diff --git a/docs/jargon-org.txt b/docs/jargon-org.txt index aedf733..5f65672 100644 --- a/docs/jargon-org.txt +++ b/docs/jargon-org.txt @@ -19,7 +19,7 @@ Free Documentation License". * Generated -This file last generated Monday, 15 October 2018 01:57PM UTC +This file last generated Monday, 15 October 2018 02:14PM UTC * Glossary ** ( @@ -145,7 +145,7 @@ n. [MIT] Common LISP: The Language , by Guy L. Steele Jr. (Digital Press, first n A series of personal computer models originally sold by Commodore, based on 680x0 processors, custom support chips and an operating system that combined some of the best features of Macintosh and Unix with compatibility with neither. The Amiga was released just as the personal computing world standardized on IBM-PC clones. This prevented it from gaining serious market share, despite the fact that the first Amigas had a substantial technological lead on the IBM XTs of the time. Instead, it acquired a small but zealous population of enthusiastic hackers who dreamt of one day unseating the clones (see Amiga Persecution Complex ). The traits of this culture are both spoofed and illuminated in The BLAZE Humor Viewer. The strength of the Amiga platform seeded a small industry of companies building software and hardware for the platform, especially in graphics and video applications (see video toaster ). Due to spectacular mismanagement, Commodore did hardly any R D, allowing the competition to close Amiga's technological lead. After Commodore went bankrupt in 1994 the technology passed through several hands, none of whom did much with it. However, the Amiga is still being produced in Europe under license and has a substantial number of fans, which will probably extend the platform's life considerably. *** Amiga Persecution Complex -n. The disorder suffered by a particularly egregious variety of bigot , those who believe that the marginality of their preferred machine is the result of some kind of industry-wide conspiracy (for without a conspiracy of some kind, the eminent superiority of their beloved shining jewel of a platform would obviously win over all, market pressures be damned!) Those afflicted are prone to engaging in flame wars and calling for boycotts and mailbombings. Amiga Persecution Complex is by no means limited to Amiga users; NeXT, NeWS , OS/2 , Macintosh, LISP , and GNU users are also common victims. Linux users used to display symptoms very frequently before Linux started winning; some still do. See also newbie , troll , holy wars , weenie , Get a life!. +n. The disorder suffered by a particularly egregious variety of bigot , those who believe that the marginality of their preferred machine is the result of some kind of industry-wide conspiracy (for without a conspiracy of some kind, the eminent superiority of their beloved shining jewel of a platform would obviously win over all, market pressures be damned!) Those afflicted are prone to engaging in flame wars and calling for boycotts and mailbombings. Amiga Persecution Complex is by no means limited to Amiga users; NeXT, NeWS , OS/2 , Macintosh, LISP , and GNU users are also common victims. Linux users used to display symptoms very frequently before Linux started winning; some still do. See also newbie, troll, holy wars. *** Angband n. , /angband/ Like nethack , moria , and rogue , one of the large freely distributed Dungeons-and-Dragons-like simulation games, available for a wide range of machines and operating systems. The name is from Tolkien's Pits of Angband (compare elder days , elvish ). Has been described as Moria on steroids ; but, unlike Moria, many aspects of the game are customizable. This leads many hackers and would-be hackers into fooling with these instead of doing productive work. There are many Angband variants, of which the most notorious is probably the rather whimsical Zangband. In this game, when a key that does not correspond to a command is pressed, the game will display Type ? for help 50% of the time. The other 50% of the time, random error messages including An error has occurred because an error of type 42 has occurred and Windows 95 uninstalled successfully will be displayed. Zangband also allows the player to kill Santa Claus (who has some really good stuff, but also has a lot of friends), Bull Gates , and Barney the Dinosaur (but be watchful; Barney has a nasty case of halitosis). There is an official angband home page at http://thangorodrim.angband.org/ and a zangband one at http://www.zangband.org/. See also Random Number God. @@ -1664,7 +1664,7 @@ n. Used to refer to the Unix operating system (a trademark of AT T, then of Nove Stands for Useless Use of cat ; the reference is to the Unix command cat (1) , not the feline animal. As received wisdom on comp.unix.shell observes, The purpose of cat is to concatenate (or catenate ) files. If it's only one file, concatenating it with nothing at all is a waste of time, and costs you a process. Nevertheless one sees people doing catfile|some_commandanditsargs... instead of the equivalent and cheaper filesome_commandanditsargs... or (equivalently and more classically) some_commandanditsargs... file Since 1995, occasional awards for UUOC have been given out, usually by Perl luminary Randal L. Schwartz. There is a web page devoted to this and other similar awards. *** Unix -/yooniks/ , n. [In the authors' words, A weak pun on Multics ; very early on it was UNICS ] (also UNIX ) An interactive timesharing system invented in 1969 by Ken Thompson after Bell Labs left the Multics project, originally so he could play games on his scavenged PDP-7. Dennis Ritchie, the inventor of C, is considered a co-author of the system. The turning point in Unix's history came when it was reimplemented almost entirely in C during 1972 1974, making it the first source-portable OS. Unix subsequently underwent mutations and expansions at the hands of many different people, resulting in a uniquely flexible and developer-friendly environment. By 1991, Unix had become the most widely used multiuser general-purpose operating system in the world and since 1996 the variant called Linux has been at the cutting edge of the open source movement. Many people consider the success of Unix the most important victory yet of hackerdom over industry opposition (but see Unix weenie and Unix conspiracy for an opposing point of view). See Version 7 , BSD , Linux. Archetypal hackers ken (left) and dmr (right). Some people are confused over whether this word is appropriately UNIX or Unix ; both forms are common, and used interchangeably. Dennis Ritchie says that the UNIX spelling originally happened in CACM's 1974 paper The UNIX Time-Sharing System because we had a new typesetter and troff had just been invented and we were intoxicated by being able to produce small caps. Later, dmr tried to get the spelling changed to Unix in a couple of Bell Labs papers, on the grounds that the word is not acronymic. He failed, and eventually (his words) wimped out on the issue. So, while the trademark today is UNIX , both capitalizations are grounded in ancient usage; the Jargon File uses Unix in deference to dmr's wishes. +/yooniks/ , n. [In the authors' words, A weak pun on Multics ; very early on it was UNICS ] (also UNIX ) An interactive timesharing system invented in 1969 by Ken Thompson after Bell Labs left the Multics project, originally so he could play games on his scavenged PDP-7. Dennis Ritchie, the inventor of C, is considered a co-author of the system. The turning point in Unix's history came when it was reimplemented almost entirely in C during 1972 1974, making it the first source-portable OS. Unix subsequently underwent mutations and expansions at the hands of many different people, resulting in a uniquely flexible and developer-friendly environment. By 1991, Unix had become the most widely used multiuser general-purpose operating system in the world and since 1996 the variant called Linux has been at the cutting edge of the open source movement. Many people consider the success of Unix the most important victory yet of hackerdom over industry opposition. See Version 7 , BSD , Linux. Archetypal hackers ken (left) and dmr (right). Some people are confused over whether this word is appropriately UNIX or Unix ; both forms are common, and used interchangeably. Dennis Ritchie says that the UNIX spelling originally happened in CACM's 1974 paper The UNIX Time-Sharing System because we had a new typesetter and troff had just been invented and we were intoxicated by being able to produce small caps. Later, dmr tried to get the spelling changed to Unix in a couple of Bell Labs papers, on the grounds that the word is not acronymic. He failed, and eventually (his words) wimped out on the issue. So, while the trademark today is UNIX , both capitalizations are grounded in ancient usage; the Jargon File uses Unix in deference to dmr's wishes. *** Unix brain damage n. Something that has to be done to break a network program (typically a mailer) on a non-Unix system so that it will interoperate with Unix systems. The hack may qualify as Unix brain damage if the program conforms to published