Insufficient notability
This commit is contained in:
parent
231251d0a8
commit
e3b3503146
|
@ -19,7 +19,7 @@ Free Documentation License".
|
||||||
|
|
||||||
* Generated
|
* Generated
|
||||||
|
|
||||||
This file last generated Thursday, 13 September 2018 06:29PM UTC
|
This file last generated Thursday, 13 September 2018 06:33PM UTC
|
||||||
|
|
||||||
* Glossary
|
* Glossary
|
||||||
** (
|
** (
|
||||||
|
@ -2381,7 +2381,7 @@ vt. To blow out despite a safeguard. The server blew past the 5K reserve buffer.
|
||||||
2. Syn. blow out.
|
2. Syn. blow out.
|
||||||
|
|
||||||
*** blue box
|
*** blue box
|
||||||
1. obs. Once upon a time, before all-digital switches made it possible for the phone companies to move them out of band, one could actually hear the switching tones used to route long-distance calls. Early phreaker s built devices called es that could reproduce these tones, which could be used to commandeer portions of the phone network. (This was not as hard as it may sound; one early phreak acquired the sobriquet Captain Crunch after he proved that he could generate switching tones with a plastic whistle pulled out of a box of Captain Crunch cereal!) There were other colors of box with more specialized phreaking uses; red boxes, black boxes, silver boxes, etc. There were boxes of other colors as well, but the was the original and archetype.
|
1. obs. Once upon a time, before all-digital switches made it possible for the phone companies to move them out of band, one could actually hear the switching tones used to route long-distance calls. Early phreaker s built devices called es that could reproduce these tones, which could be used to commandeer portions of the phone network. There were other colors of box with more specialized phreaking uses; red boxes, black boxes, silver boxes, etc. There were boxes of other colors as well, but the was the original and archetype.
|
||||||
|
|
||||||
2. n. An IBM machine, especially a large (non-PC) one.
|
2. n. An IBM machine, especially a large (non-PC) one.
|
||||||
|
|
||||||
|
@ -3257,11 +3257,7 @@ n. Two binary digits; a quad. Larger than a bit , smaller than a nybble. Conside
|
||||||
|
|
||||||
3. n. The character #. Used at XEROX and CMU, among other places. See ASCII.
|
3. n. The character #. Used at XEROX and CMU, among other places. See ASCII.
|
||||||
|
|
||||||
4. vt. To squeeze program source into a minimum-size representation that will still compile or execute. The term came into being specifically for a famous program on the BBC micro that ed BASIC source in order to make it run more quickly (it was a wholly interpretive BASIC, so the number of characters mattered). Obfuscated C Contest entries are often ed; see the first example under that entry.
|
4. vt. To squeeze program source into a minimum-size representation that will still compile or execute. The term came into being specifically for a famous program on the BBC micro that ed BASIC source in order to make it run more quickly (it was a wholly interpretive BASIC, so the number of characters mattered). Obfuscated C Contest entries are often ed; see the first example under that entry. 7. Lowest common denominator intensification of labor strategy. A phase of (typically though not exclusively) commercial software development when hackers are threatened by their project managers in order to work additional unpaid hours to meet some arbitrary deadline decided by a suit on a golf course. "I won't be at the hackspace tonight because there's a crunch on at work".
|
||||||
|
|
||||||
5. Pseudonym of John Draper, an early hacker and phreaker. See phreaking.
|
|
||||||
|
|
||||||
6. Lowest common denominator intensification of labor strategy. A phase of (typically though not exclusively) commercial software development when hackers are threatened by their project managers in order to work additional unpaid hours to meet some arbitrary deadline decided by a suit on a golf course. "I won't be at the hackspace tonight because there's a crunch on at work".
|
|
||||||
|
|
||||||
*** cryppie
|
*** cryppie
|
||||||
/kripee/ , n. A cryptographer. One who hacks or implements cryptographic software or hardware.
|
/kripee/ , n. A cryptographer. One who hacks or implements cryptographic software or hardware.
|
||||||
|
|
BIN
docs/jargon.1.gz
BIN
docs/jargon.1.gz
Binary file not shown.
|
@ -18,7 +18,7 @@ Free Documentation License".
