diff options
Diffstat (limited to '3008-0.txt')
| -rw-r--r-- | 3008-0.txt | 49752 |
1 files changed, 49752 insertions, 0 deletions
diff --git a/3008-0.txt b/3008-0.txt new file mode 100644 index 0000000..c0594da --- /dev/null +++ b/3008-0.txt @@ -0,0 +1,49752 @@ +The Project Gutenberg eBook of The New Hacker's Dictionary version 4.2.2, by various editors + +This eBook is for the use of anyone anywhere in the United States and most +other parts of the world at no cost and with almost no restrictions +whatsoever. You may copy it, give it away or re-use it under the terms of +the Project Gutenberg License included with this eBook or online at +www.gutenberg.org. If you are not located in the United States, you'll have +to check the laws of the country where you are located before using this ebook. + +Title: The New Hacker's Dictionary version 4.2.2 + +Author: Various editors + +Release Date: January, 2002 [eBook #3008] +[Most recently updated: April 15, 2022] + +Language: English + +Character set encoding: UTF-8 + +*** START OF THIS PROJECT GUTENBERG EBOOK THE NEW HACKER'S DICTIONARY 4.2.2 *** + + + + +Node:Top, Next:Introduction, Previous:(dir), Up:(dir) + + +#======= THIS IS THE JARGON FILE, VERSION 4.2.2, 20 AUG 2000 =======# + + +This is the Jargon File, a comprehensive compendium of hacker +slang illuminating many aspects of hackish tradition, folklore, +and humor. + +This document (the Jargon File) is in the public domain, to be +freely used, shared, and modified. There are (by intention) no +legal restraints on what you can do with it, but there are +traditions about its proper use to which many hackers are quite +strongly attached. Please extend the courtesy of proper citation +when you quote the File, ideally with a version number, as it +will change and grow over time. (Examples of appropriate citation +form: "Jargon File 4.2.2" or "The on-line hacker Jargon File, +version 4.2.2, 20 AUG 2000".) + +The Jargon File is a common heritage of the hacker culture. +Over the years a number of individuals have volunteered +considerable time to maintaining the File and been recognized by +the net at large as editors of it. Editorial responsibilities +include: to collate contributions and suggestions from others; to +seek out corroborating information; to cross-reference related +entries; to keep the file in a consistent format; and to announce +and distribute updated versions periodically. Current volunteer +editors include: + +Eric Raymond + +Although there is no requirement that you do so, it is +considered good form to check with an editor before quoting the +File in a published work or commercial product. We may have +additional information that would be helpful to you and can +assist you in framing your quote to reflect not only the letter +of the File but its spirit as well. + +All contributions and suggestions about this file sent to a +volunteer editor are gratefully received and will be regarded, +unless otherwise labelled, as freely given donations for possible +use as part of this public-domain file. + +From time to time a snapshot of this file has been polished, +edited, and formatted for commercial publication with the +cooperation of the volunteer editors and the hacker community at +large. If you wish to have a bound paper copy of this file, you +may find it convenient to purchase one of these. They often +contain additional material not found in on-line versions. The +two `authorized' editions so far are described in the Revision +History section; there may be more in the future. + + +Introduction: The purpose and +scope of this File + + +A Few Terms: Of Slang, Jargon +and Techspeak + + +Revision History: How the +File came to be + + +Jargon Construction: How +hackers invent jargon + + +Hacker Writing Style: +How they write + + +Email Quotes: And the Inclusion +Problem + + +Hacker Speech Style: +How hackers talk + + +International Style: +Some notes on usage outside the U.S. + + +Lamer-speak: Crackers, Phreaks, +and Lamers + + +Pronunciation Guide: How +to read the pronunciation keys + + +Other Lexicon +Conventions: How to read lexicon entries + + +Format for New +Entries: How to submit new entries for the File + + +The Jargon Lexicon: The +lexicon itself + + +Appendix A: Hacker Folklore + + +Appendix B: A Portrait of J. +Random Hacker + + +Appendix C: Helping Hacker +Culture Grow + + +Bibliography: For your further +enjoyment + + +Node:Introduction, Next:A Few Terms, Previous:Top, Up:Top + +Introduction + +This document is a collection of slang terms used by various +subcultures of computer hackers. Though some technical material +is included for background and flavor, it is not a technical +dictionary; what we describe here is the language hackers use +among themselves for fun, social communication, and technical +debate. + +The `hacker culture' is actually a loosely networked +collection of subcultures that is nevertheless conscious of some +important shared experiences, shared roots, and shared values. It +has its own myths, heroes, villains, folk epics, in-jokes, +taboos, and dreams. Because hackers as a group are particularly +creative people who define themselves partly by rejection of +`normal' values and working habits, it has unusually rich and +conscious traditions for an intentional culture less than 40 +years old. + +As usual with slang, the special vocabulary of hackers helps +hold their culture together -- it helps hackers recognize each +other's places in the community and expresses shared values and +experiences. Also as usual, not knowing the slang (or +using it inappropriately) defines one as an outsider, a mundane, +or (worst of all in hackish vocabulary) possibly even a suit. All human cultures use slang in this +threefold way -- as a tool of communication, and of inclusion, +and of exclusion. + +Among hackers, though, slang has a subtler aspect, paralleled +perhaps in the slang of jazz musicians and some kinds of fine +artists but hard to detect in most technical or scientific +cultures; parts of it are code for shared states of +consciousness. There is a whole range of altered states +and problem-solving mental stances basic to high-level hacking +which don't fit into conventional linguistic reality any better +than a Coltrane solo or one of Maurits Escher's `trompe l'oeil' +compositions (Escher is a favorite of hackers), and hacker slang +encodes these subtleties in many unobvious ways. As a simple +example, take the distinction between a kluge and an elegant solution, and the differing +connotations attached to each. The distinction is not only of +engineering significance; it reaches right back into the nature +of the generative processes in program design and asserts +something important about two different kinds of relationship +between the hacker and the hack. Hacker slang is unusually rich +in implications of this kind, of overtones and undertones that +illuminate the hackish psyche. + +But there is more. Hackers, as a rule, love wordplay and are +very conscious and inventive in their use of language. These +traits seem to be common in young children, but the +conformity-enforcing machine we are pleased to call an +educational system bludgeons them out of most of us before +adolescence. Thus, linguistic invention in most subcultures of +the modern West is a halting and largely unconscious process. +Hackers, by contrast, regard slang formation and use as a game to +be played for conscious pleasure. Their inventions thus display +an almost unique combination of the neotenous enjoyment of +language-play with the discrimination of educated and powerful +intelligence. Further, the electronic media which knit them +together are fluid, `hot' connections, well adapted to both the +dissemination of new slang and the ruthless culling of weak and +superannuated specimens. The results of this process give us +perhaps a uniquely intense and accelerated view of linguistic +evolution in action. + +Hacker slang also challenges some common linguistic and +anthropological assumptions. For example, it has recently become +fashionable to speak of `low-context' versus `high-context' +communication, and to classify cultures by the preferred context +level of their languages and art forms. It is usually claimed +that low-context communication (characterized by precision, +clarity, and completeness of self-contained utterances) is +typical in cultures which value logic, objectivity, +individualism, and competition; by contrast, high-context +communication (elliptical, emotive, nuance-filled, multi-modal, +heavily coded) is associated with cultures which value +subjectivity, consensus, cooperation, and tradition. What then +are we to make of hackerdom, which is themed around extremely +low-context interaction with computers and exhibits primarily +"low-context" values, but cultivates an almost absurdly +high-context slang style? + +The intensity and consciousness of hackish invention make a +compilation of hacker slang a particularly effective window into +the surrounding culture -- and, in fact, this one is the latest +version of an evolving compilation called the `Jargon File', +maintained by hackers themselves for over 15 years. This one +(like its ancestors) is primarily a lexicon, but also includes +topic entries which collect background or sidelight information +on hacker culture that would be awkward to try to subsume under +individual slang definitions. + +Though the format is that of a reference volume, it is +intended that the material be enjoyable to browse. Even a +complete outsider should find at least a chuckle on nearly every +page, and much that is amusingly thought-provoking. But it is +also true that hackers use humorous wordplay to make strong, +sometimes combative statements about what they feel. Some of +these entries reflect the views of opposing sides in disputes +that have been genuinely passionate; this is deliberate. We have +not tried to moderate or pretty up these disputes; rather we have +attempted to ensure that everyone's sacred cows get +gored, impartially. Compromise is not particularly a hackish +virtue, but the honest presentation of divergent viewpoints +is. + +The reader with minimal computer background who finds some +references incomprehensibly technical can safely ignore them. We +have not felt it either necessary or desirable to eliminate all +such; they, too, contribute flavor, and one of this document's +major intended audiences -- fledgling hackers already partway +inside the culture -- will benefit from them. + +A selection of longer items of hacker folklore and humor is +included in Appendix A. The +`outside' reader's attention is particularly directed to the +Portrait of J. Random Hacker in Appendix B. Appendix C, the Bibliography, lists some non-technical +works which have either influenced or described the hacker +culture. + +Because hackerdom is an intentional culture (one each +individual must choose by action to join), one should not be +surprised that the line between description and influence can +become more than a little blurred. Earlier versions of the Jargon +File have played a central role in spreading hacker language and +the culture that goes with it to successively larger populations, +and we hope and expect that this one will do likewise. + + +Node:A Few Terms, Next:Revision History, +Previous:Introduction, +Up:Top + +Of Slang, Jargon, and Techspeak + +Linguists usually refer to informal language as `slang' and +reserve the term `jargon' for the technical vocabularies of +various occupations. However, the ancestor of this collection was +called the `Jargon File', and hacker slang is traditionally `the +jargon'. When talking about the jargon there is therefore no +convenient way to distinguish it from what a linguist +would call hackers' jargon -- the formal vocabulary they learn +from textbooks, technical papers, and manuals. + +To make a confused situation worse, the line between hacker +slang and the vocabulary of technical programming and computer +science is fuzzy, and shifts over time. Further, this vocabulary +is shared with a wider technical culture of programmers, many of +whom are not hackers and do not speak or recognize hackish +slang. + +Accordingly, this lexicon will try to be as precise as the +facts of usage permit about the distinctions among three +categories: + + +`slang': informal language from mainstream English or +non-technical subcultures (bikers, rock fans, surfers, etc). + + +`jargon': without qualifier, denotes informal `slangy' +language peculiar to or predominantly found among hackers -- the +subject of this lexicon. + + +`techspeak': the formal technical vocabulary of programming, +computer science, electronics, and other fields connected to +hacking. + +This terminology will be consistently used throughout the +remainder of this lexicon. + +The jargon/techspeak distinction is the delicate one. A lot of +techspeak originated as jargon, and there is a steady continuing +uptake of jargon into techspeak. On the other hand, a lot of +jargon arises from overgeneralization of techspeak terms (there +is more about this in the Jargon Construction section +below). + +In general, we have considered techspeak any term that +communicates primarily by a denotation well established in +textbooks, technical dictionaries, or standards documents. + +A few obviously techspeak terms (names of operating systems, +languages, or documents) are listed when they are tied to hacker +folklore that isn't covered in formal sources, or sometimes to +convey critical historical background necessary to understand +other entries to which they are cross-referenced. Some other +techspeak senses of jargon words are listed in order to make the +jargon senses clear; where the text does not specify that a +straight technical sense is under discussion, these are marked +with `[techspeak]' as an etymology. Some entries have a primary +sense marked this way, with subsequent jargon meanings explained +in terms of it. + +We have also tried to indicate (where known) the apparent +origins of terms. The results are probably the least reliable +information in the lexicon, for several reasons. For one thing, +it is well known that many hackish usages have been independently +reinvented multiple times, even among the more obscure and +intricate neologisms. It often seems that the generative +processes underlying hackish jargon formation have an internal +logic so powerful as to create substantial parallelism across +separate cultures and even in different languages! For another, +the networks tend to propagate innovations so quickly that `first +use' is often impossible to pin down. And, finally, compendia +like this one alter what they observe by implicitly stamping +cultural approval on terms and widening their use. + +Despite these problems, the organized collection of +jargon-related oral history for the new compilations has enabled +us to put to rest quite a number of folk etymologies, place +credit where credit is due, and illuminate the early history of +many important hackerisms such as kluge, cruft, and +foo. We believe specialist +lexicographers will find many of the historical notes more than +casually instructive. + + +Node:Revision History, Next:Jargon Construction, +Previous:A Few +Terms, Up:Top + +Revision History + +The original Jargon File was a collection of hacker jargon +from technical cultures including the MIT AI Lab, the Stanford AI +lab (SAIL), and others of the old ARPANET AI/LISP/PDP-10 +communities including Bolt, Beranek and Newman (BBN), +Carnegie-Mellon University (CMU), and Worcester Polytechnic +Institute (WPI). + +The Jargon File (hereafter referred to as `jargon-1' or `the +File') was begun by Raphael Finkel at Stanford in 1975. From this +time until the plug was finally pulled on the SAIL computer in +1991, the File was named AIWORD.RF[UP,DOC] there. Some terms in +it date back considerably earlier (frob and some senses of moby, for instance, go back to the Tech Model +Railroad Club at MIT and are believed to date at least back to +the early 1960s). The revisions of jargon-1 were all unnumbered +and may be collectively considered `Version 1'. + +In 1976, Mark Crispin, having seen an announcement about the +File on the SAIL computer, FTPed a copy +of the File to MIT. He noticed that it was hardly restricted to +`AI words' and so stored the file on his directory as AI:MRC;SAIL +JARGON. + +The file was quickly renamed JARGON > (the `>' caused +versioning under ITS) as a flurry of enhancements were made by +Mark Crispin and Guy L. Steele Jr. Unfortunately, amidst all this +activity, nobody thought of correcting the term `jargon' to +`slang' until the compendium had already become widely known as +the Jargon File. + +Raphael Finkel dropped out of active participation shortly +thereafter and Don Woods became the SAIL contact for the File +(which was subsequently kept in duplicate at SAIL and MIT, with +periodic resynchronizations). + +The File expanded by fits and starts until about 1983; Richard +Stallman was prominent among the contributors, adding many MIT +and ITS-related coinages. + +In Spring 1981, a hacker named Charles Spurgeon got a large +chunk of the File published in Stewart Brand's "CoEvolution +Quarterly" (issue 29, pages 26-35) with illustrations by Phil +Wadler and Guy Steele (including a couple of the Crunchly +cartoons). This appears to have been the File's first paper +publication. + +A late version of jargon-1, expanded with commentary for the +mass market, was edited by Guy Steele into a book published in +1983 as "The Hacker's Dictionary" (Harper & Row CN 1082, ISBN +0-06-091082-8). The other jargon-1 editors (Raphael Finkel, Don +Woods, and Mark Crispin) contributed to this revision, as did +Richard M. Stallman and Geoff Goodfellow. This book (now out of +print) is hereafter referred to as `Steele-1983' and those six as +the Steele-1983 coauthors. + +Shortly after the publication of Steele-1983, the File +effectively stopped growing and changing. Originally, this was +due to a desire to freeze the file temporarily to facilitate the +production of Steele-1983, but external conditions caused the +`temporary' freeze to become permanent. + +The AI Lab culture had been hit hard in the late 1970s by +funding cuts and the resulting administrative decision to use +vendor-supported hardware and software instead of homebrew +whenever possible. At MIT, most AI work had turned to dedicated +LISP Machines. At the same time, the commercialization of AI +technology lured some of the AI Lab's best and brightest away to +startups along the Route 128 strip in Massachusetts and out West +in Silicon Valley. The startups built LISP machines for MIT; the +central MIT-AI computer became a TWENEX system rather than a host for the AI +hackers' beloved ITS. + +The Stanford AI Lab had effectively ceased to exist by 1980, +although the SAIL computer continued as a Computer Science +Department resource until 1991. Stanford became a major TWENEX site, at one point operating more +than a dozen TOPS-20 systems; but by the mid-1980s most of the +interesting software work was being done on the emerging BSD Unix +standard. + +In April 1983, the PDP-10-centered cultures that had nourished +the File were dealt a death-blow by the cancellation of the +Jupiter project at Digital Equipment Corporation. The File's +compilers, already dispersed, moved on to other things. +Steele-1983 was partly a monument to what its authors thought was +a dying tradition; no one involved realized at the time just how +wide its influence was to be. + +By the mid-1980s the File's content was dated, but the legend +that had grown up around it never quite died out. The book, and +softcopies obtained off the ARPANET, circulated even in cultures +far removed from MIT and Stanford; the content exerted a strong +and continuing influence on hacker language and humor. Even as +the advent of the microcomputer and other trends fueled a +tremendous expansion of hackerdom, the File (and related +materials such as the Some AI +Koans in Appendix A) came to be seen as a sort of sacred +epic, a hacker-culture Matter of Britain chronicling the heroic +exploits of the Knights of the Lab. The pace of change in +hackerdom at large accelerated tremendously -- but the Jargon +File, having passed from living document to icon, remained +essentially untouched for seven years. + +This revision contains nearly the entire text of a late +version of jargon-1 (a few obsolete PDP-10-related entries were +dropped after careful consultation with the editors of +Steele-1983). It merges in about 80% of the Steele-1983 text, +omitting some framing material and a very few entries introduced +in Steele-1983 that are now also obsolete. + +This new version casts a wider net than the old Jargon File; +its aim is to cover not just AI or PDP-10 hacker culture but all +the technical computing cultures wherein the true hacker-nature +is manifested. More than half of the entries now derive from +Usenet and represent jargon now +current in the C and Unix communities, but special efforts have +been made to collect jargon from other cultures including IBM PC +programmers, Amiga fans, Mac enthusiasts, and even the IBM +mainframe world. + +Eric S. Raymond maintains the new File with assistance from Guy L. Steele Jr.; +these are the persons primarily reflected in the File's editorial +`we', though we take pleasure in acknowledging the special +contribution of the other coauthors of Steele-1983. Please email +all additions, corrections, and correspondence relating to the +Jargon File to jargon@thyrsus.com. + +(Warning: other email addresses appear in this file but +are not guaranteed to be correct later than the revision +date on the first line. Don't email us if an attempt to +reach your idol bounces -- we have no magic way of checking +addresses or looking up people.) + +The 2.9.6 version became the main text of "The New Hacker's +Dictionary", by Eric Raymond (ed.), MIT Press 1991, ISBN +0-262-68069-6. + +The 3.0.0 version was published in September 1993 as the +second edition of "The New Hacker's Dictionary", again from MIT +Press (ISBN 0-262-18154-1). + +If you want the book, you should be able to find it at any of +the major bookstore chains. Failing that, you can order by mail +from + +The MIT Press 55 Hayward Street Cambridge, MA 02142 + +or order by phone at (800)-356-0343 or (617)-625-8481. + +The maintainers are committed to updating the on-line version +of the Jargon File through and beyond paper publication, and will +continue to make it available to archives and public-access sites +as a trust of the hacker community. + +Here is a chronology of the high points in the recent on-line +revisions: + +Version 2.1.1, Jun 12 1990: the Jargon File comes alive again +after a seven-year hiatus. Reorganization and massive additions +were by Eric S. Raymond, approved by Guy Steele. Many items of +UNIX, C, USENET, and microcomputer-based jargon were added at +that time. + +Version 2.9.6, Aug 16 1991: corresponds to reproduction copy +for book. This version had 18952 lines, 148629 words, 975551 +characters, and 1702 entries. + +Version 2.9.7, Oct 28 1991: first markup for hypertext +browser. This version had 19432 lines, 152132 words, 999595 +characters, and 1750 entries. + +Version 2.9.8, Jan 01 1992: first public release since the +book, including over fifty new entries and numerous +corrections/additions to old ones. Packaged with version 1.1 of +vh(1) hypertext reader. This version had 19509 lines, 153108 +words, 1006023 characters, and 1760 entries. + +Version 2.9.9, Apr 01 1992: folded in XEROX PARC lexicon. This +version had 20298 lines, 159651 words, 1048909 characters, and +1821 entries. + +Version 2.9.10, Jul 01 1992: lots of new historical material. +This version had 21349 lines, 168330 words, 1106991 characters, +and 1891 entries. + +Version 2.9.11, Jan 01 1993: lots of new historical material. +This version had 21725 lines, 171169 words, 1125880 characters, +and 1922 entries. + +Version 2.9.12, May 10 1993: a few new entries & changes, +marginal MUD/IRC slang and some borderline techspeak removed, all +in preparation for 2nd Edition of TNHD. This version had 22238 +lines, 175114 words, 1152467 characters, and 1946 entries. + +Version 3.0.0, Jul 27 1993: manuscript freeze for 2nd edition +of TNHD. This version had 22548 lines, 177520 words, 1169372 +characters, and 1961 entries. + +Version 3.1.0, Oct 15 1994: interim release to test WWW +conversion. This version had 23197 lines, 181001 words, 1193818 +characters, and 1990 entries. + +Version 3.2.0, Mar 15 1995: Spring 1995 update. This version +had 23822 lines, 185961 words, 1226358 characters, and 2031 +entries. + +Version 3.3.0, Jan 20 1996: Winter 1996 update. This version +had 24055 lines, 187957 words, 1239604 characters, and 2045 +entries. + +Version 3.3.1, Jan 25 1996: Copy-corrected improvement on +3.3.0 shipped to MIT Press as a step towards TNHD III. This +version had 24147 lines, 188728 words, 1244554 characters, and +2050 entries. + +Version 3.3.2, Mar 20 1996: A number of new entries pursuant +on 3.3.2. This version had 24442 lines, 190867 words, 1262468 +characters, and 2061 entries. + +Version 3.3.3, Mar 25 1996: Cleanup before TNHD III manuscript +freeze. This version had 24584 lines, 191932 words, 1269996 +characters, and 2064 entries. + +Version 4.0.0, Jul 25 1996: The actual TNHD III version after +copy-edit. This version had 24801 lines, 193697 words, 1281402 +characters, and 2067 entries. + +Version 4.1.0, 8 Apr 1999: The Jargon File rides again after +three years. This version had 25777 lines, 206825 words, 1359992 +characters, and 2217 entries. + +Version 4.1.1, 18 Apr 1999: Corrections for minor errors in +4.1.0, and some new entries. This version had 25921 lines, 208483 +words, 1371279 characters, and 2225 entries. + +Version 4.1.2, 28 Apr 1999: Moving texi2html out of the +production path. This version had 26006 lines, 209479 words, +1377687 characters, and 2225 entries. + +Version 4.1.3, 14 Jun 1999: Minor updates and markup fixes. +This version had 26108 lines, 210480 words, 1384546 characters, +and 2234 entries. + +Version 4.1.4, 17 Jun 1999: Markup fixes for framed HTML. This +version had 26117 lines, 210527 words, 1384902 characters, and +2234 entries. + +Version 4.2.0, 31 Jan 2000: Fix processing of URLs. This +version had 26598 lines, 214639 words, 1412243 characters, and +2267 entries. + +Version 4.2.1, 5 Mar 2000: Point release to test new +production machinery. This version had 26647 lines, 215040 words, +1414942 characters, and 2269 entries. + +Version 4.2.2, 12 Aug 2000: This version had 27171 lines, +219630 words, 1444887 characters, and 2302 entries. + +Version numbering: Version numbers should be read as +_major_._minor_._revision_. Major version 1 is +reserved for the `old' (ITS) Jargon File, jargon-1. Major version +2 encompasses revisions by ESR (Eric S. Raymond) with assistance +from GLS (Guy L. Steele, Jr.) leading up to and including the +second paper edition. From now on, major version number N.00 will +probably correspond to the Nth paper edition. Usually later +versions will either completely supersede or incorporate earlier +versions, so there is generally no point in keeping old versions +around. + +Our thanks to the coauthors of Steele-1983 for oversight and +assistance, and to the hundreds of Usenetters (too many to name here) +who contributed entries and encouragement. More thanks go to several of +the old-timers on the Usenet group _alt.folklore.computers_, who +contributed much useful commentary and many corrections and valuable +historical perspective: Joseph M. Newcomer, Bernie Cosell, Earl +Boebert, and Joe Morris. + +We were fortunate enough to have the aid of some accomplished +linguists. David Stampe and Charles Hoequist contributed valuable +criticism; Joe Keane helped us improve the pronunciation guides. + +A few bits of this text quote previous works. We are indebted to Brian +A. LaMacchia for obtaining permission for us to use material from the +"TMRC Dictionary"; also, Don Libes contributed some appropriate +material from his excellent book "Life With UNIX". We thank Per +Lindberg, author of the remarkable Swedish-language 'zine +"Hackerbladet", for bringing "FOO!" comics to our attention and +smuggling one of the IBM hacker underground's own baby jargon files out +to us. Thanks also to Maarten Litmaath for generously allowing the +inclusion of the ASCII pronunciation guide he formerly maintained. And +our gratitude to Marc Weiser of XEROX PARC for securing us permission +to quote from PARC's own jargon lexicon and shipping us a copy. + +It is a particular pleasure to acknowledge the major contributions of +Mark Brader and Steve Summit to the File and Dictionary; they have read +and reread many drafts, checked facts, caught typos, submitted an +amazing number of thoughtful comments, and done yeoman service in +catching typos and minor usage bobbles. Their rare combination of +enthusiasm, persistence, wide-ranging technical knowledge, and +precisionism in matters of language has been of invaluable help. +Indeed, the sustained volume and quality of Mr. Brader's input over +several years and several different editions has only allowed him to +escape co-editor credit by the slimmest of margins. + +Finally, George V. Reilly helped with TeX arcana and painstakingly +proofread some 2.7 and 2.8 versions, and Eric Tiedemann contributed +sage advice throughout on rhetoric, amphigory, and philosophunculism. + + +Node:Jargon Construction, +Next:Hacker +Writing Style, Previous:Revision History, Up:Top + +How Jargon Works + +Jargon Construction + +There are some standard methods of jargonification that became +established quite early (i.e., before 1970), spreading from such +sources as the Tech Model Railroad Club, the PDP-1 SPACEWAR +hackers, and John McCarthy's original crew of LISPers. These +include verb doubling, soundalike slang, the `-P' convention, +overgeneralization, spoken inarticulations, and +anthropomorphization. Each is discussed below. We also cover the +standard comparatives for design quality. + +Of these six, verb doubling, overgeneralization, +anthropomorphization, and (especially) spoken inarticulations +have become quite general; but soundalike slang is still largely +confined to MIT and other large universities, and the `-P' +convention is found only where LISPers flourish. + + +Verb Doubling: Doubling a verb +may change its semantics + + +Soundalike Slang: Punning +jargon + + +The -P convention: A +LISPy way to form questions + + +Overgeneralization: +Standard abuses of grammar + + +Spoken +Inarticulations: Sighing and <*sigh*>ing + + +Anthropomorphization: +Homunculi, daemons, and confused programs + + +Comparatives: Standard +comparatives for design quality + + +Node:Verb Doubling, Next:Soundalike Slang, Up:Jargon Construction + + +Verb Doubling + +A standard construction in English is to double a verb and use +it as an exclamation, such as "Bang, bang!" or "Quack, quack!". +Most of these are names for noises. Hackers also double verbs as +a concise, sometimes sarcastic comment on what the implied +subject does. Also, a doubled verb is often used to terminate a +conversation, in the process remarking on the current state of +affairs or what the speaker intends to do next. Typical examples +involve win, lose, hack, flame, barf, +chomp: + +"The disk heads just crashed." "Lose, lose." + +"Mostly he talked about his latest crock. Flame, flame." + +"Boy, what a bagbiter! Chomp, chomp!" + + +Some verb-doubled constructions have special meanings not +immediately obvious from the verb. These have their own listings +in the lexicon. + +The Usenet culture has one +tripling convention unrelated to this; the names of +`joke' topic groups often have a tripled last element. The first +and paradigmatic example was +_alt.swedish.chef.bork.bork.bork_ (a "Muppet Show" +reference); other infamous examples have included: + +_alt.french.captain.borg.borg.borg_ + +_alt.wesley.crusher.die.die.die_ + +_comp.unix.internals.system.calls.brk.brk.brk_ + +_sci.physics.edward.teller.boom.boom.boom_ + +_alt.sadistic.dentists.drill.drill.drill_ + +Node:Soundalike Slang, Next:The -P convention, +Previous:Verb +Doubling, Up:Jargon +Construction + +Soundalike slang + +Hackers will often make rhymes or puns in order to convert an +ordinary word or phrase into something more interesting. It is +considered particularly flavorful +if the phrase is bent so as to include some other jargon word; +thus the computer hobbyist magazine "Dr. Dobb's Journal" is +almost always referred to among hackers as `Dr. Frob's Journal' +or simply `Dr. Frob's'. Terms of this kind that have been in +fairly wide use include names for newspapers: + + Boston Herald => Horrid (or Harried) + Boston Globe => Boston Glob + Houston (or San Francisco) Chronicle + => the Crocknicle (or the Comical) + New York Times => New York Slime + Wall Street Journal => Wall Street Urinal + + +However, terms like these are often made up on the spur of the +moment. Standard examples include: + + Data General => Dirty Genitals + IBM 360 => IBM Three-Sickly + Government Property --- Do Not Duplicate (on keys) + => Government Duplicity --- Do Not Propagate + for historical reasons => for hysterical raisins + Margaret Jacks Hall (the CS building at Stanford) + => Marginal Hacks Hall + Microsoft => Microsloth + Internet Explorer => Internet Exploiter + + +This is not really similar to the Cockney rhyming slang it has +been compared to in the past, because Cockney substitutions are +opaque whereas hacker punning jargon is intentionally +transparent. + + +Node:The -P convention, +Next:Overgeneralization, Previous:Soundalike Slang, Up:Jargon Construction + + +The `-P' convention + +Turning a word into a question by appending the syllable `P'; +from the LISP convention of appending the letter `P' to denote a +predicate (a boolean-valued function). The question should expect +a yes/no answer, though it needn't. (See T and NIL.) + + At dinnertime: + + Q: ``Foodp?'' + + A: ``Yeah, I'm pretty hungry.'' or ``T!'' + + + At any time: + + Q: ``State-of-the-world-P?'' + + A: (Straight) ``I'm about to go home.'' + + A: (Humorous) ``Yes, the world has a state.'' + + + On the phone to Florida: + + Q: ``State-p Florida?'' + + A: ``Been reading JARGON.TXT again, eh?'' + + +[One of the best of these is a Gosperism. Once, when we were at a Chinese +restaurant, Bill Gosper wanted to know whether someone would like +to share with him a two-person-sized bowl of soup. His inquiry +was: "Split-p soup?" -- GLS] + + +Node:Overgeneralization, Next:Spoken +Inarticulations, Previous:The -P convention, Up:Jargon Construction + +Overgeneralization + +A very conspicuous feature of jargon is the frequency with +which techspeak items such as names of program tools, command +language primitives, and even assembler opcodes are applied to +contexts outside of computing wherever hackers find amusing +analogies to them. Thus (to cite one of the best-known examples) +Unix hackers often grep for things +rather than searching for them. Many of the lexicon entries are +generalizations of exactly this kind. + +Hackers enjoy overgeneralization on the grammatical level as +well. Many hackers love to take various words and add the wrong +endings to them to make nouns and verbs, often by extending a +standard rule to nonuniform cases (or vice versa). For example, +because + +porous => porosity + +generous => generosity + + +hackers happily generalize: + +mysterious => mysteriosity + +ferrous => ferrosity + +obvious => obviosity + +dubious => dubiosity + + +Another class of common construction uses the suffix `-itude' +to abstract a quality from just about any adjective or noun. This +usage arises especially in cases where mainstream English would +perform the same abstraction through `-iness' or `-ingness'. +Thus: + +win => winnitude (a common exclamation) + +loss => lossitude + +cruft => cruftitude + +lame => lameitude + + +Some hackers cheerfully reverse this transformation; they +argue, for example, that the horizontal degree lines on a globe +ought to be called `lats' -- after all, they're measuring +latitude! + +Also, note that all nouns can be verbed. E.g.: "All nouns can +be verbed", "I'll mouse it up", "Hang on while I clipboard it +over", "I'm grepping the files". English as a whole is already +heading in this direction (towards pure-positional grammar like +Chinese); hackers are simply a bit ahead of the curve. + +The suffix "-full" can also be applied in generalized and +fanciful ways, as in "As soon as you have more than one cachefull +of data, the system starts thrashing," or "As soon as I have more +than one headfull of ideas, I start writing it all down." A +common use is "screenfull", meaning the amount of text that will +fit on one screen, usually in text mode where you have no choice +as to character size. Another common form is "bufferfull". + +However, hackers avoid the unimaginative verb-making +techniques characteristic of marketroids, bean-counters, and the +Pentagon; a hacker would never, for example, `productize', +`prioritize', or `securitize' things. Hackers have a strong +aversion to bureaucratic bafflegab and regard those who use it +with contempt. + +Similarly, all verbs can be nouned. This is only a slight +overgeneralization in modern English; in hackish, however, it is +good form to mark them in some standard nonstandard way. +Thus: + +win => winnitude, winnage + +disgust => disgustitude + +hack => hackification + + +Further, note the prevalence of certain kinds of nonstandard +plural forms. Some of these go back quite a ways; the TMRC +Dictionary includes an entry which implies that the plural of +`mouse' is meeces, and notes that +the defined plural of `caboose' is `cabeese'. This latter has +apparently been standard (or at least a standard joke) among +railfans (railroad enthusiasts) for many years. + +On a similarly Anglo-Saxon note, almost anything ending in `x' +may form plurals in `-xen' (see VAXen +and boxen in the main text). Even +words ending in phonetic /k/ alone are sometimes treated this +way; e.g., `soxen' for a bunch of socks. Other funny plurals are +`frobbotzim' for the plural of `frobbozz' (see frobnitz) and `Unices' and `Twenices' (rather +than `Unixes' and `Twenexes'; see Unix, TWENEX in main +text). But note that `Twenexen' was never used, and `Unixen' was +not sighted in the wild until the year 2000, thirty years after +it might logically have come into use; it has been suggested that +this is because `-ix' and `-ex' are Latin singular endings that +attract a Latinate plural. Finally, it has been suggested to +general approval that the plural of `mongoose' ought to be +`polygoose'. + +The pattern here, as with other hackish grammatical quirks, is +generalization of an inflectional rule that in English is either +an import or a fossil (such as the Hebrew plural ending `-im', or +the Anglo-Saxon plural suffix `-en') to cases where it isn't +normally considered to apply. + +This is not `poor grammar', as hackers are generally quite +well aware of what they are doing when they distort the language. +It is grammatical creativity, a form of playfulness. It is done +not to impress but to amuse, and never at the expense of +clarity. + + +Node:Spoken +Inarticulations, Next:Anthropomorphization, Previous:Overgeneralization, +Up:Jargon +Construction + +Spoken inarticulations + +Words such as `mumble', `sigh', and `groan' are spoken in +places where their referent might more naturally be used. It has +been suggested that this usage derives from the impossibility of +representing such noises on a comm link or in electronic mail, +MUDs, and IRC channels (interestingly, the same sorts of +constructions have been showing up with increasing frequency in +comic strips). Another expression sometimes heard is "Complain!", +meaning "I have a complaint!" + + +Node:Anthropomorphization, +Next:Comparatives, +Previous:Spoken Inarticulations, Up:Jargon Construction + + +Anthropomorphization + +Semantically, one rich source of jargon constructions is the +hackish tendency to anthropomorphize hardware and software. +English purists and academic computer scientists frequently look +down on others for anthropomorphizing hardware and software, +considering this sort of behavior to be characteristic of naive +misunderstanding. But most hackers anthropomorphize freely, +frequently describing program behavior in terms of wants and +desires. + +Thus it is common to hear hardware or software talked about as +though it has homunculi talking to each other inside