This commit is contained in:
Bob Mottram 2014-08-14 20:36:07 +01:00
commit c1b340fbf1
116 changed files with 188 additions and 257 deletions

View File

@ -5,10 +5,9 @@ those who believe that the marginality of their preferred machine is the
result of some kind of industry-wide conspiracy (for without a conspiracy of result of some kind of industry-wide conspiracy (for without a conspiracy of
some kind, the eminent superiority of their beloved shining jewel of a some kind, the eminent superiority of their beloved shining jewel of a
platform would obviously win over all, market pressures be damned!) Those platform would obviously win over all, market pressures be damned!) Those
afflicted are prone to engaging in flame war s and calling for boycotts and afflicted are prone to engaging in flame wars and calling for boycotts and
mailbombings. Amiga Persecution Complex is by no means limited to Amiga mailbombings. Amiga Persecution Complex is by no means limited to Amiga
users; NeXT, NeWS , OS/2 , Macintosh, LISP , and GNU users are also common users; NeXT, NeWS , OS/2 , Macintosh, LISP , and GNU users are also common
victims. Linux users used to display symptoms very frequently before Linux victims. Linux users used to display symptoms very frequently before Linux
started winning; some still do. See also newbie , troll , holy wars , weenie started winning; some still do. See also newbie , troll , holy wars , weenie
, Get a life!. , Get a life!.

View File

@ -14,9 +14,8 @@ which intended to outlaw discussion of abortion on the Internet. To say that
this direct attack on First Amendment free-speech rights was not well this direct attack on First Amendment free-speech rights was not well
received on the Internet would be putting it mildly. A firestorm of protest received on the Internet would be putting it mildly. A firestorm of protest
followed, including a February 29th 1996 mass demonstration by thousands of followed, including a February 29th 1996 mass demonstration by thousands of
netters who turned their home page s black for 48 hours. Several netters who turned their home pages black for 48 hours. Several
civil-rights groups and computing/telecommunications companies mounted a civil-rights groups and computing/telecommunications companies mounted a
constitutional challenge. The CDA was demolished by a strongly-worded constitutional challenge. The CDA was demolished by a strongly-worded
decision handed down in 8th-circuit Federal court and subsequently affirmed decision handed down in 8th-circuit Federal court and subsequently affirmed
by the U.S. Supreme Court on 26 June 1997 ( White Thursday ). See also Exon. by the U.S. Supreme Court on 26 June 1997 ( White Thursday ). See also Exon.

View File

@ -1,13 +1,12 @@
COBOL COBOL
/kohbol/ , n. [COmmon Business-Oriented Language] (Synonymous with evil. ) A /kohbol/ , n. [COmmon Business-Oriented Language] (Synonymous with evil. ) A
weak, verbose, and flabby language used by code grinder s to do boring weak, verbose, and flabby language used by code grinders to do boring
mindless things on dinosaur mainframes. Hackers believe that all COBOL mindless things on dinosaur mainframes. Hackers believe that all COBOL
programmers are suit s or code grinder s, and no self-respecting hacker will programmers are suits or code grinder s, and no self-respecting hacker will
ever admit to having learned the language. Its very name is seldom uttered ever admit to having learned the language. Its very name is seldom uttered
without ritual expressions of disgust or horror. One popular one is Edsger without ritual expressions of disgust or horror. One popular one is Edsger
W. Dijkstra's famous observation that The use of COBOL cripples the mind; W. Dijkstra's famous observation that The use of COBOL cripples the mind;
its teaching should, therefore, be regarded as a criminal offense. (from its teaching should, therefore, be regarded as a criminal offense. (from
Selected Writings on Computing: A Personal Perspective ) See also fear and Selected Writings on Computing: A Personal Perspective ) See also fear and
loathing , software rot. loathing , software rot.

View File

@ -22,7 +22,7 @@ known pesticide, dichloro-diphenyl-trichloroethane C 14 H 9 Cl 5 should be
minimal since each attacks a different, and apparently mutually exclusive, minimal since each attacks a different, and apparently mutually exclusive,
class of bugs. (The tape referred to was, incidentally, not magnetic but class of bugs. (The tape referred to was, incidentally, not magnetic but
paper.) Sadly, this quotation was removed from later editions of the paper.) Sadly, this quotation was removed from later editions of the
handbook after the suit s took over and DEC became much more businesslike. handbook after the suits took over and DEC became much more businesslike.
The history above is known to many old-time hackers. But there's more: Peter The history above is known to many old-time hackers. But there's more: Peter
Samson, compiler of the original TMRC lexicon, reports that he named DDT Samson, compiler of the original TMRC lexicon, reports that he named DDT
after a similar tool on the TX-0 computer, the direct ancestor of the PDP-1 after a similar tool on the TX-0 computer, the direct ancestor of the PDP-1
@ -30,4 +30,3 @@ built at MIT's Lincoln Lab in 1957. The debugger on that ground-breaking
machine (the first transistorized computer) rejoiced in the name FLIT machine (the first transistorized computer) rejoiced in the name FLIT
(FLexowriter Interrogation Tape). Flit was for many years the trade-name of (FLexowriter Interrogation Tape). Flit was for many years the trade-name of
a popular insecticide. a popular insecticide.

View File

@ -3,8 +3,7 @@ DEADBEEF
/dedbeef/ , n. The hexadecimal word-fill pattern for freshly allocated /dedbeef/ , n. The hexadecimal word-fill pattern for freshly allocated
memory under a number of IBM environments, including the RS/6000. Some memory under a number of IBM environments, including the RS/6000. Some
modern debugging tools deliberately fill freed memory with this value as a modern debugging tools deliberately fill freed memory with this value as a
way of converting heisenbug s into Bohr bug s. As in Your program is way of converting heisenbugs into Bohr bug s. As in Your program is
DEADBEEF (meaning gone, aborted, flushed from memory); if you start from an DEADBEEF (meaning gone, aborted, flushed from memory); if you start from an
odd half-word boundary, of course, you have BEEFDEAD. See also the anecdote odd half-word boundary, of course, you have BEEFDEAD. See also the anecdote
under fool and dead beef attack. under fool and dead beef attack.

View File

@ -2,6 +2,5 @@ DED
/DED/ , n. Dark-Emitting Diode (that is, a burned-out LED). Compare SED , /DED/ , n. Dark-Emitting Diode (that is, a burned-out LED). Compare SED ,
LER , write-only memory. In the early 1970s both Signetics and Texas LER , write-only memory. In the early 1970s both Signetics and Texas
instruments released DED spec sheets as AFJ s (suggested uses included as a instruments released DED spec sheets as AFJs (suggested uses included as a
power-off indicator ). power-off indicator ).

View File

@ -1,6 +1,6 @@
Datamation Datamation
/day`t@maysh@n/ , n. A magazine that many hackers assume all suit s read. /day`t@maysh@n/ , n. A magazine that many hackers assume all suits read.
Used to question an unbelieved quote, as in Did you read that in Used to question an unbelieved quote, as in Did you read that in
Datamation?. It used to publish something hackishly funny every once in a Datamation?. It used to publish something hackishly funny every once in a
while, like the original paper on COME FROM in 1973, and Ed Post's Real while, like the original paper on COME FROM in 1973, and Ed Post's Real
@ -9,4 +9,3 @@ it was much more exclusively suit -oriented and boring. Following a change
of editorship in 1994, Datamation briefly tried for more the technical of editorship in 1994, Datamation briefly tried for more the technical
content and irreverent humor that marked its early days, but this did not content and irreverent humor that marked its early days, but this did not
last. last.

View File

@ -1,7 +1,6 @@
Doom, X of Doom, X of
A construction similar to Death, X of , but derived rather from the Cracks A construction similar to Death, X of , but derived rather from the Cracks
of Doom in J.R.R. Tolkien s Lord of the Rings trilogy. The connotations are of Doom in J.R.R. Tolkiens Lord of the Rings trilogy. The connotations are
slightly different; a Foo of Death is mainly being held up to ridicule, but slightly different; a Foo of Death is mainly being held up to ridicule, but
one would have to take a Foo of Doom a bit more seriously. one would have to take a Foo of Doom a bit more seriously.

View File

@ -20,6 +20,5 @@ Indeed, some hackers find EMACS too heavyweight and baroque for their taste,
and expand the name as Escape Meta Alt Control Shift to spoof its heavy and expand the name as Escape Meta Alt Control Shift to spoof its heavy
reliance on keystrokes decorated with bucky bits. Other spoof expansions reliance on keystrokes decorated with bucky bits. Other spoof expansions
include Eight Megabytes And Constantly Swapping (from when that was a lot of include Eight Megabytes And Constantly Swapping (from when that was a lot of
core ), Eventually malloc () s All Computer Storage , and EMACS Makes A core ), Eventually malloc()s All Computer Storage , and EMACS Makes A
Computer Slow (see recursive acronym ). See also vi. Computer Slow (see recursive acronym ). See also vi.

View File

@ -3,6 +3,5 @@ Exploder
n. Used within Microsoft to refer to the Windows Explorer, the web-interface n. Used within Microsoft to refer to the Windows Explorer, the web-interface
component of Windows 95 and WinNT 4. Our spies report that most of the heavy component of Windows 95 and WinNT 4. Our spies report that most of the heavy
guns at MS came from a Unix background and use command line utilities; even guns at MS came from a Unix background and use command line utilities; even
they are scornful of the over-gingerbreaded WIMP environment s that they they are scornful of the over-gingerbreaded WIMP environments that they
have been called upon to create. have been called upon to create.

View File

@ -2,11 +2,10 @@ FOD
/fod/ , v. [Abbreviation for Finger of Death , originally a spell-name from /fod/ , v. [Abbreviation for Finger of Death , originally a spell-name from
fantasy gaming] To terminate with extreme prejudice and with no regard for fantasy gaming] To terminate with extreme prejudice and with no regard for
other people. From MUD s where the wizard command FOD player results in the other people. From MUDs where the wizard command FOD player results in the
immediate and total death of player , usually as punishment for obnoxious immediate and total death of player , usually as punishment for obnoxious
behavior. This usage migrated to other circumstances, such as I'm going to behavior. This usage migrated to other circumstances, such as I'm going to
fod the process that is burning all the cycles. In aviation, FOD means fod the process that is burning all the cycles. In aviation, FOD means
Foreign Object Damage, e.g., what happens when a jet engine sucks up a rock Foreign Object Damage, e.g., what happens when a jet engine sucks up a rock
on the runway or a bird in flight. Finger of Death is a distressingly apt on the runway or a bird in flight. Finger of Death is a distressingly apt
description of what this generally does to the engine. description of what this generally does to the engine.

View File

@ -1,7 +1,6 @@
GIGO GIGO
/gi:goh/ 1. Garbage In, Garbage Out usually said in response to luser s who /gi:goh/ 1. Garbage In, Garbage Out usually said in response to lusers who
complain that a program didn't do the right thing when given imperfect input complain that a program didn't do the right thing when given imperfect input
or otherwise mistreated in some way. Also commonly used to describe failures or otherwise mistreated in some way. Also commonly used to describe failures
in human decision making due to faulty, incomplete, or imprecise data. 2. in human decision making due to faulty, incomplete, or imprecise data. 2.

View File

@ -1,6 +1,6 @@
GNU GNU
/gnoo/ , not , /noo/ 1. [acronym: GNU s Not Unix!', see recursive acronym ] /gnoo/ , not , /noo/ 1. [acronym: GNUs Not Unix!', see recursive acronym ]
A Unix-workalike development effort of the Free Software Foundation headed A Unix-workalike development effort of the Free Software Foundation headed
by Richard Stallman. GNU EMACS and the GNU C compiler, two tools designed by Richard Stallman. GNU EMACS and the GNU C compiler, two tools designed
for this project, have become very popular in hackerdom and elsewhere. The for this project, have become very popular in hackerdom and elsewhere. The
@ -15,4 +15,3 @@ Foundation's imprimatur. The GNU project has a web page at
http://www.gnu.org/. See EMACS , copyleft , General Public Virus , Linux. 2. http://www.gnu.org/. See EMACS , copyleft , General Public Virus , Linux. 2.
Noted Unix hacker John Gilmore gnu@toad.com }, founder of Usenet's anarchic Noted Unix hacker John Gilmore gnu@toad.com }, founder of Usenet's anarchic
alt.* hierarchy. alt.* hierarchy.

