T, then of Novell, then of Unix Systems Laboratories, then of the Open Group; the source code parted company with it after Novell and was owned by SCO, which was acquired by Caldera) in writing, but avoiding the need for the ugly typography (see also (TM) ). Also used to refer to any or all varieties of Unixoid operating systems. Ironically, lawyers now say that the requirement for the trademark postfix has no legal force, but the asterisk usage is entrenched anyhow. It has been suggested that there may be a psychological connection to practice in certain religions (especially Judaism) in which the name of the deity is never written out in full, e.g., YHWH or G--d is used. See also glob and splat out.

URL

@@ -2014,7 +2002,7 @@ This file last generated Monday, 15 October 2018 02:14PM UTC

UTSL

- // , n. [Unix] On-line acronym for Use the Source, Luke (a pun on Obi-Wan Kenobi's Use the Force, Luke! in Star Wars ) analogous to RTFS (sense 1), but more polite. This is a common way of suggesting that someone would be better off reading the source code that supports whatever feature is causing confusion, rather than making yet another futile pass through the manuals, or broadcasting questions on Usenet that haven't attracted wizards to answer them. Once upon a time in elder days , everyone running Unix had source. After 1978, AT T's policy tightened up, so this objurgation was in theory appropriately directed only at associates of some outfit with a Unix source license. In practice, bootlegs of Unix source code (made precisely for reference purposes) were so ubiquitous that one could utter it at almost anyone on the network without concern. Nowadays, free Unix clones have become widely enough distributed that anyone can read source legally. The most widely distributed is certainly Linux, with variants of the NET/2 and 4.4BSD distributions running second. Cheap commercial Unixes with source such as BSD/OS are accelerating this trend. + // , n. [Unix] On-line acronym for Use the Source, Luke (a pun on Obi-Wan Kenobi's Use the Force, Luke! in Star Wars ) analogous to RTFS (sense 1), but more polite. This is a common way of suggesting that someone would be better off reading the source code that supports whatever feature is causing confusion, rather than making yet another futile pass through the manuals, or broadcasting questions on Usenet that haven't attracted wizards to answer them. Once upon a time in elder days , everyone running Unix had source. After 1978, AT&T's policy tightened up, so this objurgation was in theory appropriately directed only at associates of some outfit with a Unix source license. In practice, bootlegs of Unix source code (made precisely for reference purposes) were so ubiquitous that one could utter it at almost anyone on the network without concern. Nowadays, free Unix clones have become widely enough distributed that anyone can read source legally. The most widely distributed is certainly Linux, with variants of the NET/2 and 4.4BSD distributions running second. Cheap commercial Unixes with source such as BSD/OS are accelerating this trend.

UUOC

@@ -2030,7 +2018,7 @@ This file last generated Monday, 15 October 2018 02:14PM UTC

Unix conspiracy

- n. [ITS] According to a conspiracy theory long popular among ITS and TOPS-20 fans, Unix's growth is the result of a plot, hatched during the 1970s at Bell Labs, whose intent was to hobble AT T's competitors by making them dependent upon a system whose future evolution was to be under AT T's control. This would be accomplished by disseminating an operating system that is apparently inexpensive and easily portable, but also relatively unreliable and insecure (so as to require continuing upgrades from AT T). This theory was lent a substantial impetus in 1984 by the paper referenced in the back door entry. In this view, Unix was designed to be one of the first computer viruses (see virus ) but a virus spread to computers indirectly by people and market forces, rather than directly through disks and networks. Adherents of this Unix virus theory like to cite the fact that the well-known quotation Unix is snake oil was uttered by DEC president Kenneth Olsen shortly before DEC began actively promoting its own family of Unix workstations. (Olsen now claims to have been misquoted.) If there was ever such a conspiracy, it got thoroughly out of the plotters' control after 1990. AT T sold its Unix operation to Novell around the same time Linux and other free-Unix distributions were beginning to make noise. + n. [ITS] According to a conspiracy theory long popular among ITS and TOPS-20 fans, Unix's growth is the result of a plot, hatched during the 1970s at Bell Labs, whose intent was to hobble AT&T's competitors by making them dependent upon a system whose future evolution was to be under AT&T's control. This would be accomplished by disseminating an operating system that is apparently inexpensive and easily portable, but also relatively unreliable and insecure (so as to require continuing upgrades from AT&T). This theory was lent a substantial impetus in 1984 by the paper referenced in the back door entry. In this view, Unix was designed to be one of the first computer viruses (see virus ) but a virus spread to computers indirectly by people and market forces, rather than directly through disks and networks. Adherents of this Unix virus theory like to cite the fact that the well-known quotation Unix is snake oil was uttered by DEC president Kenneth Olsen shortly before DEC began actively promoting its own family of Unix workstations. (Olsen now claims to have been misquoted.) If there was ever such a conspiracy, it got thoroughly out of the plotters' control after 1990. AT&T sold its Unix operation to Novell around the same time Linux and other free-Unix distributions were beginning to make noise.

Usenet

@@ -2686,7 +2674,7 @@ This file last generated Monday, 15 October 2018 02:14PM UTC

4. More generally, a (possibly incorrect) mental state of belief. I have a bit set that says that you were the last guy to hack on EMACS. (Meaning I think you were the last guy to hack on EMACS, and what I am about to say is predicated on this, so please stop me if this isn't true. ) I just need one bit from you is a polite way of indicating that you intend only a short interruption for a question that can presumably be answered yes or no. A bit is said to be set if its value is true or 1, and reset or clear if its value is false or 0. One speaks of setting and clearing bits. To toggle or invert a bit is to change it, either from 0 to 1 or from 1 to 0. See also flag , trit , mode bit. The term bit first appeared in print in the computer-science sense in a 1948 paper by information theorist Claude Shannon, and was there credited to the early computer scientist John Tukey (who also seems to have coined the term software ). Tukey records that bit evolved over a lunch table as a handier alternative to bigit or binit , at a conference in the winter of 1943-44.

bit bang

- n. Transmission of data on a serial line, when accomplished by rapidly tweaking a single output bit, in software, at the appropriate times. The technique is a simple loop with eight OUT and SHIFT instruction pairs for each byte. Input is more interesting. And full duplex (doing input and output at the same time) is one way to separate the real hackers from the wannabee s. Bit bang was used on certain early models of Prime computers, presumably when UARTs were too expensive, and on archaic Z80 micros with a Zilog PIO but no SIO. In an interesting instance of the cycle of reincarnation , this technique returned to use in the early 1990s on some RISC architectures because it consumes such an infinitesimal part of the processor that it actually makes sense not to have a UART. Compare cycle of reincarnation. Nowadays it's used to describe I2C, a serial protocol for monitoring motherboard hardware. + n. Transmission of data on a serial line, when accomplished by rapidly tweaking a single output bit, in software, at the appropriate times. The technique is a simple loop with eight OUT and SHIFT instruction pairs for each byte. Input is more interesting. And full duplex (doing input and output at the same time) is one way to separate the real hackers from the wannabees. Bit bang was used on certain early models of Prime computers, presumably when UARTs were too expensive, and on archaic Z80 micros with a Zilog PIO but no SIO. In an interesting instance of the cycle of reincarnation , this technique returned to use in the early 1990s on some RISC architectures because it consumes such an infinitesimal part of the processor that it actually makes sense not to have a UART. Compare cycle of reincarnation. Nowadays it's used to describe I2C, a serial protocol for monitoring motherboard hardware.

bit bashing

@@ -2778,6 +2766,10 @@ This file last generated Monday, 15 October 2018 02:14PM UTC

/blech'@r@s/ , adj. Disgusting in design or function; esthetically unappealing. This word is seldom used of people. This keyboard is bletcherous! (Perhaps the keys don't work very well, or are misplaced.) See losing , cretinous , bagbiting , bogus , and random. The term bletcherous applies to the esthetics of the thing so described; similarly for cretinous. By contrast, something that is losing or bagbiting may be failing to meet objective criteria. See also bogus and random , which have richer and wider shades of meaning than any of the above.