it, with +intentions and desires. Thus, one hears "The protocol handler got +confused", or that programs "are trying" to do things, or one may +say of a routine that "its goal in life is to X". One even hears +explanations like "... and its poor little brain +couldn't understand X, and it died." Sometimes modelling things +this way actually seems to make them easier to understand, +perhaps because it's instinctively natural to think of anything +with a really complex behavioral repertoire as `like a person' +rather than `like a thing'. + +At first glance, to anyone who understands how these programs +actually work, this seems like an absurdity. As hackers are among +the people who know best how these phenomena work, it seems odd +that they would use language that seemds to ascribe conciousness +to them. The mind-set behind this tendency thus demands +examination. + +The key to understanding this kind of usage is that it isn't +done in a naive way; hackers don't personalize their stuff in the +sense of feeling empathy with it, nor do they mystically believe +that the things they work on every day are `alive'. To the +contrary: hackers who anthropomorphize are expressing not a +vitalistic view of program behavior but a mechanistic view of +human behavior. + +Almost all hackers subscribe to the mechanistic, materialistic +ontology of science (this is in practice true even of most of the +minority with contrary religious theories). In this view, people +are biological machines - consciousness is an interesting and +valuable epiphenomenon, but mind is implemented in machinery +which is not fundamentally different in information-processing +capacity from computers. + +Hackers tend to take this a step further and argue that the +difference between a substrate of CHON atoms and water and a +substrate of silicon and metal is a relatively unimportant one; +what matters, what makes a thing `alive', is information and +richness of pattern. This is animism from the flip side; it +implies that humans and computers and dolphins and rocks are all +machines exhibiting a continuum of modes of `consciousness' +according to their information-processing capacity. + +Because hackers accept a that a human machine can have +intentions, it is therefore easy for them to ascribe +consciousness and intention to complex patterned systems such as +computers. If consciousness is mechanical, it is neither more or +less absurd to say that "The program wants to go into an infinite +loop" than it is to say that "I want to go eat some chocolate" - +and even defensible to say that "The stone, once dropped, wants +to move towards the center of the earth". + +This viewpoint has respectable company in academic philosophy. +Daniel Dennett organizes explanations of behavior using three +stances: the "physical stance" (thing-to-be-explained as a +physical object), the "design stance" (thing-to-be-explained as +an artifact), and the "intentional stance" (thing-to-be-explained +as an agent with desires and intentions). Which stances are +appropriate is a matter not of truth but of utility. Hackers +typically view simple programs from the design stance, but more +complex ones are modelled using the intentional stance. + + +Node:Comparatives, Previous:Anthropomorphization, +Up:Jargon +Construction + +Comparatives + +Finally, note that many words in hacker jargon have to be +understood as members of sets of comparatives. This is especially +true of the adjectives and nouns used to describe the beauty and +functional quality of code. Here is an approximately correct +spectrum: + +monstrosity brain-damage screw bug lose +misfeature + +crock kluge hack win feature elegance perfection + + +The last is spoken of as a mythical absolute, approximated but +never actually attained. Another similar scale is used for +describing the reliability of software: + +broken flaky dodgy fragile brittle + +solid robust bulletproof armor-plated + + +Note, however, that `dodgy' is primarily Commonwealth Hackish +(it is rare in the U.S.) and may change places with `flaky' for +some speakers. + +Coinages for describing lossage +seem to call forth the very finest in hackish linguistic +inventiveness; it has been truly said that hackers have even more +words for equipment failures than Yiddish has for obnoxious +people. + + +Node:Hacker Writing Style, +Next:Email Quotes, +Previous:Jargon +Construction, Up:Top + +Hacker Writing Style + +We've already seen that hackers often coin jargon by +overgeneralizing grammatical rules. This is one aspect of a more +general fondness for form-versus-content language jokes that +shows up particularly in hackish writing. One correspondent +reports that he consistently misspells `wrong' as `worng'. Others +have been known to criticize glitches in Jargon File drafts by +observing (in the mode of Douglas Hofstadter) "This sentence no +verb", or "Too repetetetive", or "Bad speling", or "Incorrectspa +cing." Similarly, intentional spoonerisms are often made of +phrases relating to confusion or things that are confusing; `dain +bramage' for `brain damage' is perhaps the most common +(similarly, a hacker would be likely to write "Excuse me, I'm +cixelsyd today", rather than "I'm dyslexic today"). This sort of +thing is quite common and is enjoyed by all concerned. + +Hackers tend to use quotes as balanced delimiters like +parentheses, much to the dismay of American editors. Thus, if +"Jim is going" is a phrase, and so are "Bill runs" and "Spock +groks", then hackers generally prefer to write: "Jim is going", +"Bill runs", and "Spock groks". This is incorrect according to +standard American usage (which would put the continuation commas +and the final period inside the string quotes); however, it is +counter-intuitive to hackers to mutilate literal strings with +characters that don't belong in them. Given the sorts of examples +that can come up in discussions of programming, American-style +quoting can even be grossly misleading. When communicating +command lines or small pieces of code, extra characters can be a +real pain in the neck. + +Consider, for example, a sentence in a vi tutorial that looks like this: + +Then delete a line from the file by typing +"dd". + + +Standard usage would make this + +Then delete a line from the file by typing +"dd." + + +but that would be very bad -- because the reader would be +prone to type the string d-d-dot, and it happens that in +vi(1) dot repeats the last command accepted. The net +result would be to delete two lines! + +The Jargon File follows hackish usage throughout. + +Interestingly, a similar style is now preferred practice in +Great Britain, though the older style (which became established +for typographical reasons having to do with the aesthetics of +comma and quotes in typeset text) is still accepted there. +"Hart's Rules" and the "Oxford Dictionary for Writers and +Editors" call the hacker-like style `new' or `logical' quoting. +This returns British English to the style Latin languages +(including Spanish, French, Italian, Catalan) have been using all +along. + +Another hacker habit is a tendency to distinguish between +`scare' quotes and `speech' quotes; that is, to use British-style +single quotes for marking and reserve American-style double +quotes for actual reports of speech or text included from +elsewhere. Interestingly, some authorities describe this as +correct general usage, but mainstream American English has gone +to using double-quotes indiscriminately enough that hacker usage +appears marked [and, in fact, I thought this was a personal quirk +of mine until I checked with Usenet --ESR]. One further +permutation that is definitely not standard is a hackish +tendency to do marking quotes by using apostrophes (single +quotes) in pairs; that is, 'like this'. This is modelled on +string and character literal syntax in some programming languages +(reinforced by the fact that many character-only terminals +display the apostrophe in typewriter style, as a vertical single +quote). + +One quirk that shows up frequently in the email style of Unix hackers in particular is a +tendency for some things that are normally all-lowercase +(including usernames and the names of commands and C routines) to +remain uncapitalized even when they occur at the beginning of +sentences. It is clear that, for many hackers, the case of such +identifiers becomes a part of their internal representation (the +`spelling') and cannot be overridden without mental effort (an +appropriate reflex because Unix and C both distinguish cases and +confusing them can lead to lossage). A way of escaping this dilemma is +simply to avoid using these constructions at the beginning of +sentences. + +There seems to be a meta-rule behind these nonstandard +hackerisms to the effect that precision of expression is more +important than conformance to traditional rules; where the latter +create ambiguity or lose information they can be discarded +without a second thought. It is notable in this respect that +other hackish inventions (for example, in vocabulary) also tend +to carry very precise shades of meaning even when constructed to +appear slangy and loose. In fact, to a hacker, the contrast +between `loose' form and `tight' content in jargon is a +substantial part of its humor! + +Hackers have also developed a number of punctuation and +emphasis conventions adapted to single-font all-ASCII +communications links, and these are occasionally carried over +into written documents even when normal means of font changes, +underlining, and the like are available. + +One of these is that TEXT IN ALL CAPS IS INTERPRETED AS +`LOUD', and this becomes such an ingrained synesthetic reflex +that a person who goes to caps-lock while in talk mode may be asked to "stop shouting, +please, you're hurting my ears!". + +Also, it is common to use bracketing with unusual characters +to signify emphasis. The asterisk is most common, as in "What the +*hell*?" even though this interferes with the common use of the +asterisk suffix as a footnote mark. The underscore is also +common, suggesting underlining (this is particularly common with +book titles; for example, "It is often alleged that Joe Haldeman +wrote _The_Forever_War_ as a rebuttal to Robert Heinlein's +earlier novel of the future military, _Starship_Troopers_."). +Other forms exemplified by "=hell=", "\hell/", or "/hell/" are +occasionally seen (it's claimed that in the last example the +first slash pushes the letters over to the right to make them +italic, and the second keeps them from falling over). On FidoNet, +you might see #bright# and ^dark^ text, which was actually +interpreted by some reader software. Finally, words may also be +emphasized L I K E T H I S, or by a series of carets (^) under +them on the next line of the text. + +There is a semantic difference between *emphasis like this* +(which emphasizes the phrase as a whole), and *emphasis* *like* +*this* (which suggests the writer speaking very slowly and +distinctly, as if to a very young child or a mentally impaired +person). Bracketing a word with the `*' character may also +indicate that the writer wishes readers to consider that an +action is taking place or that a sound is being made. Examples: +*bang*, *hic*, *ring*, *grin*, *kick*, *stomp*, *mumble*. + +One might also see the above sound effects as <bang>, +<hic>, <ring>, <grin>, <kick>, +<stomp>, <mumble>. This use of angle brackets to mark +their contents originally derives from conventions used in BNF, but since about 1993 it has been +reinforced by the HTML markup used on the World Wide Web. + +Angle-bracket enclosure is also used to indicate that a term +stands for some random member of a +larger class (this is straight from BNF). Examples like the following are common: + +So this <ethnic> walks into a bar one day... + + +There is also an accepted convention for `writing under +erasure'; the text + +Be nice to this fool^H^H^H^Hgentleman, +he's visiting from corporate HQ. + + +reads roughly as "Be nice to this fool, er, +gentleman...", with irony emphasized. The digraph +^H is often used as a print representation for a backspace, and +was actually very visible on old-style printing terminals. As the +text was being composed the characters would be echoed and +printed immediately, and when a correction was made the backspace +keystrokes would be echoed with the string '^H'. Of course, the +final composed text would have no trace of the backspace +characters (or the original erroneous text). + +This convention parallels (and may have been influenced by) +the ironic use of `slashouts' in science-fiction fanzines. + +A related habit uses editor commands to signify corrections to +previous text. This custom faded in email as more mailers got +good editing capabilities, only to tale on new life on IRCs and +other line-based chat systems. + +I've seen that term used on alt.foobar often. +Send it to Erik for the File. +Oops...s/Erik/Eric/. + + +The s/Erik/Eric/ says "change Erik to Eric in the preceding". +This syntax is borrowed from the Unix editing tools +ed and sed, but is widely recognized by +non-Unix hackers as well. + +In a formula, * signifies multiplication but two +asterisks in a row are a shorthand for exponentiation (this +derives from FORTRAN). Thus, one might write 2 ** 8 = 256. + +Another notation for exponentiation one sees more frequently +uses the caret (^, ASCII 1011110); one might write instead +2^8 = 256. This goes all the way back to Algol-60, +which used the archaic ASCII `up-arrow' that later became the +caret; this was picked up by Kemeny and Kurtz's original BASIC, +which in turn influenced the design of the bc(1) and +dc(1) Unix tools, which have probably done most to +reinforce the convention on Usenet. (TeX math mode also uses ^ +for exponention.) The notation is mildly confusing to C +programmers, because ^ means bitwise exclusive-or in +C. Despite this, it was favored 3:1 over ** in a late-1990 +snapshot of Usenet. It is used consistently in this lexicon. + +In on-line exchanges, hackers tend to use decimal forms or +improper fractions (`3.5' or `7/2') rather than `typewriter +style' mixed fractions (`3-1/2'). The major motive here is +probably that the former are more readable in a monospaced font, +together with a desire to avoid the risk that the latter might be +read as `three minus one-half'. The decimal form is definitely +preferred for fractions with a terminating decimal +representation; there may be some cultural influence here from +the high status of scientific notation. + +Another on-line convention, used especially for very large or +very small numbers, is taken from C (which derived it from +FORTRAN). This is a form of `scientific notation' using `e' to +replace `*10^'; for example, one year is about 3e7 seconds +long. + +The tilde (~) is commonly used in a quantifying sense of +`approximately'; that is, ~50 means `about +fifty'. + +On Usenet and in the MUD world, +common C boolean, logical, and relational operators such as +|, &, ||, +&&, !, ==, +!=, >, <, +>=, and =< are often combined +with English. The Pascal not-equals, <>, is +also recognized, and occasionally one sees /= for +not-equals (from Ada, Common Lisp, and Fortran 90). The use of +prefix `!' as a loose synonym for `not-' or `no-' is particularly +common; thus, `!clue' is read `no-clue' or `clueless'. + +A related practice borrows syntax from preferred programming +languages to express ideas in a natural-language text. For +example, one might see the following: + +In <jrh578689@thudpucker.com> J. R. Hacker wrote: +>I recently had occasion to field-test the Snafu +>Systems 2300E adaptive gonkulator. The price was +>right, and the racing stripe on the case looked +>kind of neat, but its performance left something +>to be desired. + +Yeah, I tried one out too. + +#ifdef FLAME +Hasn't anyone told those idiots that you can't get +decent bogon suppression with AFJ filters at today's +net volumes? +#endif /* FLAME */ + +I guess they figured the price premium for true +frame-based semantic analysis was too high. +Unfortunately, it's also the only workable approach. +I wouldn't recommend purchase of this product unless +you're on a *very* tight budget. + +#include <disclaimer.h> +-- + == Frank Foonly (Fubarco Systems) + + +In the above, the #ifdef/#endif pair +is a conditional compilation syntax from C; here, it implies that +the text between (which is a flame) +should be evaluated only if you have turned on (or defined on) +the switch FLAME. The #include at the end is C for +"include standard disclaimer here"; the `standard disclaimer' is +understood to read, roughly, "These are my personal opinions and +not to be construed as the official position of my employer." + +The top section in the example, with > at the left margin, +is an example of an inclusion convention we'll discuss below. + +More recently, following on the huge popularity of the World +Wide Web, pseudo-HTML markup has become popular for similar +purposes: + +<flame> +Your father was a hamster and your mother smelt of elderberries! +</flame> + + +You'll even see this with an HTML-style modifier: + +<flame intensity="100%"> +You seem well-suited for a career in government. +</flame> + + +Another recent (late 1990s) construction now common on USENET +seems to be borrowed from Perl. It consists of using a dollar +sign before an uppercased form of a word or acronym to suggest +any random member of the class +indicated by the word. Thus: `$PHB' means "any random member of +the class `Pointy-Haired Boss'". + +Hackers also mix letters and numbers more freely than in +mainstream usage. In particular, it is good hackish style to +write a digit sequence where you intend the reader to understand +the text string that names that number in English. So, hackers +prefer to write `1970s' rather than `nineteen-seventies' or +`1970's' (the latter looks like a possessive). + +It should also be noted that hackers exhibit much less +reluctance to use multiply-nested parentheses than is normal in +English. Part of this is almost certainly due to influence from +LISP (which uses deeply nested parentheses (like this (see?)) in +its syntax a lot), but it has also been suggested that a more +basic hacker trait of enjoying playing with complexity and +pushing systems to their limits is in operation. + +Finally, it is worth mentioning that many studies of on-line +communication have shown that electronic links have a +de-inhibiting effect on people. Deprived of the body-language +cues through which emotional state is expressed, people tend to +forget everything about other parties except what is presented +over that ASCII link. This has both good and bad effects. A good +one is that it encourages honesty and tends to break down +hierarchical authority relationships; a bad one is that it may +encourage depersonalization and gratuitous rudeness. Perhaps in +response to this, experienced netters often display a sort of +conscious formal _politesse_ in their writing that has +passed out of fashion in other spoken and written media (for +example, the phrase "Well said, sir!" is not uncommon). + +Many introverted hackers who are next to inarticulate in +person communicate with considerable fluency over the net, +perhaps precisely because they can forget on an unconscious level +that they are dealing with people and thus don't feel stressed +and anxious as they would face to face. + +Though it is considered gauche to publicly criticize posters +for poor spelling or grammar, the network places a premium on +literacy and clarity of expression. It may well be that future +historians of literature will see in it a revival of the great +tradition of personal letters as art. + + +Node:Email Quotes, Next:Hacker Speech Style, +Previous:Hacker Writing Style, Up:Top + +Email Quotes and Inclusion Conventions + +One area where conventions for on-line writing are still in +some flux is the marking of included material from earlier +messages -- what would be called `block quotations' in ordinary +English. From the usual typographic convention employed for these +(smaller font at an extra indent), there derived a practice of +included text being indented by one ASCII TAB (0001001) +character, which under Unix and many other environments gives the +appearance of an 8-space indent. + +Early mail and netnews readers had no facility for including +messages this way, so people had to paste in copy manually. BSD +Mail(1) was the first message agent to support +inclusion, and early Usenetters emulated its style. But the TAB +character tended to push included text too far to the right +(especially in multiply nested inclusions), leading to ugly +wraparounds. After a brief period of confusion (during which an +inclusion leader consisting of three or four spaces became +established in EMACS and a few mailers), the use of leading +> or > became standard, perhaps +owing to its use in ed(1) to display tabs +(alternatively, it may derive from the > that +some early Unix mailers used to quote lines starting with "From" +in text, so they wouldn't look like the beginnings of new message +headers). Inclusions within inclusions keep their +> leaders, so the `nesting level' of a quotation +is visually apparent. + +The practice of including text from the parent article when +posting a followup helped solve what had been a major nuisance on +Usenet: the fact that articles do not arrive at different sites +in the same order. Careless posters used to post articles that +would begin with, or even consist entirely of, "No, that's wrong" +or "I agree" or the like. It was hard to see who was responding +to what. Consequently, around 1984, new news-posting software +evolved a facility to automatically include the text of a +previous article, marked with "> " or whatever the poster +chose. The poster was expected to delete all but the relevant +lines. The result has been that, now, careless posters post +articles containing the entire text of a preceding +article, followed only by "No, that's wrong" or "I +agree". + +Many people feel that this cure is worse than the original +disease, and there soon appeared newsreader software designed to +let the reader skip over included text if desired. Today, some +posting software rejects articles containing too high a +proportion of lines beginning with `>' -- but this too has led +to undesirable workarounds, such as the deliberate inclusion of +zero-content filler lines which aren't quoted and thus pull the +message below the rejection threshold. + +Because the default mailers supplied with Unix and other +operating systems haven't evolved as quickly as human usage, the +older conventions using a leading TAB or three or four spaces are +still alive; however, >-inclusion is now clearly the prevalent +form in both netnews and mail. + +Inclusion practice is still evolving, and disputes over the +`correct' inclusion style occasionally lead to holy wars. + +Most netters view an inclusion as a promise that comment on it +will immediately follow. The preferred, conversational style +looks like this, + + > relevant excerpt 1 + response to excerpt + > relevant excerpt 2 + response to excerpt + > relevant excerpt 3 + response to excerpt + + +or for short messages like this: + + > entire message + response to message + + +Thanks to poor design of some PC-based mail agents, one will +occasionally see the entire quoted message after the +response, like this + + response to message + > entire message + + +but this practice is strongly deprecated. + +Though > remains the standard inclusion +leader, | is occasionally used for extended +quotations where original variations in indentation are being +retained (one mailer even combines these and uses +|>). One also sees different styles of quoting a +number of authors in the same message: one (deprecated because it +loses information) uses a leader of > for +everyone, another (the most common) is +> > > > , > > > +, etc. (or >>>> , +>>>, etc., depending on line length and +nesting depth) reflecting the original order of messages, and yet +another is to use a different citation leader for each author, +say > , : , | , +} (preserving nesting so that the inclusion order +of messages is still apparent, or tagging the inclusions with +authors' names). Yet another style is to use each +poster's initials (or login name) as a citation leader for that +poster. + +Occasionally one sees a # leader used for +quotations from authoritative sources such as standards +documents; the intended allusion is to the root prompt (the +special Unix command prompt issued when one is running as the +privileged super-user). + + +Node:Hacker Speech Style, +Next:International +Style, Previous:Email Quotes, Up:Top + +Hacker Speech Style + +Hackish speech generally features extremely precise diction, +careful word choice, a relatively large working vocabulary, and +relatively little use of contractions or street slang. Dry humor, +irony, puns, and a mildly flippant attitude are highly valued -- +but an underlying seriousness and intelligence are essential. One +should use just enough jargon to communicate precisely and +identify oneself as a member of the culture; overuse of jargon or +a breathless, excessively gung-ho attitude is considered tacky +and the mark of a loser. + +This speech style is a variety of the precisionist English +normally spoken by scientists, design engineers, and academics in +technical fields. In contrast with the methods of jargon +construction, it is fairly constant throughout hackerdom. + +It has been observed that many hackers are confused by +negative questions -- or, at least, that the people to whom they +are talking are often confused by the sense of their answers. The +problem is that they have done so much programming that +distinguishes between + +if (going) ... + + +and + +if (!going) ... + + +that when they parse the question "Aren't you going?" it may +seem to be asking the opposite question from "Are you going?", +and so to merit an answer in the opposite sense. This confuses +English-speaking non-hackers because they were taught to answer +as though the negative part weren't there. In some other +languages (including Russian, Chinese, and Japanese) the hackish +interpretation is standard and the problem wouldn't arise. +Hackers often find themselves wishing for a word like French +`si', German `doch', or Dutch `jawel' - a word with which one +could unambiguously answer `yes' to a negative question. (See +also mu) + +For similar reasons, English-speaking hackers almost never use +double negatives, even if they live in a region where colloquial +usage allows them. The thought of uttering something that +logically ought to be an affirmative knowing it will be misparsed +as a negative tends to disturb them. + +In a related vein, hackers sometimes make a game of answering +questions containing logical connectives with a strictly literal +rather than colloquial interpretation. A non-hacker who is +indelicate enough to ask a question like "So, are you working on +finding that bug now or leaving it until later?" is +likely to get the perfectly correct answer "Yes!" (that is, "Yes, +I'm doing it either now or later, and you didn't ask +which!"). + + +Node:International Style, +Next:Lamer-speak, +Previous:Hacker +Speech Style, Up:Top + +International Style + +Although the Jargon File remains primarily a lexicon of hacker +usage in American English, we have made some effort to get input +from abroad. Though the hacker-speak of other languages often +uses translations of jargon from English (often as transmitted to +them by earlier Jargon File versions!), the local variations are +interesting, and knowledge of them may be of some use to +travelling hackers. + +There are some references herein to `Commonwealth hackish'. +These are intended to describe some variations in hacker usage as +reported in the English spoken in Great Britain and the +Commonwealth (Canada, Australia, India, etc. -- though Canada is +heavily influenced by American usage). There is also an entry on +Commonwealth Hackish +reporting some general phonetic and vocabulary differences from +U.S. hackish. + +Hackers in Western Europe and (especially) Scandinavia report +that they often use a mixture of English and their native +languages for technical conversation. Occasionally they develop +idioms in their English usage that are influenced by their +native-language styles. Some of these are reported here. + +On the other hand, English often gives rise to grammatical and +vocabulary mutations in the native language. For example, Italian +hackers often use the nonexistent verbs `scrollare' (to scroll) +and `deletare' (to delete) rather than native Italian `scorrere' +and `cancellare'. Similarly, the English verb `to hack' has been +seen conjugated in Swedish. In German, many Unix terms in English +are casually declined as if they were German verbs - thus: +mount/mounten/gemountet; grep/grepen/gegrept; +fork/forken/geforkt; core dump/core-dumpen, core-gedumpt. And +Spanish-speaking hackers use `linkar' (to link), `debugear' (to +debug), and `lockear' (to lock). + +European hackers report that this happens partly because the +English terms make finer distinctions than are available in their +native vocabularies, and partly because deliberate +language-crossing makes for amusing wordplay. + +A few notes on hackish usages in Russian have been added where +they are parallel with English idioms and thus comprehensible to +English-speakers. + + +Node:Lamer-speak, Next:Pronunciation Guide, +Previous:International Style, Up:Top + +Crackers, Phreaks, and Lamers + +From the early 1980s onward, a flourishing culture of local, +MS-DOS-based bulletin boards developed separately from Internet +hackerdom. The BBS culture has, as its seamy underside, a stratum +of `pirate boards' inhabited by crackers, phone phreaks, and warez d00dz. These people (mostly +teenagers running IBM-PC clones from their bedrooms) have +developed their own characteristic jargon, heavily influenced by +skateboard lingo and underground-rock slang. + +Though crackers often call themselves `hackers', they aren't +(they typically have neither significant programming ability, nor +Internet expertise, nor experience with UNIX or other true +multi-user systems). Their vocabulary has little overlap with +hackerdom's. Nevertheless, this lexicon covers much of it so the +reader will be able to understand what goes by on bulletin-board +systems. + +Here is a brief guide to cracker and warez d00dz usage: + + +Misspell frequently. The substitutions + + phone => fone + freak => phreak + + +are obligatory. + + +Always substitute `z's for `s's. (i.e. "codes" -> +"codez"). The substitution of 'z' for 's' has evolved so that a +'z' is bow systematically put at the end of words to denote an +illegal or cracking connection. Examples : Appz, passwordz, +passez, utilz, MP3z, distroz, pornz, sitez, gamez, crackz, +serialz, downloadz, FTPz, etc. + + +Type random emphasis characters after a post line (i.e. "Hey +Dudes!#!$#$!#!$"). + + +Use the emphatic `k' prefix ("k-kool", "k-rad", "k-awesome") +frequently. + + +Abbreviate compulsively ("I got lotsa warez w/ docs"). + + +Substitute `0' for `o' ("r0dent", "l0zer"). + + +TYPE ALL IN CAPS LOCK, SO IT LOOKS LIKE YOU'RE YELLING ALL +THE TIME. + +These traits are similar to those of B1FF, who originated as a parody of naive BBS users; also of his latter-day equivalent +Jeff K.. Occasionally, this sort +of distortion may be used as heavy sarcasm by a real hacker, as +in: + + > I got X Windows running under Linux! + + d00d! u R an 31337 hax0r + + +The only practice resembling this in actual hacker usage is +the substitution of a dollar sign of `s' in names of products or +service felt to be excessively expensive, e.g. Compu$erve, +Micro$oft. + +For further discussion of the pirate-board subculture, see +lamer, elite, leech, poser, cracker, and especially warez d00dz, banner site, ratio site, leech mode. + + +Node:Pronunciation Guide, +Next:Other +Lexicon Conventions, Previous:Lamer-speak, Up:Top + +How to Use the Lexicon + +Pronunciation Guide + +Pronunciation keys are provided in the jargon listings for all +entries that are neither dictionary words pronounced as in +standard English nor obvious compounds thereof. Slashes bracket +phonetic pronunciations, which are to be interpreted using the +following conventions: + + +Syllables are hyphen-separated, except that an accent or +back-accent follows each accented syllable (the back-accent marks +a secondary accent in some words of four or more syllables). If +no accent is given, the word is pronounced with equal +accentuation on all syllables (this is common for +abbreviations). + + +Consonants are pronounced as in American English. The letter +`g' is always hard (as in "got" rather than "giant"); `ch' is +soft ("church" rather than "chemist"). The letter `j' is the +sound that occurs twice in "judge". The letter `s' is always as +in "pass", never a z sound. The digraph `kh' is the guttural of +"loch" or "l'chaim". The digraph 'gh' is the aspirated g+h of +"bughouse" or "ragheap" (rare in English). + + +Uppercase letters are pronounced as their English letter +names; thus (for example) /H-L-L/ is equivalent to /aych el el/. +/Z/ may be pronounced /zee/ or /zed/ depending on your local +dialect. + + +Vowels are represented as follows: + + +/a/ + + +back, that + +/ah/ + + +father, palm (see note) + + +/ar/ + + +far, mark + + +/aw/ + + +flaw, caught + + +/ay/ + + +bake, rain + + +/e/ + + +less, men + + +/ee/ + + +easy, ski + + +/eir/ + + +their, software + + +/i/ + + +trip, hit + + +/i:/ + + +life, sky + + +/o/ + + +block, stock (see note) + + +/oh/ + + +flow, sew + + +/oo/ + + +loot, through + + +/or/ + + +more, door + + +/ow/ + + +out, how + + +/oy/ + + +boy, coin + + +/uh/ + + +but, some + + +/u/ + + +put, foot + + +/y/ + + +yet, young + + +/yoo/ + + +few, chew + + +/[y]oo/ + + +/oo/ with optional fronting as in `news' (/nooz/ or +/nyooz/) + + + +The glyph /*/ is used for the `schwa' sound of unstressed or +occluded vowels (the one that is often written with an +upside-down `e'). The schwa vowel is omitted in syllables +containing vocalic r, l, m or n; that is, `kitten' and `color' +would be rendered /kit'n/ and /kuhl'r/, not /kit'*n/ and +/kuhl'*r/. + +Note that the above table reflects mainly distinctions found +in standard American English (that is, the neutral dialect spoken +by TV network announcers and typical of educated speech in the +Upper Midwest, Chicago, Minneapolis/St. Paul and Philadelphia). +However, we separate /o/ from /ah/, which tend to merge in +standard American. This may help readers accustomed to accents +resembling British Received Pronunciation. + +The intent of this scheme is to permit as many readers as +possible to map the pronunciations into their local dialect by +ignoring some subset of the distinctions we make. Speakers of +British RP, for example, can smash terminal /r/ and all +unstressed vowels. Speakers of many varieties of southern +American will automatically map /o/ to /aw/; and so forth. +(Standard American makes a good reference dialect for this +purpose because it has crisp consonants and more vowel +distinctions than other major dialects, and tends to retain +distinctions between unstressed vowels. It also happens to be +what your editor speaks.) + +Entries with a pronunciation of `//' are written-only usages. +(No, Unix weenies, this does not mean `pronounce like +previous pronunciation'!) + + +Node:Other Lexicon +Conventions, Next:Format for New Entries, +Previous:Pronunciation Guide, Up:Top + +Other Lexicon Conventions + +Entries are sorted in case-blind ASCII collation order (rather +than the letter-by-letter order ignoring interword spacing common +in mainstream dictionaries), except that all entries beginning +with nonalphabetic characters are sorted after Z. The +case-blindness is a feature, not a bug. + +The beginning of each entry is marked by a colon +(:) at the left margin. This convention helps out +tools like hypertext browsers that benefit from knowing where +entry boundaries are, but aren't as context-sensitive as +humans. + +In pure ASCII renderings of the Jargon File, you will see {} +used to bracket words which themselves have entries in the File. +This isn't done all the time for every such word, but it is done +everywhere that a reminder seems useful that the term has a +jargon meaning and one might wish to refer to its entry. + +In this all-ASCII version, headwords for topic entries are +distinguished from those for ordinary entries by being followed +by "::" rather than ":"; similarly, references are surrounded by +"{{" and "}}" rather than "{" and "}". + +Defining instances of terms and phrases appear in `slanted +type'. A defining instance is one which occurs near to or as part +of an explanation of it. + +Prefixed ** is used as linguists do; to mark examples of +incorrect usage. + +We follow the `logical' quoting convention described in the +Writing Style section above. In addition, we reserve double +quotes for actual excerpts of text or (sometimes invented) +speech. Scare quotes (which mark a word being used in a +nonstandard way), and philosopher's quotes (which turn an +utterance into the string of letters or words that name it) are +both rendered with single quotes. + +References such as malloc(3) and +patch(1) are to Unix facilities (some of which, such +as patch(1), are actually freeware distributed over +Usenet). The Unix manuals use foo(n) to refer to +item foo in section (n) of the manual, where n=1 is utilities, +n=2 is system calls, n=3 is C library routines, n=6 is games, and +n=8 (where present) is system administration utilities. Sections +4, 5, and 7 of the manuals have changed roles frequently and in +any case are not referred to in any of the entries. + +Various abbreviations used frequently in the lexicon are +summarized here: + + +_abbrev._ + + +abbreviation + + +_adj._ + + +adjective + + +_adv._ + + +adverb + + +_alt._ + + +alternate + + +_cav._ + + +caveat + + +_conj._ + + +conjunction + + +_esp._ + + +especially + + +_excl._ + + +exclamation + + +_imp._ + + +imperative + + +_interj._ + + +interjection + + +_n._ + + +noun + + +_obs._ + + +obsolete + + +_pl._ + + +plural + + +_poss._ + + +possibly + + +_pref._ + + +prefix + + +_prob._ + + +probably + + +_prov._ + + +proverbial + + +_quant._ + + +quantifier + + +_suff._ + + +suffix + + +_syn._ + + +synonym (or synonymous with) + + +_v._ + + +verb (may be transitive or intransitive) + + +_var._ + + +variant + + +_vi._ + + +intransitive verb + + +_vt._ + + +transitive verb + +Where alternate spellings or pronunciations are given, +_alt._ separates two possibilities with nearly equal +distribution, while _var._ prefixes one that is markedly +less common than the primary. + +Where a term can be attributed to a particular subculture or +is known to have originated there, we have tried to so indicate. +Here is a list of abbreviations used in etymologies: + + +Amateur Packet Radio + + +A technical culture of ham-radio sites using AX.25 and TCP/IP +for wide-area networking and BBS systems. + +Berkeley + + +University of California at Berkeley + +BBN + + +Bolt, Beranek & Newman + +Cambridge + + +the university in England (not the city in +Massachusetts where MIT happens to be located!) + +CMU + + +Carnegie-Mellon University + +Commodore + + +Commodore Business Machines + +DEC + + +The Digital Equipment Corporation (now Compaq). + +Fairchild + + +The Fairchild Instruments Palo Alto development group + +FidoNet + + +See the FidoNet entry + +IBM + + +International Business Machines + +MIT + + +Massachusetts Institute of Technology; esp. the legendary MIT +AI Lab culture of roughly 1971 to 1983 and its feeder groups, +including the Tech Model Railroad Club + +NRL + + +Naval Research Laboratories + +NYU + + +New York University + +OED + + +The Oxford English Dictionary + +Purdue + + +Purdue University + +SAIL + + +Stanford Artificial Intelligence Laboratory (at Stanford +University) + +SI + + +From _Système International_, the name for the +standard conventions of metric nomenclature used in the +sciences + +Stanford + + +Stanford University + +Sun + + +Sun Microsystems + +TMRC + + +Some MITisms go back as far as the Tech Model Railroad Club +(TMRC) at MIT c. 1960. Material marked TMRC is from "An Abridged +Dictionary of the TMRC Language", originally compiled by Pete +Samson in 1959 + +UCLA + + +University of California at Los Angeles + +UK + + +the United Kingdom (England, Wales, Scotland, Northern +Ireland) + +Usenet + + +See the Usenet entry + +WPI + + +Worcester Polytechnic Institute, site