View File

@ -1,7 +1,7 @@
General Public Virus General Public Virus
n. Pejorative name for some versions of the GNU project copyleft or General n. Pejorative name for some versions of the GNU project copyleft or General
Public License (GPL), which requires that any tools or app s incorporating Public License (GPL), which requires that any tools or apps incorporating
copylefted code must be source-distributed on the same anti-proprietary copylefted code must be source-distributed on the same anti-proprietary
terms as GNU stuff. Thus it is alleged that the copyleft infects software terms as GNU stuff. Thus it is alleged that the copyleft infects software
generated with GNU tools, which may in turn infect other software that generated with GNU tools, which may in turn infect other software that
@ -13,4 +13,3 @@ Nevertheless, widespread suspicion that the copyleft language is
boobytrapped has caused many developers to avoid using GNU tools and the boobytrapped has caused many developers to avoid using GNU tools and the
GPL. Changes in the language of the version 2.0 GPL did not eliminate this GPL. Changes in the language of the version 2.0 GPL did not eliminate this
problem. problem.

View File

@ -17,7 +17,7 @@ communication between humans and linked up in steadily increasing numbers,
connecting together a quirky mix of academics, techies, hippies, SF fans, connecting together a quirky mix of academics, techies, hippies, SF fans,
hackers, and anarchists. The roots of this lexicon lie in those early years. hackers, and anarchists. The roots of this lexicon lie in those early years.
Over the next quarter-century the Internet evolved in many ways. The typical Over the next quarter-century the Internet evolved in many ways. The typical
machine/OS combination moved from DEC PDP-10 s and PDP-20 s, running TOPS-10 machine/OS combination moved from DEC PDP-10s and PDP-20 s, running TOPS-10
and TOPS-20 , to PDP-11s and VAX en and Suns running Unix , and in the 1990s and TOPS-20 , to PDP-11s and VAX en and Suns running Unix , and in the 1990s
to Unix on Intel microcomputers. The Internet's protocols grew more capable, to Unix on Intel microcomputers. The Internet's protocols grew more capable,
most notably in the move from NCP/IP to TCP/IP in 1982 and the most notably in the move from NCP/IP to TCP/IP in 1982 and the
@ -43,4 +43,3 @@ networking after 1980. By 1996 it had become a commonplace even in
mainstream media to predict that a globally-extended Internet would become mainstream media to predict that a globally-extended Internet would become
the key unifying communications technology of the next century. See also the the key unifying communications technology of the next century. See also the
network. network.

View File

@ -1,9 +1,8 @@
Iron Age Iron Age
n. In the history of computing, 1961-1971 the formative era of commercial n. In the history of computing, 1961-1971 the formative era of commercial
mainframe technology, when ferrite-core dinosaur s ruled the earth. The Iron mainframe technology, when ferrite-core dinosaurs ruled the earth. The Iron
Age began, ironically enough, with the delivery of the first minicomputer Age began, ironically enough, with the delivery of the first minicomputer
(the PDP-1) and ended with the introduction of the first commercial (the PDP-1) and ended with the introduction of the first commercial
microprocessor (the Intel 4004) in 1971. See also Stone Age ; compare elder microprocessor (the Intel 4004) in 1971. See also Stone Age ; compare elder
days. days.

View File

@ -10,6 +10,5 @@ knobkerries, automatic weapons, flamethrowers, and tactical nukes all have
their partisans. Compare clue-by-four. 2. v. To use a LART. Some would add their partisans. Compare clue-by-four. 2. v. To use a LART. Some would add
in malice , but some sysadmins do prefer to gently lart their users as a in malice , but some sysadmins do prefer to gently lart their users as a
first (and sometimes final) warning. 3. interj. Calling for one's LART, much first (and sometimes final) warning. 3. interj. Calling for one's LART, much
as a surgeon might call Scalpel!. 4. interj. [rare] Used in flame s as a as a surgeon might call Scalpel!. 4. interj. [rare] Used in flames as a
rebuke. rebuke.

View File

@ -6,11 +6,10 @@ rendered by hackers as Meaningless Indication of Processor Speed or in other
unflattering ways, such as Meaningless Information Provided by Salesmen. unflattering ways, such as Meaningless Information Provided by Salesmen.
This joke expresses an attitude nearly universal among hackers about the This joke expresses an attitude nearly universal among hackers about the
value of most benchmark claims, said attitude being one of the great value of most benchmark claims, said attitude being one of the great
cultural divides between hackers and marketroid s (see also BogoMIPS ). The cultural divides between hackers and marketroids (see also BogoMIPS ). The
singular is sometimes 1 MIP even though this is clearly etymologically singular is sometimes 1 MIP even though this is clearly etymologically
wrong. See also KIPS and GIPS. 2. Computers, especially large computers, wrong. See also KIPS and GIPS. 2. Computers, especially large computers,
considered abstractly as sources of computron s. This is just a workstation; considered abstractly as sources of computron s. This is just a workstation;
the heavy MIPS are hidden in the basement. 3. The corporate name of a the heavy MIPS are hidden in the basement. 3. The corporate name of a
particular RISC-chip company, later acquired by SGI. 4. Acronym for particular RISC-chip company, later acquired by SGI. 4. Acronym for
Meaningless Information per Second (a joke, prob.: from sense 1). Meaningless Information per Second (a joke, prob.: from sense 1).

View File

@ -5,7 +5,7 @@ micros; proof that IBM/Microsoft couldn't get it right the second time,
either. Often called Half-an-OS. Mentioning it is usually good for a cheap either. Often called Half-an-OS. Mentioning it is usually good for a cheap
laugh among hackers the design was so baroque , and the implementation of laugh among hackers the design was so baroque , and the implementation of
1.x so bad, that three years after introduction you could still count the 1.x so bad, that three years after introduction you could still count the
major app s shipping for it on the fingers of two hands in unary. The 2.x major apps shipping for it on the fingers of two hands in unary. The 2.x
versions were said to have improved somewhat, and informed hackers rated versions were said to have improved somewhat, and informed hackers rated
them superior to Microsoft Windows (an endorsement which, however, could them superior to Microsoft Windows (an endorsement which, however, could
easily be construed as damning with faint praise). In the mid-1990s IBM put easily be construed as damning with faint praise). In the mid-1990s IBM put
@ -13,4 +13,3 @@ OS/2 on life support, refraining from killing it outright purely for
internal political reasons; by 1999 the success of Linux had effectively internal political reasons; by 1999 the success of Linux had effectively
ended any possibility of a renaissance. See monstrosity , cretinous , ended any possibility of a renaissance. See monstrosity , cretinous ,
second-system effect. second-system effect.

View File

@ -2,10 +2,9 @@ PDP-11
Possibly the single most successful minicomputer design in history, a Possibly the single most successful minicomputer design in history, a
favorite of hackers for many years, and the first major Unix machine, The favorite of hackers for many years, and the first major Unix machine, The
first s (the 11/15 and 11/20) shipped in 1970 from DEC ; the last (11/93 and firsts (the 11/15 and 11/20) shipped in 1970 from DEC ; the last (11/93 and
11/94) in 1990. Along the way, the 11 gave birth to the VAX , strongly 11/94) in 1990. Along the way, the 11 gave birth to the VAX , strongly
influenced the design of microprocessors such as the Motorola 6800 and Intel influenced the design of microprocessors such as the Motorola 6800 and Intel
386, and left a permanent imprint on the C language (which has an odd 386, and left a permanent imprint on the C language (which has an odd
preference for octal embedded in its syntax because of the way machine preference for octal embedded in its syntax because of the way machine
instructions were formatted). There is a history site. instructions were formatted). There is a history site.

View File

@ -1,10 +1,9 @@
RTFM RTFM
/RTFM/ , imp. [Unix] Abbreviation for Read The Fucking Manual. 1. Used by /RTFM/ , imp. [Unix] Abbreviation for Read The Fucking Manual. 1. Used by
guru s to brush off questions they consider trivial or annoying. Compare gurus to brush off questions they consider trivial or annoying. Compare
Don't do that then!. 2. Used when reporting a problem to indicate that you Don't do that then!. 2. Used when reporting a problem to indicate that you
aren't just asking out of randomness. No, I can't figure out how to aren't just asking out of randomness. No, I can't figure out how to
interface Unix to my toaster, and yes, I have RTFM. Unlike sense 1, this use interface Unix to my toaster, and yes, I have RTFM. Unlike sense 1, this use
is considered polite. See also FM , RTFAQ , RTFB , RTFS , STFW , RTM , all is considered polite. See also FM , RTFAQ , RTFB , RTFS , STFW , RTM , all
of which mutated from RTFM, and compare UTSL. of which mutated from RTFM, and compare UTSL.

View File

@ -1,31 +1,33 @@
SNAFU principle SNAFU principle
/snafoo prinsipl/ , n. [from a WWII Army acronym for Situation Normal, All /snafoo prinsipl/ , n. [from a WWII Army acronym for Situation Normal,
Fucked Up ] True communication is possible only between equals, because All Fucked Up ] True communication is possible only between equals,
inferiors are more consistently rewarded for telling their superiors because inferiors are more consistently rewarded for telling their
pleasant lies than for telling the truth.: a central tenet of Discordianism superiors pleasant lies than for telling the truth.: a central tenet
, often invoked by hackers to explain why authoritarian hierarchies screw up of Discordianism, often invoked by hackers to explain why
so reliably and systematically. The effect of the SNAFU principle is a authoritarian hierarchies screw up so reliably and systematically. The
progressive disconnection of decision-makers from reality. This lightly effect of the SNAFU principle is a progressive disconnection of
adapted version of a fable dating back to the early 1960s illustrates the decision-makers from reality. This lightly adapted version of a fable
phenomenon perfectly: Inthebeginningwastheplan, andthenthespecification; dating back to the early 1960s illustrates the phenomenon perfectly:
Andtheplanwaswithoutform, andthespecificationwasvoid. Anddarkness
wasonthefacesoftheimplementorsthereof; Andtheyspakeuntotheirleader, saying:
Itisacrockofshit, andsmellsasofasewer. Andtheleadertookpityonthem,
andspoketotheprojectleader: Itisacrockofexcrement,
andnonemayabidetheodorthereof. Andtheprojectleader
spakeuntohissectionhead,saying: Itisacontainerofexcrement,
anditisverystrong,suchthatnonemayabideit.
Thesectionheadthenhurriedtohisdepartmentmanager, andinformedhimthus:
Itisavesseloffertilizer, andnonemayabideitsstrength.
Thedepartmentmanagercarriedthesewords tohisgeneralmanager, andspokeuntohim
saying: Itcontaineththatwhichaideththegrowthofplants, anditisverystrong.
Andsoitwasthatthegeneralmanagerrejoiced
anddeliveredthegoodnewsuntotheVicePresident. Itpromotethgrowth,
anditisverypowerful. TheVicePresidentrushedtothePresident'sside,
andjoyouslyexclaimed: Thispowerfulnewsoftwareproduct
willpromotethegrowthofthecompany! AndthePresidentlookedupontheproduct,
andsawthatitwasverygood. After the subsequent and inevitable disaster, the
suit s protect themselves by saying I was misinformed! , and the
implementors are demoted or fired. Compare Conway's Law.
In the beginning was the plan, and then the specification; And the
plan was without form, and the specification was void. And darkness
was on the faces of the implementors thereof; And they spake unto
their leader, saying verily: It is a crock of shit, and smells as of a
sewer. And the leader took pity on them, and spoke to the project
leader: It is a crock of excrement, and none may abide the odor
thereof. And the project leader spake unto his section head, saying:
It is a container of excrement, and it is very strong, such that none
may abide it. The section head then hurried to his department manager,
and informed him thus: It is a vessel of fertilizer, and none may
abide its strength. The department manager carried these words to his
general manager, and spoke unto him saying: It containeth that which
aideth the growth of plants, and it is very strong. And so it was that
the general manager rejoiced and delivered the good news unto the Vice
President. It promoteth growth, and it is very powerful. The Vice
President rushed to the President's side, and joyously exclaimed: This
powerful new software product will promote the growth of the company!
And the President looked upon the product, and saw that it was very
good. After the subsequent and inevitable disaster, the suits protect
themselves by saying I was misinformed!, and the implementors are
demoted or fired. Compare Conway's Law.

