Insufficient notability
This commit is contained in:
parent
231251d0a8
commit
e3b3503146
@ -19,7 +19,7 @@ Free Documentation License".
|
||||
|
||||
* Generated
|
||||
|
||||
This file last generated Thursday, 13 September 2018 06:29PM UTC
|
||||
This file last generated Thursday, 13 September 2018 06:33PM UTC
|
||||
|
||||
* Glossary
|
||||
** (
|
||||
@ -2381,7 +2381,7 @@ vt. To blow out despite a safeguard. The server blew past the 5K reserve buffer.
|
||||
2. Syn. blow out.
|
||||
|
||||
*** blue box
|
||||
1. obs. Once upon a time, before all-digital switches made it possible for the phone companies to move them out of band, one could actually hear the switching tones used to route long-distance calls. Early phreaker s built devices called es that could reproduce these tones, which could be used to commandeer portions of the phone network. (This was not as hard as it may sound; one early phreak acquired the sobriquet Captain Crunch after he proved that he could generate switching tones with a plastic whistle pulled out of a box of Captain Crunch cereal!) There were other colors of box with more specialized phreaking uses; red boxes, black boxes, silver boxes, etc. There were boxes of other colors as well, but the was the original and archetype.
|
||||
1. obs. Once upon a time, before all-digital switches made it possible for the phone companies to move them out of band, one could actually hear the switching tones used to route long-distance calls. Early phreaker s built devices called es that could reproduce these tones, which could be used to commandeer portions of the phone network. There were other colors of box with more specialized phreaking uses; red boxes, black boxes, silver boxes, etc. There were boxes of other colors as well, but the was the original and archetype.
|
||||
|
||||
2. n. An IBM machine, especially a large (non-PC) one.
|
||||
|
||||
@ -3257,11 +3257,7 @@ n. Two binary digits; a quad. Larger than a bit , smaller than a nybble. Conside
|
||||
|
||||
3. n. The character #. Used at XEROX and CMU, among other places. See ASCII.
|
||||
|
||||
4. vt. To squeeze program source into a minimum-size representation that will still compile or execute. The term came into being specifically for a famous program on the BBC micro that ed BASIC source in order to make it run more quickly (it was a wholly interpretive BASIC, so the number of characters mattered). Obfuscated C Contest entries are often ed; see the first example under that entry.
|
||||
|
||||
5. Pseudonym of John Draper, an early hacker and phreaker. See phreaking.
|
||||
|
||||
6. Lowest common denominator intensification of labor strategy. A phase of (typically though not exclusively) commercial software development when hackers are threatened by their project managers in order to work additional unpaid hours to meet some arbitrary deadline decided by a suit on a golf course. "I won't be at the hackspace tonight because there's a crunch on at work".
|
||||
4. vt. To squeeze program source into a minimum-size representation that will still compile or execute. The term came into being specifically for a famous program on the BBC micro that ed BASIC source in order to make it run more quickly (it was a wholly interpretive BASIC, so the number of characters mattered). Obfuscated C Contest entries are often ed; see the first example under that entry. 7. Lowest common denominator intensification of labor strategy. A phase of (typically though not exclusively) commercial software development when hackers are threatened by their project managers in order to work additional unpaid hours to meet some arbitrary deadline decided by a suit on a golf course. "I won't be at the hackspace tonight because there's a crunch on at work".
|
||||
|
||||
*** cryppie
|
||||
/kripee/ , n. A cryptographer. One who hacks or implements cryptographic software or hardware.
|
||||
|
BIN
docs/jargon.1.gz
BIN
docs/jargon.1.gz
Binary file not shown.
@ -18,7 +18,7 @@ Free Documentation License".