+

bling

+

+ The aesthetic appearance of a system can be described as "bling heavy" if it contains a lot of fancy animations, slick screen transitions and exquisitely designed icons and fonts. "You can bling the heck out of this desktop environment". +

blinkenlights

/blink'@nli:tz/ , n. [common] Front-panel diagnostic lights on a computer, esp. a dinosaur. Now that dinosaurs are rare, this term usually refers to status lights on a modem, network hub, or the like. This term derives from the last word of the famous blackletter-Gothic sign in mangled pseudo-German that once graced about half the computer rooms in the English-speaking world. One version ran in its entirety as follows: ACHTUNG!ALLESLOOKENSPEEPERS! Allestouristenundnon-technischenlookenpeepers! Dascomputermachineistnichtfuergefingerpokenundmittengrabben. Isteasyschnappenderspringenwerk,blowenfusenundpoppencorken mitspitzensparken.Istnichtfuergewerkenbeidasdumpkopfen. Dasrubberneckensichtseerenkeependascotten-pickenenhansindas pocketsmuss;relaxenundwatchendasblinkenlichten. This silliness dates back at least as far as 1955 at IBM and had already gone international by the early 1960s, when it was reported at London University's ATLAS computing site. There are several variants of it in circulation, some of which actually do end with the word blinkenlights. In an amusing example of turnabout-is-fair-play, German hackers have developed their own versions of the blinkenlights poster in fractured English, one of which is reproduced here: ATTENTION Thisroomisfullfilledmitspecialelectronischeequippment. Fingergrabbingandpressingthecnoeppkesfromthecomputersis allowedfordieexpertsonly!Soallthe lefthanders stayaway anddonotdisturbenthebrainstormingvonhereworking intelligencies.Otherwiseyouwillbeoutthrownandkicked anderswhere!Also:pleasekeepstillandonlywatchenastaunished theblinkenlights. See also geef. Old-time hackers sometimes get nostalgic for blinkenlights because they were so much more fun to look at than a blank panel. Sadly, very few computers still have them (the three LEDs on a PC keyboard certainly don't count). The obvious reasons (cost of wiring, cost of front-panel cutouts, almost nobody needs or wants to interpret machine-register states on the fly anymore) are only part of the story. Another part of it is that radio-frequency leakage from the lamp wiring was beginning to be a problem as far back as transistor machines. But the most fundamental fact is that there are very few signals slow enough to blink an LED these days! With slow CPUs, you could watch the bus register or instruction counter tick, but even at 33/66/150MHz (let alone gigahertz speeds) it's all a blur. Despite this, a couple of relatively recent computer designs of note have featured programmable blinkenlights that were added just because they looked cool. The Connection Machine, a 65,536-processor parallel computer designed in the mid-1980s, was a black cube with one side covered with a grid of red blinkenlights; the sales demo had them evolving life patterns. A few years later the ill-fated BeBox (a personal computer designed to run the BeOS operating system) featured twin rows of blinkenlights on the case front. When Be, Inc. decided to get out of the hardware business in 1996 and instead ported their OS to the PowerPC and later to the Intel architecture, many users suffered severely from the absence of their beloved blinkenlights. Before long an external version of the blinkenlights driven by a PC serial port became available; there is some sort of plot symmetry in the fact that it was assembled by a German. Finally, a version updated for the Internet has been seen on news.admin.net-abuse. @@ -2876,7 +2868,7 @@ This file last generated Monday, 15 October 2018 02:14PM UTC

3. Obsolete but still working hardware, especially when used of an old, bulky, quirky system; originally a term of annoyance, but became more and more affectionate as the hardware became more and more obsolete. Auctioneers use this term for a large, undesirable object such as a washing machine; actual boating enthusiasts, however, use mooring anchor for frustrating (not actually useless) equipment.

bob

- n. At Demon Internet , all tech support personnel are called Bob. (Female support personnel have an option on Bobette ). This has nothing to do with Bob the divine drilling-equipment salesman of the Church of the SubGenius. Nor is it acronymized from Brother Of BOFH , though all parties agree it could have been. Rather, it was triggered by an unusually large draft of new tech-support people in 1995. It was observed that there would be much duplication of names. To ease the confusion, it was decided that all support techs would henceforth be known as Bob , and identity badges were created labelled Bob 1 and Bob 2. ( No, we never got any further reports a witness). The reason for Bob rather than anything else is due to a luser calling and asking to speak to Bob , despite the fact that no Bob was currently working for Tech Support. Since we all know the customer is always right , it was decided that there had to be at least one Bob on duty at all times, just in case. This sillyness snowballed inexorably. Shift leaders and managers began to refer to their groups of bobs. Whole ranks of support machines were set up (and still exist in the DNS as of 1999) as bob1 through bobN. Then came alt.tech-support.recovery , and it was filled with Demon support personnel. They all referred to themselves, and to others, as bob , and after a while it caught on. There is now a Bob Code describing the Bob nature. + n. In the 1990s at an early ISP called Demon Internet, all tech support personnel are called either Bob (masc) or Bobette (fem). This has nothing to do with Bob the divine drilling-equipment salesman of the Church of the SubGenius. Nor is it acronymized from Brother Of BOFH , though all parties agree it could have been. Rather, it was triggered by an unusually large draft of new tech-support people in 1995. It was observed that there would be much duplication of names. To ease the confusion, it was decided that all support techs would henceforth be known as Bob or Bobette, and identity badges were created labelled Bob 1 and Bob 2. (No, we never got any further reports a witness). The reason for Bob/Bobette rather than anything else is due to a someone calling and asking to speak to Bob, despite the fact that no Bob was currently working for Tech Support. Since we all know the customer is always right, it was decided that there had to be at least one Bob on duty at all times, just in case. This sillyness snowballed inexorably. Shift leaders and managers began to refer to their groups of bobs. Whole ranks of support machines were set up (and still exist in the DNS as of 1999) as bob1 through bobN. Then came alt.tech-support.recovery, and it was filled with Demon support personnel. They all referred to themselves, and to others, as bob, and after a while it caught on. There is now a Bob Code describing the Bob nature.

bodge

@@ -3327,7 +3319,7 @@ This file last generated Monday, 15 October 2018 02:14PM UTC

chainik

- /chi:nik/ [Russian, literally teapot ] Almost synonymous with muggle. Implies both ignorance and a certain amount of willingness to learn, but does not necessarily imply as little experience or short exposure time as newbie and is not as derogatory as luser. Both a novice user and someone using a system for a long time without any understanding of the internals can be referred to as chainiks. Very widespread term in Russian hackish, often used in an English context by Russian-speaking hackers esp. in Israel (e.g. Our new colleague is a complete chainik ). FidoNet discussion groups often had a chainik subsection for newbies and, well, old chainiks (eg. su.asm.chainik, ru.linux.chainik, ru.html.chainik). Public projects often have a chainik mailing list to keep the chainiks off the developers' and experienced users' discussions. Today, the word is slowly slipping into mainstream Russian due to the Russian translation of the popular yellow-black covered foobar for dummies series, which (correctly) uses chainik for dummy , but its frequent (though not excessive) use is still characteristic hacker-speak. + /chi:nik/ [Russian, literally teapot ] Almost synonymous with muggle. Implies both ignorance and a certain amount of willingness to learn, but does not necessarily imply as little experience or short exposure time as newbie. Both a novice user and someone using a system for a long time without any understanding of the internals can be referred to as chainiks. Very widespread term in Russian hackish, often used in an English context by Russian-speaking hackers esp. in Israel (e.g. Our new colleague is a complete chainik ). FidoNet discussion groups often had a chainik subsection for newbies and, well, old chainiks (eg. su.asm.chainik, ru.linux.chainik, ru.html.chainik). Public projects often have a chainik mailing list to keep the chainiks off the developers' and experienced users' discussions. Today, the word is slowly slipping into mainstream Russian due to the Russian translation of the popular yellow-black covered foobar for dummies series, which (correctly) uses chainik for dummy , but its frequent (though not excessive) use is still characteristic hacker-speak.

channel

@@ -3405,6 +3397,10 @@ This file last generated Monday, 15 October 2018 02:14PM UTC

vi. To run slowly; to grind or grovel. The download is chugging like crazy.