standards and the Unix program in question does not. Unix brain damage happens because it is much easier for other (minority) systems to change their ways to match non-conforming behavior than it is to change all the hundreds of thousands of Unix systems out there. An example of Unix brain damage is a kluge in a mail server to recognize bare line feed (the Unix newline) as an equivalent form to the Internet standard newline, which is a carriage return followed by a line feed. Such things can make even a hardened jock weep. @@ -1672,11 +1672,6 @@ n. Something that has to be done to break a network program (typically a mailer) *** Unix conspiracy n. [ITS] According to a conspiracy theory long popular among ITS and TOPS-20 fans, Unix's growth is the result of a plot, hatched during the 1970s at Bell Labs, whose intent was to hobble AT T's competitors by making them dependent upon a system whose future evolution was to be under AT T's control. This would be accomplished by disseminating an operating system that is apparently inexpensive and easily portable, but also relatively unreliable and insecure (so as to require continuing upgrades from AT T). This theory was lent a substantial impetus in 1984 by the paper referenced in the back door entry. In this view, Unix was designed to be one of the first computer viruses (see virus ) but a virus spread to computers indirectly by people and market forces, rather than directly through disks and networks. Adherents of this Unix virus theory like to cite the fact that the well-known quotation Unix is snake oil was uttered by DEC president Kenneth Olsen shortly before DEC began actively promoting its own family of Unix workstations. (Olsen now claims to have been misquoted.) If there was ever such a conspiracy, it got thoroughly out of the plotters' control after 1990. AT T sold its Unix operation to Novell around the same time Linux and other free-Unix distributions were beginning to make noise. -*** Unix weenie -1. A derogatory play on Unix wizard , common among hackers who use Unix by necessity but would prefer alternatives. The implication is that although the person in question may consider mastery of Unix arcana to be a wizardly skill, the only real skill involved is the ability to tolerate (and the bad taste to wallow in) the incoherence and needless complexity that is alleged to infest many Unix programs. This shell script tries to parse its arguments in 69 bletcherous ways. It must have been written by a real Unix weenie. - -2. A derogatory term for anyone who engages in uncritical praise of Unix. Often appearing in the context stupid Unix weenie. See Weenix , Unix conspiracy. See also weenie. - *** Usenet /yoosnet/ , /yooznet/ , n. [from Users' Network ; the original spelling was USENET, but the mixed-case form is now widely preferred] A distributed bboard (bulletin board) system supported mainly by Unix machines. Originally implemented in 1979--1980 by Steve Bellovin, Jim Ellis, Tom Truscott, and Steve Daniel at Duke University and the University of North Carolina, it has swiftly grown to become international in scope and is now probably the largest decentralized information utility in existence. As of late 2002, it hosts over 100,000 newsgroups and an unguessably huge volume of new technical articles, news, discussion, chatter, and flamage every day (and that leaves out the graphics...). By the year the Internet hit the mainstream (1994) the original UUCP transport for Usenet was fading out of use almost all Usenet connections were over Internet links. A lot of newbies and journalists began to refer to Internet newsgroups as though Usenet was and always had been just another Internet service. This ignorance greatly annoys experienced Usenetters. @@ -1747,11 +1742,6 @@ Acronym. Software license type. This open source license encourages hackers to " *** Weaknesses of the Hacker Personality withdrawn, relationally incompetent, sexually frustrated, and desperately unhappy when not submerged in his or her craft. Fortunately, this extreme is far less common than mainstream folklore paints it but almost all hackers will recognize something of themselves in the unflattering paragraphs above. Hackers are often monumentally disorganized and sloppy about dealing with the physical world. Bills don't get paid on time, clutter piles up to incredible heights in homes and offices, and minor maintenance tasks get deferred indefinitely. 1994-95's fad behavioral disease was a syndrome called Attention Deficit Disorder (ADD), supposedly characterized by (among other things) a combination of short attention span with an ability to hyperfocus imaginatively on interesting tasks. In 1998-1999 another syndrome that is said to overlap with many hacker traits entered popular awareness: Asperger's syndrome (AS). This disorder is also sometimes called high-function autism, though researchers are divided on whether AS is in fact a mild form of autism or a distinct syndrome with a different etiology. AS patients exhibit mild to severe deficits in interpreting facial and body-language cues and in modeling or empathizing with others' emotions. Though some AS patients exhibit mild retardation, others compensate for their deficits with high intelligence and analytical ability, and frequently seek out technical fields where problem-solving abilities are at a premium and people skills are relatively unimportant. Both syndromes are thought to relate to abnormalities in neurotransmitter chemistry, especially the brain's processing of serotonin. Many hackers have noticed that mainstream culture has shown a tendency to pathologize and medicalize normal variations in personality, especially those variations that make life more complicated for authority figures and conformists. Thus, hackers aware of the issue tend to be among those questioning whether ADD and AS actually exist; and if so whether they are really diseases rather than extremes of a normal genetic variation like having freckles or being able to taste DPT. In either case, they have a sneaking tendency to wonder if these syndromes are over-diagnosed and over-treated. After all, people in authority will always be inconvenienced by schoolchildren or workers or citizens who are prickly, intelligent individualists thus, any social system that depends on authority relationships will tend to helpfully ostracize and therapize and drug such abnormal people until they are properly docile and stupid and well-socialized. So hackers tend to believe they have good reason for skepticism about clinical explanations of the hacker personality. That being said, most would also concede that some hacker traits coincide with indicators for non-hyperactive ADD and AS the status of caffeine as a hacker beverage of choice may be connected to the fact that it bonds to the same neural receptors as Ritalin, the drug most commonly prescribed for ADD. It is probably true that boosters of both would find a rather higher rate of clinical ADD among hackers than the supposedly mainstream-normal 3-5% (AS is rarer at 0.4-0.5%). -*** Weenix -1. [ITS] A derogatory term for Unix , derived from Unix weenie. According to one noted ex-ITSer, it is the operating system preferred by Unix Weenies: typified by poor modularity, poor reliability, hard file deletion, no file version numbers, case sensitivity everywhere, and users who believe that these are all advantages. (Some ITS fans behave as though they believe Unix stole a future that rightfully belonged to them. See ITS , sense 2.) - -2. [Brown University] A Unix-like OS developed for tutorial purposes at Brown University. See http://www.cs.brown.edu/courses/cs167/weenix.html. Named independently of the ITS usage. - *** What's a spline? This phrase expands to: You have just used a term that I've heard for a year and a half, and I feel I should know, but don't. My curiosity has finally overcome my guilt. The PARC lexicon adds Moral: don't hesitate to ask questions, even if they seem obvious. @@ -2222,7 +2212,7 @@ n. [common] Large, expensive, ultra-fast computers. Used generally of number-cru 3. [Stanford] In backgammon, large numbers on the dice especially a roll of double fives or double sixes (compare moby , sense 4). See also El Camino Bignum. Sense 1 may require some explanation. Most computer languages provide a kind of data called integer , but such computer integers are usually very limited in size; usually they must be smaller than 2 31 (2,147,483,648). If you want to work with numbers larger than that, you have to use floating-point numbers, which are usually accurate to only six or seven decimal places. Computer languages that provide bignums can perform exact calculations on very large numbers, such as 1000! (the factorial of 1000, which is 1000 times 999 times 998 times. .. times 2 times 1). For example, this value for 1000! was computed by the MacLISP system using bignums: 40238726007709377354370243392300398571937486421071 46325437999104299385123986290205920442084869694048 00479988610197196058631666872994808558901323829669 94459099742450408707375991882362772718873251977950 59509952761208749754624970436014182780946464962910 