|
||||
</p>
|
||||
<H2>Generated</H2>
|
||||
<p>
|
||||
This file last generated Thursday, 13 September 2018 06:29PM UTC
|
||||
This file last generated Thursday, 13 September 2018 06:33PM UTC
|
||||
|
||||
</p>
|
||||
<H2>Glossary</H2>
|
||||
@ -2855,7 +2855,7 @@ This file last generated Thursday, 13 September 2018 06:29PM UTC
|
||||
|
||||
<p>2. Syn. blow out.</p>
|
||||
<H4>blue box</H4>
|
||||
<p>1. obs. Once upon a time, before all-digital switches made it possible for the phone companies to move them out of band, one could actually hear the switching tones used to route long-distance calls. Early phreaker s built devices called es that could reproduce these tones, which could be used to commandeer portions of the phone network. (This was not as hard as it may sound; one early phreak acquired the sobriquet Captain Crunch after he proved that he could generate switching tones with a plastic whistle pulled out of a box of Captain Crunch cereal!) There were other colors of box with more specialized phreaking uses; red boxes, black boxes, silver boxes, etc. There were boxes of other colors as well, but the was the original and archetype. </p>
|
||||
<p>1. obs. Once upon a time, before all-digital switches made it possible for the phone companies to move them out of band, one could actually hear the switching tones used to route long-distance calls. Early phreaker s built devices called es that could reproduce these tones, which could be used to commandeer portions of the phone network. There were other colors of box with more specialized phreaking uses; red boxes, black boxes, silver boxes, etc. There were boxes of other colors as well, but the was the original and archetype. </p>
|
||||
|
||||
<p>2. n. An IBM machine, especially a large (non-PC) one.</p>
|
||||
<H4>blue goo</H4>
|
||||
@ -3874,11 +3874,7 @@ This file last generated Thursday, 13 September 2018 06:29PM UTC
|
||||
|
||||
<p>3. n. The character #. Used at XEROX and CMU, among other places. See ASCII. </p>
|
||||
|
||||
<p>4. vt. To squeeze program source into a minimum-size representation that will still compile or execute. The term came into being specifically for a famous program on the BBC micro that ed BASIC source in order to make it run more quickly (it was a wholly interpretive BASIC, so the number of characters mattered). Obfuscated C Contest entries are often ed; see the first example under that entry. </p>
|
||||
|
||||
<p>5. Pseudonym of John Draper, an early hacker and phreaker. See phreaking. </p>
|
||||
|
||||
<p>6. Lowest common denominator intensification of labor strategy. A phase of (typically though not exclusively) commercial software development when hackers are threatened by their project managers in order to work additional unpaid hours to meet some arbitrary deadline decided by a suit on a golf course. "I won't be at the hackspace tonight because there's a crunch on at work".</p>
|
||||
<p>4. vt. To squeeze program source into a minimum-size representation that will still compile or execute. The term came into being specifically for a famous program on the BBC micro that ed BASIC source in order to make it run more quickly (it was a wholly interpretive BASIC, so the number of characters mattered). Obfuscated C Contest entries are often ed; see the first example under that entry. 7. Lowest common denominator intensification of labor strategy. A phase of (typically though not exclusively) commercial software development when hackers are threatened by their project managers in order to work additional unpaid hours to meet some arbitrary deadline decided by a suit on a golf course. "I won't be at the hackspace tonight because there's a crunch on at work".</p>
|
||||
<H4>cryppie</H4>
|
||||
<p>
|
||||
/kripee/ , n. A cryptographer. One who hacks or implements cryptographic software or hardware.
|
||||
|
@ -4,12 +4,8 @@ n. 1. obs. Once upon a time, before all-digital switches made it possible
|
||||
for the phone companies to move them out of band, one could actually hear
|
||||
the switching tones used to route long-distance calls. Early phreaker s
|
||||
built devices called es that could reproduce these tones, which could be
|
||||
used to commandeer portions of the phone network. (This was not as hard as
|
||||
it may sound; one early phreak acquired the sobriquet Captain Crunch after
|
||||
he proved that he could generate switching tones with a plastic whistle
|
||||
pulled out of a box of Captain Crunch cereal!) There were other colors of
|
||||
box with more specialized phreaking uses; red boxes, black boxes, silver
|
||||
used to commandeer portions of the phone network. There were other colors
|
||||
of box with more specialized phreaking uses; red boxes, black boxes, silver
|
||||
boxes, etc. There were boxes of other colors as well, but the was the
|
||||
original and archetype. 2. n. An IBM machine, especially a large (non-PC)
|
||||
one.
|
||||
|
||||
|
@ -17,8 +17,7 @@ compile or execute. The term came into being specifically for a famous
|
||||
program on the BBC micro that ed BASIC source in order to make it run more
|
||||
quickly (it was a wholly interpretive BASIC, so the number of characters
|
||||
mattered). Obfuscated C Contest entries are often ed; see the first example
|
||||
under that entry. 5. Pseudonym of John Draper, an early hacker and phreaker.
|
||||
See phreaking. 6. Lowest common denominator intensification of labor
|
||||
under that entry. 7. Lowest common denominator intensification of labor
|
||||
strategy. A phase of (typically though not exclusively) commercial software
|
||||
development when hackers are threatened by their project managers in order
|
||||
to work additional unpaid hours to meet some arbitrary deadline decided by
|
||||
|
Loading…
Reference in New Issue
Block a user