View File

@ -1,10 +1,9 @@
Stupids Stupids
n. Term used by samurai for the suit s who employ them; succinctly expresses n. Term used by samurai for the suits who employ them; succinctly expresses
an attitude at least as common, though usually better disguised, among other an attitude at least as common, though usually better disguised, among other
subcultures of hackers. There may be intended reference here to an SF story subcultures of hackers. There may be intended reference here to an SF story
originally published in 1952 but much anthologized since, Mark Clifton's originally published in 1952 but much anthologized since, Mark Clifton's
Star, Bright. In it, a super-genius child classifies humans into a very few Star, Bright. In it, a super-genius child classifies humans into a very few
Brights like herself, a huge majority of Stupids , and a minority of Tweens Brights like herself, a huge majority of Stupids , and a minority of Tweens
, the merely ordinary geniuses. , the merely ordinary geniuses.

View File

@ -5,7 +5,7 @@ Kenobi's Use the Force, Luke! in Star Wars ) analogous to RTFS (sense 1),
but more polite. This is a common way of suggesting that someone would be but more polite. This is a common way of suggesting that someone would be
better off reading the source code that supports whatever feature is causing better off reading the source code that supports whatever feature is causing
confusion, rather than making yet another futile pass through the manuals, confusion, rather than making yet another futile pass through the manuals,
or broadcasting questions on Usenet that haven't attracted wizard s to or broadcasting questions on Usenet that haven't attracted wizards to
answer them. Once upon a time in elder days , everyone running Unix had answer them. Once upon a time in elder days , everyone running Unix had
source. After 1978, AT T's policy tightened up, so this objurgation was in source. After 1978, AT T's policy tightened up, so this objurgation was in
theory appropriately directed only at associates of some outfit with a Unix theory appropriately directed only at associates of some outfit with a Unix
@ -16,4 +16,3 @@ become widely enough distributed that anyone can read source legally. The
most widely distributed is certainly Linux, with variants of the NET/2 and most widely distributed is certainly Linux, with variants of the NET/2 and
4.4BSD distributions running second. Cheap commercial Unixes with source 4.4BSD distributions running second. Cheap commercial Unixes with source
such as BSD/OS are accelerating this trend. such as BSD/OS are accelerating this trend.

View File

@ -7,7 +7,7 @@ implemented in 1979--1980 by Steve Bellovin, Jim Ellis, Tom Truscott, and
Steve Daniel at Duke University and the University of North Carolina, it has Steve Daniel at Duke University and the University of North Carolina, it has
swiftly grown to become international in scope and is now probably the swiftly grown to become international in scope and is now probably the
largest decentralized information utility in existence. As of late 2002, it largest decentralized information utility in existence. As of late 2002, it
hosts over 100,000 newsgroup s and an unguessably huge volume of new hosts over 100,000 newsgroups and an unguessably huge volume of new
technical articles, news, discussion, chatter, and flamage every day (and technical articles, news, discussion, chatter, and flamage every day (and
that leaves out the graphics...). By the year the Internet hit the that leaves out the graphics...). By the year the Internet hit the
mainstream (1994) the original UUCP transport for Usenet was fading out of mainstream (1994) the original UUCP transport for Usenet was fading out of
@ -15,4 +15,3 @@ use almost all Usenet connections were over Internet links. A lot of newbies
and journalists began to refer to Internet newsgroups as though Usenet was and journalists began to refer to Internet newsgroups as though Usenet was
and always had been just another Internet service. This ignorance greatly and always had been just another Internet service. This ignorance greatly
annoys experienced Usenetters. annoys experienced Usenetters.

View File

@ -3,7 +3,7 @@ VAX
/vaks/ , n. 1. [from Virtual Address eXtension] The most successful /vaks/ , n. 1. [from Virtual Address eXtension] The most successful
minicomputer design in industry history, possibly excepting its immediate minicomputer design in industry history, possibly excepting its immediate
ancestor, the PDP-11. Between its release in 1978 and its eclipse by killer ancestor, the PDP-11. Between its release in 1978 and its eclipse by killer
micro s after about 1986, the VAX was probably the hacker's favorite machine micros after about 1986, the VAX was probably the hacker's favorite machine
of them all, esp. after the 1982 release of 4.2 BSD Unix (see BSD ). of them all, esp. after the 1982 release of 4.2 BSD Unix (see BSD ).
Especially noted for its large, assembler-programmer-friendly instruction Especially noted for its large, assembler-programmer-friendly instruction
set an asset that became a liability after the RISC revolution. It is worth set an asset that became a liability after the RISC revolution. It is worth
@ -25,4 +25,3 @@ the slogan a sufficiently good idea to copy it. Several British hackers
report that VAX's promotions used it in 1986--1987, and we have one report report that VAX's promotions used it in 1986--1987, and we have one report
from a New Zealander that the infamous slogan surfaced there in TV ads for from a New Zealander that the infamous slogan surfaced there in TV ads for
the product in 1992. the product in 1992.

View File

@ -3,7 +3,6 @@ Wizard Book
n. Structure and Interpretation of Computer Programs (Hal Abelson, Jerry n. Structure and Interpretation of Computer Programs (Hal Abelson, Jerry
Sussman and Julie Sussman; MIT Press, 1984, 1996; ISBN 0-262-01153-0), an Sussman and Julie Sussman; MIT Press, 1984, 1996; ISBN 0-262-01153-0), an
excellent computer science text used in introductory courses at MIT. So excellent computer science text used in introductory courses at MIT. So
called because of the wizard on the jacket. One of the bible s of the called because of the wizard on the jacket. One of the bibles of the
LISP/Scheme world. Also, less commonly, known as the Purple Book. Now LISP/Scheme world. Also, less commonly, known as the Purple Book. Now
available on the http://mitpress.mit. available on the http://mitpress.mit.

View File

@ -9,8 +9,7 @@ machines anticipated the powerful personal computers of the 1980s by a
decade. Sadly, the prophets at PARC were without honor in their own company, decade. Sadly, the prophets at PARC were without honor in their own company,
so much so that it became a standard joke to describe PARC as a place that so much so that it became a standard joke to describe PARC as a place that
specialized in developing brilliant ideas for everyone else. The stunning specialized in developing brilliant ideas for everyone else. The stunning
shortsightedness and obtusity of XEROX's top-level suit s has been well shortsightedness and obtusity of XEROX's top-level suits has been well
anatomized in Fumbling The Future: How XEROX Invented, Then Ignored, the anatomized in Fumbling The Future: How XEROX Invented, Then Ignored, the
First Personal Computer by Douglas K. Smith and Robert C. Alexander (William First Personal Computer by Douglas K. Smith and Robert C. Alexander (William
Morrow Co., 1988, ISBN 0-688-09511-9). Morrow Co., 1988, ISBN 0-688-09511-9).

View File

@ -9,10 +9,10 @@ Kingdom (England, Wales, Scotland, Northern Ireland) Usenet See the Usenet
entry WPI Worcester Polytechnic Institute, site of a very active community entry WPI Worcester Polytechnic Institute, site of a very active community
of PDP-10 hackers during the 1970s WWW The World-Wide-Web. XEROX PARC of PDP-10 hackers during the 1970s WWW The World-Wide-Web. XEROX PARC
XEROX's Palo Alto Research Center, site of much pioneering research in user XEROX's Palo Alto Research Center, site of much pioneering research in user
interface design and networking Yale Yale University Other etymology s such interface design and networking Yale Yale University Other etymologys such
as Unix and PDP-10 refer to technical cultures surrounding specific as Unix and PDP-10 refer to technical cultures surrounding specific
operating systems, processors, or other environments. The fact that a term operating systems, processors, or other environments. The fact that a term
is labelled with any one of these s does not necessarily mean its use is is labelled with any one of theses does not necessarily mean its use is
confined to that culture. In particular, many terms labelled MIT and confined to that culture. In particular, many terms labelled MIT and
Stanford are in quite general use. We have tried to give some indication of Stanford are in quite general use. We have tried to give some indication of
the distribution of speakers in the usage notes; however, a number of the distribution of speakers in the usage notes; however, a number of
@ -22,4 +22,3 @@ entries are marked [proposed]. These are usually generalizations suggested
by editors or Usenet respondents in the process of commenting on previous by editors or Usenet respondents in the process of commenting on previous
definitions of those entries. These are not represented as established definitions of those entries. These are not represented as established
jargon. Prev Up Next Chapter10.Pronunciation Guide Home Chapter12. jargon. Prev Up Next Chapter10.Pronunciation Guide Home Chapter12.

13
entries/app store.txt Normal file
View File

@ -0,0 +1,13 @@
App Store
n. An App Store, sometimes also known as a Software Center or Software
Manager, is a graphical user interface which allows the user to
conveniently download and install new applications onto their computer
or mobile device. App Stores can be very convenient but are often
proprietary and may enable a particular company to control and censor
what types of application non-technical users may run on their systems
- typically in accordance with an American west coast morality. App
stores have sometimes been described as a type of MITM attack on
software distribution, allowing companies to insert themselves as
rent-seeking trolls on a virtual toll bridge between the users and
producers of software.

View File

@ -1,6 +1,5 @@
barfmail barfmail
n. Multiple bounce message s accumulating to the level of serious annoyance, n. Multiple bounce messages accumulating to the level of serious annoyance,
or worse. The sort of thing that happens when an inter-network mail gateway or worse. The sort of thing that happens when an inter-network mail gateway
goes down or wonky. goes down or wonky.

View File

@ -1,8 +1,7 @@
bixie bixie
/biksee/ , n. Variant emoticon s used BIX (the BIX Information eXchange); /biksee/ , n. Variant emoticons used BIX (the BIX Information eXchange);
the term survived the demise of BIX itself. The most common ( smiley ) bixie the term survived the demise of BIX itself. The most common ( smiley ) bixie
is @_@ , representing two cartoon eyes and a mouth. These were originally is @_@ , representing two cartoon eyes and a mouth. These were originally
invented in an SF fanzine called APA-L and imported to BIX by one of the invented in an SF fanzine called APA-L and imported to BIX by one of the
earliest users. earliest users.

View File

@ -1,9 +1,8 @@
blue goo blue goo
n. Term for police nanobot s intended to prevent gray goo , denature n. Term for police nanobots intended to prevent gray goo , denature
hazardous waste, destroy pollution, put ozone back into the stratosphere, hazardous waste, destroy pollution, put ozone back into the stratosphere,
prevent halitosis, and promote truth, justice, and the American way, etc. prevent halitosis, and promote truth, justice, and the American way, etc.
The term Blue Goo can be found in Dr. Seuss's Fox In Socks to refer to a The term Blue Goo can be found in Dr. Seuss's Fox In Socks to refer to a
substance much like bubblegum. Would you like to chew blue goo, sir?. See substance much like bubblegum. Would you like to chew blue goo, sir?. See
nanotechnology. nanotechnology.