56393887437886487337119181045825783647849977012476 63288983595573543251318532395846307555740911426241 74743493475534286465766116677973966688202912073791 43853719588249808126867838374559731746136085379534 52422158659320192809087829730843139284440328123155 86110369768013573042161687476096758713483120254785 89320767169132448426236131412508780208000261683151 02734182797770478463586817016436502415369139828126 48102130927612448963599287051149649754199093422215 66832572080821333186116811553615836546984046708975 60290095053761647584772842188967964624494516076535 34081989013854424879849599533191017233555566021394 50399736280750137837615307127761926849034352625200 01588853514733161170210396817592151090778801939317 81141945452572238655414610628921879602238389714760 88506276862967146674697562911234082439208160153780 88989396451826324367161676217916890977991190375403 12746222899880051954444142820121873617459926429565 81746628302955570299024324153181617210465832036786 90611726015878352075151628422554026517048330422614 39742869330616908979684825901254583271682264580665 26769958652682272807075781391858178889652208164348 34482599326604336766017699961283186078838615027946 59551311565520360939881806121385586003014356945272 24206344631797460594682573103790084024432438465657 24501440282188525247093519062092902313649327349756 55139587205596542287497740114133469627154228458623 77387538230483865688976461927383814900140767310446 64025989949022222176590433990188601856652648506179 97023561938970178600408118897299183110211712298459 01641921068884387121855646124960798722908519296819 37238864261483965738229112312502418664935314397013 74285319266498753372189406942814341185201580141233 44828015051399694290153483077644569099073152433278 28826986460278986432113908350621709500259738986355 42771967428222487575867657523442202075736305694988 25087968928162753848863396909959826280956121450994 87170124451646126037902930912088908694202851064018 21543994571568059418727489980942547421735824010636 77404595741785160829230135358081840096996372524230 56085590370062427124341690900415369010593398383577 79394109700277534720000000000000000000000000000000 00000000000000000000000000000000000000000000000000 00000000000000000000000000000000000000000000000000 00000000000000000000000000000000000000000000000000 00000000000000000000000000000000000000000000000000 00000000000000000. *** bigot -n. [common] A person who is religiously attached to a particular computer, language, operating system, editor, or other tool (see religious issues ). Usually found with a specifier; thus, Cray bigot , ITS bigot , APL bigot , VMS bigot , Berkeley bigot. Real bigots can be distinguished from mere partisans or zealots by the fact that they refuse to learn alternatives even when the march of time and/or technology is threatening to obsolete the favored tool. It is truly said You can tell a bigot, but you can't tell him much. Compare weenie , Amiga Persecution Complex. +n. [common] A person who is religiously attached to a particular computer, language, operating system, editor, or other tool (see religious issues). Among hackers "language bigotry" is fairly common as people religiously defend their favorite programming language or development environment. *** bikeshedding Technical disputes over minor, marginal issues conducted while more serious ones are being overlooked. The implied image is of people arguing over what color to paint the bicycle shed while the house is not finished. @@ -2940,7 +2930,7 @@ n. Abandoned website. A World Wide Web Site that hasn't been updated so long it 3. A self-deprecating way of denying responsibility for a management decision, or of complaining about having to live with such decisions. As in Don't ask me why we need to write a compiler in COBOL, I'm just a code monkey. *** code police -n. [by analogy with George Orwell's thought police ] A mythical team of Gestapo-like storm troopers that might burst into one's office and arrest one for violating programming style rules. May be used either seriously, to underline a claim that a particular style violation is dangerous, or ironically, to suggest that the practice under discussion is condemned mainly by anal-retentive weenie s. Dike out that goto or the code police will get you! The ironic usage is perhaps more common. +n. [by analogy with George Orwell's thought police ] A mythical team of Gestapo-like storm troopers that might burst into one's office and arrest one for violating programming style rules. Also reminiscent of Turing Police from William Gibson's Neuromancer who try to prevent AI systems from breaking out from their constraints. *** codes n. [scientific computing] Programs. This usage is common in people who hack supercomputers and heavy-duty number-crunching , rare to unknown elsewhere (if you say codes to hackers outside scientific computing, their first association is likely to be and cyphers ). @@ -4397,7 +4387,7 @@ vi. (also garbage collection , n.) See GC. v. [ostensibly from gefingerpoken ] vt. Syn. mung. See also blinkenlights. *** geek -n. A person who has chosen concentration rather than conformity; one who pursues skill (especially technical skill) and imagination, not mainstream social acceptance. Geeks usually have a strong case of neophilia. Most geeks are adept with computers and treat hacker as a term of respect, but not all are hackers themselves and some who are in fact hackers normally call themselves geeks anyway, because they (quite properly) regard hacker as a label that should be bestowed by others rather than self-assumed. One description accurately if a little breathlessly enumerates gamers, ravers, science fiction fans, punks, perverts, programmers, nerds, subgenii, and trekkies. These are people who did not go to their high school proms, and many would be offended by the suggestion that they should have even wanted to. Originally, a geek was a carnival performer who bit the heads off chickens. (In early 20th-century Scotland a geek was an immature coley, a type of fish.) Before about 1990 usage of this term was rather negative. Earlier versions of this lexicon defined a computer geek as one who eats (computer) bugs for a living an asocial, malodorous, pasty-faced monomaniac with all the personality of a cheese grater. This is often still the way geeks are regarded by non-geeks, but as the mainstream culture becomes more dependent on technology and technical skill mainstream attitudes have tended to shift towards grudging respect. Correspondingly, there are now geek pride festivals (the implied reference to gay pride is not accidental). See also propeller head , clustergeeking , geek out , wannabee , terminal junkie , spod , weenie , geek code , alpha geek. +n. A person who has chosen concentration rather than conformity; one who pursues skill (especially technical skill) and imagination, not mainstream social acceptance. Geeks usually have a strong case of neophilia. Most geeks are adept with computers and treat hacker as a term of respect, but not all are hackers themselves and some who are in fact hackers normally call themselves geeks anyway, because they (quite properly) regard hacker as a label that should be bestowed by others rather than self-assumed. One description accurately if a little breathlessly enumerates gamers, ravers, science fiction fans, punks, perverts, programmers, nerds, subgenii, and trekkies. These are people who did not go to their high school proms, and many would be offended by the suggestion that they should have even wanted to. Originally, a geek was a carnival performer who bit the heads off chickens. (In early 20th-century Scotland a geek was an immature coley, a type of fish.) Before about 1990 usage of this term was rather negative. Earlier versions of this lexicon defined a computer geek as one who eats (computer) bugs for a living an asocial, malodorous, pasty-faced monomaniac with all the personality of a cheese grater. This is often still the way geeks are regarded by non-geeks, but as the mainstream culture becomes more dependent on technology and technical skill mainstream attitudes have tended to shift towards grudging respect. Correspondingly, there are now geek pride festivals (the implied reference to gay pride is not accidental). See also propeller head, clustergeeking, geek out, wannabee, terminal junkie, geek code. *** geek code n. (also Code of the Geeks ). A set of codes commonly used in sig blocks to broadcast the interests, skills, and aspirations of the poster. Features a G at the left margin followed by numerous letter codes, often suffixed with plusses or minuses. Because many net users are involved in computer science, the most common prefix is GCS. To see a copy of the current code, browse http://www.geekcode.com/. Here is a sample geek code (that of Robert Hayden, the code's inventor) from that page: -----BEGINGEEKCODEBLOCK----- Version:3.1 GED/Jd--s:++ :a-C++(++++)$ULUO++P+ +++L++!E----W+(---)N+++ o+K+++w+(---)O-M+$ ++V--PS++(+++) $PE++(+) $Y++PGP++t-5+++ X++R+++ $tv+b+DI+++D+++G+++++ $e++$ ++++hr--y+** ------ENDGEEKCODEBLOCK------ The geek code originated in 1993; it