of a very active +community of PDP-10 hackers during the 1970s + +WWW + + +The World-Wide-Web. + +XEROX PARC + + +XEROX's Palo Alto Research Center, site of much pioneering +research in user interface design and networking + +Yale + + +Yale University + + + +Some other etymology abbreviations such as Unix and PDP-10 +refer to technical cultures surrounding specific operating +systems, processors, or other environments. The fact that a term +is labelled with any one of these abbreviations does not +necessarily mean its use is confined to that culture. In +particular, many terms labelled `MIT' and `Stanford' are in quite +general use. We have tried to give some indication of the +distribution of speakers in the usage notes; however, a number of +factors mentioned in the introduction conspire to make these +indications less definite than might be desirable. + +A few new definitions attached to entries are marked +[proposed]. These are usually generalizations suggested by +editors or Usenet respondents in the process of commenting on +previous definitions of those entries. These are not +represented as established jargon. + + +Node:Format for New +Entries, Next:The Jargon Lexicon, Previous:Other +Lexicon Conventions, Up:Top + +Format For New Entries + +You can mail submissions for the Jargon File to jargon@snark.thyrsus.com. + +We welcome new jargon, and corrections to or amplifications of +existing entries. You can improve your submission's chances of +being included by adding background information on user +population and years of currency. References to actual usage via +URLs and/or DejaNews pointers are particularly welcomed. + +All contributions and suggestions about the Jargon File will +be considered donations to be placed in the public domain as part +of this File, and may be used in subsequent paper editions. +Submissions may be edited for accuracy, clarity and +concision. + +We are looking to expand the File's range of technical +specialties covered. There are doubtless rich veins of jargon yet +untapped in the scientific computing, graphics, and networking +hacker communities; also in numerical analysis, computer +architectures and VLSI design, language design, and many other +related fields. Send us your jargon! + +We are not interested in straight technical terms +explained by textbooks or technical dictionaries unless an entry +illuminates `underground' meanings or aspects not covered by +official histories. We are also not interested in `joke' entries +-- there is a lot of humor in the file but it must flow naturally +out of the explanations of what hackers do and how they +think. + +It is OK to submit items of jargon you have originated if they +have spread to the point of being used by people who are not +personally acquainted with you. We prefer items to be attested by +independent submission from two different sites. + +An HTML version of the File is available at +http://www.tuxedo.org/jargon. Please send us URLs for materials +related to the entries, so we can enrich the File's link +structure. + +The Jargon File will be regularly maintained and made +available for browsing on the World Wide Web, and will include a +version number. Read it, pass it around, contribute -- this is +your monument! + + +Node:The Jargon Lexicon, +Next:Appendix A, +Previous:Format for New Entries, Up:Top + +The Jargon Lexicon + + += 0 =: + + += A =: + + += B =: + + += C =: + + += D =: + + += E =: + + += F =: + + += G =: + + += H =: + + += I =: + + += J =: + + += K =: + + += L =: + + += M =: + + += N =: + + += O =: + + += P =: + + += Q =: + + += R =: + + += S =: + + += T =: + + += U =: + + += V =: + + += W =: + + += X =: + + += Y =: + + += Z =: + + +Node:= 0 =, Next:= A =, Up:The Jargon Lexicon + += 0 = + + +0: + + +1TBS: + + +120 reset: + + +2: + + +404: + + +404 compliant: + + +4.2: + + +@-party: + + +Node:0, Next:1TBS, +Up:= 0 = + +0 + +Numeric zero, as opposed to the letter `O' (the 15th letter of +the English alphabet). In their unmodified forms they look a lot +alike, and various kluges invented to make them visually distinct +have compounded the confusion. If your zero is center-dotted and +letter-O is not, or if letter-O looks almost rectangular but zero +looks more like an American football stood on end (or the +reverse), you're probably looking at a modern character display +(though the dotted zero seems to have originated as an option on +IBM 3270 controllers). If your zero is slashed but letter-O is +not, you're probably looking at an old-style ASCII graphic set +descended from the default typewheel on the venerable ASR-33 +Teletype (Scandinavians, for whom Ø is a letter, curse +this arrangement). (Interestingly, the slashed zero long predates +computers; Florian Cajori's monumental "A History of Mathematical +Notations" notes that it was used in the twelfth and thirteenth +centuries.) If letter-O has a slash across it and the zero does +not, your display is tuned for a very old convention used at IBM +and a few other early mainframe makers (Scandinavians curse +this arrangement even more, because it means two of +their letters collide). Some Burroughs/Unisys equipment displays +a zero with a reversed slash. Old CDC computers rendered +letter O as an unbroken oval and 0 as an oval broken at upper +right and lower left. And yet another convention common on early +line printers left zero unornamented but added a tail or hook to +the letter-O so that it resembled an inverted Q or cursive +capital letter-O (this was endorsed by a draft ANSI standard for +how to draw ASCII characters, but the final standard changed the +distinguisher to a tick-mark in the upper-left corner). Are we +sufficiently confused yet? + + +Node:1TBS, Next:120 reset, Previous:0, Up:= 0 = + +1TBS // n. + +The "One True Brace Style"; see indent style. + + +Node:120 reset, Next:2, Previous:1TBS, Up:= 0 = + + +120 reset /wuhn-twen'tee ree'set/ n. + +[from 120 volts, U.S. wall voltage] To cycle power on a +machine in order to reset or unjam it. Compare Big Red Switch, power cycle. + + +Node:2, Next:404, +Previous:120 reset, +Up:= 0 = + +2 infix. + +In translation software written by hackers, infix 2 often +represents the syllable to with the connotation +`translate to': as in dvi2ps (DVI to PostScript), int2string +(integer to string), and texi2roff (Texinfo to [nt]roff). Several +versions of a joke have floated around the internet in which some +idiot programmer fixes the Y2K bug by changing all the Y's in +something to K's, as in Januark, Februark, etc. + + +Node:404, Next:404 compliant, Previous:2, Up:= 0 = + + +404 // n. + +[from the HTTP error "file not found on server"] Extended to +humans to convey that the subject has no idea or no clue - +sapience not found. May be used reflexively; "Uh, I'm 404ing" +means "I'm drawing a blank". + + +Node:404 compliant, Next:4.2, Previous:404, Up:= 0 = + + +404 compliant adj. + +The status of a website which has been completely removed, +usually by the administrators of the hosting site as a result of +net abuse by the website operators. The term is a tongue-in-cheek +reference to the standard "301 compliant" Murkowski Bill +disclaimer used by spammers. See also: spam, spamvertize. + + +Node:4.2, Next:@-party, Previous:404 compliant, Up:= 0 = + +4.2 /for' poynt too'/ n. + +Without a prefix, this almost invariably refers to BSD Unix release 4.2. Note that it is an +indication of cluelessness to say "version 4.2", and "release +4.2" is rare; the number stands on its own, or is used in the +more explicit forms 4.2BSD or (less commonly) BSD 4.2. Similar +remarks apply to "4.3", "4.4" and to earlier, less-widespread +releases 4.1 and 2.9. + + +Node:@-party, Next:abbrev, Previous:4.2, Up:= 0 = + + +@-party /at'par`tee/ n. + +[from the @-sign in an Internet address] (alt. `@-sign party' +/at'si:n par`tee/) A semi-closed party thrown for hackers at a +science-fiction convention (esp. the annual World Science Fiction +Convention or "Worldcon"); one must have a network address to get in, or at +least be in company with someone who does. One of the most +reliable opportunities for hackers to meet face to face with +people who might otherwise be represented by mere phosphor dots +on their screens. Compare boink. + +The first recorded @-party was held at the Westercon (a U.S. +western regional SF convention) over the July 4th weekend in +1980. It is not clear exactly when the canonical @-party venue +shifted to the Worldcon but it had certainly become established +by Constellation in 1983. Sadly, the @-party tradition has been +in decline since about 1996, mainly because having an @-address +no longer functions as an effective lodge pin. + + +Node:= A =, Next:= B =, Previous:= 0 =, Up:The Jargon Lexicon + += A = + + +abbrev: + + +ABEND: + + +accumulator: + + +ACK: + + +Acme: + + +acolyte: + + +ad-hockery: + + +Ada: + + +address harvester: + + +adger: + + +admin: + + +ADVENT: + + +AFAIK: + + +AFJ: + + +AFK: + + +AI: + + +AI-complete: + + +AI koans: + + +AIDS: + + +AIDX: + + +airplane rule: + + +Alderson loop: + + +aliasing bug: + + +Alice and Bob: + + +all-elbows: + + +alpha geek: + + +alpha particles: + + +alt: + + +alt bit: + + +Aluminum Book: + + +ambimouseterous: + + +Amiga: + + +Amiga Persecution +Complex: + + +amoeba: + + +amp off: + + +amper: + + +Angband: + + +angle brackets: + + +angry fruit salad: + + +annoybot: + + +annoyware: + + +ANSI: + + +ANSI standard: + + +ANSI standard +pizza: + + +AOL!: + + +app: + + +arena: + + +arg: + + +ARMM: + + +armor-plated: + + +asbestos: + + +asbestos cork +award: + + +asbestos longjohns: + + +ASCII: + + +ASCII art: + + +ASCIIbetical order: + + +astroturfing: + + +atomic: + + +attoparsec: + + +AUP: + + +autobogotiphobia: + + +automagically: + + +avatar: + + +awk: + + +Node:abbrev, Next:ABEND, Previous:@-party, Up:= +A = + +abbrev /*-breev'/, /*-brev'/ n. + +Common abbreviation for `abbreviation'. + + +Node:ABEND, Next:accumulator, Previous:abbrev, Up:= A += + +ABEND /a'bend/, /*-bend'/ n. + +[ABnormal END] 1. Abnormal termination (of software); crash; lossage. Derives from an error message on the +IBM 360; used jokingly by hackers but seriously mainly by code grinders. Usually +capitalized, but may appear as `abend'. Hackers will try to +persuade you that ABEND is called `abend' because it is what +system operators do to the machine late on Friday when they want +to call it a day, and hence is from the German `Abend' = +`Evening'. 2. [_alt.callahans_] Absent By Enforced Net +Deprivation - used in the subject lines of postings warning +friends of an imminent loss of Internet access. (This can be +because of computer downtime, loss of provider, moving or +illness.) Variants of this also appear: ABVND = `Absent By +Voluntary Net Deprivation' and ABSEND = `Absent By Self-Enforced +Net Deprivation' have been sighted. + + +Node:accumulator, Next:ACK, Previous:ABEND, Up:= A += + +accumulator n. obs. + +1. Archaic term for a register. On-line use of it as a synonym +for `register' is a fairly reliable indication that the user has +been around for quite a while and/or that the architecture under +discussion is quite old. The term in full is almost never used of +microprocessor registers, for example, though symbolic names for +arithmetic registers beginning in `A' derive from historical use +of the term `accumulator' (and not, actually, from `arithmetic'). +Confusingly, though, an `A' register name prefix may also stand +for `address', as for example on the Motorola 680x0 family. 2. A +register being used for arithmetic or logic (as opposed to +addressing or a loop index), especially one being used to +accumulate a sum or count of many items. This use is in context +of a particular routine or stretch of code. "The FOOBAZ routine +uses A3 as an accumulator." 3. One's in-basket (esp. among +old-timers who might use sense 1). "You want this reviewed? Sure, +just put it in the accumulator." (See stack.) + + +Node:ACK, Next:Acme, Previous:accumulator, Up:= A = + +ACK /ak/ interj. + +1. [common; from the ASCII mnemonic for 0000110] Acknowledge. +Used to register one's presence (compare mainstream +Yo!). An appropriate response to ping or ENQ. 2. [from +the comic strip "Bloom County"] An exclamation of surprised +disgust, esp. in "Ack pffft!" Semi-humorous. Generally this sense +is not spelled in caps (ACK) and is distinguished by a following +exclamation point. 3. Used to politely interrupt someone to tell +them you understand their point (see NAK). Thus, for example, you might cut off an +overly long explanation with "Ack. Ack. Ack. I get it now". 4. An +affirmative. "Think we ought to ditch that damn NT server for a +Linux box?" "ACK!" + +There is also a usage "ACK?" (from sense 1) meaning "Are you +there?", often used in email when earlier mail has produced no +reply, or during a lull in talk +mode to see if the person has gone away (the standard +humorous response is of course NAK +(sense 1), i.e., "I'm not here"). + + +Node:Acme, Next:acolyte, Previous:ACK, Up:= A = + + +Acme n. + +The canonical supplier of bizarre, elaborate, and +non-functional gadgetry - where Rube Goldberg and Heath Robinson +(two cartoonists who specialized in elaborate contraptions) shop. +The name has been humorously expanded as A (or American) Company +Making Everything. (In fact, Acme was a real brand sold from +Sears Roebuck catalogs in the early 1900s.) Describing some X as +an "Acme X" either means "This is insanely great", or, more likely, +"This looks insanely great +on paper, but in practice it's really easy to shoot yourself in +the foot with it." Compare pistol. + +This term, specially cherished by American hackers and +explained here for the benefit of our overseas brethren, comes +from the Warner Brothers' series of "Roadrunner" cartoons. In +these cartoons, the famished Wile E. Coyote was forever +attempting to catch up with, trap, and eat the Roadrunner. His +attempts usually involved one or more high-technology Rube +Goldberg devices - rocket jetpacks, catapults, magnetic traps, +high-powered slingshots, etc. These were usually delivered in +large cardboard boxes, labeled prominently with the Acme name. +These devices invariably malfunctioned in improbable and violent +ways. + + +Node:acolyte, Next:ad-hockery, Previous:Acme, Up:= A = + + +acolyte n. obs. + +[TMRC] An OSU privileged enough to +submit data and programs to a member of the priesthood. + + +Node:ad-hockery, Next:Ada, Previous:acolyte, Up:= A += + +ad-hockery /ad-hok'*r-ee/ n. + +[Purdue] 1. Gratuitous assumptions made inside certain +programs, esp. expert systems, which lead to the appearance of +semi-intelligent behavior but are in fact entirely arbitrary. For +example, fuzzy-matching of input tokens that might be typing +errors against a symbol table can make it look as though a +program knows how to spell. 2. Special-case code to cope with +some awkward input that would otherwise cause a program to choke, presuming normal inputs are dealt +with in some cleaner and more regular way. Also called +`ad-hackery', `ad-hocity' (/ad-hos'*-tee/), `ad-crockery'. See +also ELIZA effect. + + +Node:Ada, Next:address harvester, Previous:ad-hockery, Up:= A = + +Ada n. + +A Pascal-descended language that +was at one time made mandatory for Department of Defense software +projects by the Pentagon. Hackers are nearly unanimous in +observing that, technically, it is precisely what one might +expect given that kind of endorsement by fiat; designed by +committee, crockish, difficult to use, and overall a disastrous, +multi-billion-dollar boondoggle (one common description wss "The +PL/I of the 1980s"). Hackers find Ada's exception-handling and +inter-process communication features particularly hilarious. Ada +Lovelace (the daughter of Lord Byron who became the world's first +programmer while cooperating with Charles Babbage on the design +of his mechanical computing engines in the mid-1800s) would +almost certainly blanch at the use to which her name has latterly +been put; the kindest thing that has been said about it is that +there is probably a good small language screaming to get out from +inside its vast, elephantine +bulk. + + +Node:address harvester, Next:adger, Previous:Ada, Up:= A += + +address harvester n. + +A robot that searches web pages and/or filters netnews traffic +looking for valid email addresses. Some address harvesters are +benign, used only for compiling address directories. Most, +unfortunately, are run by miscreants compiling address lists to +spam. Address harvesters can be foiled +by a teergrube. + + +Node:adger, Next:admin, Previous:address harvester, Up:= A = + +adger /aj'r/ vt. + +[UCLA mutant of nadger, poss. +also from the middle name of an infamous tenured graduate student] +To make a bonehead move with consequences that could have been +foreseen with even slight mental effort. E.g., "He started +removing files and promptly adgered the whole project". Compare +dumbass attack. + + +Node:admin, Next:ADVENT, Previous:adger, Up:= A += + +admin /ad-min'/ n. + +Short for `administrator'; very commonly used in speech or +on-line to refer to the systems person in charge on a computer. +Common constructions on this include `sysadmin' and `site admin' +(emphasizing the administrator's role as a site contact for email +and news) or `newsadmin' (focusing specifically on news). Compare +postmaster, sysop, system +mangler. + + +Node:ADVENT, Next:AFAIK, Previous:admin, Up:= A += + +ADVENT /ad'vent/ n. + +The prototypical computer adventure game, first designed by +Will Crowther on the PDP-10 in the +mid-1970s as an attempt at computer-refereed fantasy gaming, and +expanded into a puzzle-oriented game by Don Woods at Stanford in +1976. (Woods had been one of the authors of INTERCAL.) Now better known as Adventure or +Colossal Cave Adventure, but the TOPS-10 operating system permitted only +six-letter filenames. See also vadding, Zork, and +Infocom. + +This game defined the terse, dryly humorous style since +expected in text adventure games, and popularized several tag +lines that have become fixtures of hacker-speak: "A huge green +fierce snake bars the way!" "I see no X here" (for some noun X). +"You are in a maze of twisty little passages, all alike." "You +are in a little maze of twisty passages, all different." The +`magic words' xyzzy and plugh also derive from this game. + +Crowther, by the way, participated in the exploration of the +Mammoth & Flint Ridge cave system; it actually has a +`Colossal Cave' and a `Bedquilt' as in the game, and the `Y2' +that also turns up is cavers' jargon for a map reference to a +secondary entrance. + +ADVENT sources are available for FTP at +ftp://ftp.wustl.edu/doc/misc/if-archive/games/source/advent.tar.Z. + + +Node:AFAIK, Next:AFJ, Previous:ADVENT, Up:= A += + +AFAIK // n. + +[Usenet] Abbrev. for "As Far As I Know". + + +Node:AFJ, Next:AFK, Previous:AFAIK, Up:= A += + +AFJ // n. + +Written-only abbreviation for "April Fool's Joke". Elaborate +April Fool's hoaxes are a long-established tradition on Usenet +and Internet; see kremvax for an +example. In fact, April Fool's Day is the only seasonal +holiday consistently marked by customary observances on Internet +and other hacker networks. + + +Node:AFK, Next:AI, +Previous:AFJ, Up:= A = + +AFK + +[MUD] Abbrev. for "Away From Keyboard". Used to notify others +that you will be momentarily unavailable online. eg. "Let's not +go kill that frost giant yet, I need to go AFK to make a phone +call". Often MUDs will have a command to politely inform others +of your absence when they try to talk with you. The term is not +restricted to MUDs, however, and has become common in many chat +situations, from IRC to Unix talk. + + +Node:AI, Next:AI-complete, Previous:AFK, Up:= A = + + +AI /A-I/ n. + +Abbreviation for `Artificial Intelligence', so common that the +full form is almost never written or spoken among hackers. + + +Node:AI-complete, Next:AI koans, Previous:AI, Up:= A = + +AI-complete /A-I k*m-pleet'/ adj. + +[MIT, Stanford: by analogy with `NP-complete' (see NP-)] Used to describe problems or subproblems in +AI, to indicate that the solution presupposes a solution to the +`strong AI problem' (that is, the synthesis of a human-level +intelligence). A problem that is AI-complete is, in other words, +just too hard. + +Examples of AI-complete problems are `The Vision Problem' +(building a system that can see as well as a human) and `The +Natural Language Problem' (building a system that can understand +and speak a natural language as well as a human). These may +appear to be modular, but all attempts so far (1999) to solve +them have foundered on the amount of context information and +`intelligence' they seem to require. See also gedanken. + + +Node:AI koans, Next:AIDS, Previous:AI-complete, Up:= A = + +AI koans /A-I koh'anz/ pl.n. + +A series of pastiches of Zen teaching riddles created by Danny +Hillis at the MIT AI Lab around various major figures of the +Lab's culture (several are included under Some AI Koans in Appendix A). See +also ha ha only +serious, mu, and hacker humor. + + +Node:AIDS, Next:AIDX, Previous:AI koans, Up:= A = + +AIDS /aydz/ n. + +Short for A* Infected Disk Syndrome (`A*' is a glob pattern that matches, but is not limited to, +Apple or Amiga), this condition is quite often the result of +practicing unsafe SEX. See virus, worm, Trojan horse, virgin. + + +Node:AIDX, Next:airplane rule, Previous:AIDS, Up:= A += + +AIDX /ayd'k*z/ n. + +Derogatory term for IBM's perverted version of Unix, AIX, +especially for the AIX 3.? used in the IBM RS/6000 series (some +hackers think it is funnier just to pronounce "AIX" as "aches"). +A victim of the dreaded "hybridism" disease, this attempt to +combine the two main currents of the Unix stream (BSD and USG Unix) +became a monstrosity to haunt +system administrators' dreams. For example, if new accounts are +created while many users are logged on, the load average jumps +quickly over 20 due to silly implementation of the user +databases. For a quite similar disease, compare HP-SUX. Also, compare Macintrash, Nominal Semidestructor, ScumOS, sun-stools. + + +Node:airplane rule, Next:Alderson loop, Previous:AIDX, Up:= A = + +airplane rule n. + +"Complexity increases the possibility of failure; a +twin-engine airplane has twice as many engine problems as a +single-engine airplane." By analogy, in both software and +electronics, the rule that simplicity increases robustness. It is +correspondingly argued that the right way to build reliable +systems is to put all your eggs in one basket, after making sure +that you've built a really good basket. See also KISS Principle, elegant. + + +Node:Alderson loop, Next:aliasing bug, Previous:airplane rule, Up:= A = + +Alderson loop n. + +[Intel] A special version of an infinite loop where there is an exit +condition available, but inaccessible in the current +implementation of the code. Typically this is created while +debugging user interface code. An example would be when there is +a menu stating, "Select 1-3 or 9 to quit" and 9 is not allowed by +the function that takes the selection from the user. + +This term received its name from a programmer who had coded a +modal message box in MSAccess with no Ok or Cancel buttons, +thereby disabling the entire program whenever the box came up. +The message box had the proper code for dismissal and even was +set up so that when the non-existent Ok button was pressed the +proper code would be called. + + +Node:aliasing bug, Next:Alice and Bob, Previous:Alderson loop, Up:= A = + +aliasing bug n. + +A class of subtle programming errors that can arise in code +that does dynamic allocation, esp. via malloc(3) or +equivalent. If several pointers address (`aliases for') a given +hunk of storage, it may happen that the storage is freed or +reallocated (and thus moved) through one alias and then +referenced through another, which may lead to subtle (and +possibly intermittent) lossage depending on the state and the +allocation history of the malloc arena. Avoidable by use of allocation strategies +that never alias allocated core, or by use of higher-level +languages, such as LISP, which employ +a garbage collector (see GC). Also +called a stale pointer +bug. See also precedence lossage, smash the stack, fandango on core, memory leak, memory smash, overrun screw, spam. + +Historical note: Though this term is nowadays associated with +C programming, it was already in use in a very similar sense in +the Algol-60 and FORTRAN communities in the 1960s. + + +Node:Alice and Bob, Next:all-elbows, Previous:aliasing bug, Up:= A = + +Alice and Bob n. + +The archetypal individuals used as examples in discussions of +cryptographic protocols. Originally, theorists would say +something like: "A communicates with someone who claims to be B, +So to be sure, A tests that B knows a secret number K. So A sends +to B a random number X. B then forms Y by encrypting X under key +K and sends Y back to A" Because this sort of thing is is quite +hard to follow, theorists stopped using the unadorned letters A +and B to represent the main players and started calling them +Alice and Bob. So now we say "Alice communicates with someone +claiming to be Bob, and to be sure, So Alice tests that Bob knows +a secret number K. Alice sends to Bob a random number X. Bob then +forms Y by encrypting X under key K and sends Y back to Alice". A +whole mythology rapidly grew up around the metasyntactic names; +see http://www.conceptlabs.co.uk/alicebob.html. + +In Bruce Schneier's definitive introductory text "Applied +Cryptography" (2nd ed., 1996, John Wiley & Sons, ISBN +0-471-11709-9) he introduces a table of dramatis personae headed +by Alice and Bob. Others include Carol (a participant in three- +and four-party protocols), Dave (a participant in four-party +protocols), Eve (an eavesdropper), Mallory (a malicious active +attacker), Trent (a trusted arbitrator), Walter (a warden), Peggy +(a prover) and Victor (a verifier). These names for roles are +either already standard or, given the wide popularity of the +book, may be expected to quickly become so. + + +Node:all-elbows, Next:alpha geek, Previous:Alice and Bob, Up:= A = + +all-elbows adj. + +[MS-DOS] Of a TSR (terminate-and-stay-resident) IBM PC +program, such as the N pop-up calendar and calculator utilities +that circulate on BBS systems: +unsociable. Used to describe a program that rudely steals the +resources that it needs without considering that other TSRs may +also be resident. One particularly common form of rudeness is +lock-up due to programs fighting over the keyboard interrupt. See +rude, also mess-dos. + + +Node:alpha geek, Next:alpha particles, Previous:all-elbows, Up:= A = + +alpha geek n. + +[from animal ethologists' `alpha male'] The most technically +accomplished or skillful person in some implied context. "Ask +Larry, he's the alpha geek here." + + +Node:alpha particles, Next:alt, Previous:alpha geek, Up:= A = + +alpha particles n. + +See bit rot. + + +Node:alt, Next:alt bit, Previous:alpha particles, Up:= A = + +alt /awlt/ + +1. n. The alt shift key on an IBM PC or clone keyboard; see bucky bits, sense 2 (though typical PC +usage does not simply set the 0200 bit). 2. n. The `option' key +on a Macintosh; use of this term usually reveals that the speaker +hacked PCs before coming to the Mac (see also feature key, which is sometimes +incorrectly called `alt'). 3. n.,obs. [PDP-10; often +capitalized to ALT] Alternate name for the ASCII ESC character +(ASCII 0011011), after the keycap labeling on some older +terminals; also `altmode' (/awlt'mohd/). This character was +almost never pronounced `escape' on an ITS system, in TECO, or under TOPS-10 -- always alt, as in "Type +alt alt to end a TECO command" or "alt-U onto the system" (for +"log onto the [ITS] system"). This usage probably arose because +alt is more convenient to say than `escape', especially when +followed by another alt or a character (or another alt +and a character, for that matter). 4. The _alt_ +hierarchy on Usenet, the tree of newsgroups created by users +without a formal vote and approval procedure. There is a myth, +not entirely implausible, that _alt_ is acronymic for +"anarchists, lunatics, and terrorists"; but in fact it is simply +short for "alternative". + + +Node:alt bit, Next:Aluminum Book, Previous:alt, Up:= A += + +alt bit /awlt bit/ [from alternate] adj. + +See meta bit. + + +Node:Aluminum Book, Next:ambimouseterous, Previous:alt bit, Up:= A = + +Aluminum Book n. + +[MIT] "Common LISP: The Language", by Guy L. Steele Jr. +(Digital Press, first edition 1984, second edition 1990). Note +that due to a technical screwup some printings of the second +edition are actually of a color the author describes succinctly +as "yucky green". See also book +titles. + + +Node:ambimouseterous, Next:Amiga, Previous:Aluminum Book, Up:= A = + +ambimouseterous /am-b*-mows'ter-us/ or +/am-b*-mows'trus/ adj. + +[modeled on _ambidextrous_] Able to use a mouse with +either hand. + + +Node:Amiga, Next:Amiga Persecution Complex, +Previous:ambimouseterous, Up:= A = + +Amiga n + +A series of personal computer models originally sold by +Commodore, based on 680x0 processors, custom support chips and an +operating system that combined some of the best features of +Macintosh and Unix with compatibility with neither. + +The Amiga was released just as the personal computing world +standardized on IBM-PC clones. This prevented it from gaining +serious market share, despite the fact that the first Amigas had +a substantial technological lead on the IBM XTs of the time. +Instead, it acquired a small but zealous population of +enthusiastic hackers who dreamt of one day unseating the clones +(see Amiga +Persecution Complex). The traits of this culture are both +spoofed and illuminated in +The BLAZE Humor Viewer. The strength of the Amiga platform +seeded a small industry of companies building software and +hardware for the platform, especially in graphics and video +applications (see video +toaster). + +Due to spectacular mismanagement, Commodore did hardly any +R&D, allowing the competition to close Amiga's technological +lead. After Commodore went bankrupt in 1994 the technology passed +through several hands, none of whom did much with it. However, +the Amiga is still being produced in Europe under license and has +a substantial number of fans, which will probably extend the +platform's life considerably. + + +Node:Amiga Persecution +Complex, Next:amoeba, +Previous:Amiga, Up:= A = + +Amiga Persecution Complex n. + +The disorder suffered by a particularly egregious variety of +bigot, those who believe that the +marginality of their preferred machine is the result of some kind +of industry-wide conspiracy (for without a conspiracy of some +kind, the eminent superiority of their beloved shining jewel of a +platform would obviously win over all, market pressures be +damned!) Those afflicted are prone to engaging in flame wars and calling for boycotts and +mailbombings. Amiga Persecution Complex is by no means limited to +Amiga users; NeXT, NeWS, OS/2, Macintosh, LISP, and GNU users are +also common victims. Linux users used +to display symptoms very frequently before Linux started winning; +some still do. See also newbie, +troll, holy +wars, weenie, Get a life!. + + +Node:amoeba, Next:amp off, Previous:Amiga Persecution Complex, +Up:= A = + +amoeba n. + +Humorous term for the Commodore Amiga personal computer. + + +Node:amp off, Next:amper, Previous:amoeba, Up:= A += + +amp off vt. + +[Purdue] To run in background. From the Unix shell `&' +operator. + + +Node:amper, Next:Angband, Previous:amp off, Up:= +A = + +amper n. + +Common abbreviation for the name of the ampersand (`&', +ASCII 0100110) character. See ASCII +for other synonyms. + + +Node:Angband, Next:angle brackets, Previous:amper, Up:= A = + +Angband n. /ang'band/ + +Like nethack, moria, and rogue, +one of the large freely distributed Dungeons-and-Dragons-like +simulation games, available for a wide range of machines and +operating systems. The name is from Tolkien's Pits of Angband +(compare elder days, elvish). Has been described as "Moria on +steroids"; but, unlike Moria, many aspects of the game are +customizable. This leads many hackers and would-be hackers into +fooling with these instead of doing productive work. There are +many Angband variants, of which the most notorious is probably +the rather whimsical Zangband. In this game, when a key that does +not correspond to a command is pressed, the game will display +"Type ? for help" 50% of the time. The other 50% of the time, +random error messages including "An error has occurred because an +error of type 42 has occurred" and "Windows 95 uninstalled +successfully" will be displayed. Zangband also allows the player +to kill Santa Claus (who has some really good stuff, but also has +a lot of friends), "Bull Gates", and Barney the Dinosaur (but be +watchful; Barney has a nasty case of halitosis). There is an +official angband home page at http://www.phial.com/angband +and a zangband one at http://thangorodrim.angband.org. +See also Random Number +God. + + +Node:angle brackets, Next:angry fruit salad, +Previous:Angband, Up:= A = + +angle brackets n. + +Either of the characters < (ASCII 0111100) and +> (ASCII 0111110) (ASCII less-than or +greater-than signs). Typographers in the Real World use angle brackets which are +either taller and slimmer (the ISO `Bra' and `Ket' characters), +or significantly smaller (single or double guillemets) than the +less-than and greater-than signs. See broket, ASCII. + + +Node:angry fruit salad, +Next:annoybot, Previous:angle brackets, Up:= A = + +angry fruit salad n. + +A bad visual-interface design that uses too many colors. (This +term derives, of course, from the bizarre day-glo colors found in +canned fruit salad.) Too often one sees similar effects from +interface designers using color window systems such as X; there is a tendency to create displays that +are flashy and attention-getting but uncomfortable for long-term +use. + + +Node:annoybot, Next:annoyware, Previous:angry fruit salad, Up:= A = + +annoybot /*-noy-bot/ n. + +[IRC] See bot. + + +Node:annoyware, Next:ANSI, Previous:annoybot, Up:= +A = + +annoyware n. + +A type of shareware that +frequently disrupts normal program operation to display requests +for payment to the author in return for the ability to disable +the request messages. (Also called `nagware') The requests +generally require user action to acknowledge the message before +normal operation is resumed and are often tied to the most +frequently used features of the software. See also careware, charityware, crippleware, freeware, FRS, +guiltware, postcardware, and -ware; compare payware. + + +Node:ANSI, Next:ANSI standard, Previous:annoyware, Up:= A = + +ANSI /an'see/ + +1. n. [techspeak] The American National Standards Institute. +ANSI, along with the International Organization for Standards +(ISO), standardized the C programming language (see K&R, Classic +C), and promulgates many other important software +standards. 2. n. [techspeak] A terminal may be said to be `ANSI' +if it meets the ANSI X.364 standard for terminal control. +Unfortunately, this standard was both over-complicated and too +permissive. It has been retired and replaced by the ECMA-48 +standard, which shares both flaws. 3. n. [BBS jargon] The set of +screen-painting codes that most MS-DOS and Amiga computers +accept. This comes from the ANSI.SYS device driver that must be +loaded on an MS-DOS computer to view such codes. Unfortunately, +neither DOS ANSI nor the BBS ANSIs derived from it exactly match +the ANSI X.364 terminal standard. For example, the ESC-[1m code +turns on the bold highlight on large machines, but in IBM +PC/MS-DOS ANSI, it turns on `intense' (bright) colors. Also, in +BBS-land, the term `ANSI' is often used to imply that a +particular computer uses or can emulate the IBM high-half +character set from MS-DOS. Particular use depends on context. +Occasionally, the vanilla ASCII character set is used with the +color codes, but on BBSs, ANSI and `IBM characters' tend to go +together. + + +Node:ANSI standard, Next:ANSI standard pizza, +Previous:ANSI, Up:= A = + +ANSI standard /an'see stan'd*rd/ + +The ANSI standard usage of `ANSI standard' refers to any +practice which is typical or broadly done. It's most +appropriately applied to things that everyone does that are not +quite regulation. For example: ANSI standard shaking of a laser +printer cartridge to get extra life from it, or the ANSI standard +word tripling in names of usenet alt groups. + + +Node:ANSI standard pizza, +Next:AOL!, Previous:ANSI standard, Up:= A = + +ANSI standard pizza /an'see stan'd*rd peet'z*/ + +[CMU] Pepperoni and mushroom pizza. Coined allegedly because +most pizzas ordered by CMU hackers during some period leading up +to mid-1990 were of that flavor. See also rotary debugger; compare ISO standard cup of +tea. + + +Node:AOL!, Next:app, Previous:ANSI standard pizza, Up:= A = + +AOL! n. + +[Usenet] Common synonym for "Me, too!" alluding to the +legendary propensity of America Online users to utter contentless +"Me, too!" postings. The number of exclamation points following +varies from zero to five or so. The pseudo-HTML + +<AOL>Me, too!