View File

@ -3,9 +3,8 @@ bomb
1. v. General synonym for crash (sense 1) except that it is not used as a 1. v. General synonym for crash (sense 1) except that it is not used as a
noun; esp. used of software or OS failures. Don't run Empire with less than noun; esp. used of software or OS failures. Don't run Empire with less than
32K stack, it'll. 2. n.,v. Atari ST and Macintosh equivalents of a Unix 32K stack, it'll. 2. n.,v. Atari ST and Macintosh equivalents of a Unix
panic or Amiga guru meditation , in which icons of little black-powder s or panic or Amiga guru meditation , in which icons of little black-powders or
mushroom clouds are displayed, indicating that the system has died. On the mushroom clouds are displayed, indicating that the system has died. On the
Mac, this may be accompanied by a decimal (or occasionally hexadecimal) Mac, this may be accompanied by a decimal (or occasionally hexadecimal)
number indicating what went wrong, similar to the Amiga guru meditation number indicating what went wrong, similar to the Amiga guru meditation
number. MS-DOS machines tend to get locked up in this situation. number. MS-DOS machines tend to get locked up in this situation.

View File

@ -3,7 +3,7 @@ bot
n [common on IRC, MUD and among gamers; from robot ] 1. An IRC or MUD user n [common on IRC, MUD and among gamers; from robot ] 1. An IRC or MUD user
who is actually a program. On IRC, typically the robot provides some useful who is actually a program. On IRC, typically the robot provides some useful
service. Examples are NickServ, which tries to prevent random users from service. Examples are NickServ, which tries to prevent random users from
adopting nick s already claimed by others, and MsgServ, which allows one to adopting nicks already claimed by others, and MsgServ, which allows one to
send asynchronous messages to be delivered when the recipient signs on. Also send asynchronous messages to be delivered when the recipient signs on. Also
common are annoybots , such as KissServ, which perform no useful function common are annoybots , such as KissServ, which perform no useful function
except to send cute messages to other people. Service bots are less common except to send cute messages to other people. Service bots are less common
@ -18,4 +18,3 @@ for a web spider. The file for controlling spider behavior on your site is
officially the Robots Exclusion File and its URL is http:// somehost officially the Robots Exclusion File and its URL is http:// somehost
/robots.txt ) Note that bots in all senses were robots when the terms first /robots.txt ) Note that bots in all senses were robots when the terms first
appeared in the early 1990s, but the shortened form is now habitual. appeared in the early 1990s, but the shortened form is now habitual.

View File

@ -1,7 +1,7 @@
buffer overflow buffer overflow
n. What happens when you try to stuff more data into a buffer (holding area) n. What happens when you try to stuff more data into a buffer (holding area)
than it can handle. This problem is commonly exploited by cracker s to get than it can handle. This problem is commonly exploited by crackers to get
arbitrary commands executed by a program running with root permissions. This arbitrary commands executed by a program running with root permissions. This
may be due to a mismatch in the processing rates of the producing and may be due to a mismatch in the processing rates of the producing and
consuming processes (see overrun and firehose syndrome ), or because the consuming processes (see overrun and firehose syndrome ), or because the
@ -14,4 +14,3 @@ accepting data when the buffer is full up. The term is used of and by humans
in a metaphorical sense. What time did I agree to meet you? My buffer must in a metaphorical sense. What time did I agree to meet you? My buffer must
have overflowed. Or If I answer that phone my buffer is going to overflow. have overflowed. Or If I answer that phone my buffer is going to overflow.
See also spam , overrun screw. See also spam , overrun screw.

View File

@ -1,8 +1,7 @@
bug-compatible bug-compatible
adj. [common] Said of a design or revision that has been badly compromised adj. [common] Said of a design or revision that has been badly compromised
by a requirement to be compatible with fossil s or misfeature s in other by a requirement to be compatible with fossils or misfeatures in other
programs or (esp.) previous releases of itself. MS-DOS 2.0 used \ as a path programs or (esp.) previous releases of itself. MS-DOS 2.0 used \ as a path
separator to be bug-compatible with some cretin's choice of / as an option separator to be bug-compatible with some cretin's choice of / as an option
character in 1.0. character in 1.0.

View File

@ -4,7 +4,6 @@ n. [from book-of-the-month club , a time-honored mail-order-marketing
technique in the U.S.] A mythical club which users of sendmail (8) (the Unix technique in the U.S.] A mythical club which users of sendmail (8) (the Unix
mail daemon) belong to; this was coined on the Usenet newsgroup mail daemon) belong to; this was coined on the Usenet newsgroup
comp.security.unix at a time when sendmail security holes, which allowed comp.security.unix at a time when sendmail security holes, which allowed
outside cracker s access to the system, were being uncovered at an alarming outside crackers access to the system, were being uncovered at an alarming
rate, forcing sysadmins to update very often. Also, more completely, fatal rate, forcing sysadmins to update very often. Also, more completely, fatal
security bug-of-the-month club. See also kernel-of-the-week club. security bug-of-the-month club. See also kernel-of-the-week club.

View File

@ -5,11 +5,10 @@ translation by a compiler or assembler. Often used in opposition to data ,
which is the stuff that operates on. Among hackers this is a mass noun, as which is the stuff that operates on. Among hackers this is a mass noun, as
in How much does it take to do a bubble sort ? , or The is loaded at the in How much does it take to do a bubble sort ? , or The is loaded at the
high end of RAM. Among scientific programmers it is sometimes a count noun high end of RAM. Among scientific programmers it is sometimes a count noun
equilvalent to program ; thus they may speak of s in the plural. Anyone equilvalent to program ; thus they may speak of codes in the plural. Anyone
referring to software as the software s is probably a newbie or a suit. 2. referring to software as the softwares is probably a newbie or a suit. 2.
v. To write. In this sense, always refers to source rather than compiled. I v. To write. In this sense, always refers to source rather than compiled. I
d an Emacs clone in two hours! This verb is a bit of a cultural marker d an Emacs clone in two hours! This verb is a bit of a cultural marker
associated with the Unix and minicomputer traditions (and lately Linux); associated with the Unix and minicomputer traditions (and lately Linux);
people within that culture prefer v. to v. program whereas outside it the people within that culture prefer v. to v. program whereas outside it the
reverse is normally true. reverse is normally true.

View File

@ -6,6 +6,5 @@ from the design can be used with greater facility and fewer errors than an
equivalent tool that is not compact. Compactness does not imply triviality equivalent tool that is not compact. Compactness does not imply triviality
or lack of power; for example, C is compact and FORTRAN is not, but C is or lack of power; for example, C is compact and FORTRAN is not, but C is
more powerful than FORTRAN. Designs become non-compact through accreting more powerful than FORTRAN. Designs become non-compact through accreting
feature s and cruft that don't merge cleanly into the overall design scheme features and cruft that don't merge cleanly into the overall design scheme
(thus, some fans of Classic C maintain that ANSI C is no longer compact). (thus, some fans of Classic C maintain that ANSI C is no longer compact).

View File

@ -1,7 +1,6 @@
cookie file cookie file
n. A collection of fortune cookie s in a format that facilitates retrieval n. A collection of fortune cookies in a format that facilitates retrieval
by a fortune program. There are several different cookie files in public by a fortune program. There are several different cookie files in public
distribution, and site admins often assemble their own from various sources distribution, and site admins often assemble their own from various sources
including this lexicon. including this lexicon.

View File

@ -2,7 +2,7 @@ crash
1. n. A sudden, usually drastic failure. Most often said of the system 1. n. A sudden, usually drastic failure. Most often said of the system
(q.v., sense 1), esp. of magnetic disk drives (the term originally described (q.v., sense 1), esp. of magnetic disk drives (the term originally described
what happens when the air gap of a hard disk collapses). Three luser s lost what happens when the air gap of a hard disk collapses). Three lusers lost
their files in last night's disk . A disk that involves the read/write their files in last night's disk . A disk that involves the read/write
heads dropping onto the surface of the disks and scraping off the oxide may heads dropping onto the surface of the disks and scraping off the oxide may
also be referred to as a head , whereas the term system usually, though also be referred to as a head , whereas the term system usually, though
@ -12,4 +12,3 @@ See down. Also used transitively to indicate the cause of the (usually a
person or a program, or both). Those idiots playing SPACEWAR ed the system. person or a program, or both). Those idiots playing SPACEWAR ed the system.
3. vi. Sometimes said of people hitting the sack after a long hacking run ; 3. vi. Sometimes said of people hitting the sack after a long hacking run ;
see gronk out. see gronk out.

View File

@ -1,7 +1,7 @@
creeping featurism creeping featurism
/kreeping feechrizm/ , n. [common] 1. Describes a systematic tendency to /kreeping feechrizm/ , n. [common] 1. Describes a systematic tendency to
load more chrome and feature s onto systems at the expense of whatever load more chrome and features onto systems at the expense of whatever
elegance they may have possessed when originally designed. See also feeping elegance they may have possessed when originally designed. See also feeping
creaturism. You know, the main problem with BSD Unix has always been creaturism. You know, the main problem with BSD Unix has always been
creeping featurism. 2. More generally, the tendency for anything complicated creeping featurism. 2. More generally, the tendency for anything complicated
@ -18,4 +18,3 @@ describe computer programs, but it could also be said of the federal
government, the IRS 1040 form, and new cars. A similar phenomenon sometimes government, the IRS 1040 form, and new cars. A similar phenomenon sometimes
afflicts conscious redesigns; see second-system effect. See also creeping afflicts conscious redesigns; see second-system effect. See also creeping
elegance. elegance.

View File

@ -4,7 +4,7 @@ crufty
] 1. Poorly built, possibly over-complex. The canonical example is This is ] 1. Poorly built, possibly over-complex. The canonical example is This is
standard old crufty DEC software. In fact, one fanciful theory of the origin standard old crufty DEC software. In fact, one fanciful theory of the origin
of crufty holds that was originally a mutation of crusty applied to DEC of crufty holds that was originally a mutation of crusty applied to DEC
software so old that the s characters were tall and skinny, looking more software so old that thes characters were tall and skinny, looking more
like f characters. 2. Unpleasant, especially to the touch, often with like f characters. 2. Unpleasant, especially to the touch, often with
encrusted junk. Like spilled coffee smeared with peanut butter and catsup. encrusted junk. Like spilled coffee smeared with peanut butter and catsup.
3. Generally unpleasant. 4. (sometimes spelled cruftie ) n. A small crufty 3. Generally unpleasant. 4. (sometimes spelled cruftie ) n. A small crufty
@ -17,4 +17,3 @@ it's said to have been the physics department's radar lab during WWII. To
this day (early 1993) the windows appear to be full of random techno-junk. this day (early 1993) the windows appear to be full of random techno-junk.
MIT or Lincoln Labs people may well have coined the term as a knock on the MIT or Lincoln Labs people may well have coined the term as a knock on the
competition. competition.

View File

@ -5,14 +5,13 @@ hacker Bill Gosper described himself as a junkie ). One can describe an
instruction as taking so many clock s. Often the computer can access its instruction as taking so many clock s. Often the computer can access its
memory once on every clock , and so one speaks also of memory s. These are memory once on every clock , and so one speaks also of memory s. These are
technical meanings of . The jargon meaning comes from the observation that technical meanings of . The jargon meaning comes from the observation that
there are only so many s per second, and when you are sharing a computer the there are only so manys per second, and when you are sharing a computer the
s get divided up among the users. The more s the computer spends working on s get divided up among the users. The more cycles the computer spends working on
your program rather than someone else's, the faster your program will run. your program rather than someone else's, the faster your program will run.
That's why every hacker wants more s: so he can spend less time waiting for That's why every hacker wants more s: so he can spend less time waiting for
the computer to respond. 2. By extension, a notional unit of human thought the computer to respond. 2. By extension, a notional unit of human thought
power, emphasizing that lots of things compete for the typical hacker's power, emphasizing that lots of things compete for the typical hacker's
think time. I refused to get involved with the Rubik's Cube back when it was think time. I refused to get involved with the Rubik's Cube back when it was
big. Knew I'd burn too many s on it if I let myself. 3. vt. Syn. bounce big. Knew I'd burn too many cycles on it if I let myself. 3. vt. Syn. bounce
(sense 4), from the phrase power. Cycle the machine again, that serial (sense 4), from the phrase power. Cycle the machine again, that serial
port's still hung. port's still hung.