was inspired (according to the inventor) by previous bear , smurf and twink style-and-sexual-preference codes from lesbian and gay newsgroup s. It has in turn spawned imitators; there is now even a Saturn geek code for owners of the Saturn car. See also geek. @@ -4830,7 +4820,7 @@ vt. [pun on hand craft ] See cruft , sense 3. v. [from obs. mainstream slang hand-rolled in opposition to ready-made , referring to cigarettes] To perform a normally automated software installation or configuration process by hand ; implies that the normal process failed due to bugs in the configurator or was defeated by something exceptional in the local environment. The worst thing about being a gateway between four different nets is having to hand-roll a new sendmail configuration every time any of them upgrades. *** handle -1. [from CB slang] An electronic pseudonym; a nom de guerre intended to conceal the user's true identity. Network and BBS handles function as the same sort of simultaneous concealment and display one finds on Citizen's Band radio, from which the term was adopted. Use of grandiose handles is characteristic of warez d00dz , cracker s, weenie s, spod s, and other lower forms of network life; true hackers travel on their own reputations rather than invented legendry. Compare nick , screen name. +1. [from CB slang] An electronic pseudonym; a nom de guerre intended to conceal the user's true identity. Network and BBS handles function as the same sort of simultaneous concealment and display one finds on Citizen's Band radio, from which the term was adopted. Use of grandiose handles is characteristic of warez d00dz, crackers, trolls, and other lower forms of network life; true hackers travel on their own reputations rather than invented legendry. Compare nick , screen name. 2. A magic cookie , often in the form of a numeric index into some array somewhere, through which you can manipulate an object like a file or window. The form file handle is especially common. @@ -7570,15 +7560,6 @@ v. [Usenet; syn. disemvowel ] To partially obscure a potentially provocative wor *** splork! The sound of coffee (or other beverage) hitting the monitor and/or keyboard after being forced out of the mouth via the nose. It usually follows an unexpectedly funny thing in a Usenet post. Compare snarf. -*** spod -1. A lower form of life found on talker systems and MUD s. The spod has few friends in RL and uses talkers instead, finding communication easier and preferable over the net. He has all the negative traits of the computer geek without having any interest in computers per se. Lacking any knowledge of or interest in how networks work, and considering his access a God-given right, he is a major irritant to sysadmins, clogging up lines in order to reach new MUDs, following passed-on instructions on how to sneak his way onto Internet ( Wow! It's in America! ) and complaining when he is not allowed to use busy routes. A true spod will start any conversation with Are you male or female? (and follow it up with Got any good numbers/IDs/passwords? ) and will not talk to someone physically present in the same terminal room until they log onto the same machine that he is using and enter talk mode. Compare newbie , tourist , weenie , twink , terminal junkie , warez d00dz. - -2. A backronym for Sole Purpose, Obtain a Degree ; according to some self-described spods, this term is used by indifferent students to condemn their harder-working fellows. Compare the defiant adoption of the term geek in the mid-1990s by people who would previously have been stigmatized by it. Spods in the positive sense are talker users who've accumulated a large amount of spod time, that is, they spend a lot of time logged in to that talker (for example, my spod time on Uberworld as of this moment is 131 days, 15 hours and 20 minutes). Spods are generally highly knowledgeable about talkers and SGXStalker coding, as well as computers and the internet in general. - -3. [Glasgow University] An otherwise competent hacker who spends way too much time on talker systems. - -4. [obs.] An ordinary person; a random. This is the meaning with which the term was coined, but the inventor informs us he has himself accepted sense 1. - *** spoiler 1. A remark which reveals important plot elements from books or movies, thus denying the reader (of the article) the proper suspense when reading the book or watching the movie. @@ -8455,7 +8436,7 @@ Driving around looking for unsecured wireless Internet access points to connect /weirz/ , n. Widely used in cracker subcultures to denote cracked version of commercial software, that is versions from which copy-protection has been stripped. Hackers recognize this term but don't use it themselves. See warez d00dz , courier , leech , elite. *** warez d00dz -/weirz doodz/ , n. A substantial subculture of crackers refer to themselves as warez d00dz ; there is evidently some connection with B1FF here. As Ozone Pilot , one former warez d00d, wrote: Warez d00dz get illegal copies of copyrighted software. If it has copy protection on it, they break the protection so the software can be copied. Then they distribute it around the world via several gateways. Warez d00dz form badass group names like RAZOR and the like. They put up boards that distribute the latest ware, or pirate program. The whole point of the Warez sub-culture is to get the pirate program released and distributed before any other group. I know, I know. But don't ask, and it won't hurt as much. This is how they prove their poweress [sic]. It gives them the right to say, I released King's Quest IVXIX before you so obviously my testicles are larger. Again don't ask... The studly thing to do if one is a warez d00d, it appears, is emit 0-day warez , that is copies of commercial software copied and cracked on the same day as its retail release. Warez d00ds also hoard software in a big way, collecting untold megabytes of arcade-style games, pornographic JPGs, and applications they'll never use onto their hard disks. As Ozone Pilot acutely observes: [BELONG] is the only word you will need to know. Warez d00dz want to belong. They have been shunned by everyone, and thus turn to cyberspace for acceptance. That is why they always start groups like TGW, FLT, USA and the like. Structure makes them happy. [...] Warez d00dz will never have a handle like Pink Daisy because warez d00dz are insecure. Only someone who is very secure with a good dose of self-esteem can stand up to the cries of fag and girlie-man. More likely you will find warez d00dz with handles like: Doctor Death, Deranged Lunatic, Hellraiser, Mad Prince, Dreamdevil, The Unknown, Renegade Chemist, Terminator, and Twin Turbo. They like to sound badass when they can hide behind their terminals. More likely, if you were given a sample of 100 people, the person whose handle is Hellraiser is the last person you'd associate with the name. The contrast with Internet hackers is stark and instructive. See cracker , wannabee , handle , elite , courier , leech ; compare weenie , spod. +/weirz doodz/ , n. An obscure subculture of crackers refer to themselves as warez d00dz. See cracker, wannabee *** warez kiddies n. Even more derogatory way of referring to warez d00dz ; refers to the fact that most warez d00dz are around the age of puberty. Compare script kiddies. @@ -8527,13 +8508,6 @@ n. [Fairchild] A bug. Prob. related to wedged. 2. At CDC/ETA before its demise, the phrase go off in the weeds was equivalent mainstream hackerdom's jump off into never-never land. -*** weenie -1. [on BBSes] Any of a species of luser resembling a less amusing version of B1FF that infests many BBS systems. The typical weenie is a teenage boy with poor social skills travelling under a grandiose handle derived from fantasy or heavy-metal rock lyrics. Among sysops, the weenie problem refers to the marginally literate and profanity-laden flamage weenies tend to spew all over a newly-discovered BBS. Compare spod , geek , terminal junkie , warez d00dz. - -2. [among hackers] When used with a qualifier (for example, as in Unix weenie , VMS weenie, IBM weenie) this can be either an insult or a term of praise, depending on context, tone of voice, and whether or not it is applied by a person who considers him or herself to be the same sort of weenie. Implies that the weenie has put a major investment of time, effort, and concentration into the area indicated; whether this is good or bad depends on the hearer's judgment of how the speaker feels about that area. See also bigot. - -3. The semicolon character, ; (ASCII 0111011). - *** well-behaved 1. Software that does its job quietly and without counterintuitive effects. Esp.: said of software having an interface spec sufficiently simple and well-defined that it can be used as a tool by other software. See cat. diff --git a/docs/jargon.1.gz b/docs/jargon.1.gz index 3e70422..b2cff2d 100644 Binary files a/docs/jargon.1.gz and b/docs/jargon.1.gz differ diff --git a/docs/jargon.html b/docs/jargon.html index 37ce036..7ae79ae 100644 --- a/docs/jargon.html +++ b/docs/jargon.html @@ -18,7 +18,7 @@ Free Documentation License".