</AOL> + + +is also frequently seen. See also September that never +ended. + + +Node:app, Next:arena, Previous:AOL!, Up:= A = + + +app /ap/ n. + +Short for `application program', as opposed to a systems +program. Apps are what systems vendors are forever chasing +developers to create for their environments so they can sell more +boxes. Hackers tend not to think of the things they themselves +run as apps; thus, in hacker parlance the term excludes +compilers, program editors, games, and messaging systems, though +a user would consider all those to be apps. (Broadly, an app is +often a self-contained environment for performing some +well-defined task such as `word processing'; hackers tend to +prefer more general-purpose tools.) See killer app; oppose tool, operating +system. + + +Node:arena, Next:arg, Previous:app, +Up:= A = + +arena n. + +[common; Unix] The area of memory attached to a process by +brk(2) and sbrk(2) and used by +malloc(3) as dynamic storage. So named from a +malloc: corrupt arena message emitted when some +early versions detected an impossible value in the free block +list. See overrun screw, +aliasing bug, memory leak, memory smash, smash the stack. + + +Node:arg, Next:ARMM, Previous:arena, Up:= A += + +arg /arg/ n. + +Abbreviation for `argument' (to a function), used so often as +to have become a new word (like `piano' from `pianoforte'). "The +sine function takes 1 arg, but the arc-tangent function can take +either 1 or 2 args." Compare param, +parm, var. + + +Node:ARMM, Next:armor-plated, Previous:arg, Up:= A += + +ARMM n. + +[acronym, `Automated Retroactive Minimal Moderation'] A Usenet +cancelbot created by Dick Depew +of Munroe Falls, Ohio. ARMM was intended to automatically cancel +posts from anonymous-posting sites. Unfortunately, the robot's +recognizer for anonymous postings triggered on its own +automatically-generated control messages! Transformed by this +stroke of programming ineptitude into a monster of +Frankensteinian proportions, it broke loose on the night of March +31, 1993 and proceeded to spam +_news.admin.policy_ with a recursive explosion of over 200 +messages. + +ARMM's bug produced a recursive cascade of messages each of which mechanically +added text to the ID and Subject and some other headers of its +parent. This produced a flood of messages in which each header +took up several screens and each message ID and subject line got +longer and longer and longer. + +Reactions varied from amusement to outrage. The pathological +messages crashed at least one mail system, and upset people +paying line charges for their Usenet feeds. One poster described +the ARMM debacle as "instant Usenet history" (also establishing +the term despew), and it has since +been widely cited as a cautionary example of the havoc the +combination of good intentions and incompetence can wreak on a +network. Compare Great Worm; +sorcerer's +apprentice mode. See also software laser, network meltdown. + + +Node:armor-plated, Next:asbestos, Previous:ARMM, Up:= A = + + +armor-plated n. + +Syn. for bulletproof. + + +Node:asbestos, Next:asbestos cork award, Previous:armor-plated, Up:= A = + +asbestos adj. + +[common] Used as a modifier to anything intended to protect +one from flames; also in other highly +flame-suggestive usages. See, for +example, asbestos +longjohns and asbestos cork award. + + +Node:asbestos cork award, +Next:asbestos +longjohns, Previous:asbestos, Up:= +A = + +asbestos cork award n. + +Once, long ago at MIT, there was a flamer so consistently obnoxious that another +hacker designed, had made, and distributed posters announcing +that said flamer had been nominated for the `asbestos cork +award'. (Any reader in doubt as to the intended application of +the cork should consult the etymology under flame.) Since then, it is agreed that only a +select few have risen to the heights of bombast required to earn +this dubious dignity -- but there is no agreement on +which few. + + +Node:asbestos longjohns, +Next:ASCII, Previous:asbestos cork +award, Up:= A = + +asbestos longjohns n. + +Notional garments donned by Usenet posters just before emitting a remark +they expect will elicit flamage. +This is the most common of the asbestos coinages. Also `asbestos underwear', +`asbestos overcoat', etc. + + +Node:ASCII, Next:ASCII art, Previous:asbestos longjohns, Up:= A = + +ASCII /as'kee/ n. + +[originally an acronym (American Standard Code for Information +Interchange) but now merely conventional] The predominant +character set encoding of present-day computers. The standard +version uses 7 bits for each character, whereas most earlier +codes (including early drafts of of ASCII prior to June 1961) +used fewer. This change allowed the inclusion of lowercase +letters -- a major win -- but it did +not provide for accented letters or any other letterforms not +used in English (such as the German sharp-S or the ae-ligature +which is a letter in, for example, Norwegian). It could be worse, +though. It could be much worse. See EBCDIC to understand how. A history of ASCII +and its ancestors is at http://www.wps.com/texts/codes/index.html. + +Computers are much pickier and less flexible about spelling +than humans; thus, hackers need to be very precise when talking +about characters, and have developed a considerable amount of +verbal shorthand for them. Every character has one or more names +-- some formal, some concise, some silly. Common jargon names for +ASCII characters are collected here. See also individual entries +for bang, excl, open, ques, semi, shriek, splat, +twiddle, and Yu-Shiang Whole Fish. + +This list derives from revision 2.3 of the Usenet ASCII +pronunciation guide. Single characters are listed in ASCII order; +character pairs are sorted in by first member. For each +character, common names are given in rough order of popularity, +followed by names that are reported but rarely seen; official +ANSI/CCITT names are surrounded by brokets: <>. Square +brackets mark the particularly silly names introduced by INTERCAL. The abbreviations "l/r" and +"o/c" stand for left/right and "open/close" respectively. +Ordinary parentheticals provide some usage information. + + +! + + +Common: bang; pling; excl; shriek; +ball-bat; <exclamation mark>. Rare: factorial; exclam; +smash; cuss; boing; yell; wow; hey; wham; eureka; [spark-spot]; +soldier, control. + +" + + +Common: double quote; quote. Rare: literal mark; +double-glitch; <quotation marks>; <dieresis>; dirk; +[rabbit-ears]; double prime. + +# + + +Common: number sign; pound; pound sign; hash; sharp; crunch; hex; [mesh]. Rare: grid; +crosshatch; octothorpe; flash; <square>, pig-pen; +tictactoe; scratchmark; thud; thump; splat. + +$ + + +Common: dollar; <dollar sign>. Rare: currency symbol; +buck; cash; string (from BASIC); escape (when used as the echo of +ASCII ESC); ding; cache; [big money]. + +% + + +Common: percent; <percent sign>; mod; grapes. Rare: +[double-oh-seven]. + +& + + +Common: <ampersand>; amper; and, and sign. Rare: +address (from C); reference (from C++); andpersand; bitand; +background (from sh(1)); pretzel; amp. [INTERCAL +called this `ampersand'; what could be sillier?] + +' + + +Common: single quote; quote; <apostrophe>. Rare: prime; +glitch; tick; irk; pop; [spark]; <closing single quotation +mark>; <acute accent>. + +( ) + + +Common: l/r paren; l/r parenthesis; left/right; open/close; +paren/thesis; o/c paren; o/c parenthesis; l/r parenthesis; l/r +banana. Rare: so/already; lparen/rparen; <opening/closing +parenthesis>; o/c round bracket, l/r round bracket, +[wax/wane]; parenthisey/unparenthisey; l/r ear. + +* + + +Common: star; [splat]; +<asterisk>. Rare: wildcard; gear; dingle; mult; spider; +aster; times; twinkle; glob (see glob); Nathan +Hale. + ++ + + +Common: <plus>; add. Rare: cross; [intersection]. + +, + + +Common: <comma>. Rare: <cedilla>; [tail]. + +- + + +Common: dash; <hyphen>; <minus>. Rare: [worm]; +option; dak; bithorpe. + +. + + +Common: dot; point; <period>; <decimal point>. +Rare: radix point; full stop; [spot]. + +/ + + +Common: slash; stroke; <slant>; forward slash. Rare: +diagonal; solidus; over; slak; virgule; [slat]. + +: + + +Common: <colon>. Rare: dots; [two-spot]. + +; + + +Common: <semicolon>; semi. Rare: weenie; [hybrid], +pit-thwong. + +< > + + +Common: <less/greater than>; bra/ket; l/r angle; l/r +angle bracket; l/r broket. Rare: from/{into, towards}; read +from/write to; suck/blow; comes-from/gozinta; in/out; crunch/zap +(all from UNIX); tic/tac; [angle/right angle]. + += + + +Common: <equals>; gets; takes. Rare: quadrathorpe; +[half-mesh]. + +? + + +Common: query; <question mark>; ques. Rare: whatmark; [what]; wildchar; huh; +hook; buttonhook; hunchback. + +@ + + +Common: at sign; at; strudel. Rare: each; vortex; whorl; +[whirlpool]; cyclone; snail; ape; cat; rose; cabbage; +<commercial at>. + +V + + +Rare: [book]. + +[ ] + + +Common: l/r square bracket; l/r bracket; <opening/closing +bracket>; bracket/unbracket. Rare: square/unsquare; [U turn/U +turn back]. + +\ + + +Common: backslash, hack, whack; escape (from C/UNIX); reverse +slash; slosh; backslant; backwhack. Rare: bash; <reverse +slant>; reversed virgule; [backslat]. + +^ + + +Common: hat; control; uparrow; caret; <circumflex>. +Rare: xor sign, chevron; [shark (or shark-fin)]; to the (`to the +power of'); fang; pointer (in Pascal). + +_ + + +Common: <underline>; underscore; underbar; under. Rare: +score; backarrow; skid; [flatworm]. + +` + + +Common: backquote; left quote; left single quote; open quote; +<grave accent>; grave. Rare: backprime; [backspark]; +unapostrophe; birk; blugle; back tick; back glitch; push; +<opening single quotation mark>; quasiquote. + +{ } + + +Common: o/c brace; l/r brace; l/r squiggly; l/r squiggly +bracket/brace; l/r curly bracket/brace; <opening/closing +brace>. Rare: brace/unbrace; curly/uncurly; leftit/rytit; l/r +squirrelly; [embrace/bracelet]. + +| + + +Common: bar; or; or-bar; v-bar; pipe; vertical bar. Rare: +<vertical line>; gozinta; thru; pipesinta (last three from +UNIX); [spike]. + +~ + + +Common: <tilde>; squiggle; twiddle; not. Rare: approx; wiggle; swung +dash; enyay; [sqiggle (sic)]. + + + +The pronunciation of # as `pound' is common in +the U.S. but a bad idea; Commonwealth Hackish has its +own, rather more apposite use of `pound sign' (confusingly, on +British keyboards the pound graphic happens to replace +#; thus Britishers sometimes call # on +a U.S.-ASCII keyboard `pound', compounding the American error). +The U.S. usage derives from an old-fashioned commercial practice +of using a # suffix to tag pound weights on bills of +lading. The character is usually pronounced `hash' outside the +U.S. There are more culture wars over the correct pronunciation +of this character than any other, which has led to the ha ha only serious +suggestion that it be pronounced `shibboleth' (see Judges 12:6 in +an Old Testament or Tanakh). + +The `uparrow' name for circumflex and `leftarrow' name for +underline are historical relics from archaic ASCII (the 1963 +version), which had these graphics in those character positions +rather than the modern punctuation characters. + +The `swung dash' or `approximation' sign is not quite the same +as tilde in typeset material but the ASCII tilde serves for both +(compare angle +brackets). + +Some other common usages cause odd overlaps. The +#, $, >, and +& characters, for example, are all pronounced +"hex" in different communities because various assemblers use +them as a prefix tag for hexadecimal constants (in particular, +# in many assembler-programming cultures, +$ in the 6502 world, > at Texas +Instruments, and & on the BBC Micro, Sinclair, +and some Z80 machines). See also splat. + +The inability of ASCII text to correctly represent any of the +world's other major languages makes the designers' choice of 7 +bits look more and more like a serious misfeature as the use of international +networks continues to increase (see software rot). Hardware and software +from the U.S. still tends to embody the assumption that ASCII is +the universal character set and that characters have 7 bits; this +is a major irritant to people who want to use a character set +suited to their own languages. Perversely, though, efforts to +solve this problem by proliferating `national' character sets +produce an evolutionary pressure to use a smaller subset +common to all those in use. + + +Node:ASCII art, Next:ASCIIbetical order, Previous:ASCII, Up:= A = + +ASCII art n. + +The fine art of drawing diagrams using the ASCII character set +(mainly |, -, /, +\, and +). Also known as `character +graphics' or `ASCII graphics'; see also boxology. Here is a serious example: + + o----)||(--+--|<----+ +---------o + D O + L )||( | | | C U + A I )||( +-->|-+ | +-\/\/-+--o - T + C N )||( | | | | P + E )||( +-->|-+--)---+--|(--+-o U + )||( | | | GND T + o----)||(--+--|<----+----------+ + + A power supply consisting of a full wave rectifier circuit + feeding a capacitor input filter circuit + + +And here are some very silly examples: + + |\/\/\/| ____/| ___ |\_/| ___ + | | \ o.O| ACK! / \_ |` '| _/ \ + | | =(_)= THPHTH! / \/ \/ \ + | (o)(o) U / \ + C _) (__) \/\/\/\ _____ /\/\/\/ + | ,___| (oo) \/ \/ + | / \/-------\ U (__) + /____\ || | \ /---V `v'- oo ) +/ \ ||---W|| * * |--| || |`. |_/\ + + //-o-\\ + ____---=======---____ + ====___\ /.. ..\ /___==== Klingons rule OK! + // ---\__O__/--- \\ + \_\ /_/ + + +There is an important subgenre of ASCII art that puns on the +standard character names in the fashion of a rebus. + ++--------------------------------------------------------+ +| ^^^^^^^^^^^^ | +| ^^^^^^^^^^^ ^^^^^^^^^ | +| ^^^^^^^^^^^^^ ^^^^^^^^^^^^^ | +| ^^^^^^^ B ^^^^^^^^^ | +| ^^^^^^^^^ ^^^ ^^^^^^^^^^^^^^ | ++--------------------------------------------------------+ + " A Bee in the Carrot Patch " + + +Within humorous ASCII art, there is for some reason an entire +flourishing subgenre of pictures of silly cows. Four of these are +reproduced in the examples above, here are three more: + + (__) (__) (__) + (\/) ($$) (**) + /-------\/ /-------\/ /-------\/ + / | 666 || / |=====|| / | || +* ||----|| * ||----|| * ||----|| + ~~ ~~ ~~ ~~ ~~ ~~ +Satanic cow This cow is a Yuppie Cow in love + + +Finally, here's a magnificent example of ASCII art depicting +an Edwardian train station in Dunedin, New Zealand: + + .-. + /___\ + |___| + |]_[| + / I \ + JL/ | \JL + .-. i () | () i .-. + |_| .^. /_\ LJ=======LJ /_\ .^. |_| +._/___\._./___\_._._._._.L_J_/.-. .-.\_L_J._._._._._/___\._./___\._._._ + ., |-,-| ., L_J |_| [I] |_| L_J ., |-,-| ., ., + JL |-O-| JL L_J%%%%%%%%%%%%%%%L_J JL |-O-| JL JL +IIIIII_HH_'-'-'_HH_IIIIII|_|=======H=======|_|IIIIII_HH_'-'-'_HH_IIIIII_HH_ +-------[]-------[]-------[_]----\.=I=./----[_]-------[]-------[]--------[]- + _/\_ ||\\_I_//|| _/\_ [_] []_/_L_J_\_[] [_] _/\_ ||\\_I_//|| _/\_ ||\ + |__| ||=/_|_\=|| |__|_|_| _L_L_J_J_ |_|_|__| ||=/_|_\=|| |__| ||- + |__| |||__|__||| |__[___]__--__===__--__[___]__| |||__|__||| |__| ||| +IIIIIII[_]IIIII[_]IIIIIL___J__II__|_|__II__L___JIIIII[_]IIIII[_]IIIIIIII[_] + \_I_/ [_]\_I_/[_] \_I_[_]\II/[]\_\I/_/[]\II/[_]\_I_/ [_]\_I_/[_] \_I_/ [_] +./ \.L_J/ \L_J./ L_JI I[]/ \[]I IL_J \.L_J/ \L_J./ \.L_J +| |L_J| |L_J| L_J| |[]| |[]| |L_J |L_J| |L_J| |L_J +|_____JL_JL___JL_JL____|-|| |[]| |[]| ||-|_____JL_JL___JL_JL_____JL_J + + +There is a newsgroup, _alt.ascii-art_, devoted to this +genre; however, see also warlording. + + +Node:ASCIIbetical order, +Next:astroturfing, +Previous:ASCII art, +Up:= A = + +ASCIIbetical order /as'kee-be'-t*-kl or'dr/ adj.,n. + +Used to indicate that data is sorted in ASCII collated order +rather than alphabetical order. This lexicon is sorted in +something close to ASCIIbetical order, but with case ignored and +entries beginning with non-alphabetic characters moved to the +end. "At my video store, they used their computer to sort the +videos into ASCIIbetical order, so I couldn't find `"Crocodile" +Dundee' until I thought to look before `2001' and `48 HRS.'!" + + +Node:astroturfing, Next:atomic, Previous:ASCIIbetical order, Up:= A = + +astroturfing n. + +The use of paid shills to create the impression of a popular +movement, through means like letters to newspapers from +soi-disant `concerned citizens', paid opinion pieces, and the +formation of grass-roots lobbying groups that are actually funded +by a PR group (astroturf is fake grass; hence the term). This +term became common among hackers after it came to light in early +1998 that Microsoft had attempted to use such tactics to +forestall the U.S. Department of Justice's antitrust action +against the company. + +This backfired horribly, angering a number of state +attorneys-general enough to induce them to go public with plans +to join the Federal suit. It also set anybody defending Microsoft +on the net for the accusation "You're just astroturfing!". + + +Node:atomic, Next:attoparsec, Previous:astroturfing, Up:= A = + +atomic adj. + +[from Gk. `atomos', indivisible] 1. Indivisible; cannot be +split up. For example, an instruction may be said to do several +things `atomically', i.e., all the things are done immediately, +and there is no chance of the instruction being half-completed or +of another being interspersed. Used esp. to convey that an +operation cannot be screwed up by interrupts. "This routine locks +the file and increments the file's semaphore atomically." 2. +[primarily techspeak] Guaranteed to complete successfully or not +at all, usu. refers to database transactions. If an error +prevents a partially-performed transaction from proceeding to +completion, it must be "backed out," as the database must not be +left in an inconsistent state. + +Computer usage, in either of the above senses, has none of the +connotations that `atomic' has in mainstream English (i.e. of +particles of matter, nuclear explosions etc.). + + +Node:attoparsec, Next:AUP, Previous:atomic, Up:= A += + +attoparsec n. + +About an inch. `atto-' is the standard SI prefix for +multiplication by 10^(-18). A parsec (parallax-second) is 3.26 +light-years; an attoparsec is thus 3.26 * 10^(-18) light years, +or about 3.1 cm (thus, 1 attoparsec/microfortnight equals about 1 +inch/sec). This unit is reported to be in use (though probably +not very seriously) among hackers in the U.K. See micro-. + + +Node:AUP, Next:autobogotiphobia, Previous:attoparsec, Up:= A = + +AUP /A-U-P/ + +Abbreviation, "Acceptable Use Policy". The policy of a given +ISP which sets out what the ISP considers to be (un)acceptable +uses of its Internet resources. + + +Node:autobogotiphobia, Next:automagically, Previous:AUP, Up:= A = + +autobogotiphobia /aw'toh-boh-got`*-foh'bee-*/ + +n. See bogotify. + + +Node:automagically, Next:avatar, Previous:autobogotiphobia, Up:= A = + +automagically /aw-toh-maj'i-klee/ adv. + +Automatically, but in a way that, for some reason (typically +because it is too complicated, or too ugly, or perhaps even too +trivial), the speaker doesn't feel like explaining to you. See +magic. "The C-INTERCAL compiler +generates C, then automagically invokes cc(1) to +produce an executable." + +This term is quite old, going back at least to the mid-70s in +jargon and probably much earlier. The word `automagic' occurred +in advertising (for a shirt-ironing gadget) as far back as the +late 1940s. + + +Node:avatar, Next:awk, Previous:automagically, Up:= A = + +avatar n. Syn. + +[in Hindu mythology, the incarnation of a god] 1. Among people +working on virtual reality and cyberspace interfaces, an avatar +is an icon or representation of a user in a shared virtual +reality. The term is sometimes used on MUDs. 2. [CMU, Tektronix] root, superuser. +There are quite a few Unix machines on which the name of the +superuser account is `avatar' rather than `root'. This quirk was +originated by a CMU hacker who found the terms `root' and +`superuser' unimaginative, and thought `avatar' might better +impress people with the responsibility they were accepting. + + +Node:awk, Next:B5, +Previous:avatar, Up:= A = + +awk /awk/ + +1. n. [Unix techspeak] An interpreted language for massaging +text data developed by Alfred Aho, Peter Weinberger, and Brian +Kernighan (the name derives from their initials). It is +characterized by C-like syntax, a declaration-free approach to +variable typing and declarations, associative arrays, and +field-oriented text processing. See also Perl. 2. n. Editing term for an expression +awkward to manipulate through normal regexp facilities (for example, one containing +a newline). 3. vt. To process data +using awk(1). + + +Node:= B =, Next:= C =, Previous:= A =, Up:The Jargon Lexicon + += B = + + +B5: + + +back door: + + +backbone cabal: + + +backbone site: + + +backgammon: + + +background: + + +backreference: + + +backronym: + + +backspace and +overstrike: + + +backward +combatability: + + +BAD: + + +Bad and Wrong: + + +Bad Thing: + + +bag on the side: + + +bagbiter: + + +bagbiting: + + +baggy pantsing: + + +balloonian +variable: + + +bamf: + + +banana label: + + +banana problem: + + +banner ad: + + +banner site: + + +barn: + + +batbelt: + + +Befunge: + + +BI: + + +binary four: + + +bandwidth: + + +bang: + + +bang on: + + +bang path: + + +banner: + + +bar: + + +bare metal: + + +barf: + + +barfmail: + + +barfulation: + + +barfulous: + + +barney: + + +baroque: + + +BASIC: + + +batch: + + +bathtub curve: + + +baud: + + +baud barf: + + +baz: + + +bazaar: + + +bboard: + + +BBS: + + +BCPL: + + +beam: + + +beanie key: + + +beep: + + +beige toaster: + + +bells and +whistles: + + +bells whistles and +gongs: + + +benchmark: + + +Berkeley Quality +Software: + + +berklix: + + +Berzerkeley: + + +beta: + + +BFI: + + +bible: + + +BiCapitalization: + + +B1FF: + + +biff: + + +Big Gray Wall: + + +big iron: + + +Big Red Switch: + + +Big Room: + + +big win: + + +big-endian: + + +bignum: + + +bigot: + + +bit: + + +bit bang: + + +bit bashing: + + +bit bucket: + + +bit decay: + + +bit rot: + + +bit twiddling: + + +bit-paired +keyboard: + + +bitblt: + + +BITNET: + + +bits: + + +bitty box: + + +bixen: + + +bixie: + + +black art: + + +black hole: + + +black magic: + + +Black Screen of +Death: + + +Black Thursday: + + +blammo: + + +blargh: + + +blast: + + +blat: + + +bletch: + + +bletcherous: + + +blink: + + +blinkenlights: + + +blit: + + +blitter: + + +blivet: + + +bloatware: + + +BLOB: + + +block: + + +block transfer +computations: + + +Bloggs Family: + + +blow an EPROM: + + +blow away: + + +blow out: + + +blow past: + + +blow up: + + +BLT: + + +Blue Book: + + +blue box: + + +Blue Glue: + + +blue goo: + + +Blue Screen of +Death: + + +blue wire: + + +blurgle: + + +BNF: + + +boa: + + +board: + + +boat anchor: + + +bob: + + +bodysurf code: + + +BOF: + + +BOFH: + + +bogo-sort: + + +bogometer: + + +BogoMIPS: + + +bogon: + + +bogon filter: + + +bogon flux: + + +bogosity: + + +bogotify: + + +bogue out: + + +bogus: + + +Bohr bug: + + +boink: + + +bomb: + + +bondage-and-discipline +language: + + +bonk/oif: + + +book titles: + + +boot: + + +Borg: + + +borken: + + +bot: + + +bot spot: + + +bottom feeder: + + +bottom-up +implementation: + + +bounce: + + +bounce message: + + +boustrophedon: + + +box: + + +boxed comments: + + +boxen: + + +boxology: + + +bozotic: + + +BQS: + + +brain dump: + + +brain fart: + + +brain-damaged: + + +brain-dead: + + +braino: + + +branch to +Fishkill: + + +bread crumbs: + + +break: + + +break-even point: + + +breath-of-life +packet: + + +breedle: + + +Breidbart Index: + + +bring X to its +knees: + + +brittle: + + +broadcast storm: + + +brochureware: + + +broken: + + +broken arrow: + + +BrokenWindows: + + +broket: + + +Brooks's Law: + + +brown-paper-bag +bug: + + +browser: + + +BRS: + + +brute force: + + +brute force and +ignorance: + + +BSD: + + +BSOD: + + +BUAF: + + +BUAG: + + +bubble sort: + + +bucky bits: + + +buffer chuck: + + +buffer overflow: + + +bug: + + +bug-compatible: + + +bug-for-bug +compatible: + + +bug-of-the-month +club: + + +buglix: + + +bulletproof: + + +bullschildt: + + +bum: + + +bump: + + +burble: + + +buried treasure: + + +burn-in period: + + +burst page: + + +busy-wait: + + +buzz: + + +BWQ: + + +by hand: + + +byte: + + +byte sex: + + +bytesexual: + + +Bzzzt! Wrong.: + + +Node:B5, Next:back door, Previous:awk, Up:= B = + + +B5 // + +[common] Abbreviation for "Babylon 5", a science-fiction TV +series as revered among hackers as was the original Star +Trek. + + +Node:back door, Next:backbone cabal, Previous:B5, Up:= B = + +back door n. + +[common] A hole in the security of a system deliberately left +in place by designers or maintainers. The motivation for such +holes is not always sinister; some operating systems, for +example, come out of the box with privileged accounts intended +for use by field service technicians or the vendor's maintenance +programmers. Syn. trap door; +may also be called a `wormhole'. See also iron box, cracker, worm, +logic bomb. + +Historically, back doors have often lurked in systems longer +than anyone expected or planned, and a few have become widely +known. Ken Thompson's 1983 Turing Award lecture to the ACM +admitted the existence of a back door in early Unix versions that +may have qualified as the most fiendishly clever security hack of +all time. In this scheme, the C compiler contained code that +would recognize when the `login' command was being recompiled and +insert some code recognizing a password chosen by Thompson, +giving him entry to the system whether or not an account had been +created for him. + +Normally such a back door could be removed by removing it from +the source code for the compiler and recompiling the compiler. +But to recompile the compiler, you have to use the +compiler -- so Thompson also arranged that the compiler would +recognize when it was compiling a version of itself, and +insert into the recompiled compiler the code to insert into the +recompiled `login' the code to allow Thompson entry -- and, of +course, the code to recognize itself and do the whole thing again +the next time around! And having done this once, he was then able +to recompile the compiler from the original sources; the hack +perpetuated itself invisibly, leaving the back door in place and +active but with no trace in the sources. + +The talk that suggested this truly moby hack was published as +"Reflections on Trusting Trust", "Communications of the ACM 27", +8 (August 1984), pp. 761-763 (text available at http://www.acm.org/classics). +Ken Thompson has since confirmed that this hack was implemented +and that the Trojan Horse code did appear in the login binary of +a Unix Support group machine. Ken says the crocked compiler was +never distributed. Your editor has heard two separate reports +that suggest that the crocked login did make it out of Bell Labs, +notably to BBN, and that it enabled at least one late-night login +across the network by someone using the login name `kt'. + + +Node:backbone cabal, Next:backbone site, Previous:back door, Up:= B = + +backbone cabal n. + +A group of large-site administrators who pushed through the +Great Renaming and reined +in the chaos of Usenet during most +of the 1980s. During most of its lifetime, the Cabal (as it was +sometimes capitalized) steadfastly denied its own existence; it +was almost obligatory for anyone privy to their secrets to +respond "There is no Cabal" whenever the existence or activities +of the group were speculated on in public. + +The result of this policy was an attractive aura of mystery. +Even a decade after the cabal mailing list disbanded in late 1988 +following a bitter internal catfight, many people believed (or +claimed to believe) that it had not actually disbanded but only +gone deeper underground with its power intact. + +This belief became a model for various paranoid theories about +various Cabals with dark nefarious objectives beginning with +taking over the Usenet or Internet. These paranoias were later +satirized in ways that took on a life of their own. See Eric Conspiracy for one +example. + +See NANA for the subsequent history +of "the Cabal". + + +Node:backbone site, Next:backgammon, Previous:backbone cabal, Up:= B = + +backbone site n.,obs. + +Formerly, a key Usenet and email site, one that processes a +large amount of third-party traffic, especially if it is the home +site of any of the regional coordinators for the Usenet maps. +Notable backbone sites as of early 1993, when this sense of the +term was beginning to pass out of general use due to wide +availability of cheap Internet connections, included _uunet_ +and the mail machines at Rutgers University, UC Berkeley, DEC's Western Research Laboratories, Ohio +State University, and the University of Texas. Compare rib site, leaf site. + +[1996 update: This term is seldom heard any more. The UUCP +network world that gave it meaning has nearly disappeared; +everyone is on the Internet now and network traffic is +distributed in very different patterns. Today one might see +references to a `backbone router' instead --ESR] + + +Node:backgammon, Next:background, Previous:backbone site, Up:= B = + +backgammon + +See bignum (sense 3), moby (sense 4), and pseudoprime. + + +Node:background, Next:backreference, Previous:backgammon, Up:= B = + +background n.,adj.,vt. + +[common] To do a task `in background' is to do it whenever +foreground matters are not +claiming your undivided attention, and `to background' something +means to relegate it to a lower priority. "For now, we'll just +print a list of nodes and links; I'm working on the +graph-printing problem in background." Note that this implies +ongoing activity but at a reduced level or in spare time, in +contrast to mainstream `back burner' (which connotes benign +neglect until some future resumption of activity). Some people +prefer to use the term for processing that they have queued up +for their unconscious minds (a tack that one can often fruitfully +take upon encountering an obstacle in creative work). Compare +amp off, slopsucker. + +Technically, a task running in background is detached from the +terminal where it was started (and often running at a lower +priority); oppose foreground. +Nowadays this term is primarily associated with Unix, but it appears to have been first used in +this sense on OS/360. + + +Node:backreference, Next:backronym, Previous:background, Up:= B = + +backreference n. + +1. In a regular expression or pattern match, the text which +was matched within grouping parentheses parentheses. 2. The part +of the pattern which refers back to the matched text. 3. By +extension, anything which refers back to something which has been +seen or discussed before. "When you said `she' just now, who were +you backreferencing?" + + +Node:backronym, Next:backspace and overstrike, +Previous:backreference, Up:= B = + +backronym n. + +[portmanteau of back + acronym] A word interpreted as an +acronym that was not originally so intended. This is a special +case of what linguists call `back formation'. Examples are given +under BASIC, recursive acronym (Cygnus), Acme, and mung. +Discovering backronyms is a common form of wordplay among +hackers. Compare retcon. + + +Node:backspace and +overstrike, Next:backward combatability, +Previous:backronym, Up:= B = + +backspace and overstrike interj. + +[rare] Whoa! Back up. Used to suggest that someone just said +or did something wrong. Once common among APL programmers; may +now be obsolete. + + +Node:backward +combatability, Next:BAD, +Previous:backspace and overstrike, +Up:= B = + +backward combatability /bak'w*rd k*m-bat'*-bil'*-tee/ +n. + +[CMU, Tektronix: from `backward compatibility'] A property of +hardware or software revisions in which previous protocols, +formats, layouts, etc. are irrevocably discarded in favor of `new +and improved' protocols, formats, and layouts, leaving the +previous ones not merely deprecated but actively defeated. (Too +often, the old and new versions cannot definitively be +distinguished, such that lingering instances of the previous ones +yield crashes or other infelicitous effects, as opposed to a +simple "version mismatch" message.) A backwards compatible +change, on the other hand, allows old versions to coexist without +crashes or error messages, but too many major changes +incorporating elaborate backwards compatibility processing can +lead to extreme software +bloat. See also flag +day. + + +Node:BAD, Next:Bad and Wrong, Previous:backward +combatability, Up:= B = + + +BAD /B-A-D/ adj. + +[IBM: acronym, `Broken As Designed'] Said of a program that is +bogus because of bad design and +misfeatures rather than because of bugginess. See working as designed. + + +Node:Bad and Wrong, Next:Bad Thing, Previous:BAD, Up:= B = + +Bad and Wrong adj. + +[Durham, UK] Said of something that is both badly designed and +wrongly executed. This common term is the prototype of, and is +used by contrast with, three less common terms - Bad and Right (a +kludge, something ugly but functional); Good and Wrong (an +overblown GUI or other attractive nuisance); and (rare praise) +Good and Right. These terms entered common use at Durham c.1994 +and may have been imported from elsewhere; they are also in use +at Oxford, and the emphatic form "Evil, Bad and Wrong" +(abbreviated EBW) is reported fromm there. There are standard +abbreviations: they start with B&R, a typo for "Bad and +Wrong". Consequently, B&W is actually "Bad and Right", +G&R = "Good and Wrong", and G&W = "Good and Right". +Compare evil and rude, +Good Thing, Bad Thing. + + +Node:Bad Thing, Next:bag on the side, Previous:Bad and Wrong, Up:= B = + +Bad Thing n. + +[very common; from the 1930 Sellar & Yeatman parody "1066 +And All That"] Something that can't possibly result in +improvement of the subject. This term is always capitalized, as +in "Replacing all of the 9600-baud modems with bicycle couriers +would be a Bad Thing". Oppose Good +Thing. British correspondents confirm that Bad Thing and Good Thing (and prob. therefore Right Thing and Wrong Thing) come from the book +referenced in the etymology, which discusses rulers who were Good +Kings but Bad Things. This has apparently created a mainstream +idiom on the British side of the pond. It is very common among +American hackers, but not in mainstream usage here. Compare Bad and Wrong. + + +Node:bag on the side, Next:bagbiter, Previous:Bad Thing, Up:= B = + +bag on the side n. + +[prob. originally related to a colostomy bag] An extension to +an established hack that is supposed to add some functionality to +the original. Usually derogatory, implying that the original was +being overextended and should have been thrown away, and the new +product is ugly, inelegant, or bloated. Also v. phrase, `to hang +a bag on the side [of]'. "C++? That's just a bag on the side of C +...." "They want me to hang a bag on the side of +the accounting system." + + +Node:bagbiter, Next:bagbiting, Previous:bag on the side, Up:= B = + +bagbiter /bag'bi:t-*r/ n. + +1. Something, such as a program or a computer, that fails to +work, or works in a remarkably clumsy manner. "This text editor +won't let me make a file with a line longer than 80 characters! +What a bagbiter!" 2. A person who has caused you some trouble, +inadvertently or otherwise, typically by failing to program the +computer properly. Synonyms: loser, +cretin, chomper. 3. `bite the bag' vi. To fail in some +manner. "The computer keeps crashing every five minutes." "Yes, +the disk controller is really biting the bag." + +The original loading of these terms was almost undoubtedly +obscene, possibly referring to a douche bag or the scrotum (we +have reports of "Bite the douche bag!" being used as a taunt at +MIT 1970-1976, and we have another report that "Bite the bag!" +was in common use at least as early as 1965), but in their +current usage they have become almost completely sanitized. + +ITS's lexiphage program was +the first and to date only known example of a program +intended to be a bagbiter. + + +Node:bagbiting, Next:baggy pantsing, Previous:bagbiter, Up:= B = + +bagbiting adj. + +Having the quality of a bagbiter. "This bagbiting system won't let me +compute the factorial of a negative number." Compare losing, cretinous, bletcherous, `barfucious' (under barfulous) and `chomping' (under chomp). + + +Node:baggy pantsing, Next:balloonian variable, +Previous:bagbiting, Up:= B = + +baggy pantsing v. + +[Georgia Tech] A "baggy pantsing" is used to reprimand hackers +who incautiously leave their terminals unlocked. The affected +user will come back to find a post from them on internal +newsgroups discussing exactly how baggy their pants are, an +accepted stand-in for "unattentive user who left their work +unprotected in the clusters". A properly-done baggy pantsing is +highly mocking and humorous (see examples below). It is +considered bad form to post a baggy pantsing to off-campus +newsgroups or the more technical, serious groups. A particularly +nice baggy pantsing may be "claimed" by immediately quoting the +message in full, followed by your sig; this has the added benefit +of keeping the embarassed victim from being able to delete the +post. Interesting baggy-pantsings have been done involving adding +commands to login scripts to repost the message every time the +unlucky user logs in; Unix boxes on the residential network, when +cracked, oftentimes have their homepages replaced (after being +politely backedup to another file) with a baggy-pants message; +.plan files are also occasionally targeted. Usage: "Prof. +Greenlee fell asleep in the Solaris cluster again; we +baggy-pantsed him to git.cc.class.2430.flame." + + +Node:balloonian variable, +Next:bamf, Previous:baggy pantsing, Up:= B = + +balloonian variable n. + +[Commodore users; perh. a deliberate phonetic mangling of +`boolean variable'?] Any variable that doesn't actually hold or +control state, but must nevertheless be declared, checked, or +set. A typical balloonian variable started out as a flag attached +to some environment feature that either became obsolete or was +planned but never implemented. Compatibility concerns (or +politics attached to same) may require that such a flag be +treated as though it were live. + + +Node:bamf, Next:banana label, Previous:balloonian variable, Up:= B = + +bamf /bamf/ + +1. [from X-Men comics; originally "bampf"] interj. Notional +sound made by a person or object teleporting in or out of the +hearer's vicinity. Often used in virtual reality (esp. MUD) electronic fora +when a character wishes to make a dramatic entrance or exit. 2. +The sound of magical transformation, used in virtual reality +fora like MUDs. 3. In MUD circles, +"bamf" is also used to refer to the act by which a MUD server +sends a special notification to the MUD client to switch its +connection to another server ("I'll set up the old site to just +bamf people over to our new location."). 4. Used by MUDders on +occasion in a more general sense related to sense 3, to refer to +directing someone to another location or resource ("A user was +asking about some technobabble so I bamfed them to http://www.tuxedo.org/jargon/".) + + +Node:banana label, Next:banana problem, Previous:bamf, Up:= B = + +banana label n. + +The labels often used on the sides of macrotape reels, so called because they are +shaped roughly like blunt-ended bananas. This term, like +macrotapes themselves, is still current but visibly headed for +obsolescence. + + +Node:banana problem, Next:binary four, Previous:banana label, Up:= B = + +banana problem n. + +[from the story of the little girl who said "I know how to +spell `banana', but I don't know when to stop"]. Not knowing +where or when to bring a production to a close (compare fencepost error). One may say +`there is a banana problem' of an algorithm with poorly defined +or incorrect termination conditions, or in discussing the +evolution of a design that may be succumbing to featuritis (see +also creeping elegance, +creeping featuritis). +See item 176 under HAKMEM, which +describes a banana problem in a Dissociated Press implementation. +Also, see one-banana +problem for a superficially similar but unrelated +usage. + + +Node:binary four, Next:bandwidth, Previous:banana problem, Up:= B = + +binary four n. + +[Usenet] The finger, in the sense of `digitus impudicus'. This +comes from an analogy between binary and the hand, i.e. +1=00001=thumb, 2=00010=index finger, 3=00011=index and thumb, +4=00100. Considered silly. Prob. from humorous derivative of +finger, sense 4. + + +Node:bandwidth, Next:bang, Previous:binary four, Up:= B = + +bandwidth n. + +1. [common] Used by hackers (in a generalization of its +technical meaning) as the volume of information per unit time +that a computer, person, or transmission medium can handle. +"Those are amazing graphics, but I missed some of the detail -- +not enough bandwidth, I guess." Compare low-bandwidth. This generalized usage +began to go mainstream after the Internet population explosion of +1993-1994. 2. Attention span. 3. On Usenet, a measure of network capacity that is +often wasted by people complaining about how items posted by +others are a waste of bandwidth. + + +Node:bang, Next:bang on, Previous:bandwidth, Up:= B = + +bang + +1. n. Common spoken name for ! (ASCII 0100001), +especially when used in pronouncing a bang path in spoken hackish. In elder days this was considered a +CMUish usage, with MIT and Stanford hackers preferring excl or shriek; +but the spread of Unix has carried `bang' with it (esp. via the +term bang path) and it is now +certainly the most common spoken name for !. Note +that it is used exclusively for non-emphatic written +!; one would not say "Congratulations bang" (except +possibly for humorous purposes), but if one wanted to specify the +exact characters `foo!' one would speak "Eff oh oh bang". See +shriek, ASCII. 2. interj. An exclamation signifying +roughly "I have achieved enlightenment!", or "The dynamite has +cleared out my brain!" Often used to acknowledge that one has +perpetrated a thinko immediately +after one has been called on it. + + +Node:bang on, Next:bang path, Previous:bang, Up:= B = + + +bang on vt. + +To stress-test a piece of hardware or software: "I banged on +the new version of the simulator all day yesterday and it didn't +crash once. I guess it is ready for release." The term pound on is synonymous. + + +Node:bang path, Next:banner, Previous:bang on, Up:= +B = + +bang path n. + +[now historical] An old-style UUCP electronic-mail address +specifying hops to get from some assumed-reachable location to +the addressee, so called because each hop is signified by a bang sign. Thus, for example, the path +_...!bigsite!foovax!barbox!me_ directs people to route their +mail to machine _bigsite_ (presumably a well-known location +accessible to everybody) and from there through the machine +_foovax_ to the account of user _me_ on +_barbox_. + +In the bad old days of not so long ago, before autorouting +mailers became commonplace, people often published compound bang +addresses using the { } convention (see glob) to give paths from several big +machines, in the hopes that one's correspondent might be able to +get mail to one of them reliably (example: _...!{seismo, +ut-sally, ihnp4}!rice!beta!gamma!me_). Bang paths of 8 to 10 +hops were not uncommon in 1981. Late-night dial-up UUCP links +would cause week-long transmission times. Bang paths were often +selected by both transmission time and reliability, as messages +would often get lost. See Internet address, the network, and sitename. + + +Node:banner, Next:banner ad, Previous:bang path, Up:= B = + +banner n. + +1. The title page added to printouts by most print spoolers +(see spool). Typically includes user +or account ID information in very large character-graphics +capitals. Also called a `burst page', because it indicates where +to burst (tear apart) fanfold paper to separate one user's +printout from the next. 2. A similar printout generated +(typically on multiple pages of fan-fold paper) from +user-specified text, e.g., by a program such as Unix's +banner({1,6}). 