View File

@ -3,8 +3,7 @@ demo mode
n. 1. [Sun] The state of being heads down in order to finish code in time n. 1. [Sun] The state of being heads down in order to finish code in time
for a demo , usually due yesterday. 2. A mode in which video games sit by for a demo , usually due yesterday. 2. A mode in which video games sit by
themselves running through a portion of the game, also known as attract themselves running through a portion of the game, also known as attract
mode. Some serious app s have a demo mode they use as a screen saver, or may mode. Some serious apps have a demo mode they use as a screen saver, or may
go through a demo mode on startup (for example, the Microsoft Windows go through a demo mode on startup (for example, the Microsoft Windows
opening screen which lets you impress your neighbors without actually having opening screen which lets you impress your neighbors without actually having
to put up with Microsloth Windows ). to put up with Microsloth Windows ).

View File

@ -10,9 +10,8 @@ demonstration purposes as long as the operator uses exactly the right
commands and skirts its numerous bugs, deficiencies, and unimplemented commands and skirts its numerous bugs, deficiencies, and unimplemented
portions, or to a special version of a program (frequently with some portions, or to a special version of a program (frequently with some
features crippled) which is distributed at little or no cost to the user for features crippled) which is distributed at little or no cost to the user for
enticement purposes. 4. [ demoscene ] A sequence of demoeffect s (usually) enticement purposes. 4. [ demoscene ] A sequence of demoeffects (usually)
combined with self-composed music and hand-drawn ( pixelated ) graphics. combined with self-composed music and hand-drawn ( pixelated ) graphics.
These days (1997) usually built to attend a compo. Often called eurodemos These days (1997) usually built to attend a compo. Often called eurodemos
outside Europe, as most of the demoscene activity seems to have gathered in outside Europe, as most of the demoscene activity seems to have gathered in
northern Europe and especially Scandinavia. See also intro , dentro. northern Europe and especially Scandinavia. See also intro , dentro.

View File

@ -4,15 +4,15 @@ demoscene
primarily in Scandinavia and northern Europe. Demoscene folklore recounts primarily in Scandinavia and northern Europe. Demoscene folklore recounts
that when old-time warez d00dz cracked some piece of software they often that when old-time warez d00dz cracked some piece of software they often
added an advertisement in the beginning, usually containing colorful display added an advertisement in the beginning, usually containing colorful display
hack s with greetings to other cracking groups. The demoscene was born among hacks with greetings to other cracking groups. The demoscene was born among
people who decided building these display hacks is more interesting than people who decided building these display hacks is more interesting than
hacking or anyway safer. Around 1990 there began to be very serious police hacking or anyway safer. Around 1990 there began to be very serious police
pressure on cracking groups, including raids with SWAT teams crashing into pressure on cracking groups, including raids with SWAT teams crashing into
bedrooms to confiscate computers. Whether in response to this or for bedrooms to confiscate computers. Whether in response to this or for
esthetic reasons, crackers of that period began to build self-contained esthetic reasons, crackers of that period began to build self-contained
display hacks of considerable elaboration and beauty (within the culture display hacks of considerable elaboration and beauty (within the culture
such a hack is called a demo ). As more of these demogroup s emerged, they such a hack is called a demo ). As more of these demogroups emerged, they
started to have compo s at copying parties (see copyparty ), which later started to have compos at copying parties (see copyparty ), which later
evolved to standalone events (see demoparty ). The demoscene has retained evolved to standalone events (see demoparty ). The demoscene has retained
some traits from the warez d00dz , including their style of handles and some traits from the warez d00dz , including their style of handles and
group names and some of their jargon. Traditionally demos were written in group names and some of their jargon. Traditionally demos were written in
@ -28,4 +28,3 @@ bigger demoparties. Older demosceners frown at this, but the majority think
it's a good direction. Many demosceners end up working in the computer game it's a good direction. Many demosceners end up working in the computer game
industry. Demoscene resource pages are available at industry. Demoscene resource pages are available at
http://www.oldskool.org/demos/explained/ and http://www.scene.org/. http://www.oldskool.org/demos/explained/ and http://www.scene.org/.

View File

@ -1,6 +1,6 @@
elephantine elephantine
adj. Used of programs or systems that are both conspicuous hog s (owing adj. Used of programs or systems that are both conspicuous hogs (owing
perhaps to poor design founded on brute force and ignorance ) and perhaps to poor design founded on brute force and ignorance ) and
exceedingly hairy in source form. An elephantine program may be functional exceedingly hairy in source form. An elephantine program may be functional
and even friendly, but (as in the old joke about being in bed with an and even friendly, but (as in the old joke about being in bed with an
@ -10,4 +10,3 @@ trumpeting sounds or perform expressive proboscatory mime at the mention of
the offending program. Usage: semi-humorous. Compare has the elephant nature the offending program. Usage: semi-humorous. Compare has the elephant nature
and the somewhat more pejorative monstrosity. See also second-system effect and the somewhat more pejorative monstrosity. See also second-system effect
and baroque. and baroque.

View File

@ -5,7 +5,7 @@ corresponding to 0 in an operating system's clock and timestamp values.
Under most Unix versions the epoch is 00:00:00 GMT, January 1, 1970; under Under most Unix versions the epoch is 00:00:00 GMT, January 1, 1970; under
VMS, it's 00:00:00 of November 17, 1858 (base date of the U.S. Naval VMS, it's 00:00:00 of November 17, 1858 (base date of the U.S. Naval
Observatory's ephemerides); on a Macintosh, it's the midnight beginning Observatory's ephemerides); on a Macintosh, it's the midnight beginning
January 1 1904. System time is measured in seconds or tick s past the epoch. January 1 1904. System time is measured in seconds or ticks past the epoch.
Weird problems may ensue when the clock wraps around (see wrap around ), Weird problems may ensue when the clock wraps around (see wrap around ),
which is not necessarily a rare event; on systems counting 10 ticks per which is not necessarily a rare event; on systems counting 10 ticks per
second, a signed 32-bit count of ticks is good only for 6.8 years. The second, a signed 32-bit count of ticks is good only for 6.8 years. The
@ -15,4 +15,3 @@ word lengths don't increase by then. See also wall time. Microsoft Windows,
on the other hand, has an epoch problem every 49.7 days but this is seldom on the other hand, has an epoch problem every 49.7 days but this is seldom
noticed as Windows is almost incapable of staying up continuously for that noticed as Windows is almost incapable of staying up continuously for that
long. long.

View File

@ -1,10 +1,9 @@
eye candy eye candy
/i: kand`ee/ , n. [from mainstream slang ear candy ] A display of some sort /i: kand`ee/ , n. [from mainstream slang ear candy ] A display of some sort
that's presented to luser s to keep them distracted while the program that's presented to lusers to keep them distracted while the program
performs necessary background tasks. Give 'em some eye candy while the performs necessary background tasks. Give 'em some eye candy while the
back-end slurp s that BLOB into core. Reported as mainstream usage among back-end slurps that BLOB into core. Reported as mainstream usage among
players of graphics-heavy computer games. We're also told this term is players of graphics-heavy computer games. We're also told this term is
mainstream slang for soft pornography, but that sense does not appear to be mainstream slang for soft pornography, but that sense does not appear to be
live among hackers. live among hackers.

View File

@ -1,9 +1,8 @@
fan fan
n. Without qualification, indicates a fan of science fiction, especially one n. Without qualification, indicates a fan of science fiction, especially one
who goes to con s and tends to hang out with other fans. Many hackers are who goes to cons and tends to hang out with other fans. Many hackers are
fans, so this term has been imported from fannish slang; however, unlike fans, so this term has been imported from fannish slang; however, unlike
much fannish slang it is recognized by most non-fannish hackers. Among SF much fannish slang it is recognized by most non-fannish hackers. Among SF
fans the plural is correctly fen , but this usage is not automatic to fans the plural is correctly fen , but this usage is not automatic to
hackers. Laura reads the stuff occasionally but isn't really a fan. hackers. Laura reads the stuff occasionally but isn't really a fan.

View File

@ -2,7 +2,7 @@ foo
/foo/ 1. interj. Term of disgust. 2. [very common] Used very generally as a /foo/ 1. interj. Term of disgust. 2. [very common] Used very generally as a
sample name for absolutely anything, esp. programs and files (esp. scratch sample name for absolutely anything, esp. programs and files (esp. scratch
files). 3. First on the standard list of metasyntactic variable s used in files). 3. First on the standard list of metasyntactic variables used in
syntax examples. See also bar , baz , qux , quux , garply , waldo , fred , syntax examples. See also bar , baz , qux , quux , garply , waldo , fred ,
plugh , xyzzy , thud. When foo is used in connection with bar it has plugh , xyzzy , thud. When foo is used in connection with bar it has
generally traced to the WWII-era Army slang acronym FUBAR ( Fucked Up Beyond generally traced to the WWII-era Army slang acronym FUBAR ( Fucked Up Beyond
@ -76,4 +76,3 @@ would find it difficult to resist elaborating a joke like that, and it is
not likely 1959's were any less susceptible. Almost the entire staff of what not likely 1959's were any less susceptible. Almost the entire staff of what
later became the MIT AI Lab was involved with TMRC, and the word spread from later became the MIT AI Lab was involved with TMRC, and the word spread from
there. there.

View File

@ -1,10 +1,9 @@
fool file fool file
n. [Usenet] A notional repository of all the most dramatically and abysmally n. [Usenet] A notional repository of all the most dramatically and abysmally
stupid utterances ever. An entire subgenre of sig block s consists of the stupid utterances ever. An entire subgenre of sig blocks consists of the
header From the fool file: followed by some quote the poster wishes to header From the fool file: followed by some quote the poster wishes to
represent as an immortal gem of dimwittery; for this usage to be really represent as an immortal gem of dimwittery; for this usage to be really
effective, the quote has to be so obviously wrong as to be laughable. More effective, the quote has to be so obviously wrong as to be laughable. More
than one Usenetter has achieved an unwanted notoriety by being quoted in than one Usenetter has achieved an unwanted notoriety by being quoted in
this way. this way.

View File

@ -11,5 +11,4 @@ that largely assembles pieces than can and will be used in other
distributions without conflict. Forking is uncommon; in fact, it is so distributions without conflict. Forking is uncommon; in fact, it is so
uncommon that individual instances loom large in hacker folklore. Notable in uncommon that individual instances loom large in hacker folklore. Notable in
this class were the Emacs/XEmacs , the GCC/EGCS (later healed by a merger) this class were the Emacs/XEmacs , the GCC/EGCS (later healed by a merger)
and the s among the FreeBSD, NetBSD, and OpenBSD operating systems. and the forks among the FreeBSD, NetBSD, and OpenBSD operating systems.

View File

@ -2,7 +2,6 @@ forum
n. [Usenet, GEnie, CI$; pl. fora or forums ] Any discussion group accessible n. [Usenet, GEnie, CI$; pl. fora or forums ] Any discussion group accessible
through a dial-in BBS , a mailing list , or a newsgroup (see the network ). through a dial-in BBS , a mailing list , or a newsgroup (see the network ).
A forum functions much like a bulletin board; users submit posting s for all A forum functions much like a bulletin board; users submit postings for all
to read and discussion ensues. Contrast real-time chat via talk mode or to read and discussion ensues. Contrast real-time chat via talk mode or
point-to-point personal email. point-to-point personal email.