-This file last generated Monday, 15 October 2018 01:57PM UTC +This file last generated Monday, 15 October 2018 02:14PM UTC
- n. The disorder suffered by a particularly egregious variety of bigot , those who believe that the marginality of their preferred machine is the result of some kind of industry-wide conspiracy (for without a conspiracy of some kind, the eminent superiority of their beloved shining jewel of a platform would obviously win over all, market pressures be damned!) Those afflicted are prone to engaging in flame wars and calling for boycotts and mailbombings. Amiga Persecution Complex is by no means limited to Amiga users; NeXT, NeWS , OS/2 , Macintosh, LISP , and GNU users are also common victims. Linux users used to display symptoms very frequently before Linux started winning; some still do. See also newbie , troll , holy wars , weenie , Get a life!. + n. The disorder suffered by a particularly egregious variety of bigot , those who believe that the marginality of their preferred machine is the result of some kind of industry-wide conspiracy (for without a conspiracy of some kind, the eminent superiority of their beloved shining jewel of a platform would obviously win over all, market pressures be damned!) Those afflicted are prone to engaging in flame wars and calling for boycotts and mailbombings. Amiga Persecution Complex is by no means limited to Amiga users; NeXT, NeWS , OS/2 , Macintosh, LISP , and GNU users are also common victims. Linux users used to display symptoms very frequently before Linux started winning; some still do. See also newbie, troll, holy wars.
@@ -2022,7 +2022,7 @@ This file last generated Monday, 15 October 2018 01:57PM UTC
- /yooniks/ , n. [In the authors' words, A weak pun on Multics ; very early on it was UNICS ] (also UNIX ) An interactive timesharing system invented in 1969 by Ken Thompson after Bell Labs left the Multics project, originally so he could play games on his scavenged PDP-7. Dennis Ritchie, the inventor of C, is considered a co-author of the system. The turning point in Unix's history came when it was reimplemented almost entirely in C during 1972 1974, making it the first source-portable OS. Unix subsequently underwent mutations and expansions at the hands of many different people, resulting in a uniquely flexible and developer-friendly environment. By 1991, Unix had become the most widely used multiuser general-purpose operating system in the world and since 1996 the variant called Linux has been at the cutting edge of the open source movement. Many people consider the success of Unix the most important victory yet of hackerdom over industry opposition (but see Unix weenie and Unix conspiracy for an opposing point of view). See Version 7 , BSD , Linux. Archetypal hackers ken (left) and dmr (right). Some people are confused over whether this word is appropriately UNIX or Unix ; both forms are common, and used interchangeably. Dennis Ritchie says that the UNIX spelling originally happened in CACM's 1974 paper The UNIX Time-Sharing System because we had a new typesetter and troff had just been invented and we were intoxicated by being able to produce small caps. Later, dmr tried to get the spelling changed to Unix in a couple of Bell Labs papers, on the grounds that the word is not acronymic. He failed, and eventually (his words) wimped out on the issue. So, while the trademark today is UNIX , both capitalizations are grounded in ancient usage; the Jargon File uses Unix in deference to dmr's wishes. + /yooniks/ , n. [In the authors' words, A weak pun on Multics ; very early on it was UNICS ] (also UNIX ) An interactive timesharing system invented in 1969 by Ken Thompson after Bell Labs left the Multics project, originally so he could play games on his scavenged PDP-7. Dennis Ritchie, the inventor of C, is considered a co-author of the system. The turning point in Unix's history came when it was reimplemented almost entirely in C during 1972 1974, making it the first source-portable OS. Unix subsequently underwent mutations and expansions at the hands of many different people, resulting in a uniquely flexible and developer-friendly environment. By 1991, Unix had become the most widely used multiuser general-purpose operating system in the world and since 1996 the variant called Linux has been at the cutting edge of the open source movement. Many people consider the success of Unix the most important victory yet of hackerdom over industry opposition. See Version 7 , BSD , Linux. Archetypal hackers ken (left) and dmr (right). Some people are confused over whether this word is appropriately UNIX or Unix ; both forms are common, and used interchangeably. Dennis Ritchie says that the UNIX spelling originally happened in CACM's 1974 paper The UNIX Time-Sharing System because we had a new typesetter and troff had just been invented and we were intoxicated by being able to produce small caps. Later, dmr tried to get the spelling changed to Unix in a couple of Bell Labs papers, on the grounds that the word is not acronymic. He failed, and eventually (his words) wimped out on the issue. So, while the trademark today is UNIX , both capitalizations are grounded in ancient usage; the Jargon File uses Unix in deference to dmr's wishes.
@@ -2032,10 +2032,6 @@ This file last generated Monday, 15 October 2018 01:57PM UTC
n. [ITS] According to a conspiracy theory long popular among ITS and TOPS-20 fans, Unix's growth is the result of a plot, hatched during the 1970s at Bell Labs, whose intent was to hobble AT T's competitors by making them dependent upon a system whose future evolution was to be under AT T's control. This would be accomplished by disseminating an operating system that is apparently inexpensive and easily portable, but also relatively unreliable and insecure (so as to require continuing upgrades from AT T). This theory was lent a substantial impetus in 1984 by the paper referenced in the back door entry. In this view, Unix was designed to be one of the first computer viruses (see virus ) but a virus spread to computers indirectly by people and market forces, rather than directly through disks and networks. Adherents of this Unix virus theory like to cite the fact that the well-known quotation Unix is snake oil was uttered by DEC president Kenneth Olsen shortly before DEC began actively promoting its own family of Unix workstations. (Olsen now claims to have been misquoted.) If there was ever such a conspiracy, it got thoroughly out of the plotters' control after 1990. AT T sold its Unix operation to Novell around the same time Linux and other free-Unix distributions were beginning to make noise.