3. On interactive software, a first +screen containing a logo and/or author credits and/or a copyright +notice. This is probably now the commonest sense. + + +Node:banner ad, Next:banner site, Previous:banner, Up:= +B = + +banner ad n. + +Any of the annoying graphical advertisements that span the +tops of way too many Web pages. + + +Node:banner site, Next:bar, Previous:banner ad, Up:= B = + +banner site n. + +[warez d00dz] A FTP site storing pirated files where one must +first click on several banners and/or subscribe to various `free' +services, usually generating some form of revenues for the site +owner, to be able to access the site. More often than not, the +username/password painfully obtained by clicking on banners and +subscribing to bogus services or mailing lists turns out to be +non-working or gives access to a site that always responds busy. +See ratio site, leech mode. + + +Node:bar, Next:bare metal, Previous:banner site, Up:= B = + +bar /bar/ n. + +1. [very common] The second metasyntactic variable, after +foo and before baz. "Suppose we have two functions: FOO and BAR. +FOO calls BAR...." 2. Often appended to foo to produce foobar. + + +Node:bare metal, Next:barf, Previous:bar, Up:= B = + + +bare metal n. + +1. [common] New computer hardware, unadorned with such snares +and delusions as an operating +system, an HLL, or even +assembler. Commonly used in the phrase `programming on the bare +metal', which refers to the arduous work of bit bashing needed to create these basic +tools for a new machine. Real bare-metal programming involves +things like building boot proms and BIOS chips, implementing +basic monitors used to test device drivers, and writing the +assemblers that will be used to write the compiler back ends that +will give the new machine a real development environment. 2. +`Programming on the bare metal' is also used to describe a style +of hand-hacking that relies on +bit-level peculiarities of a particular hardware design, esp. +tricks for speed and space optimization that rely on crocks such +as overlapping instructions (or, as in the famous case described +in The Story of Mel +(in Appendix A), interleaving of opcodes on a magnetic drum to +minimize fetch delays due to the device's rotational latency). +This sort of thing has become less common as the relative costs +of programming time and machine resources have changed, but is +still found in heavily constrained environments such as +industrial embedded systems, and in the code of hackers who just +can't let go of that low-level control. See Real Programmer. + +In the world of personal computing, bare metal programming +(especially in sense 1 but sometimes also in sense 2) is often +considered a Good Thing, or at +least a necessary evil (because these machines have often been +sufficiently slow and poorly designed to make it necessary; see +ill-behaved). There, the term +usually refers to bypassing the BIOS or OS interface and writing +the application to directly access device registers and machine +addresses. "To get 19.2 kilobaud on the serial port, you need to +get down to the bare metal." People who can do this sort of thing +well are held in high regard. + + +Node:barf, Next:barfmail, Previous:bare metal, Up:= B = + +barf /barf/ n.,v. + +[common; from mainstream slang meaning `vomit'] 1. interj. +Term of disgust. This is the closest hackish equivalent of the +Valspeak "gag me with a spoon". (Like, euwww!) See bletch. 2. vi. To say "Barf!" or emit some +similar expression of disgust. "I showed him my latest hack and +he barfed" means only that he complained about it, not that he +literally vomited. 3. vi. To fail to work because of unacceptable +input, perhaps with a suitable error message, perhaps not. +Examples: "The division operation barfs if you try to divide by +0." (That is, the division operation checks for an attempt to +divide by zero, and if one is encountered it causes the operation +to fail in some unspecified, but generally obvious, manner.) "The +text editor barfs if you try to read in a new file before writing +out the old one." See choke, gag. In Commonwealth Hackish, `barf' is +generally replaced by `puke' or `vom'. barf is sometimes also used as a metasyntactic variable, like +foo or bar. + + +Node:barfmail, Next:barfulation, Previous:barf, Up:= B = + + +barfmail n. + +Multiple bounce +messages accumulating to the level of serious annoyance, +or worse. The sort of thing that happens when an inter-network +mail gateway goes down or wonky. + + +Node:barfulation, Next:barfulous, Previous:barfmail, Up:= +B = + +barfulation /bar`fyoo-lay'sh*n/ interj. + +Variation of barf used around the +Stanford area. An exclamation, expressing disgust. On seeing some +particularly bad code one might exclaim, "Barfulation! Who wrote +this, Quux?" + + +Node:barfulous, Next:barn, Previous:barfulation, Up:= B = + +barfulous /bar'fyoo-l*s/ adj. + +(alt. `barfucious', /bar-fyoo-sh*s/) Said of something that +would make anyone barf, if only for esthetic reasons. + + +Node:barn, Next:barney, Previous:barfulous, Up:= B = + +barn n. + +[uncommon; prob. from the nuclear military] An unexpectedly +large quantity of something: a unit of measurement. "Why is +/var/adm taking up so much space?" "The logs have grown to +several barns." The source of this is clear: when physicists were +first studying nuclear interactions, the probability was thought +to be proportional to the cross-sectional area of the nucleus +(this probability is still called the cross-section). Upon +experimenting, they discovered the interactions were far more +probable than expected; the nuclei were `as big as a barn'. The +units for cross-sections were christened Barns, (10^-24 cm^2) and +the book containing cross-sections has a picture of a barn on the +cover. + + +Node:barney, Next:baroque, Previous:barn, Up:= B = + + +barney n. + +In Commonwealth hackish, `barney' is to fred (sense #1) as bar +is to foo. That is, people who commonly +use `fred' as their first metasyntactic variable will often use +`barney' second. The reference is, of course, to Fred Flintstone +and Barney Rubble in the Flintstones cartoons. + + +Node:baroque, Next:BASIC, Previous:barney, Up:= B += + +baroque adj. + +[common] Feature-encrusted; complex; gaudy; verging on +excessive. Said of hardware or (esp.) software designs, this has +many of the connotations of elephantine or monstrosity but is less extreme and not +pejorative in itself. "Metafont even has features to introduce +random variations to its letterform output. Now that is +baroque!" See also rococo. + + +Node:BASIC, Next:batbelt, Previous:baroque, Up:= B += + +BASIC /bay'-sic/ n. + +A programming language, originally designed for Dartmouth's +experimental timesharing system in the early 1960s, which for +many years was the leading cause of brain damage in +proto-hackers. Edsger W. Dijkstra observed in "Selected Writings +on Computing: A Personal Perspective" that "It is practically +impossible to teach good programming style to students that have +had prior exposure to BASIC: as potential programmers they are +mentally mutilated beyond hope of regeneration." This is another +case (like Pascal) of the cascading +lossage that happens when a +language deliberately designed as an educational toy gets taken +too seriously. A novice can write short BASIC programs (on the +order of 10-20 lines) very easily; writing anything longer (a) is +very painful, and (b) encourages bad habits that will make it +harder to use more powerful languages well. This wouldn't be so +bad if historical accidents hadn't made BASIC so common on +low-end micros in the 1980s. As it is, it probably ruined tens of +thousands of potential wizards. + +[1995: Some languages called `BASIC' aren't quite this nasty +any more, having acquired Pascal- and C-like procedures and +control structures and shed their line numbers. --ESR] + +Note: the name is commonly parsed as Beginner's All-purpose +Symbolic Instruction Code, but this is a backronym. BASIC was originally named Basic, +simply because it was a simple and basic programming language. +Because most programming language names were in fact acronyms, +BASIC was often capitalized just out of habit or to be silly. No +acronym for BASIC originally existed or was intended (as one can +verify by reading texts through the early 1970s). Later, around +the mid-1970s, people began to make up backronyms for BASIC +because they weren't sure. Beginner's All-purpose Symbolic +Instruction Code is the one that caught on. + + +Node:batbelt, Next:batch, Previous:BASIC, Up:= B += + +batbelt n. + +Many hackers routinely hang numerous devices such as pagers, +cell-phones, personal organizers, leatherman multitools, pocket +knives, flashlights, walkie-talkies, even miniature computers +from their belts. When many of these devices are worn at once, +the hacker's belt somewhat resembles Batman's utility belt; hence +it is referred to as a batbelt. + + +Node:batch, Next:bathtub curve, Previous:batbelt, Up:= B = + +batch adj. + +1. Non-interactive. Hackers use this somewhat more loosely +than the traditional technical definitions justify; in +particular, switches on a normally interactive program that +prepare it to receive non-interactive command input are often +referred to as `batch mode' switches. A `batch file' is a series +of instructions written to be handed to an interactive program +running in batch mode. 2. Performance of dreary tasks all at one +sitting. "I finally sat down in batch mode and wrote out checks +for all those bills; I guess they'll turn the electricity back on +next week..." 3. `batching up': Accumulation of a +number of small tasks that can be lumped together for greater +efficiency. "I'm batching up those letters to send sometime" "I'm +batching up bottles to take to the recycling center." + + +Node:bathtub curve, Next:baud, Previous:batch, Up:= B += + +bathtub curve n. + +Common term for the curve (resembling an end-to-end section of +one of those claw-footed antique bathtubs) that describes the +expected failure rate of electronics with time: initially high, +dropping to near 0 for most of the system's lifetime, then rising +again as it `tires out'. See also burn-in period, infant mortality. + + +Node:baud, Next:baud barf, Previous:bathtub curve, Up:= B = + +baud /bawd/ n. + +[simplified from its technical meaning] n. Bits per second. +Hence kilobaud or Kbaud, thousands of bits per second. The +technical meaning is `level transitions per second'; this +coincides with bps only for two-level modulation with no framing +or stop bits. Most hackers are aware of these nuances but +blithely ignore them. + +Historical note: `baud' was originally a unit of telegraph +signalling speed, set at one pulse per second. It was proposed at +the November, 1926 conference of the Comité Consultatif +International Des Communications Télégraphiques as +an improvement on the then standard practice of referring to line +speeds in terms of words per minute, and named for Jean Maurice +Emile Baudot (1845-1903), a French engineer who did a lot of +pioneering work in early teleprinters. + + +Node:baud barf, Next:baz, Previous:baud, Up:= B = + + +baud barf /bawd barf/ n. + +The garbage one gets a terminal (or terminal emulator) when +using a modem connection with some protocol setting (esp. line +speed) incorrect, or when someone picks up a voice extension on +the same line, or when really bad line noise disrupts the +connection. Baud barf is not completely random, by the way; hackers with a lot of +serial-line experience can usually tell whether the device at the +other end is expecting a higher or lower speed than the terminal +is set to. Really experienced ones can identify +particular speeds. + + +Node:baz, Next:bazaar, Previous:baud barf, Up:= B = + +baz /baz/ n. + +1. [common] The third metasyntactic variable +"Suppose we have three functions: FOO, BAR, and BAZ. FOO calls +BAR, which calls BAZ...." (See also fum) 2. interj. A term of mild annoyance. In this +usage the term is often drawn out for 2 or 3 seconds, producing +an effect not unlike the bleating of a sheep; /baaaaaaz/. 3. +Occasionally appended to foo to produce +`foobaz'. + +Earlier versions of this lexicon derived `baz' as a Stanford +corruption of bar. However, Pete Samson +(compiler of the TMRC lexicon) reports +it was already current when he joined TMRC in 1958. He says "It +came from "Pogo". Albert the Alligator, when vexed or outraged, +would shout `Bazz Fazz!' or `Rowrbazzle!' The club layout was +said to model the (mythical) New England counties of Rowrfolk and +Bassex (Rowrbazzle mingled with +(Norfolk/Suffolk/Middlesex/Essex)." + + +Node:bazaar, Next:bboard, Previous:baz, Up:= B = + + +bazaar n.,adj. + +In 1997, after meditatating on the success of Linux for three years, the Jargon File's own +editor ESR wrote an analytical paper on hacker culture and +development models titled The +Cathedral and the Bazaar. The main argument of the paper was +that Brooks's Law is not the +whole story; given the right social machinery, debugging can be +efficiently parallelized across large numbers of programmers. The +title metaphor caught on (see also cathedral), and the style of development +typical in the Linux community is now often referred to as the +bazaar mode. Its characteristics include releasing code early and +often, and actively seeking the largest possible pool of peer +reviewers. + + +Node:bboard, Next:BBS, Previous:bazaar, Up:= B += + +bboard /bee'bord/ n. + +[contraction of `bulletin board'] 1. Any electronic bulletin +board; esp. used of BBS systems running +on personal micros, less frequently of a Usenet newsgroup (in fact, use of this term for a +newsgroup generally marks one either as a newbie fresh in from the BBS world or as a real +old-timer predating Usenet). 2. At CMU and other colleges with +similar facilities, refers to campus-wide electronic bulletin +boards. 3. The term `physical bboard' is sometimes used to refer +to an old-fashioned, non-electronic cork-and-thumbtack memo +board. At CMU, it refers to a particular one outside the CS +Lounge. + +In either of senses 1 or 2, the term is usually prefixed by +the name of the intended board (`the Moonlight Casino bboard' or +`market bboard'); however, if the context is clear, the +better-read bboards may be referred to by name alone, as in (at +CMU) "Don't post for-sale ads on general". + + +Node:BBS, Next:BCPL, Previous:bboard, Up:= B += + +BBS /B-B-S/ n. + +[common; abbreviation, `Bulletin Board System'] An electronic +bulletin board system; that is, a message database where people +can log in and leave broadcast messages for others grouped +(typically) into topic +groups. The term was especially applied to the thousands +of local BBS systems that operated during the pre-Internet +microcomputer era of roughly 1980 to 1995, typically run by +amateurs for fun out of their homes on MS-DOS boxes with a single +modem line each. Fans of Usenet and Internet or the big +commercial timesharing bboards such as CompuServe and GEnie +tended to consider local BBSes the low-rent district of the +hacker culture, but they served a valuable function by knitting +together lots of hackers and users in the personal-micro world +who would otherwise have been unable to exchange code at all. +Post-Internet, BBSs are likely to be local newsgroups on an ISP; +efficiency has increased but a certain flavor has been lost. See +also bboard. + + +Node:BCPL, Next:beam, Previous:BBS, +Up:= B = + +BCPL // n. + +[abbreviation, `Basic Combined Programming Language') A +programming language developed by Martin Richards in Cambridge in +1967. It is remarkable for its rich syntax, small size of +compiler (it can be run in 16k) and extreme portability. It +reached break-even point at a very early stage, and was the +language in which the original hello +world program was written. It has been ported to so many +different systems that its creator confesses to having lost +count. It has only one data type (a machine word) which can be +used as an integer, a character, a floating point number, a +pointer, or almost anything else, depending on context. BCPL was +a precursor of C, which inherited some of its features. + + +Node:beam, Next:beanie key, Previous:BCPL, Up:= B = + + +beam vt. + +[from Star Trek Classic's "Beam me up, Scotty!"] 1. To +transfer softcopy of a file +electronically; most often in combining forms such as `beam me a +copy' or `beam that over to his site'. 2. Palm Pilot users very +commonly use this term for the act of exchanging bits via the +infrared links on their machines (this term seems to have +originated with the ill-fated Newton Message Pad). Compare blast, snarf, +BLT. + + +Node:beanie key, Next:beep, Previous:beam, Up:= B = + + +beanie key n. + +[Mac users] See command +key. + + +Node:beep, Next:Befunge, Previous:beanie key, Up:= B = + +beep n.,v. + +Syn. feep. This term is techspeak +under MS-DOS and OS/2, and seems to be generally preferred among +micro hobbyists. + + +Node:Befunge, Next:beige toaster, Previous:beep, Up:= B += + +Befunge n. + +A worthy companion to INTERCAL; +a computer language family which escapes the quotidian limitation +of linear control flow and embraces program counters flying +through multiple dimensions with exotic topologies. Sadly, the +Befunge home page has vanished, but a Befunge version of the +hello world program is at http://www.catseye.mb.ca/esoteric/befunge.html. + + +Node:beige toaster, Next:bells and whistles, +Previous:Befunge, Up:= B = + +beige toaster n. + +A Macintosh. See toaster; +compare Macintrash, maggotbox. + + +Node:bells and whistles, +Next:bells +whistles and gongs, Previous:beige toaster, Up:= B = + +bells and whistles n. + +[common] Features added to a program or system to make it more +flavorful from a hacker's point +of view, without necessarily adding to its utility for its +primary function. Distinguished from chrome, which is intended to attract users. +"Now that we've got the basic program working, let's go back and +add some bells and whistles." No one seems to know what +distinguishes a bell from a whistle. The recognized emphatic form +is "bells, whistles, and gongs". + +It used to be thought that this term derived from the toyboxes +on theater organs. However, the "and gongs" strongly suggests a +different origin, at sea. Before powered horns, ships routinely +used bells, whistles, and gongs to signal each other over longer +distances than voice can carry. + + +Node:bells whistles and +gongs, Next:benchmark, +Previous:bells +and whistles, Up:= B = + + +bells whistles and gongs n. + +A standard elaborated form of bells and whistles; typically +said with a pronounced and ironic accent on the `gongs'. + + +Node:benchmark, Next:Berkeley Quality Software, +Previous:bells whistles and gongs, +Up:= B = + +benchmark n. + +[techspeak] An inaccurate measure of computer performance. "In +the computer industry, there are three kinds of lies: lies, damn +lies, and benchmarks." Well-known ones include Whetstone, +Dhrystone, Rhealstone (see h), the +Gabriel LISP benchmarks (see gabriel), the SPECmark suite, and LINPACK. See +also machoflops, MIPS, smoke +and mirrors. + + +Node:Berkeley Quality +Software, Next:berklix, +Previous:benchmark, Up:= B = + +Berkeley Quality Software adj. + +(often abbreviated `BQS') Term used in a pejorative sense to +refer to software that was apparently created by rather +spaced-out hackers late at night to solve some unique problem. It +usually has nonexistent, incomplete, or incorrect documentation, +has been tested on at least two examples, and core dumps when +anyone else attempts to use it. This term was frequently applied +to early versions of the dbx(1) debugger. See also +Berzerkeley. + +Note to British and Commonwealth readers: that's /berk'lee/, +not /bark'lee/ as in British Received Pronunciation. + + +Node:berklix, Next:Berzerkeley, Previous:Berkeley Quality Software, +Up:= B = + +berklix /berk'liks/ n.,adj. + +[contraction of `Berkeley Unix'] See BSD. Not used at Berkeley itself. May be more +common among suits attempting to sound +like cognoscenti than among hackers, who usually just say +`BSD'. + + +Node:Berzerkeley, Next:beta, Previous:berklix, Up:= B += + +Berzerkeley /b*r-zer'klee/ n. + +[from `berserk', via the name of a now-deceased record label; +poss. originated by famed columnist Herb Caen] Humorous +distortion of `Berkeley' used esp. to refer to the practices or +products of the BSD Unix hackers. See +software bloat, Missed'em-five, Berkeley Quality +Software. + +Mainstream use of this term in reference to the cultural and +political peculiarities of UC Berkeley as a whole has been +reported from as far back as the 1960s. + + +Node:beta, Next:BFI, Previous:Berzerkeley, Up:= B = + +beta /bay't*/, /be't*/ or (Commonwealth) /bee't*/ +n. + +1. Mostly working, but still under test; usu. used with `in': +`in beta'. In the Real World, +systems (hardware or software) software often go through two +stages of release testing: Alpha (in-house) and Beta +(out-house?). Beta releases are generally made to a group of +lucky (or unlucky) trusted customers. 2. Anything that is new and +experimental. "His girlfriend is in beta" means that he is still +testing for compatibility and reserving judgment. 3. Flaky; +dubious; suspect (since beta software is notoriously buggy). + +Historical note: More formally, to beta-test is to test a +pre-release (potentially unreliable) version of a piece of +software by making it available to selected (or self-selected) +customers and users. This term derives from early 1960s +terminology for product cycle checkpoints, first used at IBM but +later standard throughout the industry. `Alpha Test' was the +unit, module, or component test phase; `Beta Test' was initial +system test. These themselves came from earlier A- and B-tests +for hardware. The A-test was a feasibility and manufacturability +evaluation done before any commitment to design and development. +The B-test was a demonstration that the engineering model +functioned as specified. The C-test (corresponding to today's +beta) was the B-test performed on early samples of the production +design, and the D test was the C test repeated after the model +had been in production a while. + + +Node:BFI, Next:bible, Previous:beta, Up:= B = + + +BFI /B-F-I/ n. + +See brute force +and ignorance. Also encountered in the variants `BFMI', +`brute force and massive ignorance' and `BFBI' `brute +force and bloody ignorance'. In dome parts of the U.S. this +abbreviation was probably reinforced by a company called +Browning-Ferris Industries who used to be in the waste-management +business; a large BFI logo in white-on-blue could be seen on the +sides of garbage trucks. + + +Node:bible, Next:BiCapitalization, Previous:BFI, Up:= B = + +bible n. + +1. One of a small number of fundamental source books such as +Knuth, K&R, or the Camel Book. 2. The most detailed and +authoritative reference for a particular language, operating +system, or other complex software system. + + +Node:BiCapitalization, Next:B1FF, Previous:bible, Up:= B += + +BiCapitalization n. + +The act said to have been performed on trademarks (such as +PostScript, NeXT, NeWS, VisiCalc, FrameMaker, TK!solver, +EasyWriter) that have been raised above the ruck of common +coinage by nonstandard capitalization. Too many marketroid types think this sort of thing +is really cute, even the 2,317th time they do it. Compare studlycaps. + + +Node:B1FF, Next:BI, Previous:BiCapitalization, Up:= B = + +B1FF /bif/ [Usenet] (alt. `BIFF') n. + +The most famous pseudo, and the +prototypical newbie. Articles from +B1FF feature all uppercase letters sprinkled liberally with +bangs, typos, `cute' misspellings (EVRY BUDY LUVS GOOD OLD BIFF +CUZ HE"S A K00L DOOD AN HE RITES REEL AWESUM THINGZ IN CAPITULL +LETTRS LIKE THIS!!!), use (and often misuse) of fragments of +talk mode abbreviations, a long +sig block (sometimes even a +doubled sig), and unbounded +naivete. B1FF posts articles using his elder brother's VIC-20. +B1FF's location is a mystery, as his articles appear to come from +a variety of sites. However, BITNET +seems to be the most frequent origin. The theory that B1FF is a +denizen of BITNET is supported by B1FF's (unfortunately invalid) +electronic mail address: B1FF@BIT.NET. + +[1993: Now It Can Be Told! My spies inform me that B1FF was +originally created by Joe Talmadge <jat@cup.hp.com>, also +the author of the infamous and much-plagiarized "Flamer's Bible". +The BIFF filter he wrote was later passed to Richard Sexton, who +posted BIFFisms much more widely. Versions have since been posted +for the amusement of the net at large. See also Jeff K. --ESR] + + +Node:BI, Next:biff, Previous:B1FF, Up:= B = + + +BI // + +Common written abbreviation for Breidbart Index. + + +Node:biff, Next:Big Gray Wall, Previous:BI, Up:= B = + +biff /bif/ vt. + +To notify someone of incoming mail. From the BSD utility +biff(1), which was in turn named after a friendly +dog who used to chase frisbees in the halls at UCB while 4.2BSD +was in development. There was a legend that it had a habit of +barking whenever the mailman came, but the author of +biff says this is not true. No relation to B1FF. + + +Node:Big Gray Wall, Next:big iron, Previous:biff, Up:= B = + +Big Gray Wall n. + +What faces a VMS user searching for +documentation. A full VMS kit comes on a pallet, the +documentation taking up around 15 feet of shelf space before the +addition of layered products such as compilers, databases, +multivendor networking, and programming tools. Recent (since VMS +version 5) documentation comes with gray binders; under VMS +version 4 the binders were orange (`big orange wall'), and under +version 3 they were blue. See VMS. +Often contracted to `Gray Wall'. + + +Node:big iron, Next:Big Red Switch, Previous:Big Gray Wall, Up:= B = + +big iron n. + +[common] Large, expensive, ultra-fast computers. Used +generally of number-crunching supercomputers such +as Crays, but can include more conventional big commercial IBMish +mainframes. Term of approval; compare heavy metal, oppose dinosaur. + + +Node:Big Red Switch, Next:Big Room, Previous:big iron, Up:= B = + +Big Red Switch n. + +[IBM] The power switch on a computer, esp. the `Emergency +Pull' switch on an IBM mainframe +or the power switch on an IBM PC where it really is large and +red. "This !@%$% bitty box is +hung again; time to hit the Big Red Switch." Sources at IBM +report that, in tune with the company's passion for TLAs, this is often abbreviated as `BRS' (this has +also become established on FidoNet and in the PC clone world). It is alleged that the emergency +pull switch on an IBM 360/91 actually fired a non-conducting bolt +into the main power feed; the BRSes on more recent mainframes +physically drop a block into place so that they can't be pushed +back in. People get fired for pulling them, especially +inappropriately (see also molly-guard). Compare power cycle, three-finger salute, 120 reset; see also scram switch. + + +Node:Big Room, Next:big win, Previous:Big Red Switch, Up:= B = + +Big Room n. + +(Also `Big Blue Room') The extremely large room with the blue +ceiling and intensely bright light (during the day) or black +ceiling with lots of tiny night-lights (during the night) found +outside all computer installations. "He can't come to the phone +right now, he's somewhere out in the Big Room." + + +Node:big win, Next:big-endian, Previous:Big Room, Up:= B = + +big win n. + +1. [common] Major success. 2. [MIT] Serendipity. "Yes, those +two physicists discovered high-temperature superconductivity in a +batch of ceramic that had been prepared incorrectly according to +their experimental schedule. Small mistake; big win!" See win big. + + +Node:big-endian, Next:bignum, Previous:big win, Up:= +B = + +big-endian adj. + +[common; From Swift's "Gulliver's Travels" via the famous +paper "On Holy Wars and a Plea for Peace" by Danny Cohen, USC/ISI +IEN 137, dated April 1, 1980] 1. Describes a computer +architecture in which, within a given multi-byte numeric +representation, the most significant byte has the lowest address +(the word is stored `big-end-first'). Most processors, including +the IBM 370 family, the PDP-10, the +Motorola microprocessor families, and most of the various RISC +designs are big-endian. Big-endian byte order is also sometimes +called `network order'. See little-endian, middle-endian, NUXI problem, swab. 2. An Internet address the wrong way +round. Most of the world follows the Internet standard and writes +email addresses starting with the name of the computer and ending +up with the name of the country. In the U.K. the Joint Networking +Team had decided to do it the other way round before the Internet +domain standard was established. Most gateway sites have ad-hockery in their mailers to handle +this, but can still be confused. In particular, the address +_me@uk.ac.bris.pys.as_ could be interpreted in JANET's +big-endian way as one in the U.K. (domain _uk_) or in the +standard little-endian way as one in the domain _as_ +(American Samoa) on the opposite side of the world. + + +Node:bignum, Next:bigot, Previous:big-endian, Up:= B = + +bignum /big'nuhm/ n. + +[common; orig. from MIT MacLISP] 1. [techspeak] A +multiple-precision computer representation for very large +integers. 2. More generally, any very large number. "Have you +ever looked at the United States Budget? There's bignums for +you!" 3. [Stanford] In backgammon, large numbers on the dice +especially a roll of double fives or double sixes (compare moby, sense 4). See also El Camino Bignum. + +Sense 1 may require some explanation. Most computer languages +provide a kind of data called `integer', but such computer +integers are usually very limited in size; usually they must be +smaller than 2^(31) (2,147,483,648) or (on a bitty box) 2^(15) (32,768). If you want to +work with numbers larger than that, you have to use +floating-point numbers, which are usually accurate to only six or +seven decimal places. Computer languages that provide bignums can +perform exact calculations on very large numbers, such as 1000! +(the factorial of 1000, which is 1000 times 999 times 998 times +... times 2 times 1). For example, this value for +1000! was computed by the MacLISP system using bignums: + +40238726007709377354370243392300398571937486421071 +46325437999104299385123986290205920442084869694048 +00479988610197196058631666872994808558901323829669 +94459099742450408707375991882362772718873251977950 +59509952761208749754624970436014182780946464962910 +56393887437886487337119181045825783647849977012476 +63288983595573543251318532395846307555740911426241 +74743493475534286465766116677973966688202912073791 +43853719588249808126867838374559731746136085379534 +52422158659320192809087829730843139284440328123155 +86110369768013573042161687476096758713483120254785 +89320767169132448426236131412508780208000261683151 +02734182797770478463586817016436502415369139828126 +48102130927612448963599287051149649754199093422215 +66832572080821333186116811553615836546984046708975 +60290095053761647584772842188967964624494516076535 +34081989013854424879849599533191017233555566021394 +50399736280750137837615307127761926849034352625200 +01588853514733161170210396817592151090778801939317 +81141945452572238655414610628921879602238389714760 +88506276862967146674697562911234082439208160153780 +88989396451826324367161676217916890977991190375403 +12746222899880051954444142820121873617459926429565 +81746628302955570299024324153181617210465832036786 +90611726015878352075151628422554026517048330422614 +39742869330616908979684825901254583271682264580665 +26769958652682272807075781391858178889652208164348 +34482599326604336766017699961283186078838615027946 +59551311565520360939881806121385586003014356945272 +24206344631797460594682573103790084024432438465657 +24501440282188525247093519062092902313649327349756 +55139587205596542287497740114133469627154228458623 +77387538230483865688976461927383814900140767310446 +64025989949022222176590433990188601856652648506179 +97023561938970178600408118897299183110211712298459 +01641921068884387121855646124960798722908519296819 +37238864261483965738229112312502418664935314397013 +74285319266498753372189406942814341185201580141233 +44828015051399694290153483077644569099073152433278 +28826986460278986432113908350621709500259738986355 +42771967428222487575867657523442202075736305694988 +25087968928162753848863396909959826280956121450994 +87170124451646126037902930912088908694202851064018 +21543994571568059418727489980942547421735824010636 +77404595741785160829230135358081840096996372524230 +56085590370062427124341690900415369010593398383577 +79394109700277534720000000000000000000000000000000 +00000000000000000000000000000000000000000000000000 +00000000000000000000000000000000000000000000000000 +00000000000000000000000000000000000000000000000000 +00000000000000000000000000000000000000000000000000 +000000000000000000. + +Node:bigot, Next:bit, Previous:bignum, Up:= B += + +bigot n. + +[common] A person who is religiously attached to a particular +computer, language, operating system, editor, or other tool (see +religious issues). +Usually found with a specifier; thus, `cray bigot', `ITS bigot', +`APL bigot', `VMS bigot', `Berkeley bigot'. Real bigots can be +distinguished from mere partisans or zealots by the fact that +they refuse to learn alternatives even when the march of time +and/or technology is threatening to obsolete the favored tool. It +is truly said "You can tell a bigot, but you can't tell him +much." Compare weenie, Amiga Persecution +Complex. + + +Node:bit, Next:bit bang, Previous:bigot, Up:= B += + +bit n. + +[from the mainstream meaning and `Binary digIT'] 1. +[techspeak] The unit of information; the amount of information +obtained by asking a yes-or-no question for which the two +outcomes are equally probable. 2. [techspeak] A computational +quantity that can take on one of two values, such as true and +false or 0 and 1. 3. A mental flag: a reminder that something +should be done eventually. "I have a bit set for you." (I haven't +seen you for a while, and I'm supposed to tell or ask you +something.) 4. More generally, a (possibly incorrect) mental +state of belief. "I have a bit set that says that you were the +last guy to hack on EMACS." (Meaning "I think you were the last +guy to hack on EMACS, and what I am about to say is predicated on +this, so please stop me if this isn't true.") + +"I just need one bit from you" is a polite way of indicating +that you intend only a short interruption for a question that can +presumably be answered yes or no. + +A bit is said to be `set' if its value is true or 1, and +`reset' or `clear' if its value is false or 0. One speaks of +setting and clearing bits. To toggle +or `invert' a bit is to change it, either from 0 to 1 or from 1 +to 0. See also flag, trit, mode +bit. + +The term `bit' first appeared in print in the computer-science +sense in a 1948 paper by information theorist Claude Shannon, and +was there credited to the early computer scientist John Tukey +(who also seems to have coined the term `software'). Tukey +records that `bit' evolved over a lunch table as a handier +alternative to `bigit' or `binit', at a conference in the winter +of 1943-44. + + +Node:bit bang, Next:bit bashing, Previous:bit, Up:= B += + +bit bang n. + +Transmission of data on a serial line, when accomplished by +rapidly tweaking a single output bit, in software, at the +appropriate times. The technique is a simple loop with eight OUT +and SHIFT instruction pairs for each byte. Input is more +interesting. And full duplex (doing input and output at the same +time) is one way to separate the real hackers from the wannabees. + +Bit bang was used on certain early models of Prime computers, +presumably when UARTs were too expensive, and on archaic Z80 +micros with a Zilog PIO but no SIO. In an interesting instance of +the cycle of +reincarnation, this technique returned to use in the +early 1990s on some RISC architectures because it consumes such +an infinitesimal part of the processor that it actually makes +sense not to have a UART. Compare cycle of reincarnation. + + +Node:bit bashing, Next:bit bucket, Previous:bit bang, Up:= B = + +bit bashing n. + +(alt. `bit diddling' or bit +twiddling) Term used to describe any of several kinds of +low-level programming characterized by manipulation of bit, flag, nybble, and other +smaller-than-character-sized pieces of data; these include +low-level device control, encryption algorithms, checksum and +error-correcting codes, hash functions, some flavors of graphics +programming (see bitblt), and +assembler/compiler code generation. May connote either tedium or +a real technical challenge (more usually the former). "The +command decoding for the new tape driver looks pretty solid but +the bit-bashing for the control registers still has bugs." See +also bit bang, mode bit. + + +Node:bit bucket, Next:bit decay, Previous:bit bashing, Up:= B = + +bit bucket n. + +[very common] 1. The universal data sink (originally, the +mythical receptacle used to catch bits when they fall off the end +of a register during a shift instruction). Discarded, lost, or +destroyed data is said to have `gone to the bit bucket'. On Unix, often used for /dev/null. Sometimes amplified as `the +Great Bit Bucket in the Sky'. 2. The place where all lost mail +and news messages eventually go. The selection is performed +according to Finagle's Law; +important mail is much more likely to end up in the bit bucket +than junk mail, which has an almost 100% probability of getting +delivered. Routing to the bit bucket is automatically performed +by mail-transfer agents, news systems, and the lower layers of +the network. 3. The ideal location for all unwanted mail +responses: "Flames about this article to the bit bucket." Such a +request is guaranteed to overflow one's mailbox with flames. 4. +Excuse for all mail that has not been sent. "I mailed you those +figures last week; they must have landed in the bit bucket." +Compare black hole. + +This term is used purely in jest. It is based on the fanciful +notion that bits are objects that are not destroyed but only +misplaced. This appears to have been a mutation of an earlier +term `bit box', about which the same legend was current; old-time +hackers also report that trainees used to be told that when the +CPU stored bits into memory it was actually pulling them `out of +the bit box'. See also chad +box. + +Another variant of this legend has it that, as a consequence +of the `parity preservation law', the number of 1 bits that go to +the bit bucket must equal the number of 0 bits. Any imbalance +results in bits filling up the bit bucket. A qualified computer +technician can empty a full bit bucket as part of scheduled +maintenance. + + +Node:bit decay, Next:bit rot, Previous:bit bucket, Up:= B = + +bit decay n. + +See bit rot. People with a +physics background tend to prefer this variant for the analogy +with particle decay. See also computron, quantum bogodynamics. + + +Node:bit rot, Next:bit twiddling, Previous:bit decay, Up:= B = + +bit rot n. + +[common] Also bit decay. +Hypothetical disease the existence of which has been deduced from +the observation that unused programs or features will often stop +working after sufficient time has passed, even if `nothing has +changed'. The theory explains that bits decay as if they were +radioactive. As time passes, the contents of a file or the code +in a program will become increasingly garbled. + +There actually are physical processes that produce such +effects (alpha particles generated by trace radionuclides in +ceramic chip packages, for example, can change the contents of a +computer memory unpredictably, and various kinds of subtle media +failures can corrupt files in mass storage), but they are quite +rare (and computers are built with error-detecting circuitry to +compensate for them). The notion long favored among hackers that +cosmic rays are among the causes of such events turns out to be a +myth; see the cosmic rays +entry for details. + +The term software rot is +almost synonymous. Software rot is the effect, bit rot the +notional cause. + + +Node:bit twiddling, Next:bit-paired keyboard, +Previous:bit rot, Up:= B = + +bit twiddling n. + +[very common] 1. (pejorative) An exercise in tuning (see tune) in which incredible amounts of time +and effort go to produce little noticeable improvement, often +with the result that the code becomes incomprehensible. 