View File

@ -1,6 +1,6 @@
four-color glossies four-color glossies
n. 1. Literature created by marketroid s that allegedly contains technical n. 1. Literature created by marketroids that allegedly contains technical
specs but which is in fact as superficial as possible without being totally specs but which is in fact as superficial as possible without being totally
content-free. Forget the four-color glossies, give me the tech ref manuals. content-free. Forget the four-color glossies, give me the tech ref manuals.
Often applied as an indication of superficiality even when the material is Often applied as an indication of superficiality even when the material is
@ -8,4 +8,3 @@ printed on ordinary paper in black and white. Four-color-glossy manuals are
never useful for solving a problem. 2. [rare] Applied by extension to manual never useful for solving a problem. 2. [rare] Applied by extension to manual
pages that don't contain enough information to diagnose why the program pages that don't contain enough information to diagnose why the program
doesn't produce the expected or desired output. doesn't produce the expected or desired output.

View File

@ -1,6 +1,5 @@
fum fum
n. [XEROX PARC] At PARC, often the third of the standard metasyntactic n. [XEROX PARC] At PARC, often the third of the standard metasyntactic
variable s (after foo and bar ). Competes with baz , which is more common variables (after foo and bar ). Competes with baz , which is more common
outside PARC. outside PARC.

View File

@ -4,5 +4,4 @@ excl. [Usenet; written, only rarely spoken] Written-only equivalent of
Sheesh! ; it is, in fact, sheesh modified by rot13. Evolved in mid-1992 as a Sheesh! ; it is, in fact, sheesh modified by rot13. Evolved in mid-1992 as a
response to notably silly postings repeating urban myths on the Usenet response to notably silly postings repeating urban myths on the Usenet
newsgroup alt.folklore.urban , after some posters complained that Sheesh! as newsgroup alt.folklore.urban , after some posters complained that Sheesh! as
a response to newbie s was being overused. See also FOAF. a response to newbies was being overused. See also FOAF.

View File

@ -1,6 +1,6 @@
geek code geek code
n. (also Code of the Geeks ). A set of codes commonly used in sig block s to n. (also Code of the Geeks ). A set of codes commonly used in sig blocks to
broadcast the interests, skills, and aspirations of the poster. Features a G broadcast the interests, skills, and aspirations of the poster. Features a G
at the left margin followed by numerous letter codes, often suffixed with at the left margin followed by numerous letter codes, often suffixed with
plusses or minuses. Because many net users are involved in computer science, plusses or minuses. Because many net users are involved in computer science,
@ -14,4 +14,3 @@ geek code originated in 1993; it was inspired (according to the inventor) by
previous bear , smurf and twink style-and-sexual-preference codes from previous bear , smurf and twink style-and-sexual-preference codes from
lesbian and gay newsgroup s. It has in turn spawned imitators; there is now lesbian and gay newsgroup s. It has in turn spawned imitators; there is now
even a Saturn geek code for owners of the Saturn car. See also geek. even a Saturn geek code for owners of the Saturn car. See also geek.

View File

@ -1,10 +1,9 @@
gray goo gray goo
n. A hypothetical substance composed of sagan s of sub-micron-sized n. A hypothetical substance composed of sagans of sub-micron-sized
self-replicating robots programmed to make copies of themselves out of self-replicating robots programmed to make copies of themselves out of
whatever is available. The image that goes with the term is one of the whatever is available. The image that goes with the term is one of the
entire biosphere of Earth being eventually converted to robot goo. This is entire biosphere of Earth being eventually converted to robot goo. This is
the simplest of the nanotechnology disaster scenarios, easily refuted by the simplest of the nanotechnology disaster scenarios, easily refuted by
arguments from energy requirements and elemental abundances. Compare blue arguments from energy requirements and elemental abundances. Compare blue
goo. goo.

View File

@ -1,10 +1,9 @@
hand-hacking hand-hacking
n. 1. [rare] The practice of translating hot spot s from an HLL into n. 1. [rare] The practice of translating hot spots from an HLL into
hand-tuned assembler, as opposed to trying to coerce the compiler into hand-tuned assembler, as opposed to trying to coerce the compiler into
generating better code. Both the term and the practice are becoming generating better code. Both the term and the practice are becoming
uncommon. See tune , by hand ; syn. with v. cruft. 2. [common] More uncommon. See tune , by hand ; syn. with v. cruft. 2. [common] More
generally, manual construction or patching of data sets that would normally generally, manual construction or patching of data sets that would normally
be generated by a translation utility and interpreted by another program, be generated by a translation utility and interpreted by another program,
and aren't really designed to be read or modified by humans. and aren't really designed to be read or modified by humans.

View File

@ -1,6 +1,6 @@
holy wars holy wars
n. [from Usenet , but may predate it; common] n. flame war s over religious n. [from Usenet , but may predate it; common] n. flame wars over religious
issues. The paper by Danny Cohen that popularized the terms big-endian and issues. The paper by Danny Cohen that popularized the terms big-endian and
little-endian in connection with the LSB-first/MSB-first controversy was little-endian in connection with the LSB-first/MSB-first controversy was
entitled On Holy Wars and a Plea for Peace. Great holy wars of the past have entitled On Holy Wars and a Plea for Peace. Great holy wars of the past have
@ -14,4 +14,3 @@ participants spend their time trying to pass off personal value choices and
cultural attachments as objective technical evaluations. This happens cultural attachments as objective technical evaluations. This happens
precisely because in a true holy war, the actual substantive differences precisely because in a true holy war, the actual substantive differences
between the sides are relatively minor. See also theology. between the sides are relatively minor. See also theology.

View File

@ -1,6 +1,6 @@
honey pot honey pot
n. 1. A box designed to attract cracker s so that they can be observed in n. 1. A box designed to attract crackers so that they can be observed in
action. It is usually well isolated from the rest of the network, but has action. It is usually well isolated from the rest of the network, but has
extensive logging (usually network layer, on a different machine). Different extensive logging (usually network layer, on a different machine). Different
from an iron box in that its purpose is to attract, not merely observe. from an iron box in that its purpose is to attract, not merely observe.
@ -10,4 +10,3 @@ concept was presented in Cheswick Bellovin's book Firewalls and Internet
Security. 2. A mail server that acts as an open relay when a single message Security. 2. A mail server that acts as an open relay when a single message
is attempted to send through it, but discards or diverts for examination is attempted to send through it, but discards or diverts for examination
messages that are detected to be part of a spam run. messages that are detected to be part of a spam run.

View File

@ -2,5 +2,4 @@ include war
n. Excessive multi-leveled inclusion within a discussion thread , a practice n. Excessive multi-leveled inclusion within a discussion thread , a practice
that tends to annoy readers. In a forum with high-traffic newsgroups, such that tends to annoy readers. In a forum with high-traffic newsgroups, such
as Usenet, this can lead to flame s and the urge to start a kill file. as Usenet, this can lead to flames and the urge to start a kill file.

View File

@ -4,5 +4,4 @@ vt. [Usenet] 1. To duplicate a portion (or whole) of another's message
(typically with attribution to the source) in a reply or followup, for (typically with attribution to the source) in a reply or followup, for
clarifying the context of one's response. See the discussion of inclusion clarifying the context of one's response. See the discussion of inclusion
styles under Hacker Writing Style. 2. [from C ] #include disclaimer.h has styles under Hacker Writing Style. 2. [from C ] #include disclaimer.h has
appeared in sig block s to refer to a notional standard disclaimer file. appeared in sig blocks to refer to a notional standard disclaimer file.

View File

@ -0,0 +1,7 @@
indoctritainment
What would in the 20th century have simply been known as "propaganda".
The combination of political indoctrination and popular entertainment
common within mainstream broadcast media, such as television or
tabloid newspapers. The indirect manner in which the typical person
forms their political views.

View File

@ -1,5 +1,4 @@
infinite loop infinite loop
n. One that never terminates (that is, the machine spin s or buzz es forever n. One that never terminates (that is, the machine spins or buzz es forever
and goes catatonic ). and goes catatonic ).

5
entries/json.txt Normal file
View File

@ -0,0 +1,5 @@
JSON
Acronym. JavaScript Object Notation. A human readable data format
origially created by Douglas Crockford which is typically used to
transmit information between a browser and a web based server system.

View File

@ -1,7 +1,6 @@
kernel-of-the-week club kernel-of-the-week club
The fictional society that BSD bigot s claim Linux users belong to, alluding The fictional society that BSD bigots claim Linux users belong to, alluding
to the release-early-release-often style preferred by the kernel to the release-early-release-often style preferred by the kernel
maintainers. See bazaar. This was almost certainly inspired by the earlier maintainers. See bazaar. This was almost certainly inspired by the earlier
bug-of-the-month club. bug-of-the-month club.

View File

@ -1,5 +1,4 @@
kibozo kibozo
/ki:bohzoh/ , n. [Usenet] One who kiboze s but is not Kibo (see KIBO , sense /ki:bohzoh/ , n. [Usenet] One who kibozes but is not Kibo (see KIBO , sense
2). 2).

View File

@ -9,7 +9,7 @@ and verges on being a crock. 3. n. Something that works for the wrong
reason. 4. vt. To insert a kluge into a program. I've kluged this routine to reason. 4. vt. To insert a kluge into a program. I've kluged this routine to
get around that weird bug, but there's probably a better way. 5. [WPI] n. A get around that weird bug, but there's probably a better way. 5. [WPI] n. A
feature that is implemented in a rude manner. Nowadays this term is often feature that is implemented in a rude manner. Nowadays this term is often
encountered in the variant spelling kludge. Reports from old fart s are encountered in the variant spelling kludge. Reports from old farts are
consistent that kluge was the original spelling, reported around computers consistent that kluge was the original spelling, reported around computers
as far back as the mid-1950s and, at that time, used exclusively of hardware as far back as the mid-1950s and, at that time, used exclusively of hardware
kluges. In 1947, the New York Folklore Quarterly reported a classic kluges. In 1947, the New York Folklore Quarterly reported a classic
@ -62,4 +62,3 @@ orally, use it in a restricted negative sense and are at least consistent.
European hackers have mostly learned the word from written American sources European hackers have mostly learned the word from written American sources
and tend to pronounce it /kluhj/ but use the wider American meaning! Some and tend to pronounce it /kluhj/ but use the wider American meaning! Some
observers consider this mess appropriate in view of the word's meaning. observers consider this mess appropriate in view of the word's meaning.

View File

@ -5,7 +5,7 @@ development. This list has changed over time, but slowly. Java bumped C++
off of it, and Python appears to be recruiting people who would otherwise off of it, and Python appears to be recruiting people who would otherwise
gravitate to LISP (which used to be much more important than it is now). gravitate to LISP (which used to be much more important than it is now).
Smalltalk and Prolog are also popular in small but influential communities. Smalltalk and Prolog are also popular in small but influential communities.
The Real Programmer s who loved FORTRAN and assembler have pretty much all The Real Programmers who loved FORTRAN and assembler have pretty much all
retired or died since 1990. Assembler is generally no longer considered retired or died since 1990. Assembler is generally no longer considered
interesting or appropriate for anything but HLL implementation, glue , and a interesting or appropriate for anything but HLL implementation, glue , and a
few time-critical and hardware-specific uses in systems programs. FORTRAN few time-critical and hardware-specific uses in systems programs. FORTRAN
@ -14,4 +14,3 @@ frown on languages like Pascal and Ada, which don't give them the near-total
freedom considered necessary for hacking (see bondage-and-discipline freedom considered necessary for hacking (see bondage-and-discipline
language ), and to regard everything even remotely connected with COBOL or language ), and to regard everything even remotely connected with COBOL or
other traditional DP languages as a total and unmitigated loss. other traditional DP languages as a total and unmitigated loss.