-1. A derogatory play on Unix wizard , common among hackers who use Unix by necessity but would prefer alternatives. The implication is that although the person in question may consider mastery of Unix arcana to be a wizardly skill, the only real skill involved is the ability to tolerate (and the bad taste to wallow in) the incoherence and needless complexity that is alleged to infest many Unix programs. This shell script tries to parse its arguments in 69 bletcherous ways. It must have been written by a real Unix weenie.
- -2. A derogatory term for anyone who engages in uncritical praise of Unix. Often appearing in the context stupid Unix weenie. See Weenix , Unix conspiracy. See also weenie.
/yoosnet/ , /yooznet/ , n. [from Users' Network ; the original spelling was USENET, but the mixed-case form is now widely preferred] A distributed bboard (bulletin board) system supported mainly by Unix machines. Originally implemented in 1979--1980 by Steve Bellovin, Jim Ellis, Tom Truscott, and Steve Daniel at Duke University and the University of North Carolina, it has swiftly grown to become international in scope and is now probably the largest decentralized information utility in existence. As of late 2002, it hosts over 100,000 newsgroups and an unguessably huge volume of new technical articles, news, discussion, chatter, and flamage every day (and that leaves out the graphics...). By the year the Internet hit the mainstream (1994) the original UUCP transport for Usenet was fading out of use almost all Usenet connections were over Internet links. A lot of newbies and journalists began to refer to Internet newsgroups as though Usenet was and always had been just another Internet service. This ignorance greatly annoys experienced Usenetters. @@ -2126,10 +2122,6 @@ This file last generated Monday, 15 October 2018 01:57PM UTC
withdrawn, relationally incompetent, sexually frustrated, and desperately unhappy when not submerged in his or her craft. Fortunately, this extreme is far less common than mainstream folklore paints it but almost all hackers will recognize something of themselves in the unflattering paragraphs above. Hackers are often monumentally disorganized and sloppy about dealing with the physical world. Bills don't get paid on time, clutter piles up to incredible heights in homes and offices, and minor maintenance tasks get deferred indefinitely. 1994-95's fad behavioral disease was a syndrome called Attention Deficit Disorder (ADD), supposedly characterized by (among other things) a combination of short attention span with an ability to hyperfocus imaginatively on interesting tasks. In 1998-1999 another syndrome that is said to overlap with many hacker traits entered popular awareness: Asperger's syndrome (AS). This disorder is also sometimes called high-function autism, though researchers are divided on whether AS is in fact a mild form of autism or a distinct syndrome with a different etiology. AS patients exhibit mild to severe deficits in interpreting facial and body-language cues and in modeling or empathizing with others' emotions. Though some AS patients exhibit mild retardation, others compensate for their deficits with high intelligence and analytical ability, and frequently seek out technical fields where problem-solving abilities are at a premium and people skills are relatively unimportant. Both syndromes are thought to relate to abnormalities in neurotransmitter chemistry, especially the brain's processing of serotonin. Many hackers have noticed that mainstream culture has shown a tendency to pathologize and medicalize normal variations in personality, especially those variations that make life more complicated for authority figures and conformists. Thus, hackers aware of the issue tend to be among those questioning whether ADD and AS actually exist; and if so whether they are really diseases rather than extremes of a normal genetic variation like having freckles or being able to taste DPT. In either case, they have a sneaking tendency to wonder if these syndromes are over-diagnosed and over-treated. After all, people in authority will always be inconvenienced by schoolchildren or workers or citizens who are prickly, intelligent individualists thus, any social system that depends on authority relationships will tend to helpfully ostracize and therapize and drug such abnormal people until they are properly docile and stupid and well-socialized. So hackers tend to believe they have good reason for skepticism about clinical explanations of the hacker personality. That being said, most would also concede that some hacker traits coincide with indicators for non-hyperactive ADD and AS the status of caffeine as a hacker beverage of choice may be connected to the fact that it bonds to the same neural receptors as Ritalin, the drug most commonly prescribed for ADD. It is probably true that boosters of both would find a rather higher rate of clinical ADD among hackers than the supposedly mainstream-normal 3-5% (AS is rarer at 0.4-0.5%).
-1. [ITS] A derogatory term for Unix , derived from Unix weenie. According to one noted ex-ITSer, it is the operating system preferred by Unix Weenies: typified by poor modularity, poor reliability, hard file deletion, no file version numbers, case sensitivity everywhere, and users who believe that these are all advantages. (Some ITS fans behave as though they believe Unix stole a future that rightfully belonged to them. See ITS , sense 2.)
- -2. [Brown University] A Unix-like OS developed for tutorial purposes at Brown University. See http://www.cs.brown.edu/courses/cs167/weenix.html. Named independently of the ITS usage.
This phrase expands to: You have just used a term that I've heard for a year and a half, and I feel I should know, but don't. My curiosity has finally overcome my guilt. The PARC lexicon adds Moral: don't hesitate to ask questions, even if they seem obvious. @@ -2674,7 +2666,7 @@ This file last generated Monday, 15 October 2018 01:57PM UTC
3. [Stanford] In backgammon, large numbers on the dice especially a roll of double fives or double sixes (compare moby , sense 4). See also El Camino Bignum. Sense 1 may require some explanation. Most computer languages provide a kind of data called integer , but such computer integers are usually very limited in size; usually they must be smaller than 2 31 (2,147,483,648). If you want to work with numbers larger than that, you have to use floating-point numbers, which are usually accurate to only six or seven decimal places. Computer languages that provide bignums can perform exact calculations on very large numbers, such as 1000! (the factorial of 1000, which is 1000 times 999 times 998 times. .. times 2 times 1). For example, this value for 1000! was computed by the MacLISP system using bignums: 40238726007709377354370243392300398571937486421071 46325437999104299385123986290205920442084869694048 00479988610197196058631666872994808558901323829669 94459099742450408707375991882362772718873251977950 59509952761208749754624970436014182780946464962910 56393887437886487337119181045825783647849977012476 63288983595573543251318532395846307555740911426241 74743493475534286465766116677973966688202912073791 43853719588249808126867838374559731746136085379534 52422158659320192809087829730843139284440328123155 86110369768013573042161687476096758713483120254785 89320767169132448426236131412508780208000261683151 02734182797770478463586817016436502415369139828126 48102130927612448963599287051149649754199093422215 66832572080821333186116811553615836546984046708975 60290095053761647584772842188967964624494516076535 34081989013854424879849599533191017233555566021394 50399736280750137837615307127761926849034352625200 01588853514733161170210396817592151090778801939317 81141945452572238655414610628921879602238389714760 88506276862967146674697562911234082439208160153780 88989396451826324367161676217916890977991190375403 12746222899880051954444142820121873617459926429565 81746628302955570299024324153181617210465832036786 90611726015878352075151628422554026517048330422614 39742869330616908979684825901254583271682264580665 26769958652682272807075781391858178889652208164348 34482599326604336766017699961283186078838615027946 59551311565520360939881806121385586003014356945272 24206344631797460594682573103790084024432438465657 24501440282188525247093519062092902313649327349756 55139587205596542287497740114133469627154228458623 77387538230483865688976461927383814900140767310446 64025989949022222176590433990188601856652648506179 97023561938970178600408118897299183110211712298459 01641921068884387121855646124960798722908519296819 37238864261483965738229112312502418664935314397013 74285319266498753372189406942814341185201580141233 44828015051399694290153483077644569099073152433278 28826986460278986432113908350621709500259738986355 42771967428222487575867657523442202075736305694988 25087968928162753848863396909959826280956121450994 87170124451646126037902930912088908694202851064018 21543994571568059418727489980942547421735824010636 77404595741785160829230135358081840096996372524230 56085590370062427124341690900415369010593398383577 79394109700277534720000000000000000000000000000000 00000000000000000000000000000000000000000000000000 00000000000000000000000000000000000000000000000000 00000000000000000000000000000000000000000000000000 00000000000000000000000000000000000000000000000000 00000000000000000.