2. +Aimless small modification to a program, esp. for some pointless +goal. 3. Approx. syn. for bit +bashing; esp. used for the act of frobbing the device +control register of a peripheral in an attempt to get it back to +a known state. + + +Node:bit-paired keyboard, +Next:bitblt, Previous:bit twiddling, Up:= B = + +bit-paired keyboard n.,obs. + +(alt. `bit-shift keyboard') A non-standard keyboard layout +that seems to have originated with the Teletype ASR-33 and +remained common for several years on early computer equipment. +The ASR-33 was a mechanical device (see EOU), so the only way to generate the character +codes from keystrokes was by some physical linkage. The design of +the ASR-33 assigned each character key a basic pattern that could +be modified by flipping bits if the SHIFT or the CTRL key was +pressed. In order to avoid making the thing even more of a kluge +than it already was, the design had to group characters that +shared the same basic bit pattern on one key. + +Looking at the ASCII chart, we find: + +high low bits +bits 0000 0001 0010 0011 0100 0101 0110 0111 1000 1001 + 010 ! " # $ % & ' ( ) + 011 0 1 2 3 4 5 6 7 8 9 + + +This is why the characters !"#$%&'() appear where they do +on a Teletype (thankfully, they didn't use shift-0 for space). +The Teletype Model 33 was actually designed before ASCII existed, +and was originally intended to use a code that contained these +two rows: + + low bits +high 0000 0010 0100 0110 1000 1010 1100 1110 +bits 0001 0011 0101 0111 1001 1011 1101 1111 + 10 ) ! bel # $ % wru & * ( " : ? _ , . + 11 0 1 2 3 4 5 6 7 8 9 ' ; / - esc del + + +The result would have been something closer to a normal +keyboard. But as it happened, Teletype had to use a lot of +persuasion just to keep ASCII, and the Model 33 keyboard, from +looking like this instead: + + ! " ? $ ' & - ( ) ; : * / , . + 0 1 2 3 4 5 6 7 8 9 + ~ < > × | + + +Teletype's was not the weirdest variant of the QWERTY layout widely seen, by the way; +that prize should probably go to one of several (differing) +arrangements on IBM's even clunkier 026 and 029 card punches. + +When electronic terminals became popular, in the early 1970s, +there was no agreement in the industry over how the keyboards +should be laid out. Some vendors opted to emulate the Teletype +keyboard, while others used the flexibility of electronic +circuitry to make their product look like an office typewriter. +Either choice was supported by the ANSI computer keyboard +standard, X4.14-1971, which referred to the alternatives as +`logical bit pairing' and `typewriter pairing'. These +alternatives became known as `bit-paired' and `typewriter-paired' +keyboards. To a hacker, the bit-paired keyboard seemed far more +logical -- and because most hackers in those days had never +learned to touch-type, there was little pressure from the +pioneering users to adapt keyboards to the typewriter +standard. + +The doom of the bit-paired keyboard was the large-scale +introduction of the computer terminal into the normal office +environment, where out-and-out technophobes were expected to use +the equipment. The `typewriter-paired' standard became universal, +X4.14 was superseded by X4.23-1982, `bit-paired' hardware was +quickly junked or relegated to dusty corners, and both terms +passed into disuse. + +However, in countries without a long history of touch typing, +the argument against the bit-paired keyboard layout was weak or +nonexistent. As a result, the standard Japanese keyboard, used on +PCs, Unix boxen etc. still has all of the !"#$%&'() +characters above the numbers in the ASR-33 layout. + + +Node:bitblt, Next:BITNET, Previous:bit-paired keyboard, Up:= B = + +bitblt /bit'blit/ n. + +[from BLT, q.v.] 1. [common] Any of +a family of closely related algorithms for moving and copying +rectangles of bits between main and display memory on a +bit-mapped device, or between two areas of either main or display +memory (the requirement to do the Right Thing in the case of overlapping +source and destination rectangles is what makes BitBlt tricky). +2. Synonym for blit or BLT. Both uses are borderline techspeak. + + +Node:BITNET, Next:bits, Previous:bitblt, Up:= B += + +BITNET /bit'net/ n., obs. + +[acronym: Because It's Time NETwork] Everybody's least +favorite piece of the network (see the network) - until AOL happened. The +BITNET hosts were a collection of IBM dinosaurs and VAXen (the +latter with lobotomized comm hardware) that communicate using +80-character EBCDIC card images (see +eighty-column mind); +thus, they tend to mangle the headers and text of third-party +traffic from the rest of the ASCII/RFC-822 world with annoying regularity. BITNET was +also notorious as the apparent home of B1FF. By 1995 it had, much to everyone's relief, +been obsolesced and absorbed into the Internet. Unfortunately, +around this time we also got AOL. + + +Node:bits, Next:bitty box, Previous:BITNET, Up:= B += + +bits pl.n. + +1. Information. Examples: "I need some bits about file +formats." ("I need to know about file formats.") Compare core dump, sense 4. 2. +Machine-readable representation of a document, specifically as +contrasted with paper: "I have only a photocopy of the Jargon +File; does anyone know where I can get the bits?". See softcopy, source of all good +bits See also bit. + + +Node:bitty box, Next:bixen, Previous:bits, Up:= B = + + +bitty box /bit'ee boks/ n. + +1. A computer sufficiently small, primitive, or incapable as +to cause a hacker acute claustrophobia at the thought of +developing software on or for it. Especially used of small, +obsolescent, single-tasking-only personal machines such as the +Atari 800, Osborne, Sinclair, VIC-20, TRS-80, or IBM PC. 2. +[Pejorative] More generally, the opposite of `real computer' (see +Get a real +computer!). See also mess-dos, toaster, and toy. + + +Node:bixen, Next:bixie, Previous:bitty box, Up:= B = + +bixen pl.n. + +Users of BIX (the BIX Information eXchange, formerly the Byte +Information eXchange). Parallels other plurals like boxen, VAXen, oxen. + + +Node:bixie, Next:black art, Previous:bixen, Up:= B += + +bixie /bik'see/ n. + +Variant emoticons used on BIX +(the BIX Information eXchange). The most common (smiley) bixie is <@_@>, representing two +cartoon eyes and a mouth. These were originally invented in an SF +fanzine called APA-L and imported to BIX by one of the earliest +users. + + +Node:black art, Next:black hole, Previous:bixie, Up:= B += + +black art n. + +[common] A collection of arcane, unpublished, and (by +implication) mostly ad-hoc techniques developed for a particular +application or systems area (compare black magic). VLSI design and compiler +code optimization were (in their beginnings) considered classic +examples of black art; as theory developed they became deep magic, and once standard +textbooks had been written, became merely heavy wizardry. The huge +proliferation of formal and informal channels for spreading +around new computer-related technologies during the last twenty +years has made both the term `black art' and what it describes +less common than formerly. See also voodoo programming. + + +Node:black hole, Next:black magic, Previous:black art, Up:= B = + +black hole n.,vt. + +[common] What data (a piece of email or netnews, or a stream +of TCP/IP packets) has fallen into if it disappears mysteriously +between its origin and destination sites (that is, without +returning a bounce +message). "I think there's a black hole at +_foovax_!" conveys suspicion that site _foovax_ has +been dropping a lot of stuff on the floor lately (see drop on the floor). The +implied metaphor of email as interstellar travel is interesting +in itself. Readily verbed as `blackhole': "That router is +blackholing IDP packets." Compare bit +bucket and see RBL. + + +Node:black magic, Next:Black Screen of Death, +Previous:black hole, +Up:= B = + +black magic n. + +[common] A technique that works, though nobody really +understands why. More obscure than voodoo programming, which may be +done by cookbook. Compare also black +art, deep magic, and +magic number (sense 2). + + +Node:Black Screen of +Death, Next:Black +Thursday, Previous:black magic, Up:= B = + +Black Screen of Death n. + +[prob. related to the Floating Head of Death in a famous "Far +Side" cartoon.] A failure mode of Microsloth Windows. On an attempt +to launch a DOS box, a networked Windows system not uncommonly +blanks the screen and locks up the PC so hard that it requires a +cold boot to recover. This unhappy +phenomenon is known as The Black Screen of Death. See also Blue Screen of Death, +which has become rather more common. + + +Node:Black Thursday, Next:blammo, Previous:Black Screen of Death, +Up:= B = + +Black Thursday n. + +February 8th, 1996 - the day of the signing into law of the +CDA, so called by analogy with the +catastrophic "Black Friday" in 1929 that began the Great +Depression. + + +Node:blammo, Next:blargh, Previous:Black Thursday, Up:= B = + +blammo v. + +[Oxford Brookes University and alumni, UK] To forcibly remove +someone from any interactive system, especially talker systems. +The operators, who may remain hidden, may `blammo' a user who is +misbehaving. Very similar to MIT gun; +in fact, the `blammo-gun' is a notional device used to `blammo' +someone. While in actual fact the only incarnation of the +blammo-gun is the command used to forcibly eject a user, +operators speak of different levels of blammo-gun fire; e.g., a +blammo-gun to `stun' will temporarily remove someone, but a +blammo-gun set to `maim' will stop someone coming back on for a +while. + + +Node:blargh, Next:blast, Previous:blammo, Up:= B += + +blargh /blarg/ n. + +[MIT; now common] The opposite of ping, sense 5; an exclamation indicating that one +has absorbed or is emitting a quantum of unhappiness. Less common +than ping. + + +Node:blast, Next:blat, Previous:blargh, Up:= B += + +blast 1. v.,n. + +Synonym for BLT, used esp. for large +data sends over a network or comm line. Opposite of snarf. Usage: uncommon. The variant `blat' has +been reported. 2. vt. [HP/Apollo] Synonymous with nuke (sense 3). Sometimes the message +Unable to kill all processes. Blast them (y/n)? +would appear in the command window upon logout. + + +Node:blat, Next:bletch, Previous:blast, Up:= B += + +blat n. + +1. Syn. blast, sense 1. 2. See +thud. + + +Node:bletch, Next:bletcherous, Previous:blat, Up:= B = + + +bletch /blech/ interj. + +[very common; from Yiddish/German `brechen', to vomit, poss. +via comic-strip exclamation `blech'] Term of disgust. Often used +in "Ugh, bletch". Compare barf. + + +Node:bletcherous, Next:blink, Previous:bletch, Up:= B += + +bletcherous /blech'*-r*s/ adj. + +Disgusting in design or function; esthetically unappealing. +This word is seldom used of people. "This keyboard is +bletcherous!" (Perhaps the keys don't work very well, or are +misplaced.) See losing, cretinous, bagbiting, bogus, and random. +The term bletcherous applies to +the esthetics of the thing so described; similarly for cretinous. By contrast, something that +is `losing' or `bagbiting' may be failing to meet objective +criteria. See also bogus and random, which have richer and wider shades +of meaning than any of the above. + + +Node:blink, Next:blinkenlights, Previous:bletcherous, Up:= B = + +blink vi.,n. + +To use a navigator or off-line message reader to minimize time +spent on-line to a commercial network service (a necessity in +many places outside the U.S. where the telecoms monopolies charge +per-minute for local calls). This term attained wide use in the +UK, but is rare or unknown in the US. + + +Node:blinkenlights, Next:blit, Previous:blink, Up:= B += + +blinkenlights /blink'*n-li:tz/ n. + +[common] Front-panel diagnostic lights on a computer, esp. a +dinosaur. Now that dinosaurs are +rare, this term usually refers to status lights on a modem, +network hub, or the like. + +This term derives from the last word of the famous +blackletter-Gothic sign in mangled pseudo-German that once graced +about half the computer rooms in the English-speaking world. One +version ran in its entirety as follows: + + +ACHTUNG! ALLES LOOKENSPEEPERS! + +Das computermachine ist nicht fuer gefingerpoken und +mittengrabben. Ist easy schnappen der springenwerk, blowenfusen +und poppencorken mit spitzensparken. Ist nicht fuer gewerken bei +das dumpkopfen. Das rubbernecken sichtseeren keepen das +cotten-pickenen hans in das pockets muss; relaxen und watchen das +blinkenlichten. + + +This silliness dates back at least as far as 1959 at Stanford +University and had already gone international by the early 1960s, +when it was reported at London University's ATLAS computing site. +There are several variants of it in circulation, some of which +actually do end with the word `blinkenlights'. + +In an amusing example of turnabout-is-fair-play, German +hackers have developed their own versions of the blinkenlights +poster in fractured English, one of which is reproduced here: + + +ATTENTION + +This room is fullfilled mit special electronische +equippment. Fingergrabbing and pressing the cnoeppkes from the +computers is allowed for die experts only! So all the +"lefthanders" stay away and do not disturben the brainstorming +von here working intelligencies. Otherwise you will be out thrown +and kicked anderswhere! Also: please keep still and only watchen +astaunished the blinkenlights. + + +See also geef. + +Old-time hackers sometimes get nostalgic for blinkenlights +because they were so much more fun to look at than a blank panel. +Sadly, very few computers still have them (the three LEDs on a PC +keyboard certainly don't count). The obvious reasons (cost of +wiring, cost of front-panel cutouts, almost nobody needs or wants +to interpret machine-register states on the fly anymore) are only +part of the story. Another part of it is that radio-frequency +leakage from the lamp wiring was beginning to be a problem as far +back as transistor machines. But the most fundamental fact is +that there are very few signals slow enough to blink an LED these +days! With slow CPUs, you could watch the bus register or +instruction counter tick, but at 33/66/150MHz it's all a +blur. + +Finally, a version updated for the Internet has been seen on +_news.admin.net-abuse.email_: + + +ACHTUNG! ALLES LOOKENSPEEPERS! + +Das Internet is nicht fuer gefingerclicken und +giffengrabben. Ist easy droppenpacket der routers und overloaden +der backbone mit der spammen und der me-tooen. Ist nicht fuer +gewerken bei das dumpkopfen. Das mausklicken sichtseeren keepen +das bandwit-spewin hans in das pockets muss; relaxen und watchen +das cursorblinken. + + +This newest version partly reflects reports that the word +`blinkenlights' is (in 1999) undergoing something of a revival in +usage, but applied to networking equipment. The transmit and +receive lights on routers, activity lights on switches and hubs, +and other network equipment often blink in visually pleasing and +seemingly coordinated ways. Although this is different in some +ways from register readings, a tall stack of Cisco equipment or a +19-inch rack of ISDN terminals can provoke a similar feeling of +hypnotic awe, especially in a darkened network operations center +or server room. + + +Node:blit, Next:blitter, Previous:blinkenlights, Up:= B = + +blit /blit/ vt. + +1. [common] To copy a large array of bits from one part of a +computer's memory to another part, particularly when the memory +is being used to determine what is shown on a display screen. +"The storage allocator picks through the table and copies the +good parts up into high memory, and then blits it all back down +again." See bitblt, BLT, dd, cat, blast, snarf. More generally, to perform some +operation (such as toggling) on a large array of bits while +moving them. 2. [historical, rare] Sometimes all-capitalized as +`BLIT': an early experimental bit-mapped terminal designed by Rob +Pike at Bell Labs, later commercialized as the AT&T 5620. +(The folk etymology from `Bell Labs Intelligent Terminal' is +incorrect. Its creators liked to claim that "Blit" stood for the +Bacon, Lettuce, and Interactive Tomato.) + + +Node:blitter, Next:blivet, Previous:blit, Up:= B = + + +blitter /blit'r/ n. + +[common] A special-purpose chip or hardware system built to +perform blit operations, esp. used for +fast implementation of bit-mapped graphics. The Commodore Amiga +and a few other micros have these, but since 1990 the trend has +been away from them (however, see cycle of reincarnation). +Syn. raster blaster. + + +Node:blivet, Next:bloatware, Previous:blitter, Up:= B += + +blivet /bliv'*t/ n. + +[allegedly from a World War II military term meaning "ten +pounds of manure in a five-pound bag"] 1. An intractable problem. +2. A crucial piece of hardware that can't be fixed or replaced if +it breaks. 3. A tool that has been hacked over by so many +incompetent programmers that it has become an unmaintainable +tissue of hacks. 4. An out-of-control but unkillable development +effort. 5. An embarrassing bug that pops up during a customer +demo. 6. In the subjargon of computer security specialists, a +denial-of-service attack performed by hogging limited resources +that have no access controls (for example, shared spool space on +a multi-user system). + +This term has other meanings in other technical cultures; +among experimental physicists and hardware engineers of various +kinds it seems to mean any random object of unknown purpose +(similar to hackish use of frob). It +has also been used to describe an amusing trick-the-eye drawing +resembling a three-pronged fork that appears to depict a +three-dimensional object until one realizes that the parts fit +together in an impossible way. + + +Node:bloatware, Next:BLOB, Previous:blivet, Up:= B += + +bloatware n. + +[common] Software that provides minimal functionality while +requiring a disproportionate amount of diskspace and memory. +Especially used for application and OS upgrades. This term is +very common in the Windows/NT world. So is its cause. + + +Node:BLOB, Next:block, Previous:bloatware, Up:= B = + +BLOB + +1. n. [acronym: Binary Large OBject] Used by database people +to refer to any random large block of bits that needs to be +stored in a database, such as a picture or sound file. The +essential point about a BLOB is that it's an object that cannot +be interpreted within the database itself. 2. v. To mailbomb someone by sending a BLOB to +him/her; esp. used as a mild threat. "If that program crashes +again, I'm going to BLOB the core dump to you." + + +Node:block, Next:block transfer +computations, Previous:BLOB, Up:= B = + + +block v. + +[common; from process scheduling terminology in OS theory] 1. +vi. To delay or sit idle while waiting for something. "We're +blocking until everyone gets here." Compare busy-wait. 2. `block on' vt. To block, +waiting for (something). "Lunch is blocked on Phil's +arrival." + + +Node:block transfer +computations, Next:Bloggs Family, Previous:block, Up:= B += + +block transfer computations n. + +[from the television series "Dr. Who"] Computations so +fiendishly subtle and complex that they could not be performed by +machines. Used to refer to any task that should be expressible as +an algorithm in theory, but isn't. (The Z80's LDIR instruction, +"Computed Block Transfer with increment", may also be +relevant.) + + +Node:Bloggs Family, Next:blow an EPROM, Previous:block +transfer computations, Up:= +B = + +Bloggs Family n. + +An imaginary family consisting of Fred and Mary Bloggs and +their children. Used as a standard example in knowledge +representation to show the difference between extensional and +intensional objects. For example, every occurrence of "Fred +Bloggs" is the same unique person, whereas occurrences of +"person" may refer to different people. Members of the Bloggs +family have been known to pop up in bizarre places such as the +old DEC Telephone Directory. Compare +Dr. Fred Mbogo; J. Random Hacker; Fred Foobar. + + +Node:blow an EPROM, Next:blow away, Previous:Bloggs Family, Up:= B = + +blow an EPROM /bloh *n ee'prom/ v. + +(alt. `blast an EPROM', `burn an EPROM') To program a +read-only memory, e.g. for use with an embedded system. This term +arose because the programming process for the Programmable +Read-Only Memories (PROMs) that preceded present-day Erasable +Programmable Read-Only Memories (EPROMs) involved intentionally +blowing tiny electrical fuses on the chip. The usage lives on +(it's too vivid and expressive to discard) even though the write +process on EPROMs is nondestructive. + + +Node:blow away, Next:blow out, Previous:blow an EPROM, Up:= B = + +blow away vt. + +To remove (files and directories) from permanent storage, +generally by accident. "He reformatted the wrong partition and +blew away last night's netnews." Oppose nuke. + + +Node:blow out, Next:blow past, Previous:blow away, Up:= B = + +blow out vi. + +[prob. from mining and tunneling jargon] Of software, to fail +spectacularly; almost as serious as crash and burn. See blow past, blow +up, die +horribly. + + +Node:blow past, Next:blow up, Previous:blow out, Up:= B = + +blow past vt. + +To blow out despite a +safeguard. "The server blew past the 5K reserve buffer." + + +Node:blow up, Next:BLT, Previous:blow past, Up:= B = + +blow up vi. + +1. [scientific computation] To become unstable. Suggests that +the computation is diverging so rapidly that it will soon +overflow or at least go nonlinear. 2. Syn. blow out. + + +Node:BLT, Next:Blue Book, Previous:blow up, Up:= +B = + +BLT /B-L-T/, /bl*t/ or (rarely) /belt/ n.,vt. + +Synonym for blit. This is the +original form of blit and the ancestor +of bitblt. It referred to any large +bit-field copy or move operation (one resource-intensive +memory-shuffling operation done on pre-paged versions of ITS, +WAITS, and TOPS-10 was sardonically referred to as `The Big +BLT'). The jargon usage has outlasted the PDP-10 BLock Transfer instruction from which +BLT derives; nowadays, the assembler +mnemonic BLT almost always means +`Branch if Less Than zero'. + + +Node:Blue Book, Next:blue box, Previous:BLT, Up:= B = + + +Blue Book n. + +1. Informal name for one of the four standard references on +the page-layout and graphics-control language PostScript ("PostScript Language Tutorial +and Cookbook", Adobe Systems, Addison-Wesley 1985, +QA76.73.P67P68, ISBN 0-201-10179-3); the other three official +guides are known as the Green +Book, the Red Book, and +the White Book (sense 2). 2. +Informal name for one of the three standard references on +Smalltalk: "Smalltalk-80: The Language and its Implementation", +David Robson, Addison-Wesley 1983, QA76.8.S635G64, ISBN +0-201-11371-63 (this book also has green and red siblings). 3. +Any of the 1988 standards issued by the CCITT's ninth plenary +assembly. These include, among other things, the X.400 email spec +and the Group 1 through 4 fax standards. See also book titles. + + +Node:blue box, Next:Blue Glue, Previous:Blue Book, Up:= B = + +blue box + +n. 1. obs. Once upon a time, before all-digital switches made +it possible for the phone companies to move them out of band, one +could actually hear the switching tones used to route +long-distance calls. Early phreakers built devices called `blue boxes' +that could reproduce these tones, which could be used to +commandeer portions of the phone network. (This was not as hard +as it may sound; one early phreak acquired the sobriquet `Captain +Crunch' after he proved that he could generate switching tones +with a plastic whistle pulled out of a box of Captain Crunch +cereal!) There were other colors of box with more specialized +phreaking uses; red boxes, black boxes, silver boxes, etc. 2. n. +An IBM machine, especially a large +(non-PC) one. + + +Node:Blue Glue, Next:blue goo, Previous:blue box, Up:= B = + +Blue Glue n. + +[IBM] IBM's SNA (Systems Network Architecture), an incredibly +losing and bletcherous communications protocol widely +favored at commercial shops that don't know any better. The +official IBM definition is "that which binds blue boxes +together." See fear and +loathing. It may not be irrelevant that Blue Glue is the +trade name of a 3M product that is commonly used to hold down the +carpet squares to the removable panel floors common in dinosaur pens. A correspondent at +U. Minn. reports that the CS department there has about 80 +bottles of the stuff hanging about, so they often refer to any +messy work to be done as `using the blue glue'. + + +Node:blue goo, Next:Blue Screen of Death, +Previous:Blue Glue, +Up:= B = + +blue goo n. + +Term for `police' nanobots +intended to prevent gray goo, +denature hazardous waste, destroy pollution, put ozone back into +the stratosphere, prevent halitosis, and promote truth, justice, +and the American way, etc. The term `Blue Goo' can be found in +Dr. Seuss's "Fox In Socks" to refer to a substance much like +bubblegum. `Would you like to chew blue goo, sir?'. See nanotechnology. + + +Node:Blue Screen of +Death, Next:blue wire, +Previous:blue goo, Up:= B = + +Blue Screen of Death n. + +[common] This term is closely related to the older Black Screen of Death but +much more common (many non-hackers have picked it up). Due to the +extreme fragility and bugginess of Microsoft Windows misbehaving +applications can readily crash the OS (and the OS sometimes +crashes itself spontaneously). The Blue Screen of Death, +sometimes decorated with hex error codes, is what you get when +this happens. (Commonly abbreviated BSOD.) + +The following entry from the Salon +Haiku Contest, seems to have predated popular use of the +term: + + Windows NT crashed. + I am the Blue Screen of Death + No one hears your screams. + +Node:blue wire, Next:blurgle, Previous:Blue Screen of Death, Up:= B = + +blue wire n. + +[IBM] Patch wires (esp. 30 AWG gauge) added to circuit boards +at the factory to correct design or fabrication problems. Blue +wire is not necessarily blue, the term describes function rather +than color. These may be necessary if there hasn't been time to +design and qualify another board version. In Great Britain this +can be `bodge wire', after mainstreanm slang `bodge' for a clumsy +improvisation or sloppy job of work. Compare purple wire, red wire, yellow wire, pink wire. + + +Node:blurgle, Next:BNF, Previous:blue wire, Up:= B = + +blurgle /bler'gl/ n. + +[UK] Spoken metasyntactic variable, to +indicate some text that is obvious from context, or which is +already known. If several words are to be replaced, blurgle may +well be doubled or tripled. "To look for something in several +files use `grep string blurgle blurgle'." In each case, "blurgle +blurgle" would be understood to be replaced by the file you +wished to search. Compare mumble, +sense 7. + + +Node:BNF, Next:boa, Previous:blurgle, Up:= B += + +BNF /B-N-F/ n. + +1. [techspeak] Acronym for `Backus Normal Form' (later +retronymed to `Backus-Naur Form' because BNF was not in fact a +normal form), a metasyntactic notation used to specify the syntax +of programming languages, command sets, and the like. Widely used +for language descriptions but seldom documented anywhere, so that +it must usually be learned by osmosis from other hackers. +Consider this BNF for a U.S. postal address: + + <postal-address> ::= <name-part> <street-address> <zip-part> + + <personal-part> ::= <name> | <initial> "." + + <name-part> ::= <personal-part> <last-name> [<jr-part>] <EOL> + | <personal-part> <name-part> + + <street-address> ::= [<apt>] <house-num> <street-name> <EOL> + + <zip-part> ::= <town-name> "," <state-code> <ZIP-code> <EOL> + + +This translates into English as: "A postal-address consists of +a name-part, followed by a street-address part, followed by a +zip-code part. A personal-part consists of either a first name or +an initial followed by a dot. A name-part consists of either: a +personal-part followed by a last name followed by an optional +`jr-part' (Jr., Sr., or dynastic number) and end-of-line, or a +personal part followed by a name part (this rule illustrates the +use of recursion in BNFs, covering the case of people who use +multiple first and middle names and/or initials). A street +address consists of an optional apartment specifier, followed by +a street number, followed by a street name. A zip-part consists +of a town-name, followed by a comma, followed by a state code, +followed by a ZIP-code followed by an end-of-line." Note that +many things (such as the format of a personal-part, apartment +specifier, or ZIP-code) are left unspecified. These are presumed +to be obvious from context or detailed somewhere nearby. See also +parse. 2. Any of a number of variants +and extensions of BNF proper, possibly containing some or all of +the regexp wildcards such as +* or +. In fact the example above isn't +the pure form invented for the Algol-60 report; it uses +[], which was introduced a few years later in IBM's +PL/I definition but is now universally recognized. 3. In science-fiction fandom, +a `Big-Name Fan' (someone famous or notorious). Years ago a fan +started handing out black-on-green BNF buttons at SF conventions; +this confused the hacker contingent terribly. + + +Node:boa, Next:board, Previous:BNF, Up:= B = + + +boa [IBM] n. + +Any one of the fat cables that lurk under the floor in a dinosaur pen. Possibly so called +because they display a ferocious life of their own when you try +to lay them straight and flat after they have been coiled for +some time. It is rumored within IBM that channel cables for the +370 are limited to 200 feet because beyond that length the boas +get dangerous -- and it is worth noting that one of the major +cable makers uses the trademark `Anaconda'. + + +Node:board, Next:boat anchor, Previous:boa, Up:= B += + +board n. + +1. In-context synonym for bboard; +sometimes used even for Usenet newsgroups (but see usage note +under bboard, sense 1). 2. An +electronic circuit board. + + +Node:boat anchor, Next:bob, Previous:board, Up:= B += + +boat anchor n. + +[common; from ham radio] 1. Like doorstop but more severe; implies that the +offending hardware is irreversibly dead or useless. "That was a +working motherboard once. One lightning strike later, instant +boat anchor!" 2. A person who just takes up space. 3. Obsolete +but still working hardware, especially when used of an old +S100-bus hobbyist system; originally a term of annoyance, but +became more and more affectionate as the hardware became more and +more obsolete. + + +Node:bob, Next:bodysurf code, Previous:boat anchor, Up:= B = + +bob n. + +At Demon Internet, all tech support personnel are called "Bob". (Female +support personnel have an option on "Bobette"). This has nothing to do +with Bob the divine drilling-equipment salesman of the Church of the +SubGenius. Nor is it acronymized from "Brother Of BOFH", though all +parties agree it could have been. Rather, it was triggered by an +unusually large draft of new tech-support people in 1995. It was +observed that there would be much duplication of names. To ease the +confusion, it was decided that all support techs would henceforth be +known as "Bob", and identity badges were created labelled "Bob 1" and +"Bob 2". ("No, we never got any further" reports a witness). + +The reason for "Bob" rather than anything else is due to a +luser calling and asking to speak to +"Bob", despite the fact that no "Bob" was currently working for +Tech Support. Since we all know "the customer is always right", +it was decided that there had to be at least one "Bob" on duty at +all times, just in case. + +This sillyness inexorably snowballed. Shift leaders and +managers began to refer to their groups of "bobs". Whole ranks of +support machines were set up (and still exist in the DNS as of +1999) as bob1 through bobN. Then came +_alt.tech-support.recovery_, and it was filled with Demon +support personnel. They all referred to themselves, and to +others, as `bob', and after a while it caught on. There is now a +Bob +Code describing the Bob nature. + + +Node:bodysurf code, Next:BOF, Previous:bob, Up:= B = + + +bodysurf code n. + +A program or segment of code written quickly in the heat of +inspiration without the benefit of formal design or deep thought. +Like its namesake sport, the result is too often a wipeout that +leaves the programmer eating sand. + + +Node:BOF, Next:BOFH, Previous:bodysurf code, Up:= B = + +BOF /B-O-F/ or /bof/ n. + +1. [common] Abbreviation for the phrase "Birds Of a Feather" +(flocking together), an informal discussion group and/or bull +session scheduled on a conference program. It is not clear where +or when this term originated, but it is now associated with the +USENIX conferences for Unix techies and was already established +there by 1984. It was used earlier than that at DECUS conferences +and is reported to have been common at SHARE meetings as far back +as the early 1960s. 2. Acronym, `Beginning of File'. + + +Node:BOFH, Next:bogo-sort, Previous:BOF, Up:= B = + + +BOFH // n. + +[common] Acronym, Bastard Operator From Hell. A system +administrator with absolutely no tolerance for lusers. "You say you need more filespace? +<massive-global-delete> Seems to me you have plenty +left..." Many BOFHs (and others who would be BOFHs if they could +get away with it) hang out in the newsgroup +_alt.sysadmin.recovery_, although there has also been +created a top-level newsgroup hierarchy (_bofh.*_) of their +own. + +Several people have written stories about BOFHs. The set +usually considered canonical is by Simon Travaglia and may be +found at the Bastard +Home Page. BOFHs and BOFH wannabes hang out on scary devil monastery and +wield LARTs. + + +Node:bogo-sort, Next:bogometer, Previous:BOFH, Up:= B = + + +bogo-sort /boh`goh-sort'/ n. + +(var. `stupid-sort') The archetypical perversely awful +algorithm (as opposed to bubble +sort, which is merely the generic bad +algorithm). Bogo-sort is equivalent to repeatedly throwing a deck +of cards in the air, picking them up at random, and then testing +whether they are in order. It serves as a sort of canonical +example of awfulness. Looking at a program and seeing a dumb +algorithm, one might say "Oh, I see, this program uses +bogo-sort." Esp. appropriate for algorithms with factorial or +super-exponential running time in the average case and +probabilistically infinite worst-case running time. Compare bogus, brute +force, lasherism. + +A spectacular variant of bogo-sort has been proposed which has +the interesting property that, if the Many Worlds interpretation +of quantum mechanics is true, it can sort an arbitrarily large +array in constant time. (In the Many-Worlds model, the result of +any quantum action is to split the universe-before into a sheaf +of universes-after, one for each possible way the state vector +can collapse; in any one of the universes-after the result +appears random.) The steps are: 1. Permute the array randomly +using a quantum process, 2. If the array is not sorted, destroy +the universe. Implementation of step 2 is left as an exercise for +the reader. + + +Node:bogometer, Next:BogoMIPS, Previous:bogo-sort, Up:= B = + +bogometer /boh-gom'-*t-er/ n. + +A notional instrument for measuring bogosity. Compare the Troll-O-Meter and the `wankometer' +described in the wank entry; see also +bogus. + + +Node:BogoMIPS, Next:bogon, Previous:bogometer, Up:= B = + +BogoMIPS /bo'go-mips/ n. + +The number of million times a second a processor can do +absolutely nothing. The Linux OS +measures BogoMIPS at startup in order to calibrate some soft +timing loops that will be used later on; details at the BogoMIPS mini-HOWTO. The +name Linus chose, of course, is an ironic comment on the +uselessness of all other MIPS +figures. + + +Node:bogon, Next:bogon filter, Previous:BogoMIPS, Up:= B = + +bogon /boh'gon/ n. + +[very common; by analogy with proton/electron/neutron, but +doubtless reinforced after 1980 by the similarity to Douglas +Adams's `Vogons'; see the Bibliography in Appendix C and note that +Arthur Dent actually mispronounces `Vogons' as `Bogons' at one +point] 1. The elementary particle of bogosity (see quantum bogodynamics). For +instance, "the Ethernet is emitting bogons again" means that it +is broken or acting in an erratic or bogus fashion. 2. A query +packet sent from a TCP/IP domain resolver to a root server, +having the reply bit set instead of the query bit. 3. Any bogus +or incorrectly formed packet sent on a network. 4. By synecdoche, +used to refer to any bogus thing, as in "I'd like to go to lunch +with you but I've got to go to the weekly staff bogon". 5. A +person who is bogus or who says bogus things. This was +historically the original usage, but has been overtaken by its +derivative senses 1-4. See also bogosity, bogus; +compare psyton, fat electrons, magic smoke. + +The bogon has become the type case for a whole bestiary of +nonce particle names, including the `clutron' or `cluon' +(indivisible particle of cluefulness, obviously the antiparticle +of the bogon) and the futon (elementary particle of randomness, or sometimes of lameness). +These are not so much live usages in themselves as examples of a +live meta-usage: that is, it has become a standard joke or +linguistic maneuver to "explain" otherwise mysterious +circumstances by inventing nonce particle names. And these imply +nonce particle theories, with all their dignity or lack thereof +(we might note parenthetically that this is a generalization from +"(bogus particle) theories" to "bogus (particle theories)"!). +Perhaps such particles are the modern-day equivalents of trolls +and wood-nymphs as standard starting-points around which to +construct explanatory myths. Of course, playing on an existing +word (as in the `futon') yields additional flavor. Compare magic smoke. + + +Node:bogon filter, Next:bogon flux, Previous:bogon, Up:= B = + +bogon filter /boh'gon fil'tr/ n. + +Any device, software or hardware, that limits or suppresses +the flow and/or emission of bogons. "Engineering hacked a bogon +filter between the Cray and the VAXen, and now we're getting +fewer dropped packets." See also bogosity, bogus. + + +Node:bogon flux, Next:bogosity, Previous:bogon filter, Up:= B = + +bogon flux /boh'gon fluhks/ n. + +A measure of a supposed field of bogosity emitted by a speaker, measured by a +bogometer; as a speaker starts to +wander into increasing bogosity a listener might say "Warning, +warning, bogon flux is rising". See quantum bogodynamics. + + +Node:bogosity, Next:bogotify, Previous:bogon flux, Up:= B = + +bogosity /boh-go's*-tee/ n. + +1. [orig. CMU, now very common] The degree to which something +is bogus. Bogosity is measured with a +bogometer; in a seminar, when a +speaker says something bogus, a listener might raise his hand and +say "My bogometer just triggered". More extremely, "You just +pinned my bogometer" means you just said or did something so +outrageously bogus that it is off the scale, pinning the +bogometer needle at the highest possible reading (one might also +say "You just redlined my bogometer"). The agreed-upon unit of +bogosity is the microLenat. 2. +The potential field generated by a bogon flux; see quantum bogodynamics. See also +bogon flux, bogon filter, bogus. + + +Node:bogotify, Next:bogue out, Previous:bogosity, Up:= +B = + +bogotify /boh-go't*-fi:/ vt. + +To make or become bogus. A program that has been changed so +many times as to become completely disorganized has become +bogotified. If you tighten a nut too hard and strip the threads +on the bolt, the bolt has become bogotified and you had better +not use it any more. This coinage led to the notional +`autobogotiphobia' defined as `the fear of becoming bogotified'; +but is not clear that the latter has ever been `live' jargon +rather than a self-conscious joke in jargon about jargon. See +also bogosity, bogus. + + +Node:bogue out, Next:bogus, Previous:bogotify, Up:= +B = + +bogue out /bohg owt/ vi. + +To become bogus, suddenly and unexpectedly. "His talk was +relatively sane until somebody asked him a trick question; then +he bogued out and did nothing but flame afterwards." See also bogosity, bogus. + + +Node:bogus, Next:Bohr bug, Previous:bogue out, Up:= B = + +bogus adj. + +1. Non-functional. "Your patches are bogus." 2. Useless. +"OPCON is a bogus program." 3. False. "Your arguments are bogus." +4. Incorrect. "That algorithm is bogus." 5. Unbelievable. "You +claim to have solved the halting problem for Turing Machines? +That's totally bogus." 