+

class

+

+ Hackers tend to come from the working or middle classes. They tend not to originate from the upper part of the middle class, since the offspring of wealthy elites tend to be discouraged from pursuing anything which might resemble engineering. In terms of class composition anyone you see in the street or in a supermarket could potentially be a hacker. They don't wear any particular uniform or look like any particular stereotype. Most hackers are working class, with no capital income, but some get offered shares in companies or go into fintech and become partially or wholly bourgeois. +

clean

Used of hardware or software designs, implies elegance in the small , that is, a design or implementation that may not hold any surprises but does things in a way that is reasonably intuitive and relatively easy to comprehend from the outside. The antonym is grungy or crufty. 2. v. To remove unneeded or undesired files in a effort to reduce clutter: I'm cleaning up my account. I cleaned up the garbage and now have 100 Meg free on that partition. @@ -3758,11 +3754,11 @@ This file last generated Monday, 15 October 2018 02:14PM UTC The art and science of creating cryptographic algorithms which contain back doors or bug doors, sometimes also known as "secure golden key", "front door" or "key escrow".

crash

-

1. n. A sudden, usually drastic failure. Most often said of the system (q.v., sense 1), esp. of magnetic disk drives (the term originally described what happens when the air gap of a hard disk collapses). Three lusers lost their files in last night's disk . A disk that involves the read/write heads dropping onto the surface of the disks and scraping off the oxide may also be referred to as a head , whereas the term system usually, though not always, implies that the operating system or other software was at fault.

+

1. n. A sudden, usually drastic failure. Most often said of the system (q.v., sense 1), esp. of magnetic disk drives (the term originally described what happens when the air gap of a hard disk collapses). A disk that involves the read/write heads dropping onto the surface of the disks and scraping off the oxide may also be referred to as a head, whereas the term system usually, though not always, implies that the operating system or other software was at fault.

-

2. v. To fail suddenly. Has the system just ed? Something ed the OS! See down. Also used transitively to indicate the cause of the (usually a person or a program, or both). Those idiots playing SPACEWAR ed the system.

+

2. v. To fail suddenly. Has the system just crashed? Something crashed the OS! See down. Also used transitively to indicate the cause of the crash (usually a person or a program, or both). Those idiots playing SPACEWAR crashed the system.

-

3. vi. Sometimes said of people hitting the sack after a long hacking run ; see gronk out.

+

3. vi. Sometimes said of people hitting the sack after a long hacking run; see gronk out.

crash and burn

vi.,n. A spectacular crash, in the mode of the conclusion of the car-chase scene in the movie Bullitt and many subsequent imitators (compare die horribly ). The construction crash-and-burn machine is reported for a computer used exclusively for alpha or beta testing, or reproducing bugs (i.e., not for development). The implication is that it wouldn't be such a disaster if that machine crashed, since only the testers would be inconvenienced. @@ -4393,7 +4389,7 @@ This file last generated Monday, 15 October 2018 02:14PM UTC

2. A backup. This usage is typical only at large timesharing installations.

dumpster diving

-

1. The practice of sifting refuse from an office or technical installation to extract confidential data, especially security-compromising information ( dumpster is an Americanism for what is elsewhere called a skip ). Back in AT T's monopoly days, before paper shredders became common office equipment, phone phreaks (see phreaking ) used to organize regular dumpster runs against phone company plants and offices. Discarded and damaged copies of AT T internal manuals taught them much. The technique is still rumored to be a favorite of crackers operating against careless targets.

+

1. The practice of sifting refuse from an office or technical installation to extract confidential data, especially security-compromising information ( dumpster is an Americanism for what is elsewhere called a skip ). Back in AT&T's monopoly days, before paper shredders became common office equipment, phone phreaks (see phreaking ) used to organize regular dumpster runs against phone company plants and offices. Discarded and damaged copies of AT&T internal manuals taught them much. The technique is still rumored to be a favorite of crackers operating against careless targets.

2. The practice of raiding the dumpsters behind buildings where producers and/or consumers of high-tech equipment are located, with the expectation (usually justified) of finding discarded but still-valuable equipment to be nursed back to health in some hacker's den. Experienced dumpster-divers not infrequently accumulate basements full of moldering (but still potentially useful) cruft.

dusty deck

@@ -4503,6 +4499,10 @@ This file last generated Monday, 15 October 2018 02:14PM UTC

1. [XEROX PARC] Predicating one research effort upon the success of another.

2. Allowing your own research effort to be placed on the critical path of some other project (be it a research effort or not).

+

ethnicity

+

+ The ethnicity of hackers varies depending upon where you are and it tends to follow whatever is normative for the region. So if you're in Europe or North America it's overwhelmingly Caucasian. In those areas anyone non-Caucasian tends to be kept out of commercial software development due to entrenched discrimination. +

eurodemo

/yoorodem`o/ a demo , sense 4 Prev Up Next error 33 Home evil @@ -4551,7 +4551,7 @@ This file last generated Monday, 15 October 2018 02:14PM UTC

eye candy

- /i: kand`ee/ , n. [from mainstream slang ear candy ] A display of some sort that's presented to lusers to keep them distracted while the program performs necessary background tasks. Give 'em some eye candy while the back-end slurps that BLOB into core. Reported as mainstream usage among players of graphics-heavy computer games. We're also told this term is mainstream slang for soft pornography, but that sense does not appear to be live among hackers. + /i: kand`ee/ , n. [from mainstream slang ear candy ] A display of some sort. In mainstream usage among players of graphics-heavy computer games. Can also be used in the context of desktop operating system appearance, as in: "KDE Plasma has a lot of eye candy". Also see bling.

eyeball search

@@ -4937,7 +4937,7 @@ This file last generated Monday, 15 October 2018 02:14PM UTC

for the rest of us

1. Used to describe a spiffy product whose affordability shames other comparable products, or (more often) used sarcastically to describe spiffy but very overpriced products.

-

2. Describes a program with a limited interface, deliberately limited capabilities, non-orthogonality, inability to compose primitives, or any other limitation designed to not confuse a naive user. This places an upper bound on how far that user can go before the program begins to get in the way of the task instead of helping accomplish it. Used in reference to Macintosh software which doesn't provide obvious capabilities because it is thought that the poor lusers might not be able to handle them. Becomes the rest of them when used in third-party reference; thus, Yes, it is an attractive program, but it's designed for The Rest Of Them means a program that superficially looks neat but has no depth beyond the surface flash. See also WIMP environment , Macintrash , point-and-drool interface , user-friendly.

+

2. Describes a program with a limited interface, deliberately limited capabilities, non-orthogonality, inability to compose primitives, or any other limitation designed to not confuse a naive user. This places an upper bound on how far that user can go before the program begins to get in the way of the task instead of helping accomplish it. Used in reference to Macintosh software which doesn't provide obvious capabilities because they are thought to exceed the capabilities of average users. Becomes the rest of them when used in third-party reference; thus, Yes, it is an attractive program, but it's designed for The Rest Of Them means a program that superficially looks neat but has no depth beyond the surface flash. See also WIMP environment, Macintrash, point-and-drool interface, user-friendly.

for values of

A common rhetorical maneuver at MIT is to use any of the canonical random numbers as placeholders for variables. The max function takes 42 arguments, for arbitrary values of 42.: There are 69 ways to leave your lover, for 69 = 50. This is especially likely when the speaker has uttered a random number and realizes that it was not recognized as such, but even non-random numbers are occasionally used in this fashion. A related joke is that equals 3 for small values of and large values of 3. Historical note: at MIT this usage has traditionally been traced to the programming language MAD (Michigan Algorithm Decoder), an Algol-58-like language that was the most common choice among mainstream (non-hacker) users at MIT in the mid-60s. It inherited from Algol-58 a control structure FOR VALUES OF X = 3, 7, 99 DO. .. that would repeat the indicated instructions for each value in the list (unlike the usual FOR that only works for arithmetic sequences of values). MAD is long extinct, but similar for-constructs still flourish (e.g., in Unix's shell languages). @@ -5173,6 +5173,10 @@ This file last generated Monday, 15 October 2018 02:14PM UTC

/jen/ , n.,v. Short for generate , used frequently in both spoken and written contexts.