- n. [common] A person who is religiously attached to a particular computer, language, operating system, editor, or other tool (see religious issues ). Usually found with a specifier; thus, Cray bigot , ITS bigot , APL bigot , VMS bigot , Berkeley bigot. Real bigots can be distinguished from mere partisans or zealots by the fact that they refuse to learn alternatives even when the march of time and/or technology is threatening to obsolete the favored tool. It is truly said You can tell a bigot, but you can't tell him much. Compare weenie , Amiga Persecution Complex. + n. [common] A person who is religiously attached to a particular computer, language, operating system, editor, or other tool (see religious issues). Among hackers "language bigotry" is fairly common as people religiously defend their favorite programming language or development environment.
@@ -3499,7 +3491,7 @@ This file last generated Monday, 15 October 2018 01:57PM UTC
3. A self-deprecating way of denying responsibility for a management decision, or of complaining about having to live with such decisions. As in Don't ask me why we need to write a compiler in COBOL, I'm just a code monkey.
- n. [by analogy with George Orwell's thought police ] A mythical team of Gestapo-like storm troopers that might burst into one's office and arrest one for violating programming style rules. May be used either seriously, to underline a claim that a particular style violation is dangerous, or ironically, to suggest that the practice under discussion is condemned mainly by anal-retentive weenie s. Dike out that goto or the code police will get you! The ironic usage is perhaps more common. + n. [by analogy with George Orwell's thought police ] A mythical team of Gestapo-like storm troopers that might burst into one's office and arrest one for violating programming style rules. Also reminiscent of Turing Police from William Gibson's Neuromancer who try to prevent AI systems from breaking out from their constraints.
@@ -5163,7 +5155,7 @@ This file last generated Monday, 15 October 2018 01:57PM UTC
- n. A person who has chosen concentration rather than conformity; one who pursues skill (especially technical skill) and imagination, not mainstream social acceptance. Geeks usually have a strong case of neophilia. Most geeks are adept with computers and treat hacker as a term of respect, but not all are hackers themselves and some who are in fact hackers normally call themselves geeks anyway, because they (quite properly) regard hacker as a label that should be bestowed by others rather than self-assumed. One description accurately if a little breathlessly enumerates gamers, ravers, science fiction fans, punks, perverts, programmers, nerds, subgenii, and trekkies. These are people who did not go to their high school proms, and many would be offended by the suggestion that they should have even wanted to. Originally, a geek was a carnival performer who bit the heads off chickens. (In early 20th-century Scotland a geek was an immature coley, a type of fish.) Before about 1990 usage of this term was rather negative. Earlier versions of this lexicon defined a computer geek as one who eats (computer) bugs for a living an asocial, malodorous, pasty-faced monomaniac with all the personality of a cheese grater. This is often still the way geeks are regarded by non-geeks, but as the mainstream culture becomes more dependent on technology and technical skill mainstream attitudes have tended to shift towards grudging respect. Correspondingly, there are now geek pride festivals (the implied reference to gay pride is not accidental). See also propeller head , clustergeeking , geek out , wannabee , terminal junkie , spod , weenie , geek code , alpha geek. + n. A person who has chosen concentration rather than conformity; one who pursues skill (especially technical skill) and imagination, not mainstream social acceptance. Geeks usually have a strong case of neophilia. Most geeks are adept with computers and treat hacker as a term of respect, but not all are hackers themselves and some who are in fact hackers normally call themselves geeks anyway, because they (quite properly) regard hacker as a label that should be bestowed by others rather than self-assumed. One description accurately if a little breathlessly enumerates gamers, ravers, science fiction fans, punks, perverts, programmers, nerds, subgenii, and trekkies. These are people who did not go to their high school proms, and many would be offended by the suggestion that they should have even wanted to. Originally, a geek was a carnival performer who bit the heads off chickens. (In early 20th-century Scotland a geek was an immature coley, a type of fish.) Before about 1990 usage of this term was rather negative. Earlier versions of this lexicon defined a computer geek as one who eats (computer) bugs for a living an asocial, malodorous, pasty-faced monomaniac with all the personality of a cheese grater. This is often still the way geeks are regarded by non-geeks, but as the mainstream culture becomes more dependent on technology and technical skill mainstream attitudes have tended to shift towards grudging respect. Correspondingly, there are now geek pride festivals (the implied reference to gay pride is not accidental). See also propeller head, clustergeeking, geek out, wannabee, terminal junkie, geek code.
@@ -5633,7 +5625,7 @@ This file last generated Monday, 15 October 2018 01:57PM UTC v. [from obs. mainstream slang hand-rolled in opposition to ready-made , referring to cigarettes] To perform a normally automated software installation or configuration process by hand ; implies that the normal process failed due to bugs in the configurator or was defeated by something exceptional in the local environment. The worst thing about being a gateway between four different nets is having to hand-roll a new sendmail configuration every time any of them upgrades.
1. [from CB slang] An electronic pseudonym; a nom de guerre intended to conceal the user's true identity. Network and BBS handles function as the same sort of simultaneous concealment and display one finds on Citizen's Band radio, from which the term was adopted. Use of grandiose handles is characteristic of warez d00dz , cracker s, weenie s, spod s, and other lower forms of network life; true hackers travel on their own reputations rather than invented legendry. Compare nick , screen name.
+1. [from CB slang] An electronic pseudonym; a nom de guerre intended to conceal the user's true identity. Network and BBS handles function as the same sort of simultaneous concealment and display one finds on Citizen's Band radio, from which the term was adopted. Use of grandiose handles is characteristic of warez d00dz, crackers, trolls, and other lower forms of network life; true hackers travel on their own reputations rather than invented legendry. Compare nick , screen name.
2. A magic cookie , often in the form of a numeric index into some array somewhere, through which you can manipulate an object like a file or window. The form file handle is especially common.
@@ -8861,14 +8853,6 @@ This file last generated Monday, 15 October 2018 01:57PM UTCThe sound of coffee (or other beverage) hitting the monitor and/or keyboard after being forced out of the mouth via the nose. It usually follows an unexpectedly funny thing in a Usenet post. Compare snarf.