|
||||||
</p>
|
</p>
|
||||||
<H2>Generated</H2>
|
<H2>Generated</H2>
|
||||||
<p>
|
<p>
|
||||||
This file last generated Thursday, 13 September 2018 06:29PM UTC
|
This file last generated Thursday, 13 September 2018 06:33PM UTC
|
||||||
|
|
||||||
</p>
|
</p>
|
||||||
<H2>Glossary</H2>
|
<H2>Glossary</H2>
|
||||||
|
@ -2855,7 +2855,7 @@ This file last generated Thursday, 13 September 2018 06:29PM UTC
|
||||||
|
|
||||||
<p>2. Syn. blow out.</p>
|
<p>2. Syn. blow out.</p>
|
||||||
<H4>blue box</H4>
|
<H4>blue box</H4>
|
||||||
<p>1. obs. Once upon a time, before all-digital switches made it possible for the phone companies to move them out of band, one could actually hear the switching tones used to route long-distance calls. Early phreaker s built devices called es that could reproduce these tones, which could be used to commandeer portions of the phone network. (This was not as hard as it may sound; one early phreak acquired the sobriquet Captain Crunch after he proved that he could generate switching tones with a plastic whistle pulled out of a box of Captain Crunch cereal!) There were other colors of box with more specialized phreaking uses; red boxes, black boxes, silver boxes, etc. There were boxes of other colors as well, but the was the original and archetype. </p>
|
<p>1. obs. Once upon a time, before all-digital switches made it possible for the phone companies to move them out of band, one could actually hear the switching tones used to route long-distance calls. Early phreaker s built devices called es that could reproduce these tones, which could be used to commandeer portions of the phone network. There were other colors of box with more specialized phreaking uses; red boxes, black boxes, silver boxes, etc. There were boxes of other colors as well, but the was the original and archetype. </p>
|
||||||
|
|
||||||
<p>2. n. An IBM machine, especially a large (non-PC) one.</p>
|
<p>2. n. An IBM machine, especially a large (non-PC) one.</p>
|
||||||
<H4>blue goo</H4>
|
<H4>blue goo</H4>
|
||||||
|
@ -3874,11 +3874,7 @@ This file last generated Thursday, 13 September 2018 06:29PM UTC
|
||||||
|
|
||||||
<p>3. n. The character #. Used at XEROX and CMU, among other places. See ASCII. </p>
|
<p>3. n. The character #. Used at XEROX and CMU, among other places. See ASCII. </p>
|
||||||
|
|
||||||
<p>4. vt. To squeeze program source into a minimum-size representation that will still compile or execute. The term came into being specifically for a famous program on the BBC micro that ed BASIC source in order to make it run more quickly (it was a wholly interpretive BASIC, so the number of characters mattered). Obfuscated C Contest entries are often ed; see the first example under that entry. </p>
|
<p>4. vt. To squeeze program source into a minimum-size representation that will still compile or execute. The term came into being specifically for a famous program on the BBC micro that ed BASIC source in order to make it run more quickly (it was a wholly interpretive BASIC, so the number of characters mattered). Obfuscated C Contest entries are often ed; see the first example under that entry. 7. Lowest common denominator intensification of labor strategy. A phase of (typically though not exclusively) commercial software development when hackers are threatened by their project managers in order to work additional unpaid hours to meet some arbitrary deadline decided by a suit on a golf course. "I won't be at the hackspace tonight because there's a crunch on at work".</p>
|
||||||
|
|
||||||
<p>5. Pseudonym of John Draper, an early hacker and phreaker. See phreaking. </p>
|
|
||||||
|
|
||||||
<p>6. Lowest common denominator intensification of labor strategy. A phase of (typically though not exclusively) commercial software development when hackers are threatened by their project managers in order to work additional unpaid hours to meet some arbitrary deadline decided by a suit on a golf course. "I won't be at the hackspace tonight because there's a crunch on at work".</p>
|
|
||||||
<H4>cryppie</H4>
|
<H4>cryppie</H4>
|
||||||
<p>
|
<p>
|
||||||
/kripee/ , n. A cryptographer. One who hacks or implements cryptographic software or hardware.
|
/kripee/ , n. A cryptographer. One who hacks or implements cryptographic software or hardware.
|
||||||
|
|
|
@ -4,12 +4,8 @@ n. 1. obs. Once upon a time, before all-digital switches made it possible
|
||||||
for the phone companies to move them out of band, one could actually hear
|
for the phone companies to move them out of band, one could actually hear
|
||||||
the switching tones used to route long-distance calls. Early phreaker s
|
the switching tones used to route long-distance calls. Early phreaker s
|
||||||
built devices called es that could reproduce these tones, which could be
|
built devices called es that could reproduce these tones, which could be
|
||||||
used to commandeer portions of the phone network. (This was not as hard as
|
used to commandeer portions of the phone network. There were other colors
|
||||||
it may sound; one early phreak acquired the sobriquet Captain Crunch after
|
of box with more specialized phreaking uses; red boxes, black boxes, silver
|
||||||
he proved that he could generate switching tones with a plastic whistle
|
|
||||||
pulled out of a box of Captain Crunch cereal!) There were other colors of
|
|
||||||
box with more specialized phreaking uses; red boxes, black boxes, silver
|
|
||||||
boxes, etc. There were boxes of other colors as well, but the was the
|
boxes, etc. There were boxes of other colors as well, but the was the
|
||||||
original and archetype. 2. n. An IBM machine, especially a large (non-PC)
|
original and archetype. 2. n. An IBM machine, especially a large (non-PC)
|
||||||
one.
|
one.
|
||||||
|
|
||||||
|
|
|
@ -17,8 +17,7 @@ compile or execute. The term came into being specifically for a famous
|
||||||
program on the BBC micro that ed BASIC source in order to make it run more
|
program on the BBC micro that ed BASIC source in order to make it run more
|
||||||
quickly (it was a wholly interpretive BASIC, so the number of characters
|
quickly (it was a wholly interpretive BASIC, so the number of characters
|
||||||
mattered). Obfuscated C Contest entries are often ed; see the first example
|
mattered). Obfuscated C Contest entries are often ed; see the first example
|
||||||
under that entry. 5. Pseudonym of John Draper, an early hacker and phreaker.
|
under that entry. 7. Lowest common denominator intensification of labor
|
||||||
See phreaking. 6. Lowest common denominator intensification of labor
|
|
||||||
strategy. A phase of (typically though not exclusively) commercial software
|
strategy. A phase of (typically though not exclusively) commercial software
|
||||||
development when hackers are threatened by their project managers in order
|
development when hackers are threatened by their project managers in order
|
||||||
to work additional unpaid hours to meet some arbitrary deadline decided by
|
to work additional unpaid hours to meet some arbitrary deadline decided by
|
||||||
|
|
Loading…
Reference in New Issue
Block a user