+

gender

+

+ Currently (2018) about 25% women in commercial software development. FOSS projects are more difficult to assess due to the common use of pseudonyms, but the percentage is probably similar. Before 1970 people writing software code were more like 50% women or above, and this early change in gender composition has now been well documented. +

gender mender

n. [common] A cable connector shell with either two male or two female connectors on it, used to correct the mismatches that result when some loser didn't understand the RS232C specification and the distinction between DTE and DCE. Used esp. for RS-232C parts in either the original D-25 or the IBM PC's bogus D-9 format. Also called gender bender , gender blender , sex changer , and even homosexual adapter; however, there appears to be some confusion as to whether a male homosexual adapter has pins on both sides (is doubly male) or sockets on both sides (connects two males). @@ -5313,6 +5317,10 @@ This file last generated Monday, 15 October 2018 02:14PM UTC

n. A hypothetical substance which attracts the index bots of Google.com. In common usage, a web page or web site with high placement in the results of a particular search on Google or frequent placement in the results of a various searches is said to have a lot of google juice or good google juice. Also used to compare web pages or web sites, for example CrackMonkey has more google juice than KPMG. See also juice , kilogoogle.

+

googler

+

+ A software engineer who works at Google. Overpaid. Possibly overtly sexist. Likely to be a suit and talk like suits. Probably deficient in hacker ethics. Syn for a failed hacker who went to the dark side. +

gopher

n. [obs.] A type of Internet service first floated around 1991 and obsolesced around 1995 by the World Wide Web. Gopher presents a menuing interface to a tree or graph of links; the links can be to documents, runnable programs, or other gopher menus arbitrarily far across the net. Some claim that the gopher software, which was originally developed at the University of Minnesota, was named after the Minnesota Gophers (a sports team). Others claim the word derives from American slang gofer (from go for , dialectal go fer ), one whose job is to run and fetch things. Finally, observe that gophers dig long tunnels, and the idea of tunneling through the net to find information was a defining metaphor for the developers. Probably all three things were true, but with the first two coming first and the gopher-tunnel metaphor serendipitously adding flavor and impetus to the project as it developed out of its concept stage. @@ -5355,7 +5363,7 @@ This file last generated Monday, 15 October 2018 02:14PM UTC

2. By extension, the non-data bits in any self-describing format. A GIF file contains, among other things, green bytes describing the packing method for the image. Compare out-of-band , zigamorph , fence (sense 1).

green card

- n. [after the IBM System/360 Reference Data card] A summary of an assembly language, even if the color is not green and not a card. Less frequently used now because of the decrease in the use of assembly language. I'll go get my green card so I can check the addressing mode for that instruction. The original green card became a yellow card when the System/370 was introduced, and later a yellow booklet. An anecdote from IBM refers to a scene that took place in a programmers' terminal room at Yorktown in 1978. A luser overheard one of the programmers ask another Do you have a green card? The other grunted and passed the first a thick yellow booklet. At this point the luser turned a delicate shade of olive and rapidly left the room, never to return. In fall 2000 it was reported from Electronic Data Systems that the green card for 370 machines has been a blue-green booklet since 1989. + n. [after the IBM System/360 Reference Data card] A summary of an assembly language, even if the color is not green and not a card. Less frequently used now because of the decrease in the use of assembly language. I'll go get my green card so I can check the addressing mode for that instruction. The original green card became a yellow card when the System/370 was introduced, and later a yellow booklet. In fall 2000 it was reported from Electronic Data Systems that the green card for 370 machines has been a blue-green booklet since 1989.

green lightning

1. Apparently random flashing streaks on the face of 3278-9 terminals while a new symbol set is being downloaded. This hardware bug was left deliberately unfixed, as some genius within IBM suggested it would let the user know that something is happening. That, it certainly does. Later microprocessor-driven IBM color graphics displays were actually programmed to produce green lightning!

@@ -5468,7 +5476,7 @@ This file last generated Monday, 15 October 2018 02:14PM UTC

H

ha ha only serious

- A phrase (often seen abbreviated as HHOS) that aptly captures the flavor of much hacker discourse. Applied especially to parodies, absurdities, and ironic jokes that are both intended and perceived to contain a possibly disquieting amount of truth, or truths that are constructed on in-joke and self-parody. This lexicon contains many examples of ha-ha-only-serious in both form and content. Indeed, the entirety of hacker culture is often perceived as ha-ha-only-serious by hackers themselves; to take it either too lightly or too seriously marks a person as an outsider, a wannabee , or in larval stage. For further enlightenment on this subject, consult any Zen master. See also hacker humor , and koan. + A phrase (often seen abbreviated as HHOS) that aptly captures the flavor of much hacker discourse. Applied especially to parodies, absurdities, and ironic jokes that are both intended and perceived to contain a possibly disquieting amount of truth, or truths that are constructed on in-joke and self-parody. This lexicon contains many examples of ha-ha-only-serious in both form and content. Indeed, the entirety of hacker culture is often perceived as ha-ha-only-serious by hackers themselves; to take it either too lightly or too seriously marks a person as an outsider, a wannabee, or in larval stage. For further enlightenment on this subject, consult any Zen master. See also hacker humor, and koan.

hack

1. n. Originally, a quick job that produces what is needed, but not well.

@@ -5580,7 +5588,7 @@ This file last generated Monday, 15 October 2018 02:14PM UTC

hair

- n. [back-formation from hairy ] The complications that make something hairy. Decoding TECO commands requires a certain amount of hair. Often seen in the phrase infinite hair , which connotes extreme complexity. Also in hairiferous (tending to promote hair growth): GNUMACS elisp encourages lusers to write complex editing modes. Yeah, it's pretty hairiferous all right. + n. [back-formation from hairy ] The complications that make something hairy. Decoding TECO commands requires a certain amount of hair. Often seen in the phrase infinite hair, which connotes extreme complexity. Also in hairiferous (tending to promote hair growth): EMACS elisp is pretty hairiferous all right.

hairball

1. [Fidonet] A large batch of messages that a store-and-forward network is failing to forward when it should. Often used in the phrase Fido coughed up a hairball today , meaning that the stuck messages have just come unstuck, producing a flood of mail where there had previously been drought.

@@ -5756,7 +5764,7 @@ This file last generated Monday, 15 October 2018 02:14PM UTC

highly

- adv. [scientific computation] The preferred modifier for overstating an understatement. As in: highly nonoptimal , the worst possible way to do something; highly nontrivial , either impossible or requiring a major research project; highly nonlinear , completely erratic and unpredictable; highly nontechnical , drivel written for luser s, oversimplified to the point of being misleading or incorrect (compare drool-proof paper ). In other computing cultures, postfixing of in the extreme might be preferred. + adv. [scientific computation] The preferred modifier for overstating an understatement. As in: highly nonoptimal, the worst possible way to do something; highly nontrivial, either impossible or requiring a major research project; highly nonlinear, completely erratic and unpredictable. In other computing cultures, postfixing of in the extreme might be preferred.