View File

@ -2,7 +2,7 @@ letterbomb
1. n. A piece of email containing live data intended to do nefarious things 1. n. A piece of email containing live data intended to do nefarious things
to the recipient's machine or terminal. It used to be possible, for example, to the recipient's machine or terminal. It used to be possible, for example,
to send s that would lock up some specific kinds of terminals when they are to sends that would lock up some specific kinds of terminals when they are
viewed, so thoroughly that the user must cycle power (see cycle , sense 3) viewed, so thoroughly that the user must cycle power (see cycle , sense 3)
to unwedge them. Under Unix, a can also try to get part of its contents to unwedge them. Under Unix, a can also try to get part of its contents
interpreted as a shell command to the mailer. The results of this could interpreted as a shell command to the mailer. The results of this could
@ -11,4 +11,3 @@ the standard Unix/Internet mail software was vulnerable to such an attack
(though, as the Melissa virus attack demonstrated in early 1999, Microsoft (though, as the Melissa virus attack demonstrated in early 1999, Microsoft
systems can have serious problems). See also Trojan horse ; compare systems can have serious problems). See also Trojan horse ; compare
nastygram. 2. Loosely, a mailbomb. nastygram. 2. Loosely, a mailbomb.

View File

@ -9,6 +9,5 @@ security-breaking virus that is triggered the next time a hapless user
strikes that key. For another, there are some well-known bugs in vi that strikes that key. For another, there are some well-known bugs in vi that
allow certain texts to send arbitrary commands back to the machine when they allow certain texts to send arbitrary commands back to the machine when they
are simply viewed. 2. In C code, data that includes pointers to function are simply viewed. 2. In C code, data that includes pointers to function
hook s (executable code). 3. An object, such as a trampoline , that is hooks (executable code). 3. An object, such as a trampoline , that is
constructed on the fly by a program and intended to be executed as code. constructed on the fly by a program and intended to be executed as code.

View File

@ -1,6 +1,5 @@
loose bytes loose bytes
n. Commonwealth hackish term for the padding bytes or shim s many compilers n. Commonwealth hackish term for the padding bytes or shims many compilers
insert between members of a record or structure to cope with alignment insert between members of a record or structure to cope with alignment
requirements imposed by the machine architecture. requirements imposed by the machine architecture.

View File

@ -8,7 +8,7 @@ eventually just as mainframes. The term carries the connotation of a machine
designed for batch rather than interactive use, though possibly with an designed for batch rather than interactive use, though possibly with an
interactive timesharing operating system retrofitted onto it; it is interactive timesharing operating system retrofitted onto it; it is
especially used of machines built by IBM, Unisys, and the other great especially used of machines built by IBM, Unisys, and the other great
dinosaur s surviving from computing's Stone Age. It has been common wisdom dinosaurs surviving from computing's Stone Age. It has been common wisdom
among hackers since the late 1980s that the mainframe architectural among hackers since the late 1980s that the mainframe architectural
tradition is essentially dead (outside of the tiny market for tradition is essentially dead (outside of the tiny market for
number-crunching supercomputers having been swamped by the recent huge number-crunching supercomputers having been swamped by the recent huge
@ -22,4 +22,3 @@ assisted by IBM produced a resurgence of interest in mainframe computing as
a way of providing huge quantities of easily maintainable, reliable virtual a way of providing huge quantities of easily maintainable, reliable virtual
Linux servers, saving IBM's mainframe division from almost certain Linux servers, saving IBM's mainframe division from almost certain
extinction. extinction.

7
entries/mitm attack.txt Normal file
View File

@ -0,0 +1,7 @@
Man In The Middle (MITM) attack
This is a type of malicious communications interception in which an
interloper inserts themselves between two communicating parties. The
motivation for conducting such an attack is typically in order to
obtain personal, financial or political gain. They may merely collect
data, or insert their own packets into the conversation.

View File

@ -3,7 +3,7 @@ newsgroup
n. [Usenet] One of Usenet 's huge collection of topic groups or fora. Usenet n. [Usenet] One of Usenet 's huge collection of topic groups or fora. Usenet
groups can be unmoderated (anyone can post) or moderated (submissions are groups can be unmoderated (anyone can post) or moderated (submissions are
automatically directed to a moderator, who edits or filters and then posts automatically directed to a moderator, who edits or filters and then posts
the results). Some newsgroups have parallel mailing list s for Internet the results). Some newsgroups have parallel mailing lists for Internet
people with no netnews access, with postings to the group automatically people with no netnews access, with postings to the group automatically
propagated to the list and vice versa. Some moderated groups (especially propagated to the list and vice versa. Some moderated groups (especially
those which are actually gatewayed Internet mailing lists) are distributed those which are actually gatewayed Internet mailing lists) are distributed
@ -13,4 +13,3 @@ C-language forum), comp.arch (on computer architectures), comp.unix.wizards
(for Unix wizards), rec.arts.sf.written and siblings (for science-fiction (for Unix wizards), rec.arts.sf.written and siblings (for science-fiction
fans), and talk.politics.misc (miscellaneous political discussions and fans), and talk.politics.misc (miscellaneous political discussions and
flamage ). flamage ).

View File

@ -2,7 +2,6 @@ old fart
n. Tribal elder. A title self-assumed with remarkable frequency by (esp.) n. Tribal elder. A title self-assumed with remarkable frequency by (esp.)
Usenetters who have been programming for more than about 25 years; often Usenetters who have been programming for more than about 25 years; often
appears in sig block s attached to Jargon File contributions of great appears in sig blocks attached to Jargon File contributions of great
archeological significance. This is a term of insult in the second or third archeological significance. This is a term of insult in the second or third
person but one of pride in first person. person but one of pride in first person.

View File

@ -9,10 +9,9 @@ problem is simple; hence, It's only a one-banana job at the most; what's
taking them so long? At IBM, folklore divides the world into one-, two-, and taking them so long? At IBM, folklore divides the world into one-, two-, and
three-banana problems. Other cultures have different hierarchies and may three-banana problems. Other cultures have different hierarchies and may
divide them more finely; at ICL, for example, five grapes (a bunch) equals a divide them more finely; at ICL, for example, five grapes (a bunch) equals a
banana. Their upper limit for the in-house sysape s is said to be two banana. Their upper limit for the in-house sysapes is said to be two
bananas and three grapes (another source claims it's three bananas and one bananas and three grapes (another source claims it's three bananas and one
grape, but observes However, this is subject to local variations, cosmic grape, but observes However, this is subject to local variations, cosmic
rays and ISO ). At a complication level any higher than that, one asks the rays and ISO ). At a complication level any higher than that, one asks the
manufacturers to send someone around to check things. See also manufacturers to send someone around to check things. See also
Infinite-Monkey Theorem. Infinite-Monkey Theorem.

View File

@ -4,11 +4,10 @@ n. [C programming] A variety of fandango on core produced by scribbling past
the end of an array (C implementations typically have no checks for this the end of an array (C implementations typically have no checks for this
error). This is relatively benign and easy to spot if the array is static; error). This is relatively benign and easy to spot if the array is static;
if it is auto, the result may be to smash the stack often resulting in if it is auto, the result may be to smash the stack often resulting in
heisenbug s of the most diabolical subtlety. The term overrun screw is used heisenbugs of the most diabolical subtlety. The term overrun screw is used
esp. of scribbles beyond the end of arrays allocated with malloc (3) ; this esp. of scribbles beyond the end of arrays allocated with malloc (3) ; this
typically trashes the allocation header for the next block in the arena , typically trashes the allocation header for the next block in the arena ,
producing massive lossage within malloc and often a core dump on the next producing massive lossage within malloc and often a core dump on the next
operation to use stdio (3) or malloc (3) itself. See spam , overrun ; see operation to use stdio (3) or malloc (3) itself. See spam , overrun ; see
also memory leak , memory smash , aliasing bug , precedence lossage , also memory leak , memory smash , aliasing bug , precedence lossage ,
fandango on core , secondary damage. fandango on core , secondary damage.

View File

@ -1,9 +1,8 @@
padded cell padded cell
n. Where you put luser s so they can't hurt anything. A program that limits n. Where you put lusers so they can't hurt anything. A program that limits
a luser to a carefully restricted subset of the capabilities of the host a luser to a carefully restricted subset of the capabilities of the host
system (for example, the rsh (1) utility on USG Unix). Note that this is system (for example, the rsh (1) utility on USG Unix). Note that this is
different from an iron box because it is overt and not aimed at enforcing different from an iron box because it is overt and not aimed at enforcing
security so much as protecting others (and the luser) from the consequences security so much as protecting others (and the luser) from the consequences
of the luser's boundless naivete (see naive ). Also padded cell environment. of the luser's boundless naivete (see naive ). Also padded cell environment.

View File

@ -1,9 +1,8 @@
paper-net paper-net
n. Hackish way of referring to the postal service, analogizing it to a very n. Hackish way of referring to the postal service, analogizing it to a very
slow, low-reliability network. Usenet sig block s sometimes include a slow, low-reliability network. Usenet sig blocks sometimes include a
Paper-Net: header just before the sender's postal address; common variants Paper-Net: header just before the sender's postal address; common variants
of this are Papernet and P-Net. Note that the standard netiquette guidelines of this are Papernet and P-Net. Note that the standard netiquette guidelines
discourage this practice as a waste of bandwidth, since netters are quite discourage this practice as a waste of bandwidth, since netters are quite
unlikely to casually use postal addresses. Compare voice-net , snail-mail. unlikely to casually use postal addresses. Compare voice-net , snail-mail.

View File

@ -6,7 +6,7 @@ corresponding constructs in any HLL (peek reads memory, poke modifies it).
Much hacking on small, non-MMU micros used to consist of peek ing around Much hacking on small, non-MMU micros used to consist of peek ing around
memory, more or less at random, to find the location where the system keeps memory, more or less at random, to find the location where the system keeps
interesting stuff. Long (and variably accurate) lists of such addresses for interesting stuff. Long (and variably accurate) lists of such addresses for
various computers circulated. The results of poke s at these addresses may various computers circulated. The results of pokes at these addresses may
be highly useful, mildly amusing, useless but neat, or (most likely) total be highly useful, mildly amusing, useless but neat, or (most likely) total
lossage (see killer poke ). Since a real operating system provides useful, lossage (see killer poke ). Since a real operating system provides useful,
higher-level services for the tasks commonly performed with peeks and pokes higher-level services for the tasks commonly performed with peeks and pokes
@ -15,4 +15,3 @@ groveling, a question like How do I do a peek in C? is diagnostic of the
newbie. (Of course, OS kernels often have to do exactly this; a real kernel newbie. (Of course, OS kernels often have to do exactly this; a real kernel
hacker would unhesitatingly, if unportably, assign an absolute address to a hacker would unhesitatingly, if unportably, assign an absolute address to a
pointer variable and indirect through it. pointer variable and indirect through it.

View File

@ -1,8 +1,7 @@
pointy-haired pointy-haired
adj. [after the character in the Dilbert comic strip] Describes the extreme adj. [after the character in the Dilbert comic strip] Describes the extreme
form of the property that separates suit s and marketroid s from hackers. form of the property that separates suits and marketroids from hackers.
Compare brain-dead ; demented ; see PHB. Always applied to people, never to Compare brain-dead ; demented ; see PHB. Always applied to people, never to
ideas. The plural form is often used as a noun. The pointy-haireds ordered ideas. The plural form is often used as a noun. The pointy-haireds ordered
me to use Windows NT, but I set up a Linux server with Samba instead. me to use Windows NT, but I set up a Linux server with Samba instead.

View File

@ -7,5 +7,4 @@ of prime time was traditionally given as a major reason for night mode
hacking. The term fell into disuse during the early PC era, but has been hacking. The term fell into disuse during the early PC era, but has been
revived to refer to times of day or evening at which the Internet tends to revived to refer to times of day or evening at which the Internet tends to
be heavily loaded, making Web access slow. The hackish tendency to be heavily loaded, making Web access slow. The hackish tendency to
late-night hacking run s has changed not a bit. late-night hacking runs has changed not a bit.

