Insufficient notability

This commit is contained in:
Bob Mottram 2018-09-13 19:34:39 +01:00
parent 231251d0a8
commit e3b3503146
5 changed files with 9 additions and 22 deletions

View File

@ -19,7 +19,7 @@ Free Documentation License".
* Generated
This file last generated Thursday, 13 September 2018 06:29PM UTC
This file last generated Thursday, 13 September 2018 06:33PM UTC
* Glossary
** (
@ -2381,7 +2381,7 @@ vt. To blow out despite a safeguard. The server blew past the 5K reserve buffer.
2. Syn. blow out.
*** blue box
1. obs. Once upon a time, before all-digital switches made it possible for the phone companies to move them out of band, one could actually hear the switching tones used to route long-distance calls. Early phreaker s built devices called es that could reproduce these tones, which could be used to commandeer portions of the phone network. (This was not as hard as it may sound; one early phreak acquired the sobriquet Captain Crunch after he proved that he could generate switching tones with a plastic whistle pulled out of a box of Captain Crunch cereal!) There were other colors of box with more specialized phreaking uses; red boxes, black boxes, silver boxes, etc. There were boxes of other colors as well, but the was the original and archetype.
1. obs. Once upon a time, before all-digital switches made it possible for the phone companies to move them out of band, one could actually hear the switching tones used to route long-distance calls. Early phreaker s built devices called es that could reproduce these tones, which could be used to commandeer portions of the phone network. There were other colors of box with more specialized phreaking uses; red boxes, black boxes, silver boxes, etc. There were boxes of other colors as well, but the was the original and archetype.
2. n. An IBM machine, especially a large (non-PC) one.
@ -3257,11 +3257,7 @@ n. Two binary digits; a quad. Larger than a bit , smaller than a nybble. Conside
3. n. The character #. Used at XEROX and CMU, among other places. See ASCII.
4. vt. To squeeze program source into a minimum-size representation that will still compile or execute. The term came into being specifically for a famous program on the BBC micro that ed BASIC source in order to make it run more quickly (it was a wholly interpretive BASIC, so the number of characters mattered). Obfuscated C Contest entries are often ed; see the first example under that entry.
5. Pseudonym of John Draper, an early hacker and phreaker. See phreaking.
6. Lowest common denominator intensification of labor strategy. A phase of (typically though not exclusively) commercial software development when hackers are threatened by their project managers in order to work additional unpaid hours to meet some arbitrary deadline decided by a suit on a golf course. "I won't be at the hackspace tonight because there's a crunch on at work".
4. vt. To squeeze program source into a minimum-size representation that will still compile or execute. The term came into being specifically for a famous program on the BBC micro that ed BASIC source in order to make it run more quickly (it was a wholly interpretive BASIC, so the number of characters mattered). Obfuscated C Contest entries are often ed; see the first example under that entry. 7. Lowest common denominator intensification of labor strategy. A phase of (typically though not exclusively) commercial software development when hackers are threatened by their project managers in order to work additional unpaid hours to meet some arbitrary deadline decided by a suit on a golf course. "I won't be at the hackspace tonight because there's a crunch on at work".
*** cryppie
/kripee/ , n. A cryptographer. One who hacks or implements cryptographic software or hardware.

Binary file not shown.