hing

@@ -5792,7 +5800,7 @@ This file last generated Monday, 15 October 2018 02:14PM UTC

holy wars

- n. [from Usenet , but may predate it; common] n. flame wars over religious issues. The paper by Danny Cohen that popularized the terms big-endian and little-endian in connection with the LSB-first/MSB-first controversy was entitled On Holy Wars and a Plea for Peace. Great holy wars of the past have included ITS vs.: Unix , Unix vs.: VMS , BSD Unix vs.: System V, C vs.: Pascal , C vs.: FORTRAN, etc. In the year 2003, popular favorites of the day are KDE vs, GNOME, vim vs. elvis, Linux vs. [Free|Net|Open]BSD. Hardy perennials include EMACS vs.: vi , my personal computer vs.: everyone else's personal computer, ad nauseam. The characteristic that distinguishes holy wars from normal technical disputes is that in a holy war most of the participants spend their time trying to pass off personal value choices and cultural attachments as objective technical evaluations. This happens precisely because in a true holy war, the actual substantive differences between the sides are relatively minor. See also theology. + n. [from Usenet , but may predate it; common] n. flame wars over religious issues. The paper by Danny Cohen that popularized the terms big-endian and little-endian in connection with the LSB-first/MSB-first controversy was entitled On Holy Wars and a Plea for Peace. Great holy wars of the past have included ITS vs Unix, Unix vs VMS, BSD Unix vs System V, C vs Rust, Python vs Perl, init vs systemd, vim vs Emacs, etc. The characteristic that distinguishes holy wars from normal technical disputes is that in a holy war most of the participants spend their time trying to pass off personal value choices and cultural attachments as objective technical evaluations. This happens precisely because in a true holy war, the actual substantive differences between the sides are relatively minor. See also theology.

home box

@@ -6197,11 +6205,11 @@ This file last generated Monday, 15 October 2018 02:14PM UTC n. [MUD, IRC; very common] When used without qualification this is synonymous with netlag. Curiously, people will often complain I'm really lagged when in fact it is their server or network connection that is lagging.

lamer

-

1. Synonym for luser , not used much by hackers but common among warez d00dz , crackers, and phreaker s. A person who downloads much, but who never uploads. (Also known as leecher ). Oppose elite. Has the same connotations of self-conscious elitism that use of luser does among hackers.

+

1. Someone who is not very good at their craft. Perhaps a wannabe.

-

2. Someone who tries to crack a BBS.

+

2. Trying but failing at something. "I tried to install this but failed. Is it broken or am I just too lame?".

-

3. Someone who annoys the sysop or other BBS users for instance, by posting lots of silly messages, uploading virus-ridden software, frequently dropping carrier, etc. Crackers also use it to refer to cracker wannabee s. In phreak culture, a lamer is one who scams codes off others rather than doing cracks or really understanding the fundamental concepts. In warez d00dz culture, where the ability to wave around cracked commercial software within days of (or before) release to the commercial market is much esteemed, the lamer might try to upload garbage or shareware or something incredibly old (old in this context is read as a few years to anything older than 3 days). Lamer is also much used in the IRC world in a similar sense to the above. This term seems to have originated in the Commodore-64 scene in the mid 1980s. It was popularized among Amiga crackers of the mid-1980s by Lamer Exterminator , the most famous and feared Amiga virus ever, which gradually corrupted non-write-protected floppy disks with bad sectors. The bad sectors, when looked at, were overwritten with repetitions of the string LAMER!.

+

3. A system which is designed or operates in a significantly suboptimal manner. "Microsoft Windows is utterly lame".

language lawyer

n. A person, usually an experienced or senior software engineer, who is intimately familiar with many or most of the numerous restrictions and features (both useful and esoteric) applicable to one or more computer programming languages. A language lawyer is distinguished by the ability to show you the five sentences scattered through a 200-plus-page manual that together imply the answer to your question if only you had thought to look there. Compare wizard , legal , legalese. @@ -6414,10 +6422,6 @@ This file last generated Monday, 15 October 2018 02:14PM UTC

interj. A reply to or comment on an undesirable situation. I accidentally deleted all my files! Lose, lose.

-

loser

-

- n. An unexpectedly bad situation, program, programmer, or person. Someone who habitually loses. (Even winners can lose occasionally.) Someone who knows not and knows not that he knows not. Emphatic forms are real loser , total loser , and complete loser (but not ** moby loser , which would be a contradiction in terms). See luser. -

losing

adj. Said of anything that is or causes a lose or lossage. The compiler is losing badly when I try to use templates. @@ -6458,10 +6462,6 @@ This file last generated Monday, 15 October 2018 02:14PM UTC

n. One of the silent majority in an electronic forum; one who posts occasionally or not at all but is known to read the group's postings regularly. This term is not pejorative and indeed is casually used reflexively: Oh, I'm just lurking. Often used in the lurkers , the hypothetical audience for the group's flamage -emitting regulars. When a lurker speaks up for the first time, this is called delurking. The creator of the popular science-fiction TV series Babylon 5 has ties to SF fandom and the hacker culture. In that series, the use of the term lurker for a homeless or displaced person is a conscious reference to the jargon term.

-

luser

-

- /loozr/ , n. [common] A user ; esp. one who is also a loser. ( luser and loser are pronounced identically.) This word was coined around 1975 at MIT. Under ITS, when you first walked up to a terminal at MIT and typed Control-Z to get the computer's attention, it printed out some status information, including how many people were already using the computer; it might print 14 users , for example. Someone thought it would be a great joke to patch the system to print 14 losers instead. There ensued a great controversy, as some of the users didn't particularly want to be called losers to their faces every time they used the computer. For a while several hackers struggled covertly, each changing the message behind the back of the others; any time you logged into the computer it was even money whether it would say users or losers. Finally, someone tried the compromise lusers , and it stuck. Later one of the ITS machines supported luser as a request-for-help command. ITS died the death in mid-1990, except as a museum piece; the usage lives on, however, and the term luser is often seen in program comments and on Usenet. Compare mundane , muggle , newbie , chainik. -

M

macdink

@@ -6849,7 +6849,7 @@ This file last generated Monday, 15 October 2018 02:14PM UTC

muggle

- A non- wizard. Not as disparaging as luser ; implies vague pity rather than contempt. In the universe of Rowling's enormously (and deservedly) popular children's series, muggles and wizards inhabit the same modern world, but each group is ignorant of the commonplaces of the others' existence most muggles are unaware that wizards exist, and wizards (used to magical ways of doing everything) are perplexed and fascinated by muggle artifacts. In retrospect it seems completely inevitable that hackers would adopt this metaphor, and in hacker usage it readily forms compounds such as muggle-friendly. Compare luser , mundane , chainik , newbie. + A non- wizard. Implies vague pity rather than contempt. In the universe of Rowling's popular children's series, muggles and wizards inhabit the same modern world, but each group is ignorant of the commonplaces of the others' existence most muggles are unaware that wizards exist, and wizards (used to magical ways of doing everything) are perplexed and fascinated by muggle artifacts. In retrospect it seems completely inevitable that hackers would adopt this metaphor, and in hacker usage it readily forms compounds such as muggle-friendly. Compare mundane, chainik, newbie, wannabe.

multitask

@@ -6889,7 +6889,7 @@ This file last generated Monday, 15 October 2018 02:14PM UTC

munchkin

- /muhnchkin/ , n. [from the squeaky-voiced little people in L. Frank Baum's The Wizard of Oz ] A teenage-or-younger micro enthusiast hacking BASIC or something else equally constricted. A term of mild derision munchkins are annoying but some grow up to be hackers after passing through a larval stage. The term urchin is also used. See also wannabee , bitty box. + /muhnchkin/ , n. [from the squeaky-voiced little people in L. Frank Baum's The Wizard of Oz ] A teenage-or-younger micro enthusiast hacking BASIC or something else equally constricted. A term of mild derision munchkins are annoying but some grow up to be hackers after passing through a larval stage. The term urchin is also used. See also wannabee, bitty box.

mundane

1. A person who is not in science fiction fandom.

@@ -6942,7 +6942,7 @@ This file last generated Monday, 15 October 2018 02:14PM UTC

2. Said of an algorithm that doesn't take advantage of some superior but advanced technique, e.g., the bubble sort. It may imply naivete on the part of the programmer, although there are situations where a naive algorithm is preferred, because it is more important to keep the code comprehensible than to go for maximum performance. I know the linear search is naive, but in this case the list typically only has half a dozen items. Compare brute force.

naive user

- n. A luser. Tends to imply someone who is ignorant mainly owing to inexperience. When this is applied to someone who has experience, there is a definite implication of stupidity. + n. Tends to imply someone who is ignorant mainly owing to inexperience.

