Update docs

This commit is contained in:
Bob Mottram 2018-10-15 20:18:41 +01:00
parent 96b74018f3
commit af080bb038
3 changed files with 130 additions and 116 deletions

View File

@ -19,7 +19,7 @@ Free Documentation License".
* Generated
This file last generated Monday, 15 October 2018 06:35PM UTC
This file last generated Monday, 15 October 2018 07:18PM UTC
* Glossary
** (
@ -157,7 +157,7 @@ Semantically, one rich source of jargon constructions is the hackish tendency to
n. An App Store, sometimes also known as a Software Center or Software Manager, is a graphical user interface which allows the user to conveniently download and install new applications onto their computer or mobile device. App Stores can be very convenient but are often proprietary and may enable a particular company to control and censor what types of application non-technical users may run on their systems - typically in accordance with an American west coast morality. App stores have sometimes been described as a type of MITM attack on software distribution, allowing companies to insert themselves as rent-seeking trolls on a virtual toll bridge between the users and producers of software.
*** Archimedes
The world's first RISC microcomputer, available only in the British Commonwealth and europe. Built in 1987 in Great Britain by Acorn Computers, it was legendary for its use of the ARM-2 microprocessor as a CPU. Many a novice hacker in the Commonwealth first learnt his or her skills on the , since it was specifically designed for use in schools and educational institutions. Owners of machines are often still treated with awe and reverence. Familiarly, archi.
The world's first RISC microcomputer, available only in the British Commonwealth and Europe. Built in 1987 in Great Britain by Acorn Computers, it was legendary for its use of the ARM-2 microprocessor as a CPU. Many a novice hacker in the Commonwealth in the late 1980s or early 1990s first learnt his or her skills on the Archimedes, since it was specifically designed for use in schools and educational institutions. Owners of Archimedes machines are often still treated with awe and reverence. Familiarly, archi.
*** Aunt Tillie
n. [linux-kernel mailing list] The archetypal non-technical user, one's elderly and scatterbrained maiden aunt. Invoked in discussions of usability for people who are not hackers and geeks; one sees references to the Aunt Tillie test.
@ -1858,6 +1858,9 @@ s of metric nomenclature used in the sciences Stanford Stanford University Sun S
*** address harvester
n. A robot that searches web pages and/or filters netnews traffic looking for valid email addresses. Some address harvesters are benign, used only for compiling address directories. Most, unfortunately, are run by miscreants compiling address lists to spam. Address harvesters can be foiled by a teergrube.
*** address space randomization
The practice or randomly changing the layout of memory so as to avoid exploits which simply poke some value to a fixed memory offset. Used by the Linux kernel for hardening security against exploitation.
*** adger
/ajr/ , vt. [UCLA mutant of nadger , poss. also from the middle name of an infamous tenured graduate student ] To make a bonehead move with consequences that could have been foreseen with even slight mental effort. E.g., He started removing files and promptly adgered the whole project. Compare dumbass attack.
@ -2281,6 +2284,9 @@ n.,vt. [common] What data (a piece of email or netnews, or a stream of TCP/IP pa
*** black magic
n. [common] A technique that works, though nobody really understands why. More obscure than voodoo programming , which may be done by cookbook. Compare also black art , deep magic , and magic number (sense 2).
*** blacklist
aka blocklist or denylist. A list of users or domains to be blocked. This can be to avoid spam or harassment. Also see whitelist.
*** blameware
In corporate environments this is typically closed source software procured for the purpose of having some external entity to blame when things inevitably go wrong. Software as a strategy for deflecting blame within the organizational structure. The efficiency or usefulness of the software doesn't matter so long as it can be used to absorb blame. "Get the blame out of the building".
@ -8543,7 +8549,7 @@ n. [Stanford University] A period in larval stage during which student hackers h
See black hat.
*** whitelist
n. The opposite of a blacklist. That is, instead of being an explicit list of people who are banned, it's an explicit list of people who are to be admitted. Hackers use this especially of lists of email addresses that are explicitly enabled to get past strict anti-spam filters.
n. The opposite of a blacklist. aka "allow list" That is, instead of being an explicit list of people or domains who are banned, it's an explicit list of people who are to be admitted. Hackers use this especially of lists of email addresses that are explicitly enabled to get past strict anti-spam filters.
*** whizzy
adj. (alt.: wizzy ) [Sun] Describes a cuspy program; one that is feature-rich and well presented.