6. Silly. "Stop writing those bogus +sagas." + +Astrology is bogus. So is a bolt that is obviously about to +break. So is someone who makes blatantly false claims to have +solved a scientific problem. (This word seems to have some, but +not all, of the connotations of random -- mostly the negative ones.) + +It is claimed that `bogus' was originally used in the hackish +sense at Princeton in the late 1960s. It was spread to CMU and +Yale by Michael Shamos, a migratory Princeton alumnus. A glossary +of bogus words was compiled at Yale when the word was first +popularized there about 1975-76. These coinages spread into +hackerdom from CMU and MIT. Most of them remained wordplay +objects rather than actual vocabulary items or live metaphors. +Examples: `amboguous' (having multiple bogus interpretations); +`bogotissimo' (in a gloriously bogus manner); `bogotophile' (one +who is pathologically fascinated by the bogus); `paleobogology' +(the study of primeval bogosity). + +Some bogowords, however, obtained sufficient live currency to +be listed elsewhere in this lexicon; see bogometer, bogon, bogotify, +and quantum +bogodynamics and the related but unlisted Dr. Fred Mbogo. + +By the early 1980s `bogus' was also current in something like +hacker usage sense in West Coast teen slang, and it had gone +mainstream by 1985. A correspondent from Cambridge reports, by +contrast, that these uses of `bogus' grate on British nerves; in +Britain the word means, rather specifically, `counterfeit', as in +"a bogus 10-pound note". + + +Node:Bohr bug, Next:boink, Previous:bogus, Up:= B += + +Bohr bug /bohr buhg/ n. + +[from quantum physics] A repeatable bug; one that manifests reliably under a possibly +unknown but well-defined set of conditions. Antonym of heisenbug; see also mandelbug, schroedinbug. + + +Node:boink, Next:bomb, Previous:Bohr bug, Up:= B = + +boink /boynk/ + +[Usenet: variously ascribed to the TV series "Cheers" +"Moonlighting", and "Soap"] 1. v. To have sex with; compare bounce, sense 3. (This is mainstream +slang.) In Commonwealth hackish the variant `bonk' is more +common. 2. n. After the original Peter Korn `Boinkon' Usenet parties, used for almost any net social +gathering, e.g., Miniboink, a small boink held by Nancy Gillett +in 1988; Minniboink, a Boinkcon in Minnesota in 1989; +Humpdayboinks, Wednesday get-togethers held in the San Francisco +Bay Area. Compare @-party. 3. Var +of `bonk'; see bonk/oif. + + +Node:bomb, Next:bondage-and-discipline +language, Previous:boink, +Up:= B = + +bomb + +1. v. General synonym for crash +(sense 1) except that it is not used as a noun; esp. used of +software or OS failures. "Don't run Empire with less than 32K +stack, it'll bomb." 2. n.,v. Atari ST and Macintosh equivalents +of a Unix `panic' or Amiga guru +meditation, in which icons of little black-powder bombs +or mushroom clouds are displayed, indicating that the system has +died. On the Mac, this may be accompanied by a decimal (or +occasionally hexadecimal) number indicating what went wrong, +similar to the Amiga guru +meditation number. MS-DOS +machines tend to get locked up +in this situation. + + +Node:bondage-and-discipline +language, Next:bonk/oif, +Previous:bomb, Up:= B = + +bondage-and-discipline language n. + +A language (such as Pascal, Ada, APL, or Prolog) that, though ostensibly +general-purpose, is designed so as to enforce an author's theory +of `right programming' even though said theory is demonstrably +inadequate for systems hacking or even vanilla general-purpose +programming. Often abbreviated `B&D'; thus, one may speak of +things "having the B&D nature". See Pascal; oppose languages of choice. + + +Node:bonk/oif, Next:book titles, Previous:bondage-and-discipline +language, Up:= B = + +bonk/oif /bonk/, /oyf/ interj. + +In the U.S. MUD community, it has +become traditional to express pique or censure by `bonking' the +offending person. Convention holds that one should acknowledge a +bonk by saying `oif!' and there is a myth to the effect that +failing to do so upsets the cosmic bonk/oif balance, causing much +trouble in the universe. Some MUDs have implemented special +commands for bonking and oifing. Note: in parts of the U.K. +`bonk' is a sexually loaded slang term; care is advised in +transatlantic conversations (see boink). Commonwealth hackers report a similar +convention involving the `fish/bang' balance. See also talk mode. + + +Node:book titles, Next:boot, Previous:bonk/oif, Up:= B = + +book titles + +There is a tradition in hackerdom of informally tagging +important textbooks and standards documents with the dominant +color of their covers or with some other conspicuous feature of +the cover. Many of these are described in this lexicon under +their own entries. See Aluminum +Book, Blue Book, Camel Book, Cinderella Book, Devil Book, Dragon Book, Green Book, Orange Book, Purple Book, Red Book, Silver Book, White Book, Wizard Book, Yellow Book, and bible; see also rainbow series. Since about 1983 this +tradition has gotten a boost from the popular O'Reilly and +Associates line of technical books, which usually feature some +kind of exotic animal on the cover. + + +Node:boot, Next:Borg, Previous:book titles, Up:= B = + +boot v.,n. + +[techspeak; from `by one's bootstraps'] To load and initialize +the operating system on a machine. This usage is no longer jargon +(having passed into techspeak) but has given rise to some +derivatives that are still jargon. + +The derivative `reboot' implies that the machine hasn't been +down for long, or that the boot is a bounce (sense 4) intended to clear some state +of wedgitude. This is sometimes +used of human thought processes, as in the following exchange: +"You've lost me." "OK, reboot. Here's the +theory...." + +This term is also found in the variants `cold boot' (from +power-off condition) and `warm boot' (with the CPU and all +devices already powered up, as after a hardware reset or software +crash). + +Another variant: `soft boot', reinitialization of only part of +a system, under control of other software still running: "If +you're running the mess-dos +emulator, control-alt-insert will cause a soft-boot of the +emulator, while leaving the rest of the system running." + +Opposed to this there is `hard boot', which connotes hostility +towards or frustration with the machine being booted: "I'll have +to hard-boot this losing Sun." "I recommend booting it hard." One +often hard-boots by performing a power cycle. + +Historical note: this term derives from `bootstrap loader', a +short program that was read in from cards or paper tape, or +toggled in from the front panel switches. This program was always +very short (great efforts were expended on making it short in +order to minimize the labor and chance of error involved in +toggling it in), but was just smart enough to read in a slightly +more complex program (usually from a card or paper tape reader), +to which it handed control; this program in turn was smart enough +to read the application or operating system from a magnetic tape +drive or disk drive. Thus, in successive steps, the computer +`pulled itself up by its bootstraps' to a useful operating state. +Nowadays the bootstrap is usually found in ROM or EPROM, and +reads the first stage in from a fixed location on the disk, +called the `boot block'. When this program gains control, it is +powerful enough to load the actual OS and hand control over to +it. + + +Node:Borg, Next:borken, Previous:boot, Up:= B = + + +Borg n. + +In "Star Trek: The Next Generation" the Borg is a species of +cyborg that ruthlessly seeks to incorporate all sentient life +into itself; their slogan is "You will be assimilated. Resistance +is futile." In hacker parlance, the Borg is usually Microsoft, which is thought to be trying +just as ruthlessly to assimilate all computers and the entire +Internet to itself (there is a widely circulated image of Bill +Gates as a Borg). Being forced to use Windows or NT is often +referred to as being "Borged". Interestingly, the Halloween Documents reveal that +this jargon is live within Microsoft itself. (Other companies, +notably Intel and UUNet, have also occasionally been equated to +the Borg.) See also Evil +Empire, Internet +Exploiter. + +In IETF circles, where direct pressure from Microsoft is not a +daily reality, the Borg is sometimes Cisco. This usage +commemmorates their tendency to pay any price to hire talent away +from their competitors. In fact, at the Spring 1997 IETF, a large +number of ex-Cisco employees, all former members of Routing +Geeks, showed up with t-shirts printed with "Recovering +Borg". + + +Node:borken, Next:bot, Previous:Borg, +Up:= B = + +borken adj. + +(also `borked') Common deliberate typo for `broken'. + + +Node:bot, Next:bot spot, Previous:borken, Up:= B += + +bot n + +[common on IRC, MUD and among gamers; from `robot'] 1. An +IRC or MUD +user who is actually a program. On IRC, typically the robot +provides some useful service. Examples are NickServ, which tries +to prevent random users from adopting nicks already claimed by others, and MsgServ, +which allows one to send asynchronous messages to be delivered +when the recipient signs on. Also common are `annoybots', such as +KissServ, which perform no useful function except to send cute +messages to other people. Service bots are less common on MUDs; +but some others, such as the `Julia' bot active in 1990-91, have +been remarkably impressive Turing-test experiments, able to pass +as human for as long as ten or fifteen minutes of conversation. +2. An AI-controlled player in a computer game (especially a +first-person shooter such as Quake) which, unlike ordinary +monsters, operates like a human-controlled player, with access to +a player's weapons and abilities. An example can be found at http://www.telefragged.com/thefatal/. +3. Term used, though less commonly, for a web spider. The file for controlling spider +behavior on your site is officially the "Robots Exclusion File" +and its URL is "http://<somehost>/robots.txt") + +Note that bots in all senses were `robots' when the terms +first appeared in the early 1990s, but the shortened form is now +habitual. + + +Node:bot spot, Next:bottom feeder, Previous:bot, Up:= B += + +bot spot n. + +[MUD] The user on a MUD with the longest connect time. Derives +from the fact that bots on MUDS often +stay constantly connected and appear at the bottom of the +list. + + +Node:bottom feeder, Next:bottom-up +implementation, Previous:bot spot, Up:= B = + +bottom feeder n. + +1. An Internet user that leeches off ISPs - the sort you can +never provide good enough services for, always complains about +the price, no matter how low it may be, and will bolt off to +another service the moment there is even the slimmest price +difference. While most bottom feeders infest free or almost free +services such as AOL, MSN, and Hotmail, too many flock to +whomever happens to be the cheapest regional ISP at the time. +Bottom feeders are often the classic problem user, known for +unleashing spam, flamage, and other breaches of netiquette. 2. Syn. for slopsucker, derived from the fishermen's +and naturalists' term for finny creatures who subsist on the +primordial ooze. (This sense is older.) + + +Node:bottom-up +implementation, Next:bounce, +Previous:bottom +feeder, Up:= B = + +bottom-up implementation n. + +Hackish opposite of the techspeak term `top-down design'. It +has been received wisdom in most programming cultures that it is +best to design from higher levels of abstraction down to lower, +specifying sequences of action in increasing detail until you get +to actual code. Hackers often find (especially in exploratory +designs that cannot be closely specified in advance) that it +works best to build things in the opposite order, by +writing and testing a clean set of primitive operations and then +knitting them together. Naively applied, this leads to +hacked-together bottom-up implementations; a more sophisticated +response is `middle-out implementation', in which scratch code +within primitives at the mid-level of the system is gradually +replaced with a more polished version of the lowest level at the +same time the structure above the midlevel is being built. + + +Node:bounce, Next:bounce message, Previous:bottom-up +implementation, Up:= B += + +bounce v. + +1. [common; perhaps by analogy to a bouncing check] An +electronic mail message that is undeliverable and returns an +error notification to the sender is said to `bounce'. See also +bounce message. 2. +[Stanford] To play volleyball. The now-demolished D. C. Power Lab building used by +the Stanford AI Lab in the 1970s had a volleyball court on the +front lawn. From 5 P.M. to 7 P.M. was the scheduled maintenance +time for the computer, so every afternoon at 5 would come over +the intercom the cry: "Now hear this: bounce, bounce!", followed +by Brian McCune loudly bouncing a volleyball on the floor outside +the offices of known volleyballers. 3. To engage in sexual +intercourse; prob. from the expression `bouncing the mattress', +but influenced by Roo's psychosexually loaded "Try bouncing me, +Tigger!" from the "Winnie-the-Pooh" books. Compare boink. 4. To casually reboot a system in order +to clear up a transient problem. Reported primarily among VMS and Unix +users. 5. [VM/CMS programmers] Automatic warm-start of a +machine after an error. "I logged on this morning and found it +had bounced 7 times during the night" 6. [IBM] To power cycle a peripheral in order to +reset it. + + +Node:bounce message, Next:boustrophedon, Previous:bounce, Up:= B = + +bounce message n. + +[common] Notification message returned to sender by a site +unable to relay email to the intended +Internet address +recipient or the next link in a bang +path (see bounce, sense 1). +Reasons might include a nonexistent or misspelled username or a +down relay site. Bounce messages can +themselves fail, with occasionally ugly results; see sorcerer's apprentice +mode and software +laser. The terms `bounce mail' and `barfmail' are also +common. + + +Node:boustrophedon, Next:box, Previous:bounce message, Up:= B = + +boustrophedon n. + +[from a Greek word for turning like an ox while plowing] An +ancient method of writing using alternate left-to-right and +right-to-left lines. This term is actually philologists' +techspeak and typesetters' jargon. Erudite hackers use it for an +optimization performed by some computer typesetting software and +moving-head printers. The adverbial form `boustrophedonically' is +also found (hackers purely love constructions like this). + + +Node:box, Next:boxed comments, Previous:boustrophedon, Up:= B = + +box n. + +1. A computer; esp. in the construction `foo box' where +_foo_ is some functional qualifier, like `graphics', or the +name of an OS (thus, `Unix box', `MS-DOS box', etc.) "We +preprocess the data on Unix boxes before handing it up to the +mainframe." 2. [IBM] Without qualification but within an +SNA-using site, this refers specifically to an IBM front-end +processor or FEP /F-E-P/. An FEP is a small computer necessary to +enable an IBM mainframe to +communicate beyond the limits of the dinosaur pen. Typically used in +expressions like the cry that goes up when an SNA network goes +down: "Looks like the box has fallen +over." (See fall over.) See +also IBM, fear and loathing, Blue Glue. + + +Node:boxed comments, Next:boxen, Previous:box, Up:= B = + + +boxed comments n. + +Comments (explanatory notes attached to program instructions) +that occupy several lines by themselves; so called because in +assembler and C code they are often surrounded by a box in a +style something like this: + + +/************************************************* + * + * This is a boxed comment in C style + * + *************************************************/ + + +Common variants of this style omit the asterisks in column 2 +or add a matching row of asterisks closing the right side of the +box. The sparest variant omits all but the comment delimiters +themselves; the `box' is implied. Oppose winged comments. + + +Node:boxen, Next:boxology, Previous:boxed comments, Up:= B = + +boxen /bok'sn/ pl.n. + +[very common; by analogy with VAXen] Fanciful plural of box often encountered in the phrase `Unix boxen', +used to describe commodity Unix +hardware. The connotation is that any two Unix boxen are +interchangeable. + + +Node:boxology, Next:bozotic, Previous:boxen, Up:= B += + +boxology /bok-sol'*-jee/ n. + +Syn. ASCII art. This term +implies a more restricted domain, that of box-and-arrow drawings. +"His report has a lot of boxology in it." Compare macrology. + + +Node:bozotic, Next:BQS, Previous:boxology, Up:= +B = + +bozotic /boh-zoh'tik/ or /boh-zo'tik/ adj. + +[from the name of a TV clown even more losing than Ronald +McDonald] Resembling or having the quality of a bozo; that is, +clownish, ludicrously wrong, unintentionally humorous. Compare +wonky, demented. Note that the noun `bozo' occurs in +slang, but the mainstream adjectival form would be `bozo-like' or +(in New England) `bozoish'. + + +Node:BQS, Next:brain dump, Previous:bozotic, Up:= B += + +BQS /B-Q-S/ adj. + +Syn. Berkeley +Quality Software. + + +Node:brain dump, Next:brain fart, Previous:BQS, Up:= B += + +brain dump n. + +[common] The act of telling someone everything one knows about +a particular topic or project. Typically used when someone is +going to let a new party maintain a piece of code. Conceptually +analogous to an operating system core +dump in that it saves a lot of useful state before an exit. "You'll have to give me a +brain dump on FOOBAR before you start your new job at +HackerCorp." See core dump +(sense 4). At Sun, this is also known as `TOI' (transfer of +information). + + +Node:brain fart, Next:brain-damaged, Previous:brain dump, Up:= B = + +brain fart n. + +The actual result of a braino, as +opposed to the mental glitch that is the braino itself. E.g., +typing dir on a Unix box after a session with +DOS. + + +Node:brain-damaged, Next:brain-dead, Previous:brain fart, Up:= B = + +brain-damaged adj. + +1. [common; generalization of `Honeywell Brain Damage' (HBD), +a theoretical disease invented to explain certain utter +cretinisms in Honeywell Multics] +adj. Obviously wrong; cretinous; +demented. There is an implication +that the person responsible must have suffered brain damage, +because he should have known better. Calling something +brain-damaged is really bad; it also implies it is unusable, and +that its failure to work is due to poor design rather than some +accident. "Only six monocase characters per file name? Now +that's brain-damaged!" 2. [esp. in the Mac world] May +refer to free demonstration software that has been deliberately +crippled in some way so as not to compete with the product it is +intended to sell. Syn. crippleware. + + +Node:brain-dead, Next:braino, Previous:brain-damaged, Up:= B = + +brain-dead adj. + +[common] Brain-damaged in the extreme. It tends to imply +terminal design failure rather than malfunction or simple +stupidity. "This comm program doesn't know how to send a break -- +how brain-dead!" + + +Node:braino, Next:branch to Fishkill, Previous:brain-dead, Up:= B = + +braino /bray'no/ n. + +Syn. for thinko. See also brain fart. + + +Node:branch to Fishkill, +Next:bread crumbs, +Previous:braino, Up:= B = + +branch to Fishkill n. + +[IBM: from the location of one of the corporation's +facilities] Any unexpected jump in a program that produces +catastrophic or just plain weird results. See jump off into +never-never land, hyperspace. + + +Node:bread crumbs, Next:break, Previous:branch to Fishkill, Up:= B = + +bread crumbs n. + +1. Debugging statements inserted into a program that emit +output or log indicators of the program's state to a file so you can see where it dies or +pin down the cause of surprising behavior. The term is probably a +reference to the Hansel and Gretel story from the Brothers Grimm +or the older French folktale of Thumbelina; in several variants +of these, a character leaves a trail of bread crumbs so as not to +get lost in the woods. 2. In user-interface design, any feature +that allows some tracking of where you've been, like coloring +visited links purple rather than blue in Netscape (also called +`footrinting'). + + +Node:break, Next:break-even point, Previous:bread crumbs, Up:= B = + +break + +1. vt. To cause to be broken (in +any sense). "Your latest patch to the editor broke the paragraph +commands." 2. v. (of a program) To stop temporarily, so that it +may debugged. The place where it stops is a `breakpoint'. 3. +[techspeak] vi. To send an RS-232 break (two character widths of +line high) over a serial comm line. 4. [Unix] vi. To strike +whatever key currently causes the tty driver to send SIGINT to +the current process. Normally, break (sense 3), delete or control-C does this. 5. `break break' +may be said to interrupt a conversation (this is an example of +verb doubling). This usage comes from radio communications, which +in turn probably came from landline telegraph/teleprinter usage, +as badly abused in the Citizen's Band craze a few years ago. + + +Node:break-even point, Next:breath-of-life +packet, Previous:break, +Up:= B = + +break-even point n. + +In the process of implementing a new computer language, the +point at which the language is sufficiently effective that one +can implement the language in itself. That is, for a new language +called, hypothetically, FOOGOL, one has reached break-even when +one can write a demonstration compiler for FOOGOL in FOOGOL, +discard the original implementation language, and thereafter use +working versions of FOOGOL to develop newer ones. This is an +important milestone; see MFTL. + +Since this entry was first written, several correspondents +have reported that there actually was a compiler for a tiny +Algol-like language called Foogol floating around on various +VAXen in the early and mid-1980s. A +FOOGOL implementation is available at the Retrocomputing Museum +http://www.ccil.org/retro. + + +Node:breath-of-life packet, +Next:breedle, Previous:break-even point, Up:= B = + +breath-of-life packet n. + +[XEROX PARC] An Ethernet packet that contains bootstrap (see +boot) code, periodically sent out from +a working computer to infuse the `breath of life' into any +computer on the network that has happened to crash. Machines +depending on such packets have sufficient hardware or firmware +code to wait for (or request) such a packet during the reboot +process. See also dickless +workstation. + +The notional `kiss-of-death packet', with a function +complementary to that of a breath-of-life packet, is recommended +for dealing with hosts that consume too many network resources. +Though `kiss-of-death packet' is usually used in jest, there is +at least one documented instance of an Internet subnet with +limited address-table slots in a gateway machine in which such +packets were routinely used to compete for slots, rather like +Christmas shoppers competing for scarce parking spaces. + + +Node:breedle, Next:Breidbart Index, Previous:breath-of-life +packet, Up:= B = + +breedle n. + +See feep. + + +Node:Breidbart Index, Next:bring X to its +knees, Previous:breedle, Up:= B += + +Breidbart Index /bri:d'bart ind*ks/ + +A measurement of the severity of spam invented by long-time +hacker Seth Breidbart, used for programming cancelbots. The +Breidbart Index takes into account the fact that excessive +multi-posting EMP is worse than +excessive cross-posting ECP. The +Breidbart Index is computed as follows: For each article in a +spam, take the square-root of the number of newsgroups to which +the article is posted. The Breidbart Index is the sum of the +square roots of all of the posts in the spam. For example, one +article posted to nine newsgroups and again to sixteen would have +BI = sqrt(9) + sqrt(16) = 7. It is generally agreed that a spam +is cancelable if the Breidbart Index exceeds 20. + +The Breidbart Index accumulates over a 45-day window. Ten +articles yesterday and ten articles today and ten articles +tomorrow add up to a 30-article spam. Spam fighters will often +reset the count if you can convince them that the spam was +accidental and/or you have seen the error of your ways and won't +repeat it. Breidbart Index can accumulate over multiple authors. +For example, the "Make Money Fast" pyramid scheme exceeded a BI +of 20 a long time ago, and is now considered "cancel on +sight". + + +Node:bring X to its +knees, Next:brittle, +Previous:Breidbart +Index, Up:= B = + +bring X to its knees v. + +[common] To present a machine, operating system, piece of +software, or algorithm with a load so extreme or pathological that it grinds to a halt. +"To bring a MicroVAX to its knees, try twenty users running vi -- or four running EMACS." Compare hog. + + +Node:brittle, Next:broadcast storm, Previous:bring X to its +knees, Up:= B = + +brittle adj. + +Said of software that is functional but easily broken by +changes in operating environment or configuration, or by any +minor tweak to the software itself. Also, any system that +responds inappropriately and disastrously to abnormal but +expected external stimuli; e.g., a file system that is usually +totally scrambled by a power failure is said to be brittle. This +term is often used to describe the results of a research effort +that were never intended to be robust, but it can be applied to +commercial software, which (due to closed-source development) +displays the quality far more often than it ought to. Oppose +robust. + + +Node:broadcast storm, Next:brochureware, Previous:brittle, Up:= B = + +broadcast storm n. + +[common] An incorrect packet broadcast on a network that +causes most hosts to respond all at once, typically with wrong +answers that start the process over again. See network meltdown; compare mail storm. + + +Node:brochureware, Next:broken, Previous:broadcast storm, Up:= B = + +brochureware n. + +Planned but non-existent product like vaporware, but with the added implication +that marketing is actively selling and promoting it (they've +printed brochures). Brochureware is often deployed as a strategic +weapon; the idea is to con customers into not committing to an +existing product of the competition's. It is a safe bet that when +a brochureware product finally becomes real, it will be more +expensive than and inferior to the alternatives that had been +available for years. + + +Node:broken, Next:broken arrow, Previous:brochureware, Up:= B = + +broken adj. + +1. Not working properly (of programs). 2. Behaving strangely; +especially (when used of people) exhibiting extreme +depression. + + +Node:broken arrow, Next:BrokenWindows, Previous:broken, Up:= B = + +broken arrow n. + +[IBM] The error code displayed on line 25 of a 3270 terminal +(or a PC emulating a 3270) for various kinds of protocol +violations and "unexpected" error conditions (including +connection to a down computer). On a +PC, simulated with `->/_', with the two center characters +overstruck. + +Note: to appreciate this term fully, it helps to know that +`broken arrow' is also military jargon for an accident involving +nuclear weapons.... + + +Node:BrokenWindows, Next:broket, Previous:broken arrow, Up:= B = + +BrokenWindows n. + +Abusive hackerism for the crufty +and elephantine X environment on Sun machines; properly called +`OpenWindows'. + + +Node:broket, Next:Brooks's Law, Previous:BrokenWindows, Up:= B = + +broket /broh'k*t/ or /broh'ket`/ n. + +[rare; by analogy with `bracket': a `broken bracket'] Either +of the characters < and >, when +used as paired enclosing delimiters. This word originated as a +contraction of the phrase `broken bracket', that is, a bracket +that is bent in the middle. (At MIT, and apparently in the Real World as well, these are +usually called angle +brackets.) + + +Node:Brooks's Law, Next:brown-paper-bag bug, +Previous:broket, Up:= B = + +Brooks's Law prov. + +"Adding manpower to a late software project makes it later" -- +a result of the fact that the expected advantage from splitting +development work among N programmers is O(N) (that is, +proportional to N), but the complexity and communications cost +associated with coordinating and then merging their work is +O(N^2) (that is, proportional to the square of N). The quote is +from Fred Brooks, a manager of IBM's OS/360 project and author of +"The Mythical Man-Month" (Addison-Wesley, 1975, ISBN +0-201-00650-2), an excellent early book on software engineering. +The myth in question has been most tersely expressed as +"Programmer time is fungible" and Brooks established conclusively +that it is not. Hackers have never forgotten his advice (though +it's not the whole story; see bazaar); too often, management still does. See also creationism, second-system effect, optimism. + + +Node:brown-paper-bag bug, +Next:browser, Previous:Brooks's Law, Up:= B = + +brown-paper-bag bug n. + +A bug in a public software release that is so embarrassing +that the author notionally wears a brown paper bag over his head +for a while so he won't be recognized on the net. Entered popular +usage after the early-1999 release of the first Linux 2.2, which +had one. The phrase was used in Linus Torvalds's apology +posting. + + +Node:browser, Next:BRS, Previous:brown-paper-bag bug, Up:= B = + +browser n. + +A program specifically designed to help users view and +navigate hypertext, on-line documentation, or a database. While +this general sense has been present in jargon for a long time, +the proliferation of browsers for the World Wide Web after 1992 +has made it much more popular and provided a central or default +techspeak meaning of the word previously lacking in hacker usage. +Nowadays, if someone mentions using a `browser' without +qualification, one may assume it is a Web browser. + + +Node:BRS, Next:brute force, Previous:browser, Up:= B = + +BRS /B-R-S/ n. + +Syn. Big Red Switch. +This abbreviation is fairly common on-line. + + +Node:brute force, Next:brute force and +ignorance, Previous:BRS, +Up:= B = + +brute force adj. + +Describes a primitive programming style, one in which the +programmer relies on the computer's processing power instead of +using his or her own intelligence to simplify the problem, often +ignoring problems of scale and applying naive methods suited to +small problems directly to large ones. The term can also be used +in reference to programming style: brute-force programs are +written in a heavyhanded, tedious way, full of repetition and +devoid of any elegance or useful abstraction (see also brute force and +ignorance). + +The canonical example of a +brute-force algorithm is associated with the `traveling salesman +problem' (TSP), a classical NP-hard +problem: Suppose a person is in, say, Boston, and wishes to drive +to N other cities. In what order should the cities be visited in +order to minimize the distance travelled? The brute-force method +is to simply generate all possible routes and compare the +distances; while guaranteed to work and simple to implement, this +algorithm is clearly very stupid in that it considers even +obviously absurd routes (like going from Boston to Houston via +San Francisco and New York, in that order). For very small N it +works well, but it rapidly becomes absurdly inefficient when N +increases (for N = 15, there are already 1,307,674,368,000 +possible routes to consider, and for N = 1000 -- well, see bignum). Sometimes, unfortunately, there +is no better general solution than brute force. See also NP-. + +A more simple-minded example of brute-force programming is +finding the smallest number in a large list by first using an +existing program to sort the list in ascending order, and then +picking the first number off the front. + +Whether brute-force programming should actually be considered +stupid or not depends on the context; if the problem is not +terribly big, the extra CPU time spent on a brute-force solution +may cost less than the programmer time it would take to develop a +more `intelligent' algorithm. Additionally, a more intelligent +algorithm may imply more long-term complexity cost and +bug-chasing than are justified by the speed improvement. + +Ken Thompson, co-inventor of Unix, is reported to have uttered +the epigram "When in doubt, use brute force". He probably +intended this as a ha ha +only serious, but the original Unix kernel's preference +for simple, robust, and portable algorithms over brittle `smart' ones does seem to have been a +significant factor in the success of that OS. Like so many other +tradeoffs in software design, the choice between brute force and +complex, finely-tuned cleverness is often a difficult one that +requires both engineering savvy and delicate esthetic +judgment. + + +Node:brute force and +ignorance, Next:BSD, +Previous:brute force, +Up:= B = + +brute force and ignorance n. + +A popular design technique at many software houses -- brute force coding unrelieved by +any knowledge of how problems have been previously solved in +elegant ways. Dogmatic adherence to design methodologies tends to +encourage this sort of thing. Characteristic of early larval stage programming; +unfortunately, many never outgrow it. Often abbreviated BFI: +"Gak, they used a bubble +sort! That's strictly from BFI." Compare bogosity. + + +Node:BSD, Next:BSOD, Previous:brute force and ignorance, +Up:= B = + +BSD /B-S-D/ n. + +[abbreviation for `Berkeley Software Distribution'] a family +of Unix versions for the DEC VAX and PDP-11 +developed by Bill Joy and others at Berzerkeley starting around 1977, +incorporating paged virtual memory, TCP/IP networking +enhancements, and many other features. The BSD versions (4.1, +4.2, and 4.3) and the commercial versions derived from them +(SunOS, ULTRIX, and Mt. Xinu) held the technical lead in the Unix +world until AT&T's successful standardization efforts after +about 1986; descendants including Free/Open/NetBSD, BSD/OS and +MacOS X are still widely popular. Note that BSD versions going +back to 2.9 are often referred to by their version numbers alone, +without the BSD prefix. See 4.2, Unix, USG +Unix. + + +Node:BSOD, Next:BUAF, Previous:BSD, +Up:= B = + +BSOD /B-S-O-D/ + +Very commmon abbreviation for Blue Screen of Death. Both +spoken and written. + + +Node:BUAF, Next:BUAG, Previous:BSOD, Up:= B = + + +BUAF // n. + +[abbreviation, from _alt.fan.warlord_] Big Ugly ASCII +Font -- a special form of ASCII +art. Various programs exist for rendering text strings +into block, bloob, and pseudo-script fonts in cells between four +and six character cells on a side; this is smaller than the +letters generated by older banner +(sense 2) programs. These are sometimes used to render one's name +in a sig block, and are +critically referred to as `BUAF's. See warlording. + + +Node:BUAG, Next:bubble sort, Previous:BUAF, Up:= B += + +BUAG // n. + +[abbreviation, from _alt.fan.warlord_] Big Ugly ASCII +Graphic. Pejorative term for ugly ASCII +art, especially as found in sig +blocks. For some reason, mutations of the head of Bart +Simpson are particularly common in the least imaginative sig blocks. See warlording. + + +Node:bubble sort, Next:bucky bits, Previous:BUAG, Up:= B += + +bubble sort n. + +Techspeak for a particular sorting technique in which pairs of +adjacent values in the list to be sorted are compared and +interchanged if they are out of order; thus, list entries `bubble +upward' in the list until they bump into one with a lower sort +value. Because it is not very good relative to other methods and +is the one typically stumbled on by naive and untutored programmers, hackers +consider it the canonical example +of a naive algorithm. (However, it's been shown by repeated +experiment that below about 5000 records bubble-sort is OK +anyway.) The canonical example of a really bad algorithm +is bogo-sort. A bubble sort might +be used out of ignorance, but any use of bogo-sort could issue +only from brain damage or willful perversity. + + +Node:bucky bits, Next:buffer chuck, Previous:bubble sort, Up:= B = + +bucky bits /buh'kee bits/ n. + +1. obs. The bits produced by the CONTROL and META shift keys +on a SAIL keyboard (octal 200 and 400 respectively), resulting in +a 9-bit keyboard character set. The MIT AI TV (Knight) keyboards +extended this with TOP and separate left and right CONTROL and +META keys, resulting in a 12-bit character set; later, LISP +Machines added such keys as SUPER, HYPER, and GREEK (see space-cadet keyboard). 