nakamoto scheme

@@ -7082,7 +7082,7 @@ This file last generated Monday, 15 October 2018 02:14PM UTC

newbie

- /n[y]oobee/ , n. [very common; orig. from British public-school and military slang variant of new boy ] A Usenet neophyte. This term surfaced in the newsgroup talk.bizarre but is now in wide use (the combination clueless newbie is especially common). Criteria for being considered a newbie vary wildly; a person can be called a newbie in one newsgroup while remaining a respected regular in another. The label newbie is sometimes applied as a serious insult to a person who has been around Usenet for a long time but who carefully hides all evidence of having a clue. See B1FF ; see also gnubie. Compare chainik , luser. + /n[y]oobee/ , n. A new user of some system. This term surfaced in the Usenet newsgroup talk.bizarre but is now in wide use (the combination clueless newbie is especially common). Criteria for being considered a newbie vary wildly; a person can be called a newbie in one newsgroup while remaining a respected regular in another. The label newbie is sometimes applied as a serious insult to a person who has been around Usenet for a long time but who carefully hides all evidence of having a clue. See B1FF; see also gnubie. Compare chainik.

newgroup wars

@@ -7352,7 +7352,7 @@ This file last generated Monday, 15 October 2018 02:14PM UTC

padded cell

- n. Where you put lusers so they can't hurt anything. A program that limits a luser to a carefully restricted subset of the capabilities of the host system (for example, the rsh (1) utility on USG Unix). Note that this is different from an iron box because it is overt and not aimed at enforcing security so much as protecting others (and the luser) from the consequences of the luser's boundless naivete (see naive ). Also padded cell environment. + Also known as jailware. Proprietary software is often a padded cell. A padded cell may be nice in appearance. It may have attractive features and some convenience factor, but it still robs the user of essential freedoms. Much Apple software is like this. High on bling, low on freedom.

page in

1. To become aware of one's surroundings again after having paged out (see page out ). Usually confined to the sarcastic comment: Eric pages in, film at 11 !

@@ -7642,10 +7642,6 @@ This file last generated Monday, 15 October 2018 02:14PM UTC

2. When a discussion gets to a level of detail so deep that the main point of the discussion is being lost, someone will shout Pop! , meaning Get back up to a higher level! The shout is frequently accompanied by an upthrust arm with a finger pointing to the ceiling.

3. [all-caps, as POP ] Point of Presence, a bank of dial-in lines allowing customers to make (local) calls into an ISP. This is borderline techspeak.

-

poser

-

- n. [from French poseur ] A wannabee ; not hacker slang, but used among crackers, phreaks and warez d00dz. Not as negative as lamer or leech. Probably derives from a similar usage among punk-rockers and metalheads, putting down those who talk the talk but don't walk the walk. -

post

v. To send a message to a mailing list or newsgroup. @@ -7804,7 +7800,7 @@ This file last generated Monday, 15 October 2018 02:14PM UTC

pseudosuit

- /soodohs[y]oot`/ , n. A suit wannabee; a hacker who has decided that he wants to be in management or administration and begins wearing ties, sport coats, and (shudder!) suits voluntarily. It's his funeral. See also lobotomy. + /soodohs[y]oot`/ , n. A suit wannabee; a hacker who has decided that he wants to be in management or administration and begins wearing ties, sport coats, and (shudder!) suits voluntarily. It's his funeral. See also googler.

psychedelicware

@@ -8002,7 +7998,7 @@ This file last generated Monday, 15 October 2018 02:14PM UTC

read-only user

- n. Describes a luser who uses computers almost exclusively for reading Usenet, bulletin boards, and/or email, rather than writing code or purveying useful information. See twink , terminal junkie , lurker. + Someone who operates in consumer mode only. They never create anything, only "consume" content. See twink, terminal junkie, lurker.

real

@@ -8027,7 +8023,7 @@ This file last generated Monday, 15 October 2018 02:14PM UTC

real user

1. A commercial user. One who is paying real money for his computer usage.

-

2. A non-hacker. Someone using the system for an explicit purpose (a research project, a course, etc.) other than pure exploration. See user. Hackers who are also students may also be real users. I need this fixed so I can do a problem set. I'm not complaining out of randomness, but as a real user. See also luser.

+

2. A non-hacker. Someone using the system for an explicit purpose (a research project, a course, etc.) other than pure exploration. See user. Hackers who are also students may also be real users. I need this fixed so I can do a problem set. I'm not complaining out of randomness, but as a real user.

reality check

1. The simplest kind of test of software or hardware; doing the equivalent of asking it what 2 + 2 is and seeing if you get 4. The software equivalent of a smoke test.

@@ -8086,7 +8082,7 @@ This file last generated Monday, 15 October 2018 02:14PM UTC

religious issues

- n. Questions which seemingly cannot be raised without touching off holy wars , such as What is the best operating system (or editor, language, architecture, shell, mail reader, news reader)? , What about that Heinlein guy, eh? , What should we add to the new Jargon File? See holy wars ; see also theology , bigot , and compare rathole. This term is a prime example of ha ha only serious. People actually develop the most amazing and religiously intense attachments to their tools, even when the tools are intangible. The most constructive thing one can do when one stumbles into the crossfire is mumble Get a life! and leave unless, of course, one's own unassailably rational and obviously correct choices are being slammed. + n. Questions which seemingly cannot be raised without touching off holy wars, such as What is the best operating system (or editor, language, architecture, shell, mail reader, news reader)? See holy wars; see also theology , bigot , and compare rathole. People actually develop the most amazing and religiously intense attachments to their tools, even when the tools are intangible.

replicator

@@ -8148,10 +8144,6 @@ This file last generated Monday, 15 October 2018 02:14PM UTC

n. A Dungeons-and-Dragons-like game using character graphics, written under BSD Unix and subsequently ported to other Unix systems. The original BSD curses (3) screen-handling package was hacked together by Ken Arnold primarily to support games, and the development of rogue (6) popularized its use; it has since become one of Unix's most important and heavily used application libraries. Nethack, Omega, Larn, Angband, and an entire subgenre of computer dungeon games (all known as roguelikes ) all took off from the inspiration provided by rogue (6) ; the popular Windows game Diablo, though graphics-intensive, has very similar play logic. See also nethack , moria , Angband. 2.

-

room-temperature IQ

-

- quant. [IBM] 80 or below (nominal room temperature is 72 degrees Fahrenheit, 22 degrees Celsius). Used in describing the expected intelligence range of the luser. Well, but how's this interface going to play with the room-temperature IQ crowd? See drool-proof paper. This is a much more insulting phrase in countries that use Celsius thermometers. -

root

1. [Unix] The superuser account (with user name root ) that ignores permission bits, user number 0 on a Unix system. The term avatar is also used.

@@ -8754,7 +8746,7 @@ This file last generated Monday, 15 October 2018 02:14PM UTC

spam

1. To crash a program by overrunning a fixed-size buffer with excessively large input data. See also buffer overflow , overrun screw , smash the stack.

-

2. To cause a newsgroup to be flooded with irrelevant or inappropriate messages. You can spam a newsgroup with as little as one well- (or ill-) planned message (e.g. asking What do you think of abortion? on soc.women ). This is often done with cross-post ing (e.g. any message which is cross-posted to alt.rush-limbaugh and alt.politics.homosexuality will almost inevitably spam both groups). This overlaps with troll behavior; the latter more specific term has become more common.

+

2. To cause a newsgroup to be flooded with irrelevant or inappropriate messages. This overlaps with troll behavior; the latter more specific term has become more common.

3. To send many identical or nearly-identical messages separately to a large number of Usenet newsgroups. This is more specifically called ECP , Excessive Cross-Posting. This is one sure way to infuriate nearly everyone on the Net. See also velveeta and jello.

@@ -8762,7 +8754,7 @@ This file last generated Monday, 15 October 2018 02:14PM UTC

5. To mass-mail unrequested identical or nearly-identical email messages, particularly those containing advertising. Especially used when the mail addresses have been culled from network traffic or databases without the consent of the recipients. Synonyms include UCE , UBE. As a noun, spam refers to the messages so sent.