View File

@ -5,8 +5,7 @@ each user's home directory and intended to be easily modified by the user in
order to customize the program's behavior. Used to avoid hardcoded choices order to customize the program's behavior. Used to avoid hardcoded choices
(see also dot file , rc file ). 2. [techspeak] A report on the amounts of (see also dot file , rc file ). 2. [techspeak] A report on the amounts of
time spent in each routine of a program, used to find and tune away the hot time spent in each routine of a program, used to find and tune away the hot
spot s in it. This sense is often verbed. Some profiling modes report units spots in it. This sense is often verbed. Some profiling modes report units
other than time (such as call counts) and/or report at granularities other other than time (such as call counts) and/or report at granularities other
than per-routine, but the idea is similar. 3.[techspeak] A subset of a than per-routine, but the idea is similar. 3.[techspeak] A subset of a
standard used for a particular purpose. standard used for a particular purpose.

View File

@ -2,7 +2,7 @@ quantum bogodynamics
/kwontm boh`gohdi:namiks/ , n. A theory that characterizes the universe in /kwontm boh`gohdi:namiks/ , n. A theory that characterizes the universe in
terms of bogon sources (such as politicians, used-car salesmen, TV terms of bogon sources (such as politicians, used-car salesmen, TV
evangelists, and suit s in general), bogon sinks (such as taxpayers and evangelists, and suits in general), bogon sinks (such as taxpayers and
computers), and bogosity potential fields. Bogon absorption, of course, computers), and bogosity potential fields. Bogon absorption, of course,
causes human beings to behave mindlessly and machines to fail (and may also causes human beings to behave mindlessly and machines to fail (and may also
cause both to emit secondary bogons); however, the precise mechanics of the cause both to emit secondary bogons); however, the precise mechanics of the
@ -19,4 +19,3 @@ a bogon beam is deflected only with great difficulty. When the bogon
encounters its antiparticle, the cluon, they mutually annihilate each other, encounters its antiparticle, the cluon, they mutually annihilate each other,
releasing magic smoke. Furthermore 1 Lenat = 1 mole (6.022E23) of bogons releasing magic smoke. Furthermore 1 Lenat = 1 mole (6.022E23) of bogons
(see microLenat ). (see microLenat ).

View File

@ -17,7 +17,7 @@ sufficiently to ascertain the facts of the matter, a DEC troubleshooter
called up the field circus manager responsible and asked him sweetly, Can called up the field circus manager responsible and asked him sweetly, Can
you swim? Not all the consequences to humans were so amusing; the sysop of you swim? Not all the consequences to humans were so amusing; the sysop of
the machine in question was nearly thrown in jail at the behest of certain the machine in question was nearly thrown in jail at the behest of certain
clueless droid s at the local humane society. The moral is clear: When in clueless droids at the local humane society. The moral is clear: When in
doubt, always mount a scratch monkey. [The actual incident occured in 1979 doubt, always mount a scratch monkey. [The actual incident occured in 1979
or 1980. There is a version of this story, complete with reported dialogue or 1980. There is a version of this story, complete with reported dialogue
between one of the project people and DEC field service, that has been between one of the project people and DEC field service, that has been
@ -26,4 +26,3 @@ some facts wrong. For example, it reports the machine as a PDP-11 and
alleges that Mabel's demise occurred when DEC PM ed the machine. Earlier alleges that Mabel's demise occurred when DEC PM ed the machine. Earlier
versions of this entry were based on that story; this one has been corrected versions of this entry were based on that story; this one has been corrected
from an interview with the hapless sysop. from an interview with the hapless sysop.

View File

@ -1,7 +1,7 @@
script kiddies script kiddies
pl.n. 1. [very common] The lowest form of cracker ; script kiddies do pl.n. 1. [very common] The lowest form of cracker ; script kiddies do
mischief with scripts and rootkit s written by others, often without mischief with scripts and rootkits written by others, often without
understanding the exploit they are using. Used of people with limited understanding the exploit they are using. Used of people with limited
technical expertise using easy-to-operate, pre-configured, and/or automated technical expertise using easy-to-operate, pre-configured, and/or automated
tools to conduct disruptive activities against networked systems. Since most tools to conduct disruptive activities against networked systems. Since most
@ -9,4 +9,3 @@ of these tools are fairly well-known by the security community, the adverse
impact of such actions is usually minimal. 2. People who cannot program, but impact of such actions is usually minimal. 2. People who cannot program, but
who create tacky HTML pages by copying JavaScript routines from other tacky who create tacky HTML pages by copying JavaScript routines from other tacky
HTML pages. HTML pages.

View File

@ -1,10 +1,9 @@
segmentation fault segmentation fault
n. [Unix] 1. [techspeak] An error in which a running program attempts to n. [Unix] 1. [techspeak] An error in which a running program attempts to
access memory not allocated to it and core dump s with a segmentation access memory not allocated to it and core dumps with a segmentation
violation error. This is often caused by improper usage of pointers in the violation error. This is often caused by improper usage of pointers in the
source code, dereferencing a null pointer, or (in C) inadvertently using a source code, dereferencing a null pointer, or (in C) inadvertently using a
non-pointer variable as a pointer. The classic example is: inti; scanf( %d non-pointer variable as a pointer. The classic example is: inti; scanf( %d
,i);/*shouldhaveused i*/ 2. To lose a train of thought or a line of ,i);/*shouldhaveused i*/ 2. To lose a train of thought or a line of
reasoning. Also uttered as an exclamation at the point of befuddlement. reasoning. Also uttered as an exclamation at the point of befuddlement.

View File

@ -8,7 +8,7 @@ to a special resource or server for convenience, efficiency, or security
reasons; for this meaning, the usage is usually a shell around whatever. reasons; for this meaning, the usage is usually a shell around whatever.
This sort of program is also called a wrapper. 3. A skeleton program, This sort of program is also called a wrapper. 3. A skeleton program,
created by hand or by another program (like, say, a parser generator), which created by hand or by another program (like, say, a parser generator), which
provides the necessary incantation s to set up some task and the control provides the necessary incantations to set up some task and the control
flow to drive it (the term driver is sometimes used synonymously). The user flow to drive it (the term driver is sometimes used synonymously). The user
is meant to fill in whatever code is needed to get real work done. This is meant to fill in whatever code is needed to get real work done. This
usage is common in the AI and Microsoft Windows worlds, and confuses Unix usage is common in the AI and Microsoft Windows worlds, and confuses Unix
@ -18,4 +18,3 @@ starting up separate processes, but by dynamically linking the programs into
its own code, calling them as subroutines, and then dynamically de-linking its own code, calling them as subroutines, and then dynamically de-linking
them on return. The VMS command interpreter still does something very like them on return. The VMS command interpreter still does something very like
this. this.

7
entries/sigint.txt Normal file
View File

@ -0,0 +1,7 @@
SIGINT
Abbrev. Signals Intelligence. Data obtained via espionage or from
public sources which is used by the secret police of a nation state.
Hardware or software systems which contain back doors to facilitate
covert data collection are described as being "SIGINT enabled".
Also see back door.

View File

@ -9,9 +9,8 @@ snarfing phase of hacking FTPing megs of stuff a day. 3. To acquire, with
little concern for legal forms or politesse (but not quite by stealing). little concern for legal forms or politesse (but not quite by stealing).
They were giving away samples, so I snarfed a bunch of them. 4. Syn. for They were giving away samples, so I snarfed a bunch of them. 4. Syn. for
slurp. This program starts by snarfing the entire database into core, slurp. This program starts by snarfing the entire database into core,
then.... 5. [GEnie] To spray food or programming fluid s due to laughing at then.... 5. [GEnie] To spray food or programming fluids due to laughing at
the wrong moment. I was drinking coffee, and when I read your post I snarfed the wrong moment. I was drinking coffee, and when I read your post I snarfed
all over my desk. If I keep reading this topic, I think I'll have to all over my desk. If I keep reading this topic, I think I'll have to
snarf-proof my computer with a keyboard condom. [This sense appears to be snarf-proof my computer with a keyboard condom. [This sense appears to be
widespread among mundane teenagers ESR] The sound of snarfing is splork!. widespread among mundane teenagers ESR] The sound of snarfing is splork!.

View File

@ -1,10 +1,9 @@
social engineering social engineering
n. Term used among cracker s and samurai for cracking techniques that rely n. Term used among crackers and samurai for cracking techniques that rely
on weaknesses in wetware rather than software; the aim is to trick people on weaknesses in wetware rather than software; the aim is to trick people
into revealing passwords or other information that compromises a target into revealing passwords or other information that compromises a target
system's security. Classic scams include phoning up a mark who has the system's security. Classic scams include phoning up a mark who has the
required information and posing as a field service tech or a fellow employee required information and posing as a field service tech or a fellow employee
with an urgent access problem. See also the tiger team story in the patch with an urgent access problem. See also the tiger team story in the patch
entry, and rubber-hose cryptanalysis. entry, and rubber-hose cryptanalysis.

View File

@ -27,8 +27,7 @@ are now primary. All three behaviors are considered abuse of the net, and
are almost universally grounds for termination of the originator's email are almost universally grounds for termination of the originator's email
account or network connection. In these senses the term spam has gone account or network connection. In these senses the term spam has gone
mainstream, though without its original sense or folkloric freight there is mainstream, though without its original sense or folkloric freight there is
apparently a widespread myth among luser s that spamming is what happens apparently a widespread myth among lusers that spamming is what happens
when you dump cans of Spam into a revolving fan. Hormel, the makers of Spam, when you dump cans of Spam into a revolving fan. Hormel, the makers of Spam,
have published a surprisingly enlightened position statement on the Internet have published a surprisingly enlightened position statement on the Internet
usage. usage.

View File

@ -9,6 +9,5 @@ Usenet as Spam Freedom Day, but lesser imitators of the Spamford still
infest various murky corners of the net. Since prosecution of spammers infest various murky corners of the net. Since prosecution of spammers
became routine under the junk-fax laws and statues specifically targeting became routine under the junk-fax laws and statues specifically targeting
spam, spamhausen have declined in relative importance; today, hit-and-run spam, spamhausen have declined in relative importance; today, hit-and-run
attacks by spammers using relay rape and throwaway account s on reputable attacks by spammers using relay rape and throwaway accounts on reputable
ISPs seem to account for most of the flow. ISPs seem to account for most of the flow.

View File

@ -4,6 +4,5 @@ vt. To write unique code to handle input to or situations arising in a
program that are somehow distinguished from normal processing. This would be program that are somehow distinguished from normal processing. This would be
used for processing of mode switches or interrupt characters in an used for processing of mode switches or interrupt characters in an
interactive interface (as opposed, say, to text entry or normal commands), interactive interface (as opposed, say, to text entry or normal commands),
or for processing of hidden flag s in the input of a batch program or or for processing of hidden flags in the input of a batch program or
filter. filter.

View File

@ -1,6 +1,6 @@
spod spod
n. [UK] 1. A lower form of life found on talker system s and MUD s. The spod n. [UK] 1. A lower form of life found on talker systems and MUD s. The spod
has few friends in RL and uses talkers instead, finding communication easier has few friends in RL and uses talkers instead, finding communication easier
and preferable over the net. He has all the negative traits of the computer and preferable over the net. He has all the negative traits of the computer
geek without having any interest in computers per se. Lacking any knowledge geek without having any interest in computers per se. Lacking any knowledge
@ -26,4 +26,3 @@ computers and the internet in general. 3. [Glasgow University] An otherwise
competent hacker who spends way too much time on talker systems. 4. [obs.] competent hacker who spends way too much time on talker systems. 4. [obs.]
An ordinary person; a random. This is the meaning with which the term was An ordinary person; a random. This is the meaning with which the term was
coined, but the inventor informs us he has himself accepted sense 1. coined, but the inventor informs us he has himself accepted sense 1.

Some files were not shown because too many files have changed in this diff Show More