-1. A lower form of life found on talker systems and MUD s. The spod has few friends in RL and uses talkers instead, finding communication easier and preferable over the net. He has all the negative traits of the computer geek without having any interest in computers per se. Lacking any knowledge of or interest in how networks work, and considering his access a God-given right, he is a major irritant to sysadmins, clogging up lines in order to reach new MUDs, following passed-on instructions on how to sneak his way onto Internet ( Wow! It's in America! ) and complaining when he is not allowed to use busy routes. A true spod will start any conversation with Are you male or female? (and follow it up with Got any good numbers/IDs/passwords? ) and will not talk to someone physically present in the same terminal room until they log onto the same machine that he is using and enter talk mode. Compare newbie , tourist , weenie , twink , terminal junkie , warez d00dz.
- -2. A backronym for Sole Purpose, Obtain a Degree ; according to some self-described spods, this term is used by indifferent students to condemn their harder-working fellows. Compare the defiant adoption of the term geek in the mid-1990s by people who would previously have been stigmatized by it. Spods in the positive sense are talker users who've accumulated a large amount of spod time, that is, they spend a lot of time logged in to that talker (for example, my spod time on Uberworld as of this moment is 131 days, 15 hours and 20 minutes). Spods are generally highly knowledgeable about talkers and SGXStalker coding, as well as computers and the internet in general.
- -3. [Glasgow University] An otherwise competent hacker who spends way too much time on talker systems.
- -4. [obs.] An ordinary person; a random. This is the meaning with which the term was coined, but the inventor informs us he has himself accepted sense 1.
1. A remark which reveals important plot elements from books or movies, thus denying the reader (of the article) the proper suspense when reading the book or watching the movie.
@@ -9893,7 +9877,7 @@ This file last generated Monday, 15 October 2018 01:57PM UTC- /weirz doodz/ , n. A substantial subculture of crackers refer to themselves as warez d00dz ; there is evidently some connection with B1FF here. As Ozone Pilot , one former warez d00d, wrote: Warez d00dz get illegal copies of copyrighted software. If it has copy protection on it, they break the protection so the software can be copied. Then they distribute it around the world via several gateways. Warez d00dz form badass group names like RAZOR and the like. They put up boards that distribute the latest ware, or pirate program. The whole point of the Warez sub-culture is to get the pirate program released and distributed before any other group. I know, I know. But don't ask, and it won't hurt as much. This is how they prove their poweress [sic]. It gives them the right to say, I released King's Quest IVXIX before you so obviously my testicles are larger. Again don't ask... The studly thing to do if one is a warez d00d, it appears, is emit 0-day warez , that is copies of commercial software copied and cracked on the same day as its retail release. Warez d00ds also hoard software in a big way, collecting untold megabytes of arcade-style games, pornographic JPGs, and applications they'll never use onto their hard disks. As Ozone Pilot acutely observes: [BELONG] is the only word you will need to know. Warez d00dz want to belong. They have been shunned by everyone, and thus turn to cyberspace for acceptance. That is why they always start groups like TGW, FLT, USA and the like. Structure makes them happy. [...] Warez d00dz will never have a handle like Pink Daisy because warez d00dz are insecure. Only someone who is very secure with a good dose of self-esteem can stand up to the cries of fag and girlie-man. More likely you will find warez d00dz with handles like: Doctor Death, Deranged Lunatic, Hellraiser, Mad Prince, Dreamdevil, The Unknown, Renegade Chemist, Terminator, and Twin Turbo. They like to sound badass when they can hide behind their terminals. More likely, if you were given a sample of 100 people, the person whose handle is Hellraiser is the last person you'd associate with the name. The contrast with Internet hackers is stark and instructive. See cracker , wannabee , handle , elite , courier , leech ; compare weenie , spod. + /weirz doodz/ , n. An obscure subculture of crackers refer to themselves as warez d00dz. See cracker, wannabee
@@ -9977,12 +9961,6 @@ This file last generated Monday, 15 October 2018 01:57PM UTC
1. Refers to development projects or algorithms that have no possible relevance or practical application. Comes from off in the weeds. Used in phrases like lexical analysis for microcode is serious weeds....
2. At CDC/ETA before its demise, the phrase go off in the weeds was equivalent mainstream hackerdom's jump off into never-never land.
-1. [on BBSes] Any of a species of luser resembling a less amusing version of B1FF that infests many BBS systems. The typical weenie is a teenage boy with poor social skills travelling under a grandiose handle derived from fantasy or heavy-metal rock lyrics. Among sysops, the weenie problem refers to the marginally literate and profanity-laden flamage weenies tend to spew all over a newly-discovered BBS. Compare spod , geek , terminal junkie , warez d00dz.
- -2. [among hackers] When used with a qualifier (for example, as in Unix weenie , VMS weenie, IBM weenie) this can be either an insult or a term of praise, depending on context, tone of voice, and whether or not it is applied by a person who considers him or herself to be the same sort of weenie. Implies that the weenie has put a major investment of time, effort, and concentration into the area indicated; whether this is good or bad depends on the hearer's judgment of how the speaker feels about that area. See also bigot.
- -3. The semicolon character, ; (ASCII 0111011).
1. Software that does its job quietly and without counterintuitive effects. Esp.: said of software having an interface spec sufficiently simple and well-defined that it can be used as a tool by other software. See cat.
diff --git a/entries/wannabee.txt b/entries/wannabee.txt index a539434..adf1f4c 100644 --- a/entries/wannabee.txt +++ b/entries/wannabee.txt @@ -1,30 +1,3 @@ wannabee -/won'@bee/ , n. (also, more plausibly, spelled wannabe ) [from a term -recently used to describe Madonna fans who dress, talk, and act like their -idol; prob.: originally from biker slang] A would-be hacker. The -connotations of this term differ sharply depending on the age and exposure -of the subject. Used of a person who is in or might be entering larval stage -, it is semi-approving; such wannabees can be annoying but most hackers -remember that they, too, were once such creatures. When used of any -professional programmer, CS academic, writer, or suit , it is derogatory, -implying that said person is trying to cuddle up to the hacker mystique but -doesn't, fundamentally, have a prayer of understanding what it is all about. -Overuse of terms from this lexicon is often an indication of the wannabee -nature. Compare newbie. Historical note: The wannabee phenomenon has a -slightly different flavor now (1993) than it did ten or fifteen years ago. -When the people who are now hackerdom's tribal elders were in larval stage , -the process of becoming a hacker was largely unconscious and unaffected by -models known in popular culture communities formed spontaneously around -people who, as individuals , felt irresistibly drawn to do hackerly things, -and what wannabees experienced was a fairly pure, skill-focused desire to -become similarly wizardly. Those days of innocence are gone forever; -society's adaptation to the advent of the microcomputer after 1980 included -the elevation of the hacker as a new kind of folk hero, and the result is -that some people semi-consciously set out to be hackers and borrow hackish -prestige by fitting the popular image of hackers. Fortunately, to do this -really well, one has to actually become a wizard. Nevertheless, old-time -hackers tend to share a poorly articulated disquiet about the change; among -other things, it gives them mixed feelings about the effects of public -compendia of lore like this one. - +/won'@bee/ , n. Someone who wants to be a hacker. A novice or rookie.