-

6. Any large, annoying, quantity of output. For instance, someone on IRC who walks away from their screen and comes back to find 200 lines of text might say Oh no, spam. The later definitions have become much more prevalent as the Internet has opened up to non-techies, and to most people senses 3 4 and 5 are now primary. All three behaviors are considered abuse of the net, and are almost universally grounds for termination of the originator's email account or network connection. In these senses the term spam has gone mainstream, though without its original sense or folkloric freight there is apparently a widespread myth among lusers that spamming is what happens when you dump cans of Spam into a revolving fan. Hormel, the makers of Spam, have published a surprisingly enlightened position statement on the Internet usage.

+

6. Any large, annoying, quantity of output. For instance, someone on IRC who walks away from their screen and comes back to find 200 lines of text might say Oh no, spam. The later definitions have become much more prevalent as the Internet has opened up to non-techies, and to most people senses 3 4 and 5 are now primary. All three behaviors are considered abuse of the net, and are almost universally grounds for termination of the originator's email account or network connection. Hormel, the makers of Spam, published a surprisingly enlightened position statement on the Internet usage.

spam bait

n. Email addresses included in, or comprising the entirety of, a Usenet message so that spammers mining a newsgroup with an address harvester will collect them. These addresses can be people who have offended or annoyed the poster, or who are included so that a spammer will spam an official, thereby causing himself trouble. One particularly effective form of spam bait is the address of a teergrube. @@ -9248,7 +9240,7 @@ This file last generated Monday, 15 October 2018 02:14PM UTC

2. Technical fine points of an abstruse nature, esp. those where the resolution is of theoretical interest but is relatively marginal with respect to actual use of a design or system. Used esp. around software issues with a heavy AI or language-design component, such as the smart-data vs. smart-programs dispute in AI.

theory

- n. The consensus, idea, plan, story, or set of rules that is currently being used to inform a behavior. This usage is a generalization and (deliberate) abuse of the technical meaning. What's the theory on fixing this TECO loss? What's the theory on dinner tonight? ( Chinatown, I guess. ) What's the current theory on letting lusers on during the day? The theory behind this change is to fix the following well-known screw.... + n. The consensus, idea, plan, story, or set of rules that is currently being used to inform a behavior. This usage is a generalization and (deliberate) abuse of the technical meaning. What's the theory on fixing this TECO loss? What's the theory on dinner tonight? (Chinatown, I guess.) What's the current theory on letting users loose on this new feature? The theory behind this change is to fix the following well-known screw.

thinko

@@ -9405,9 +9397,9 @@ This file last generated Monday, 15 October 2018 02:14PM UTC n. Syn. forum.

tourist

-

1. [ITS] A guest on the system, especially one who generally logs in over a network from a remote location for comm mode , email, games, and other trivial purposes. One step below luser. ITS hackers often used to spell this turist , perhaps by some sort of tenuous analogy with luser (this usage may also have expressed the ITS culture's penchant for six-letterisms, and/or been some sort of tribute to Alan Turing). Compare twink , lurker , read-only user.

+

1. [ITS] A guest on the system, especially one who generally logs in over a network from a remote location for comm mode, email, games, and other common purposes. ITS hackers often used to spell this turist, perhaps by some sort of tenuous analogy with user (this usage may also have expressed the ITS culture's penchant for six-letterisms, and/or been some sort of tribute to Alan Turing). Compare twink, lurker, read-only user.

-

2. [IRC] An IRC user who goes from channel to channel without saying anything; see channel hopping.

+

2. [IRC] A chat system user who goes from channel to channel without saying anything; see channel hopping.

tourist information

n. Information in an on-line display that is not immediately useful, but contributes to a viewer's gestalt of what's going on with the software or hardware behind it. Whether a given piece of info falls in this category depends partly on what the user is looking for at any given time. The bytes free information at the bottom of an MS-DOS or Windows dir display is tourist information; so (most of the time) is the TIME information in a Unix ps (1) display. @@ -9474,7 +9466,7 @@ This file last generated Monday, 15 October 2018 02:14PM UTC

4. Any problem one has already solved (some claim that hackish trivial usually evaluates to I've seen it before ). Hackers' notions of triviality may be quite at variance with those of non-hackers. See nontrivial , uninteresting. The physicist Richard Feynman, who had the hacker nature to an amazing degree (see his essay Los Alamos From Below in Surely You're Joking, Mr. Feynman! ), defined trivial theorem as one that has already been proved.

troff

- /Trof/ , /trof/ , n. [Unix] The gray eminence of Unix text processing; a formatting and phototypesetting program, written originally in PDP-11 assembler and then in barely-structured early C by the late Joseph Ossanna, modeled after the earlier ROFF which was in turn modeled after the Multics and CTSS program RUNOFF by Jerome Saltzer ( that name came from the expression to run off a copy ). A companion program, nroff , formats output for terminals and line printers. In 1979, Brian Kernighan modified troff so that it could drive phototypesetters other than the Graphic Systems CAT. His paper describing that work ( A Typesetter-independent troff, AT T CSTR #97) explains troff's durability. After discussing the program's obvious deficiencies a rebarbative input syntax, mysterious and undocumented properties in some areas, and a voracious appetite for computer resources and noting the ugliness and extreme hairiness of the code and internals, Kernighan concludes: None of these remarks should be taken as denigrating Ossanna's accomplishment with TROFF. It has proven a remarkably robust tool, taking unbelievable abuse from a variety of preprocessors and being forced into uses that were never conceived of in the original design, all with considerable grace under fire. The success of TeX and desktop publishing systems have reduced troff 's relative importance, but this tribute perfectly captures the strengths that secured troff a place in hacker folklore; indeed, it could be taken more generally as an indication of those qualities of good programs that, in the long run, hackers most admire. + /Trof/ , /trof/ , n. [Unix] The gray eminence of Unix text processing; a formatting and phototypesetting program, written originally in PDP-11 assembler and then in barely-structured early C by the late Joseph Ossanna, modeled after the earlier ROFF which was in turn modeled after the Multics and CTSS program RUNOFF by Jerome Saltzer ( that name came from the expression to run off a copy ). A companion program, nroff , formats output for terminals and line printers. In 1979, Brian Kernighan modified troff so that it could drive phototypesetters other than the Graphic Systems CAT. His paper describing that work (A Typesetter-independent troff, AT&T CSTR #97) explains troff's durability. After discussing the program's obvious deficiencies a rebarbative input syntax, mysterious and undocumented properties in some areas, and a voracious appetite for computer resources and noting the ugliness and extreme hairiness of the code and internals, Kernighan concludes: None of these remarks should be taken as denigrating Ossanna's accomplishment with TROFF. It has proven a remarkably robust tool, taking unbelievable abuse from a variety of preprocessors and being forced into uses that were never conceived of in the original design, all with considerable grace under fire. The success of TeX and desktop publishing systems have reduced troff 's relative importance, but this tribute perfectly captures the strengths that secured troff a place in hacker folklore; indeed, it could be taken more generally as an indication of those qualities of good programs that, in the long run, hackers most admire.

troglodyte

1. A hacker who never leaves his cubicle. The term gnoll (from Dungeons Dragons) is also reported.

@@ -9490,7 +9482,7 @@ This file last generated Monday, 15 October 2018 02:14PM UTC

tron

- v. [NRL, CMU; prob. fr. the movie Tron ] To become inaccessible except via email or talk (1) , especially when one is normally available via telephone or in person. Frequently used in the past tense, as in: Ran seems to have tronned on us this week or Gee, Ran, glad you were able to un-tron yourself. One may also speak of tron mode ; compare spod. Note that many dialects of BASIC have a TRON/TROFF command pair that enables/disables line number tracing; this has no obvious relationship to the slang usage. + v. [NRL, CMU; prob. fr. the movie Tron ] To become inaccessible except via email or talk (1) , especially when one is normally available via telephone or in person. Frequently used in the past tense, as in: Ran seems to have tronned on us this week or Gee, Ran, glad you were able to un-tron yourself. One may also speak of tron mode. Note that many dialects of BASIC have a TRON/TROFF command pair that enables/disables line number tracing; this has no obvious relationship to the slang usage.

troughie

@@ -9532,7 +9524,7 @@ This file last generated Monday, 15 October 2018 02:14PM UTC

turist

- /toorist/ , n. Var. sp. of tourist , q.v. Also in adjectival form, turistic. Poss. influenced by luser and Turing. + /toorist/ , n. Var. sp. of tourist , q.v. Also in adjectival form, turistic. Poss. influenced by user and Turing.

tweak

1. To change slightly, usually in reference to a value. Also used synonymously with twiddle. If a program is almost correct, rather than figure out the precise problem you might just keep tweaking it until it works. See frobnicate and fudge factor ; also see shotgun debugging.