View File

@ -18,7 +18,7 @@ Free Documentation License".
</p>
<H2>Generated</H2>
<p>
This file last generated Thursday, 13 September 2018 06:29PM UTC
This file last generated Thursday, 13 September 2018 06:33PM UTC
</p>
<H2>Glossary</H2>
@ -2855,7 +2855,7 @@ This file last generated Thursday, 13 September 2018 06:29PM UTC
<p>2. Syn. blow out.</p>
<H4>blue box</H4>
<p>1. obs. Once upon a time, before all-digital switches made it possible for the phone companies to move them out of band, one could actually hear the switching tones used to route long-distance calls. Early phreaker s built devices called es that could reproduce these tones, which could be used to commandeer portions of the phone network. (This was not as hard as it may sound; one early phreak acquired the sobriquet Captain Crunch after he proved that he could generate switching tones with a plastic whistle pulled out of a box of Captain Crunch cereal!) There were other colors of box with more specialized phreaking uses; red boxes, black boxes, silver boxes, etc. There were boxes of other colors as well, but the was the original and archetype. </p>
<p>1. obs. Once upon a time, before all-digital switches made it possible for the phone companies to move them out of band, one could actually hear the switching tones used to route long-distance calls. Early phreaker s built devices called es that could reproduce these tones, which could be used to commandeer portions of the phone network. There were other colors of box with more specialized phreaking uses; red boxes, black boxes, silver boxes, etc. There were boxes of other colors as well, but the was the original and archetype. </p>
<p>2. n. An IBM machine, especially a large (non-PC) one.</p>
<H4>blue goo</H4>
@ -3874,11 +3874,7 @@ This file last generated Thursday, 13 September 2018 06:29PM UTC
<p>3. n. The character #. Used at XEROX and CMU, among other places. See ASCII. </p>
<p>4. vt. To squeeze program source into a minimum-size representation that will still compile or execute. The term came into being specifically for a famous program on the BBC micro that ed BASIC source in order to make it run more quickly (it was a wholly interpretive BASIC, so the number of characters mattered). Obfuscated C Contest entries are often ed; see the first example under that entry. </p>
<p>5. Pseudonym of John Draper, an early hacker and phreaker. See phreaking. </p>
<p>6. Lowest common denominator intensification of labor strategy. A phase of (typically though not exclusively) commercial software development when hackers are threatened by their project managers in order to work additional unpaid hours to meet some arbitrary deadline decided by a suit on a golf course. "I won't be at the hackspace tonight because there's a crunch on at work".</p>
<p>4. vt. To squeeze program source into a minimum-size representation that will still compile or execute. The term came into being specifically for a famous program on the BBC micro that ed BASIC source in order to make it run more quickly (it was a wholly interpretive BASIC, so the number of characters mattered). Obfuscated C Contest entries are often ed; see the first example under that entry. 7. Lowest common denominator intensification of labor strategy. A phase of (typically though not exclusively) commercial software development when hackers are threatened by their project managers in order to work additional unpaid hours to meet some arbitrary deadline decided by a suit on a golf course. "I won't be at the hackspace tonight because there's a crunch on at work".</p>
<H4>cryppie</H4>
<p>
/kripee/ , n. A cryptographer. One who hacks or implements cryptographic software or hardware.

View File

@ -4,12 +4,8 @@ n. 1. obs. Once upon a time, before all-digital switches made it possible
for the phone companies to move them out of band, one could actually hear
the switching tones used to route long-distance calls. Early phreaker s
built devices called es that could reproduce these tones, which could be
used to commandeer portions of the phone network. (This was not as hard as
it may sound; one early phreak acquired the sobriquet Captain Crunch after
he proved that he could generate switching tones with a plastic whistle
pulled out of a box of Captain Crunch cereal!) There were other colors of
box with more specialized phreaking uses; red boxes, black boxes, silver
used to commandeer portions of the phone network. There were other colors
of box with more specialized phreaking uses; red boxes, black boxes, silver
boxes, etc. There were boxes of other colors as well, but the was the
original and archetype. 2. n. An IBM machine, especially a large (non-PC)
one.

View File

@ -17,8 +17,7 @@ compile or execute. The term came into being specifically for a famous
program on the BBC micro that ed BASIC source in order to make it run more
quickly (it was a wholly interpretive BASIC, so the number of characters
mattered). Obfuscated C Contest entries are often ed; see the first example
under that entry. 5. Pseudonym of John Draper, an early hacker and phreaker.
See phreaking. 6. Lowest common denominator intensification of labor
under that entry. 7. Lowest common denominator intensification of labor
strategy. A phase of (typically though not exclusively) commercial software
development when hackers are threatened by their project managers in order
to work additional unpaid hours to meet some arbitrary deadline decided by