Binary file not shown.

View File

@ -18,7 +18,7 @@ Free Documentation License".
</p>
<H2>Generated</H2>
<p>
This file last generated Monday, 15 October 2018 06:35PM UTC
This file last generated Monday, 15 October 2018 07:18PM UTC
</p>
<H2>Glossary</H2>
@ -188,7 +188,7 @@ This file last generated Monday, 15 October 2018 06:35PM UTC
</p>
<H4>Archimedes</H4>
<p>
The world's first RISC microcomputer, available only in the British Commonwealth and europe. Built in 1987 in Great Britain by Acorn Computers, it was legendary for its use of the ARM-2 microprocessor as a CPU. Many a novice hacker in the Commonwealth first learnt his or her skills on the , since it was specifically designed for use in schools and educational institutions. Owners of machines are often still treated with awe and reverence. Familiarly, archi.
The world's first RISC microcomputer, available only in the British Commonwealth and Europe. Built in 1987 in Great Britain by Acorn Computers, it was legendary for its use of the ARM-2 microprocessor as a CPU. Many a novice hacker in the Commonwealth in the late 1980s or early 1990s first learnt his or her skills on the Archimedes, since it was specifically designed for use in schools and educational institutions. Owners of Archimedes machines are often still treated with awe and reverence. Familiarly, archi.
</p>
<H4>Aunt Tillie</H4>
<p>
@ -2261,6 +2261,10 @@ This file last generated Monday, 15 October 2018 06:35PM UTC
<p>
n. A robot that searches web pages and/or filters netnews traffic looking for valid email addresses. Some address harvesters are benign, used only for compiling address directories. Most, unfortunately, are run by miscreants compiling address lists to spam. Address harvesters can be foiled by a teergrube.
</p>
<H4>address space randomization</H4>
<p>
The practice or randomly changing the layout of memory so as to avoid exploits which simply poke some value to a fixed memory offset. Used by the Linux kernel for hardening security against exploitation.
</p>
<H4>adger</H4>
<p>
/ajr/ , vt. [UCLA mutant of nadger , poss. also from the middle name of an infamous tenured graduate student ] To make a bonehead move with consequences that could have been foreseen with even slight mental effort. E.g., He started removing files and promptly adgered the whole project. Compare dumbass attack.
@ -2738,6 +2742,10 @@ This file last generated Monday, 15 October 2018 06:35PM UTC
<p>
n. [common] A technique that works, though nobody really understands why. More obscure than voodoo programming , which may be done by cookbook. Compare also black art , deep magic , and magic number (sense 2).
</p>
<H4>blacklist</H4>
<p>
aka blocklist or denylist. A list of users or domains to be blocked. This can be to avoid spam or harassment. Also see whitelist.
</p>
<H4>blameware</H4>
<p>
In corporate environments this is typically closed source software procured for the purpose of having some external entity to blame when things inevitably go wrong. Software as a strategy for deflecting blame within the organizational structure. The efficiency or usefulness of the software doesn't matter so long as it can be used to absorb blame. "Get the blame out of the building".
@ -10001,7 +10009,7 @@ This file last generated Monday, 15 October 2018 06:35PM UTC
</p>
<H4>whitelist</H4>
<p>
n. The opposite of a blacklist. That is, instead of being an explicit list of people who are banned, it's an explicit list of people who are to be admitted. Hackers use this especially of lists of email addresses that are explicitly enabled to get past strict anti-spam filters.
n. The opposite of a blacklist. aka "allow list" That is, instead of being an explicit list of people or domains who are banned, it's an explicit list of people who are to be admitted. Hackers use this especially of lists of email addresses that are explicitly enabled to get past strict anti-spam filters.
</p>
<H4>whizzy</H4>
<p>