@@ -9654,11 +9646,9 @@ This file last generated Monday, 15 October 2018 02:14PM UTC n. See munchkin.

user

-

1. Someone doing real work with the computer, using it as a means rather than an end. Someone who pays to use a computer. See real user.

- -

2. A programmer who will believe anything you tell him. One who asks silly questions. [GLS observes: This is slightly unfair. It is true that users ask questions (of necessity). Sometimes they are thoughtful or deep. Very often they are annoying or downright stupid, apparently because the user failed to think for two seconds or look in the documentation before bothering the maintainer.] See luser.

- -

3. Someone who uses a program from the outside, however skillfully, without getting into the internals of the program. One who reports bugs instead of just going ahead and fixing them. The general theory behind this term is that there are two classes of people who work with a program: there are implementors (hackers) and luser s. The users are looked down on by hackers to some extent because they don't understand the full ramifications of the system in all its glory. (The few users who do are known as real winners. ) The term is a relative one: a skilled hacker may be a user with respect to some program he himself does not hack. A LISP hacker might be one who maintains LISP or one who uses LISP (but with the skill of a hacker). A LISP user is one who uses LISP, whether skillfully or not. Thus there is some overlap between the two terms; the subtle distinctions must be resolved by context.

+

+ n. Someone who uses a computer system. Within the conventional client/server paradigm there are two classes of people: those who administrate the system and those who use it. The term user is very conventional, going back to the early days of time-sharing mainframes, but may be controversial in some contexts due to having other negative associations, such as "drug user" or someone who exploits other people for cynical and self-serving reasons, as in "he was just a user". A possible alternative to user is "member". +

user-friendly

adj. Programmer-hostile. Generally used by hackers in a critical tone, to describe systems that hold the user's hand so obsessively that they make it painful for the more experienced and knowledgeable to get any work done. See menuitis , drool-proof paper , Macintrash , user-obsequious. @@ -9774,7 +9764,7 @@ This file last generated Monday, 15 October 2018 02:14PM UTC

virus

- n. [from the obvious analogy with biological viruses, via SF] A cracker program that searches out other programs and infects them by embedding a copy of itself in them, so that they become Trojan horse s. When these programs are executed, the embedded virus is executed too, thus propagating the infection. This normally happens invisibly to the user. Unlike a worm , a virus cannot infect other computers without assistance. It is propagated by vectors such as humans trading programs with their friends (see SEX ). The virus may do nothing but propagate itself and then allow the program to run normally. Usually, however, after propagating silently for a while, it starts doing things like writing cute messages on the terminal or playing strange tricks with the display (some viruses include nice display hack s). Many nasty viruses, written by particularly perversely minded cracker s, do irreversible damage, like nuking all the user's files. In the 1990s, viruses became a serious problem, especially among Windows users; the lack of security on these machines enables viruses to spread easily, even infecting the operating system (Unix machines, by contrast, are immune to such attacks). The production of special anti-virus software has become an industry, and a number of exaggerated media reports have caused outbreaks of near hysteria among users; many lusers tend to blame everything that doesn't work as they had expected on virus attacks. Accordingly, this sense of virus has passed not only into techspeak but into also popular usage (where it is often incorrectly used to denote a worm or even a Trojan horse ). See phage ; compare back door ; see also Unix conspiracy. + n. [from the obvious analogy with biological viruses, via SF] A cracker program that searches out other programs and infects them by embedding a copy of itself in them, so that they become Trojan horse s. When these programs are executed, the embedded virus is executed too, thus propagating the infection. This normally happens invisibly to the user. Unlike a worm , a virus cannot infect other computers without assistance. It is propagated by vectors such as humans trading programs with their friends (see SEX ). The virus may do nothing but propagate itself and then allow the program to run normally. Usually, however, after propagating silently for a while, it starts doing things like writing cute messages on the terminal or playing strange tricks with the display (some viruses include nice display hack s). Many nasty viruses, written by particularly perversely minded cracker s, do irreversible damage, like nuking all the user's files. In the 1990s, viruses became a serious problem, especially among Windows users; the lack of security on these machines enables viruses to spread easily, even infecting the operating system (Unix machines, by contrast, are immune to such attacks). The production of special anti-virus software has become an industry, and a number of exaggerated media reports have caused outbreaks of near hysteria among users; many lusers tend to blame everything that doesn't work as they had expected on virus attacks. See phage; compare back door; see also Unix conspiracy.

visionary

1. One who hacks vision, in the sense of an Artificial Intelligence researcher working on the problem of getting computers to see things using TV cameras. (There isn't any problem in sending information from a TV camera to a computer. The problem is, how can the computer be programmed to make use of the camera information? See SMOP , AI-complete. )

@@ -9857,7 +9847,7 @@ This file last generated Monday, 15 October 2018 02:14PM UTC

wannabee

- /won'@bee/ , n. (also, more plausibly, spelled wannabe ) [from a term recently used to describe Madonna fans who dress, talk, and act like their idol; prob.: originally from biker slang] A would-be hacker. The connotations of this term differ sharply depending on the age and exposure of the subject. Used of a person who is in or might be entering larval stage , it is semi-approving; such wannabees can be annoying but most hackers remember that they, too, were once such creatures. When used of any professional programmer, CS academic, writer, or suit , it is derogatory, implying that said person is trying to cuddle up to the hacker mystique but doesn't, fundamentally, have a prayer of understanding what it is all about. Overuse of terms from this lexicon is often an indication of the wannabee nature. Compare newbie. Historical note: The wannabee phenomenon has a slightly different flavor now (1993) than it did ten or fifteen years ago. When the people who are now hackerdom's tribal elders were in larval stage , the process of becoming a hacker was largely unconscious and unaffected by models known in popular culture communities formed spontaneously around people who, as individuals , felt irresistibly drawn to do hackerly things, and what wannabees experienced was a fairly pure, skill-focused desire to become similarly wizardly. Those days of innocence are gone forever; society's adaptation to the advent of the microcomputer after 1980 included the elevation of the hacker as a new kind of folk hero, and the result is that some people semi-consciously set out to be hackers and borrow hackish prestige by fitting the popular image of hackers. Fortunately, to do this really well, one has to actually become a wizard. Nevertheless, old-time hackers tend to share a poorly articulated disquiet about the change; among other things, it gives them mixed feelings about the effects of public compendia of lore like this one. + /won'@bee/ , n. Someone who wants to be a hacker. A novice or rookie.

war dialer

@@ -10125,10 +10115,6 @@ This file last generated Monday, 15 October 2018 02:14PM UTC

1. [TMRC] Storage space for equipment.

2. [proposed] A variety of hard-shell equipment case with heavy interior padding and/or shaped carrier cutouts in a foam-rubber matrix; mundanely called a flight case. Used for delicate test equipment, electronics, and musical instruments.

-

womble

-

- n. [Unisys UK: from British puppet-show characters] A user who has great difficulty in communicating their requirements and/or in using the resulting software. Extreme case of luser. An especially senior or high-ranking womble is referred to as Great-Uncle Bulgaria. Compare Aunt Tillie. -

wonky

/wongkee/ , adj. [from Australian slang] Yet another approximate synonym for broken. Specifically connotes a malfunction that produces behavior seen as crazy, humorous, or amusingly perverse. That was the day the printer's font logic went wonky and everybody's listings came out in Tengwar. Also in wonked out. See funky , demented , bozotic.