If it's not hacker slang it probably doesn't belong here
This commit is contained in:
parent
bc3bdaefb6
commit
f370f66761
@ -5,7 +5,7 @@ tweaking a single output bit, in software, at the appropriate times. The
|
|||||||
technique is a simple loop with eight OUT and SHIFT instruction pairs for
|
technique is a simple loop with eight OUT and SHIFT instruction pairs for
|
||||||
each byte. Input is more interesting. And full duplex (doing input and
|
each byte. Input is more interesting. And full duplex (doing input and
|
||||||
output at the same time) is one way to separate the real hackers from the
|
output at the same time) is one way to separate the real hackers from the
|
||||||
wannabee s. Bit bang was used on certain early models of Prime computers,
|
wannabees. Bit bang was used on certain early models of Prime computers,
|
||||||
presumably when UARTs were too expensive, and on archaic Z80 micros with a
|
presumably when UARTs were too expensive, and on archaic Z80 micros with a
|
||||||
Zilog PIO but no SIO. In an interesting instance of the cycle of
|
Zilog PIO but no SIO. In an interesting instance of the cycle of
|
||||||
reincarnation , this technique returned to use in the early 1990s on some
|
reincarnation , this technique returned to use in the early 1990s on some
|
||||||
@ -13,4 +13,3 @@ RISC architectures because it consumes such an infinitesimal part of the
|
|||||||
processor that it actually makes sense not to have a UART. Compare cycle of
|
processor that it actually makes sense not to have a UART. Compare cycle of
|
||||||
reincarnation. Nowadays it's used to describe I2C, a serial protocol for
|
reincarnation. Nowadays it's used to describe I2C, a serial protocol for
|
||||||
monitoring motherboard hardware.
|
monitoring motherboard hardware.
|
||||||
|
|
||||||
|
@ -7,7 +7,6 @@ disquieting amount of truth, or truths that are constructed on in-joke and
|
|||||||
self-parody. This lexicon contains many examples of ha-ha-only-serious in
|
self-parody. This lexicon contains many examples of ha-ha-only-serious in
|
||||||
both form and content. Indeed, the entirety of hacker culture is often
|
both form and content. Indeed, the entirety of hacker culture is often
|
||||||
perceived as ha-ha-only-serious by hackers themselves; to take it either too
|
perceived as ha-ha-only-serious by hackers themselves; to take it either too
|
||||||
lightly or too seriously marks a person as an outsider, a wannabee , or in
|
lightly or too seriously marks a person as an outsider, a wannabee, or in
|
||||||
larval stage. For further enlightenment on this subject, consult any Zen
|
larval stage. For further enlightenment on this subject, consult any Zen
|
||||||
master. See also hacker humor , and koan.
|
master. See also hacker humor, and koan.
|
||||||
|
|
||||||
|
@ -7,7 +7,7 @@ elite. Has the same connotations of self-conscious elitism that use of luser
|
|||||||
does among hackers. 2. Someone who tries to crack a BBS. 3. Someone who
|
does among hackers. 2. Someone who tries to crack a BBS. 3. Someone who
|
||||||
annoys the sysop or other BBS users for instance, by posting lots of silly
|
annoys the sysop or other BBS users for instance, by posting lots of silly
|
||||||
messages, uploading virus-ridden software, frequently dropping carrier, etc.
|
messages, uploading virus-ridden software, frequently dropping carrier, etc.
|
||||||
Crackers also use it to refer to cracker wannabee s. In phreak culture, a
|
Crackers also use it to refer to cracker wannabees. In phreak culture, a
|
||||||
lamer is one who scams codes off others rather than doing cracks or really
|
lamer is one who scams codes off others rather than doing cracks or really
|
||||||
understanding the fundamental concepts. In warez d00dz culture, where the
|
understanding the fundamental concepts. In warez d00dz culture, where the
|
||||||
ability to wave around cracked commercial software within days of (or
|
ability to wave around cracked commercial software within days of (or
|
||||||
@ -20,4 +20,3 @@ popularized among Amiga crackers of the mid-1980s by Lamer Exterminator ,
|
|||||||
the most famous and feared Amiga virus ever, which gradually corrupted
|
the most famous and feared Amiga virus ever, which gradually corrupted
|
||||||
non-write-protected floppy disks with bad sectors. The bad sectors, when
|
non-write-protected floppy disks with bad sectors. The bad sectors, when
|
||||||
looked at, were overwritten with repetitions of the string LAMER!.
|
looked at, were overwritten with repetitions of the string LAMER!.
|
||||||
|
|
||||||
|
@ -4,5 +4,4 @@ munchkin
|
|||||||
The Wizard of Oz ] A teenage-or-younger micro enthusiast hacking BASIC or
|
The Wizard of Oz ] A teenage-or-younger micro enthusiast hacking BASIC or
|
||||||
something else equally constricted. A term of mild derision munchkins are
|
something else equally constricted. A term of mild derision munchkins are
|
||||||
annoying but some grow up to be hackers after passing through a larval
|
annoying but some grow up to be hackers after passing through a larval
|
||||||
stage. The term urchin is also used. See also wannabee , bitty box.
|
stage. The term urchin is also used. See also wannabee, bitty box.
|
||||||
|
|
||||||
|
@ -1,7 +0,0 @@
|
|||||||
poser
|
|
||||||
|
|
||||||
n. [from French poseur ] A wannabee ; not hacker slang, but used among
|
|
||||||
crackers, phreaks and warez d00dz. Not as negative as lamer or leech.
|
|
||||||
Probably derives from a similar usage among punk-rockers and metalheads,
|
|
||||||
putting down those who talk the talk but don't walk the walk.
|
|
||||||
|
|
Loading…
Reference in New Issue
Block a user