2. +By extension, bits associated with `extra' shift keys on any +keyboard, e.g., the ALT on an IBM PC or command and option keys +on a Macintosh. + +It has long been rumored that `bucky bits' were named for +Buckminster Fuller during a period when he was consulting at +Stanford. Actually, bucky bits were invented by Niklaus Wirth +when he was at Stanford in 1964-65; he first suggested +the idea of an EDIT key to set the 8th bit of an otherwise 7-bit +ASCII character). It seems that, unknown to Wirth, certain +Stanford hackers had privately nicknamed him `Bucky' after a +prominent portion of his dental anatomy, and this nickname +transferred to the bit. Bucky-bit commands were used in a number +of editors written at Stanford, including most notably TV-EDIT +and NLS. + +The term spread to MIT and CMU early and is now in general +use. Ironically, Wirth himself remained unaware of its derivation +for nearly 30 years, until GLS dug up this history in early 1993! +See double bucky, quadruple bucky. + + +Node:buffer chuck, Next:buffer overflow, Previous:bucky bits, Up:= B = + +buffer chuck n. + +Shorter and ruder syn. for buffer overflow. + + +Node:buffer overflow, Next:bug, Previous:buffer chuck, Up:= B = + +buffer overflow n. + +What happens when you try to stuff more data into a buffer +(holding area) than it can handle. This problem is commonly +exploited by crackers to get +arbitrary commands executed by a program running with root +permissions. This may be due to a mismatch in the processing +rates of the producing and consuming processes (see overrun and firehose syndrome), or because the +buffer is simply too small to hold all the data that must +accumulate before a piece of it can be processed. For example, in +a text-processing tool that crunches +a line at a time, a short line buffer can result in lossage as input from a long line overflows +the buffer and trashes data beyond it. Good defensive programming +would check for overflow on each character and stop accepting +data when the buffer is full up. The term is used of and by +humans in a metaphorical sense. "What time did I agree to meet +you? My buffer must have overflowed." Or "If I answer that phone +my buffer is going to overflow." See also spam, overrun +screw. + + +Node:bug, Next:bug-compatible, Previous:buffer overflow, Up:= B = + +bug n. + +An unwanted and unintended property of a program or piece of +hardware, esp. one that causes it to malfunction. Antonym of +feature. Examples: "There's a bug +in the editor: it writes things out backwards." "The system +crashed because of a hardware bug." "Fred is a winner, but he has +a few bugs" (i.e., Fred is a good guy, but he has a few +personality problems). + +Historical note: Admiral Grace Hopper (an early computing +pioneer better known for inventing COBOL) liked to tell a story in which a +technician solved a glitch in the +Harvard Mark II machine by pulling an actual insect out from +between the contacts of one of its relays, and she subsequently +promulgated bug in its hackish sense as +a joke about the incident (though, as she was careful to admit, +she was not there when it happened). For many years the logbook +associated with the incident and the actual bug in question (a +moth) sat in a display case at the Naval Surface Warfare Center +(NSWC). The entire story, with a picture of the logbook and the +moth taped into it, is recorded in the "Annals of the History of +Computing", Vol. 3, No. 3 (July 1981), pp. 285-286. + +The text of the log entry (from September 9, 1947), reads +"1545 Relay #70 Panel F (moth) in relay. First actual case of bug +being found". This wording establishes that the term was already +in use at the time in its current specific sense -- and Hopper +herself reports that the term `bug' was regularly applied to +problems in radar electronics during WWII. + +Indeed, the use of `bug' to mean an industrial defect was +already established in Thomas Edison's time, and a more specific +and rather modern use can be found in an electrical handbook from +1896 ("Hawkin's New Catechism of Electricity", Theo. Audel & +Co.) which says: "The term `bug' is used to a limited extent to +designate any fault or trouble in the connections or working of +electric apparatus." It further notes that the term is "said to +have originated in quadruplex telegraphy and have been +transferred to all electric apparatus." + +The latter observation may explain a common folk etymology of +the term; that it came from telephone company usage, in which +"bugs in a telephone cable" were blamed for noisy lines. Though +this derivation seems to be mistaken, it may well be a distorted +memory of a joke first current among telegraph operators +more than a century ago! + +Or perhaps not a joke. Historians of the field inform us that +the term "bug" was regularly used in the early days of telegraphy +to refer to a variety of semi-automatic telegraphy keyers that +would send a string of dots if you held them down. In fact, the +Vibroplex keyers (which were among the most common of this type) +even had a graphic of a beetle on them (and still do)! While the +ability to send repeated dots automatically was very useful for +professional morse code operators, these were also significantly +trickier to use than the older manual keyers, and it could take +some practice to ensure one didn't introduce extraneous dots into +the code by holding the key down a fraction too long. In the +hands of an inexperienced operator, a Vibroplex "bug" on the line +could mean that a lot of garbled Morse would soon be coming your +way. + +Further, the term "bug" has long been used among radio +technicians to describe a device that converts electromagnetic +field variations into acoustic signals. It is used to trace radio +interference and look for dangerous radio emissions. Radio +community usage derives from the roach-like shape of the first +versions used by 19th century physicists. The first versions +consisted of a coil of wire (roach body), with the two wire ends +sticking out and bent back to nearly touch forming a spark gap +(roach antennae). The bug is to the radio technician what the +stethoscope is to the stereotype medical doctor. This sense is +almost certainly ancestral to modern use of "bug" for a covert +monitoring device, but may also have contributed to the use of +"bug" for the effects of radio interference itself. + +Actually, use of `bug' in the general sense of a disruptive +event goes back to Shakespeare! (Henry VI, part III - Act V, +Scene II: King Edward: "So, lie thou there. Die thou; and die our +fear; For Warwick was a bug that fear'd us all.") In the first +edition of Samuel Johnson's dictionary one meaning of `bug' is "A +frightful object; a walking spectre"; this is traced to +`bugbear', a Welsh term for a variety of mythological monster +which (to complete the circle) has recently been reintroduced +into the popular lexicon through fantasy role-playing games. + +In any case, in jargon the word almost never refers to +insects. Here is a plausible conversation that never actually +happened: + +"There is a bug in this ant farm!" + +"What do you mean? I don't see any ants in it." + +"That's the bug." + +A careful discussion of the etymological issues can be found +in a paper by Fred R. Shapiro, 1987, "Entomology of the Computer +Bug: History and Folklore", American Speech 62(4):376-378. + +[There has been a widespread myth that the original bug was +moved to the Smithsonian, and an earlier version of this entry so +asserted. A correspondent who thought to check discovered that +the bug was not there. While investigating this in late 1990, +your editor discovered that the NSWC still had the bug, but had +unsuccessfully tried to get the Smithsonian to accept it -- and +that the present curator of their History of American Technology +Museum didn't know this and agreed that it would make a +worthwhile exhibit. It was moved to the Smithsonian in mid-1991, +but due to space and money constraints was not actually exhibited +years afterwards. Thus, the process of investigating the +original-computer-bug bug fixed it in an entirely unexpected way, +by making the myth true! --ESR] + + +Node:bug-compatible, Next:bug-for-bug +compatible, Previous:bug, +Up:= B = + +bug-compatible adj. + +[common] Said of a design or revision that has been badly +compromised by a requirement to be compatible with fossils or misfeatures in other programs or (esp.) +previous releases of itself. "MS-DOS 2.0 used \ as a path +separator to be bug-compatible with some cretin's choice of / as +an option character in 1.0." + + +Node:bug-for-bug +compatible, Next:bug-of-the-month club, Previous:bug-compatible, Up:= B = + +bug-for-bug compatible n. + +Same as bug-compatible, +with the additional implication that much tedious effort went +into ensuring that each (known) bug was replicated. + + +Node:bug-of-the-month club, +Next:buglix, Previous:bug-for-bug +compatible, Up:= B = + + +bug-of-the-month club n. + +[from "book-of-the-month club", a time-honored +mail-order-marketing technique in the U.S.] A mythical club which +users of `sendmail(8)' (the UNIX mail daemon) belong to; this was +coined on the Usenet newsgroup comp.security.unix at a time when +sendmail security holes, which allowed outside crackers access to the system, were being +uncovered at an alarming rate, forcing sysadmins to update very +often. Also, more completely, `fatal security bug-of-the-month +club'. See also kernel-of-the-week club. + + +Node:buglix, Next:bulletproof, Previous:bug-of-the-month club, Up:= B = + +buglix /buhg'liks/ n. + +[uncommon] Pejorative term referring to DEC's ULTRIX operating system in its earlier +severely buggy versions. Still used to describe ULTRIX, +but without nearly so much venom. Compare AIDX, HP-SUX, Nominal Semidestructor, +Telerat, sun-stools. + + +Node:bulletproof, Next:bullschildt, Previous:buglix, Up:= +B = + +bulletproof adj. + +Used of an algorithm or implementation considered extremely +robust; lossage-resistant; capable +of correctly recovering from any imaginable exception condition +-- a rare and valued quality. Implies that the programmer has +thought of all possible errors, and added code to protect against each one. Thus, in some +cases, this can imply code that is too heavyweight, due to +excessive paranoia on the part of the programmer. Syn. armor-plated. + + +Node:bullschildt, Next:bum, Previous:bulletproof, Up:= B = + +bullschildt /bul'shilt/ n. + +[comp.lang.c on USENET] A confident, but incorrect, statement +about a programming language. This immortalizes a very bad book +about C, Herbert Schildt's "C - The +Complete Reference". One reviewer commented "The naive errors in +this book would be embarassing even in a programming assignment +turned in by a computer science college sophomore." + + +Node:bum, Next:bump, Previous:bullschildt, Up:= B = + +bum + +1. vt. To make highly efficient, either in time or space, +often at the expense of clarity. "I managed to bum three more +instructions out of that code." "I spent half the night bumming +the interrupt code." In 1996, this term and the practice it +describes are semi-obsolete. In elder +days, John McCarthy (inventor of LISP) used to compare some efficiency-obsessed +hackers among his students to "ski bums"; thus, optimization +became "program bumming", and eventually just "bumming". 2. To +squeeze out excess; to remove something in order to improve +whatever it was removed from (without changing function; this +distinguishes the process from a featurectomy). 3. n. A small change to an +algorithm, program, or hardware device to make it more efficient. +"This hardware bum makes the jump instruction faster." Usage: now +uncommon, largely superseded by v. tune (and n. tweak, +hack), though none of these exactly +capture sense 2. All these uses are rare in Commonwealth hackish, +because in the parent dialects of English the noun `bum' is a +rude synonym for `buttocks' and the verb `bum' for buggery. + + +Node:bump, Next:burble, Previous:bum, Up:= B = + + +bump vt. + +Synonym for increment. Has the same meaning as C's ++ +operator. Used esp. of counter variables, pointers, and index +dummies in for, while, and +do-while loops. + + +Node:burble, Next:buried treasure, Previous:bump, Up:= B = + +burble v. + +[from Lewis Carroll's "Jabberwocky"] Like flame, but connotes that the source is truly +clueless and ineffectual (mere flamers can be competent). A term +of deep contempt. "There's some guy on the phone burbling about +how he got a DISK FULL error and it's all our comm software's +fault." This is mainstream slang in some parts of England. + + +Node:buried treasure, Next:burn-in period, +Previous:burble, Up:= B = + +buried treasure n. + +A surprising piece of code found in some program. While +usually not wrong, it tends to vary from crufty to bletcherous, and has lain undiscovered +only because it was functionally correct, however horrible it is. +Used sarcastically, because what is found is anything +but treasure. Buried treasure almost always needs to be +dug up and removed. "I just found that the scheduler sorts its +queue using bubble sort! +Buried treasure!" + + +Node:burn-in period, Next:burst page, Previous:buried treasure, Up:= B = + +burn-in period n. + +1. A factory test designed to catch systems with marginal components before they get out the +door; the theory is that burn-in will protect customers by +outwaiting the steepest part of the bathtub curve (see infant mortality). 2. A period of +indeterminate length in which a person using a computer is so +intensely involved in his project that he forgets basic needs +such as food, drink, sleep, etc. Warning: Excessive burn-in can +lead to burn-out. See hack +mode, larval +stage. + +Historical note: the origin of "burn-in" (sense 1) is +apparently the practice of setting a new-model airplane's brakes +on fire, then extinguishing the fire, in order to make them hold +better. This was done on the first version of the U.S. spy-plane, +the U-2. + + +Node:burst page, Next:busy-wait, Previous:burn-in period, Up:= B = + +burst page n. + +Syn. banner, sense 1. + + +Node:busy-wait, Next:buzz, Previous:burst page, Up:= B = + +busy-wait vi. + +Used of human behavior, conveys that the subject is busy +waiting for someone or something, intends to move instantly as +soon as it shows up, and thus cannot do anything else at the +moment. "Can't talk now, I'm busy-waiting till Bill gets off the +phone." + +Technically, `busy-wait' means to wait on an event by spinning through a tight or timed-delay loop +that polls for the event on each pass, as opposed to setting up +an interrupt handler and continuing execution on another part of +the task. In applications this is a wasteful technique, and best +avoided on time-sharing systems where a busy-waiting program may +hog the processor. However, it is often +unavoidable in kernel programming. In the Linux world, kernel +busy-waits are usually referred to as `spinlocks'. + + +Node:buzz, Next:BWQ, Previous:busy-wait, Up:= B = + +buzz vi. + +1. Of a program, to run with no indication of progress and +perhaps without guarantee of ever finishing; esp. said of +programs thought to be executing tight loops of code. A program +that is buzzing appears to be catatonic, but never gets out of catatonia, +while a buzzing loop may eventually end of its own accord. "The +program buzzes for about 10 seconds trying to sort all the names +into order." See spin; see also grovel. 2. [ETA Systems] To test a wire or +printed circuit trace for continuity, esp. by applying an AC +rather than DC signal. Some wire faults will pass DC tests but +fail an AC buzz test. 3. To process an array or list in sequence, +doing the same thing to each element. "This loop buzzes through +the tz array looking for a terminator type." + + +Node:BWQ, Next:by hand, Previous:buzz, Up:= B = + + +BWQ /B-W-Q/ n. + +[IBM: abbreviation, `Buzz Word Quotient'] The percentage of +buzzwords in a speech or documents. Usually roughly proportional +to bogosity. See TLA. + + +Node:by hand, Next:byte, Previous:BWQ, +Up:= B = + +by hand adv. + +[common] 1. Said of an operation (especially a repetitive, +trivial, and/or tedious one) that ought to be performed +automatically by the computer, but which a hacker instead has to +step tediously through. "My mailer doesn't have a command to +include the text of the message I'm replying to, so I have to do +it by hand." This does not necessarily mean the speaker has to +retype a copy of the message; it might refer to, say, dropping +into a subshell from the mailer, making a copy of one's mailbox +file, reading that into an editor, locating the top and bottom of +the message in question, deleting the rest of the file, inserting +`>' characters on each line, writing the file, leaving the +editor, returning to the mailer, reading the file in, and later +remembering to delete the file. Compare eyeball search. 2. By extension, +writing code which does something in an explicit or low-level way +for which a presupplied library routine ought to have been +available. "This cretinous B-tree library doesn't supply a decent +iterator, so I'm having to walk the trees by hand." + + +Node:byte, Next:byte sex, Previous:by hand, Up:= +B = + +byte /bi:t/ n. + +[techspeak] A unit of memory or data equal to the amount used +to represent one character; on modern architectures this is +usually 8 bits, but may be 9 on 36-bit machines. Some older +architectures used `byte' for quantities of 6 or 7 bits, and the +PDP-10 supported `bytes' that were actually bitfields of 1 to 36 +bits! These usages are now obsolete, and even 9-bit bytes have +become rare in the general trend toward power-of-2 word +sizes. + +Historical note: The term was coined by Werner Buchholz in +1956 during the early design phase for the IBM Stretch computer; +originally it was described as 1 to 6 bits (typical I/O equipment +of the period used 6-bit chunks of information). The move to an +8-bit byte happened in late 1956, and this size was later adopted +and promulgated as a standard by the System/360. The word was +coined by mutating the word `bite' so it would not be +accidentally misspelled as bit. See +also nybble. + + +Node:byte sex, Next:bytesexual, Previous:byte, Up:= B = + + +byte sex n. + +[common] The byte sex of hardware is big-endian or little-endian; see those entries. + + +Node:bytesexual, Next:Bzzzt! Wrong., Previous:byte sex, Up:= B = + +bytesexual /bi:t`sek'shu-*l/ adj. + +[rare] Said of hardware, denotes willingness to compute or +pass data in either big-endian +or little-endian format +(depending, presumably, on a mode +bit somewhere). See also NUXI problem. + + +Node:Bzzzt! Wrong., Next:C, Previous:bytesexual, Up:= B = + +Bzzzt! Wrong. /bzt rong/ excl. + +[common; Usenet/Internet; punctuation varies] From a Robin +Williams routine in the movie "Dead Poets Society" spoofing radio +or TV quiz programs, such as Truth or Consequences, +where an incorrect answer earns one a blast from the buzzer and +condolences from the interlocutor. A way of expressing mock-rude +disagreement, usually immediately following an included quote +from another poster. The less abbreviated "*Bzzzzt*, wrong, but +thank you for playing" is also common; capitalization and +emphasis of the buzzer sound varies. + + +Node:= C =, Next:= D =, Previous:= B =, Up:The Jargon Lexicon + += C = + + +C: + + +C Programmer's +Disease: + + +C&C: + + +C++: + + +calculator: + + +Camel Book: + + +can: + + +can't happen: + + +cancelbot: + + +Cancelmoose[tm]: + + +candygrammar: + + +canonical: + + +card walloper: + + +careware: + + +cargo cult +programming: + + +cascade: + + +case and paste: + + +casters-up mode: + + +casting the runes: + + +cat: + + +catatonic: + + +cathedral: + + +cd tilde: + + +CDA: + + +cdr: + + +chad: + + +chad box: + + +chain: + + +channel: + + +channel hopping: + + +channel op: + + +chanop: + + +char: + + +charityware: + + +chase pointers: + + +chawmp: + + +check: + + +cheerfully: + + +chemist: + + +Chernobyl chicken: + + +Chernobyl packet: + + +chicken head: + + +chiclet keyboard: + + +Chinese Army +technique: + + +choad: + + +choke: + + +chomp: + + +chomper: + + +CHOP: + + +Christmas tree: + + +Christmas tree +packet: + + +chrome: + + +chug: + + +Church of the +SubGenius: + + +Cinderella Book: + + +CI$: + + +Classic C: + + +clean: + + +CLM: + + +clobber: + + +clock: + + +clocks: + + +clone: + + +clone-and-hack +coding: + + +clover key: + + +clue-by-four: + + +clustergeeking: + + +co-lo: + + +code: + + +coaster: + + +COBOL: + + +COBOL fingers: + + +cobweb site: + + +code grinder: + + +code monkey: + + +Code of the +Geeks: + + +code police: + + +codes: + + +codewalker: + + +coefficient of X: + + +cokebottle: + + +cold boot: + + +COME FROM: + + +comm mode: + + +command key: + + +comment out: + + +Commonwealth +Hackish: + + +compact: + + +compiler jock: + + +compo: + + +compress: + + +Compu$erve: + + +computer confetti: + + +computer geek: + + +computron: + + +con: + + +condition out: + + +condom: + + +confuser: + + +connector +conspiracy: + + +cons: + + +considered harmful: + + +console: + + +console jockey: + + +content-free: + + +control-C: + + +control-O: + + +control-Q: + + +control-S: + + +Conway's Law: + + +cookbook: + + +cooked mode: + + +cookie: + + +cookie bear: + + +cookie file: + + +cookie jar: + + +cookie monster: + + +copious free time: + + +copper: + + +copy protection: + + +copybroke: + + +copycenter: + + +copyleft: + + +copyparty: + + +copywronged: + + +core: + + +core cancer: + + +core dump: + + +core leak: + + +Core Wars: + + +corge: + + +cosmic rays: + + +cough and die: + + +courier: + + +cow orker: + + +cowboy: + + +CP/M: + + +CPU Wars: + + +crack: + + +crack root: + + +cracker: + + +cracking: + + +crank: + + +crapplet: + + +CrApTeX: + + +crash: + + +crash and burn: + + +crawling horror: + + +cray: + + +cray instability: + + +crayola: + + +crayola books: + + +crayon: + + +creationism: + + +creep: + + +creeping elegance: + + +creeping featurism: + + +creeping +featuritis: + + +cretin: + + +cretinous: + + +crippleware: + + +critical mass: + + +crlf: + + +crock: + + +cross-post: + + +crossload: + + +crudware: + + +cruft: + + +cruft together: + + +cruftsmanship: + + +crufty: + + +crumb: + + +crunch: + + +cryppie: + + +CTSS: + + +cube: + + +cubing: + + +cup holder: + + +cursor dipped in +X: + + +cuspy: + + +cut a tape: + + +cybercrud: + + +cyberpunk: + + +cyberspace: + + +cycle: + + +cycle crunch: + + +cycle drought: + + +cycle of +reincarnation: + + +cycle server: + + +cypherpunk: + + +C|N>K: + + +Node:C, Next:C Programmer's Disease, +Previous:Bzzzt! +Wrong., Up:= C = + +C n. + +1. The third letter of the English alphabet. 2. ASCII 1000011. +3. The name of a programming language designed by Dennis Ritchie +during the early 1970s and immediately used to reimplement Unix; so called because many features +derived from an earlier compiler named `B' in commemoration of +its parent, BCPL. (BCPL was in turn descended from an +earlier Algol-derived language, CPL.) Before Bjarne Stroustrup +settled the question by designing C++, +there was a humorous debate over whether C's successor should be +named `D' or `P'. C became immensely popular outside Bell Labs +after about 1980 and is now the dominant language in systems and +microcomputer applications programming. See also languages of choice, indent style. + +C is often described, with a mixture of fondness and disdain +varying according to the speaker, as "a language that combines +all the elegance and power of assembly language with all the +readability and maintainability of assembly language". + + +Node:C Programmer's +Disease, Next:C&C, +Previous:C, Up:= C = + +C Programmer's Disease n. + +The tendency of the undisciplined C programmer to set +arbitrary but supposedly generous static limits on table sizes +(defined, if you're lucky, by constants in header files) rather +than taking the trouble to do proper dynamic storage allocation. +If an application user later needs to put 68 elements into a +table of size 50, the afflicted programmer reasons that he or she +can easily reset the table size to 68 (or even as much as 70, to +allow for future expansion) and recompile. This gives the +programmer the comfortable feeling of having made the effort to +satisfy the user's (unreasonable) demands, and often affords the +user multiple opportunities to explore the marvelous consequences +of fandango on core. +In severe cases of the disease, the programmer cannot comprehend +why each fix of this kind seems only to further disgruntle the +user. + + +Node:C&C, Next:C++, Previous:C Programmer's Disease, Up:= C = + +C&C // + +[common, esp. on _news.admin.net-abuse.email_] +Contraction of "Coffee & Cats". This frequently occurs as a +warning label on USENET posts that are likely to cause you to +snarf coffee onto your keyboard and +startle the cat off your lap. + + +Node:C++, Next:calculator, Previous:C&C, Up:= C += + +C++ /C'-pluhs-pluhs/ n. + +Designed by Bjarne Stroustrup of AT&T Bell Labs as a +successor to C. Now one of the languages of choice, +although many hackers still grumble that it is the successor to +either Algol 68 or Ada (depending on +generation), and a prime example of second-system effect. Almost +anything that can be done in any language can be done in C++, but +it requires a language +lawyer to know what is and what is not legal-- the design +is almost too large to hold in even hackers' heads. Much +of the cruft results from C++'s +attempt to be backward compatible with C. Stroustrup himself has +said in his retrospective book "The Design and Evolution of C++" +(p. 207), "Within C++, there is a much smaller and cleaner +language struggling to get out." [Many hackers would now add +"Yes, and it's called Java" --ESR] + + +Node:calculator, Next:Camel Book, Previous:C++, Up:= C += + +calculator [Cambridge] n. + +Syn. for bitty box. + + +Node:Camel Book, Next:can, Previous:calculator, Up:= C = + +Camel Book n. + +Universally recognized nickname for the book "Programming +Perl", by Larry Wall and Randal L. Schwartz, O'Reilly and +Associates 1991, ISBN 0-937175-64-1 (second edition 1996, ISBN +1-56592-149-6). The definitive reference on Perl. + + +Node:can, Next:can't happen, Previous:Camel Book, Up:= C = + +can vt. + +To abort a job on a time-sharing system. Used esp. when the +person doing the deed is an operator, as in "canned from the +console". Frequently used in an +imperative sense, as in "Can that print job, the LPT just popped +a sprocket!" Synonymous with gun. It is +said that the ASCII character with mnemonic CAN (0011000) was +used as a kill-job character on some early OSes. Alternatively, +this term may derive from mainstream slang `canned' for being +laid off or fired. + + +Node:can't happen, Next:cancelbot, Previous:can, Up:= C = + +can't happen + +The traditional program comment for code executed under a +condition that should never be true, for example a file size +computed as negative. Often, such a condition being true +indicates data corruption or a faulty algorithm; it is almost +always handled by emitting a fatal error message and terminating +or crashing, since there is little else that can be done. Some +case variant of "can't happen" is also often the text emitted if +the `impossible' error actually happens! Although "can't happen" +events are genuinely infrequent in production code, programmers +wise enough to check for them habitually are often surprised at +how frequently they are triggered during development and how many +headaches checking for them turns out to head off. See also firewall code (sense 2). + + +Node:cancelbot, Next:Cancelmoose[tm], Previous:can't happen, Up:= C = + +cancelbot /kan'sel-bot/ + +[Usenet: compound, cancel + robot] 1. Mythically, a robocanceller 2. In reality, most +cancelbots are manually operated by being fed lists of spam +message IDs. + + +Node:Cancelmoose[tm], Next:candygrammar, Previous:cancelbot, Up:= C = + +Cancelmoose[tm] /kan'sel-moos/ + +[Usenet] The archetype and model of all good spam-fighters. Once upon a time, the 'Moose would +send out spam-cancels and then post notice anonymously to +_news.admin.policy_, _news.admin.misc_, and +_alt.current-events.net-abuse_. The 'Moose stepped to the +fore on its own initiative, at a time (mid-1994) when +spam-cancels were irregular and disorganized, and behaved +altogether admirably - fair, even-handed, and quick to respond to +comments and criticism, all without self-aggrandizement or +martyrdom. Cancelmoose[tm] quickly gained near-unanimous support +from the readership of all three above-mentioned groups. + +Nobody knows who Cancelmoose[tm] really is, and there aren't even any +good rumors. However, the 'Moose now has an e-mail address +(moose@cm.org) and a web site (http://www.cm.org.) + +By early 1995, others had stepped into the spam-cancel +business, and appeared to be comporting themselves well, after +the 'Moose's manner. The 'Moose has now gotten out of the +business, and is more interested in ending spam (and cancels) +entirely. + + +Node:candygrammar, Next:canonical, Previous:Cancelmoose[tm], Up:= C = + +candygrammar n. + +A programming-language grammar that is mostly syntactic sugar; the term is also a +play on `candygram'. COBOL, Apple's +Hypertalk language, and a lot of the so-called `4GL' database +languages share this property. The usual intent of such designs +is that they be as English-like as possible, on the theory that +they will then be easier for unskilled people to program. This +intention comes to grief on the reality that syntax isn't what +makes programming hard; it's the mental effort and organization +required to specify an algorithm precisely that costs. Thus the +invariable result is that `candygrammar' languages are just as +difficult to program in as terser ones, and far more painful for +the experienced hacker. + +[The overtones from the old Chevy Chase skit on Saturday Night +Live should not be overlooked. This was a "Jaws" parody. Someone +lurking outside an apartment door tries all kinds of bogus ways +to get the occupant to open up, while ominous music plays in the +background. The last attempt is a half-hearted "Candygram!" When +the door is opened, a shark bursts in and chomps the poor +occupant. [There is a similar gag in "Blazing Saddles" --ESR] +There is a moral here for those attracted to candygrammars. Note +that, in many circles, pretty much the same ones who remember +Monty Python sketches, all it takes is the word "Candygram!", +suitably timed, to get people rolling on the floor. -- GLS] + + +Node:canonical, Next:card walloper, Previous:candygrammar, Up:= C = + +canonical adj. + +[very common; historically, `according to religious law'] The +usual or standard state or manner of something. This word has a +somewhat more technical meaning in mathematics. Two formulas such +as 9 + x and x + 9 are said to be equivalent because they mean +the same thing, but the second one is in `canonical form' because +it is written in the usual way, with the highest power of x +first. Usually there are fixed rules you can use to decide +whether something is in canonical form. The jargon meaning, a +relaxation of the technical meaning, acquired its present loading +in computer-science culture largely through its prominence in +Alonzo Church's work in computation theory and mathematical logic +(see Knights +of the Lambda Calculus). Compare vanilla. + +Non-technical academics do not use the adjective `canonical' +in any of the senses defined above with any regularity; they do +however use the nouns `canon' and `canonicity' (not +**canonicalness or **canonicality). The `canon' of a given author +is the complete body of authentic works by that author (this +usage is familiar to Sherlock Holmes fans as well as to literary +scholars). `The canon' is the body of works in a given +field (e.g., works of literature, or of art, or of music) deemed +worthwhile for students to study and for scholars to +investigate. + +The word `canon' has an interesting history. It derives +ultimately from the Greek `kanon' (akin to the English `cane') +referring to a reed. Reeds were used for measurement, and in +Latin and later Greek the word `canon' meant a rule or a +standard. The establishment of a canon of scriptures within +Christianity was meant to define a standard or a rule for the +religion. The above non-techspeak academic usages stem from this +instance of a defined and accepted body of work. Alongside this +usage was the promulgation of `canons' (`rules') for the +government of the Catholic Church. The techspeak usages +("according to religious law") derive from this use of the Latin +`canon'. + +Hackers invest this term with a playfulness that makes an +ironic contrast with its historical meaning. A true story: One +Bob Sjoberg, new at the MIT AI Lab, expressed some annoyance at +the incessant use of jargon. Over his loud objections, GLS and +RMS made a point of using as much of it as possible in his +presence, and eventually it began to sink in. Finally, in one +conversation, he used the word `canonical' in jargon-like fashion +without thinking. Steele: "Aha! We've finally got you talking +jargon too!" Stallman: "What did he say?" Steele: "Bob just used +`canonical' in the canonical way." + +Of course, canonicality depends on context, but it is +implicitly defined as the way hackers normally expect +things to be. Thus, a hacker may claim with a straight face that +`according to religious law' is not the canonical +meaning of `canonical'. + + +Node:card walloper, Next:careware, Previous:canonical, Up:= C = + +card walloper n. + +An EDP programmer who grinds out batch programs that do stupid +things like print people's paychecks. Compare code grinder. See also punched card, eighty-column mind. + + +Node:careware, Next:cargo cult programming, +Previous:card +walloper, Up:= C = + +careware /keir'weir/ n. + +A variety of shareware for +which either the author suggests that some payment be made to a +nominated charity or a levy directed to charity is included on +top of the distribution charge. Syn. charityware; compare crippleware, sense 2. + + +Node:cargo cult +programming, Next:cascade, +Previous:careware, Up:= C = + +cargo cult programming n. + +A style of (incompetent) programming dominated by ritual +inclusion of code or program structures that serve no real +purpose. A cargo cult programmer will usually explain the extra +code as a way of working around some bug encountered in the past, +but usually neither the bug nor the reason the code apparently +avoided the bug was ever fully understood (compare shotgun debugging, voodoo programming). + +The term `cargo cult' is a reference to aboriginal religions +that grew up in the South Pacific after World War II. The +practices of these cults center on building elaborate mockups of +airplanes and military style landing strips in the hope of +bringing the return of the god-like airplanes that brought such +marvelous cargo during the war. Hackish usage probably derives +from Richard Feynman's characterization of certain practices as +"cargo cult science" in his book "Surely You're Joking, Mr. +Feynman!" (W. W. Norton & Co, New York 1985, ISBN +0-393-01921-7). + + +Node:cascade, Next:case and paste, Previous:cargo cult +programming, Up:= C = + + +cascade n. + +1. A huge volume of spurious error-message output produced by +a compiler with poor error recovery. Too frequently, one trivial +syntax error (such as a missing `)' or `}') throws the parser out +of synch so that much of the remaining program text is +interpreted as garbaged or ill-formed. 2. A chain of Usenet +followups, each adding some trivial variation or riposte to the +text of the previous one, all of which is reproduced in the new +message; an include war in +which the object is to create a sort of communal graffito. + + +Node:case and paste, Next:casters-up mode, +Previous:cascade, Up:= C = + +case and paste n. + +[from `cut and paste'] 1. The addition of a new feature to an existing system by selecting the +code from an existing feature and pasting it in with minor +changes. Common in telephony circles because most operations in a +telephone switch are selected using case statements. +Leads to software +bloat. + +In some circles of EMACS users this is called `programming by +Meta-W', because Meta-W is the EMACS command for copying a block +of text to a kill buffer in preparation to pasting it in +elsewhere. The term is condescending, implying that the +programmer is acting mindlessly rather than thinking carefully +about what is required to integrate the code for two similar +cases. + +At DEC (now Compaq), this is +sometimes called `clone-and-hack' coding. + + +Node:casters-up mode, Next:casting the runes, +Previous:case and +paste, Up:= C = + +casters-up mode n. + +[IBM, prob. fr. slang _belly up_] Yet another synonym for +`broken' or `down'. Usually connotes a major failure. A system +(hardware or software) which is `down' may be already being +restarted before the failure is noticed, whereas one which is +`casters up' is usually a good excuse to take the rest of the day +off (as long as you're not responsible for fixing it). + + +Node:casting the runes, +Next:cat, Previous:casters-up mode, Up:= C = + +casting the runes n. + +What a guru does when you ask him +or her to run a particular program and type at it because it +never works for anyone else; esp. used when nobody can ever see +what the guru is doing different from what J. Random Luser does. +Compare incantation, runes, examining the entrails; +also see the AI koan about Tom Knight in "Some AI Koans" (Appendix A). + +A correspondent from England tells us that one of ICL's most +talented systems designers used to be called out occasionally to +service machines which the field +circus had given up on. Since he knew the design inside +out, he could often find faults simply by listening to a quick +outline of the symptoms. He used to play on this by going to some +site where the field circus had just spent the last two weeks +solid trying to find a fault, and spreading a diagram of the +system out on a table top. He'd then shake some chicken bones and +cast them over the diagram, peer at the bones intently for a +minute, and then tell them that a certain module needed +replacing. The system would start working again immediately upon +the replacement. + + +Node:cat, Next:catatonic, Previous:casting the runes, Up:= C = + +cat [from `catenate' via Unix cat(1)] vt. + +1. [techspeak] To spew an entire file to the screen or some +other output sink without pause (syn. blast). 2. By extension, to dump large amounts +of data at an unprepared target or with no intention of browsing +it carefully. Usage: considered silly. Rare outside Unix sites. +See also dd, BLT. + +Among Unix fans, cat(1) is considered an +excellent example of user-interface design, because it delivers +the file contents without such verbosity as spacing or headers +between the files, and because it does not require the files to +consist of lines of text, but works with any sort of data. + +Among Unix haters, cat(1) is considered the canonical example of bad +user-interface design, because of its woefully unobvious name. It +is far more often used to blast a +file to standard output than to concatenate two files. The name +cat for the former operation is just as unintuitive +as, say, LISP's cdr. + +Of such oppositions are holy +wars made.... + + +Node:catatonic, Next:cathedral, Previous:cat, Up:= C = + + +catatonic adj. + +Describes a condition of suspended animation in which +something is so wedged or hung that it makes no response. If you are +typing on a terminal and suddenly the computer doesn't even echo +the letters back to the screen as you type, let alone do what +you're asking it to do, then the computer is suffering from +catatonia (possibly because it has crashed). "There I was in the +middle of a winning game of nethack +and it went catatonic on me! Aaargh!" Compare buzz. + + +Node:cathedral, Next:cd tilde, Previous:catatonic, Up:= C = + +cathedral n.,adj. + +[see bazaar for derivation] The +`classical' mode of software engineering long thought to be +necessarily implied by Brooks's +Law. Features small teams, tight project control, and +long release intervals. This term came into use after analysis of +the Linux experience suggested there might be something wrong (or +at least incomplete) in the classical assumptions. + + +Node:cd tilde, Next:CDA, Previous:cathedral, Up:= C = + +cd tilde /C-D til-d*/ vi. + +To go home. From the Unix C-shell and Korn-shell command +cd ~, which takes one to one's $HOME +(cd with no arguments happens to do the same thing). +By extension, may be used with other arguments; thus, over an +electronic chat link, cd ~coffee would mean "I'm +going to the coffee machine." + + +Node:CDA, Next:cdr, Previous:cd +tilde, Up:= C = + +CDA /C-D-A/ + +The "Communications Decency Act" of 1996, passed on Black Thursday as section 502 of +a major telecommunications reform bill. The CDA made it a federal +crime in the USA to send a communication which is "obscene, lewd, +lascivious, filthy, or indecent, with intent to annoy, abuse, +threaten, or harass another person." It also threatened with +imprisonment anyone who "knowingly" makes accessible to minors +any message that "describes, in terms patently offensive as +measured by contemporary community standards, sexual or excretory +activities or organs". + +While the CDA was sold as a measure to protect minors from the +putative evils of pornography, the repressive political aims of +the bill were laid bare by the Hyde amendment, which intended to +outlaw discussion of abortion on the Internet. + +To say that this direct attack on First Amendment free-speech +rights was not well received on the Internet would be putting it +mildly. A firestorm of protest followed, including a February +29th mass demonstration by thousands of netters who turned their +home pages black for 48 hours. +Several civil-rights groups and computing/telecommunications +companies mounted a constitutional challenge. The CDA was +demolished by a strongly-worded decision handed down on in +8th-circuit Federal court and subsequently affirmed by the U.S. +Supreme Court on 26 June 1997 (`White Thursday'). See also Exon. + + +Node:cdr, Next:chad, Previous:CDA, +Up:= C = + +cdr /ku'dr/ or /kuh'dr/ vt. + +[from LISP] To skip past the first item from a list of things +(generalized from the LISP operation on binary tree structures, +which returns a list consisting of all but the first element of +its argument). In the form `cdr down', to trace down a list of +elements: "Shall we cdr down the agenda?" Usage: silly. See also +loop through. + +Historical note: The instruction format of the IBM 704 that +hosted the original LISP implementation featured two 15-bit +fields called the `address' and `decrement' parts. The term `cdr' +was originally `Contents of Decrement part of Register'. +Similarly, `car' stood for `Contents of Address part of +Register'. + +The cdr and car operations have since become bases for +formation of compound metaphors in non-LISP contexts. GLS +recalls, for example, a programming project in which strings were +represented as linked lists; the get-character and skip-character +operations were of course called CHAR and CHDR. + + +Node:chad, Next:chad box, Previous:cdr, Up:= C = + + +chad /chad/ n. + +1. [common] The perforated edge strips on printer paper, after +they have been separated from the printed portion. Also called +selvage, perf, and ripoff. 2. +obs. The confetti-like paper bits punched out of cards or paper +tape; this has also been called `chaff', `computer confetti', and +`keypunch droppings'. It's reported that this was very old Army +slang, and it may now be mainstream; it has been reported seen +(1993) in directions for a card-based voting machine in +California. + +Historical note: One correspondent believes `chad' (sense 2) +derives from the Chadless keypunch (named for its inventor), +which cut little u-shaped tabs in the card to make a hole when +the tab folded back, rather than punching out a circle/rectangle; +it was clear that if the Chadless keypunch didn't make them, then +the stuff that other keypunches made had to be `chad'. There is a +legend that the word was originally acronymic, standing for "Card +Hole Aggregate Debris", but this has all the earmarks of a backronym. + + +Node:chad box, Next:chain, Previous:chad, Up:= C = + + +chad box n. + +A metal box about the size of a lunchbox (or in some models a +large wastebasket), for collecting the chad (sense 2) that accumulated in Iron Age card punches. You had to open the +covers of the card punch periodically and empty the chad box. The +bit bucket was notionally the +equivalent device in the CPU enclosure, which was typically +across the room in another great gray-and-blue box. + + +Node:chain, Next:channel, Previous:chad box, Up:= C = + +chain + +1. vi. [orig. from BASIC's CHAIN statement] To +hand off execution to a child or successor without going through +the OS command interpreter that invoked +it. The state of the parent program is lost and there is no +returning to it. Though this facility used to be common on +memory-limited micros and is still widely supported for backward +compatibility, the jargon usage is semi-obsolescent; in +particular, most Unix programmers will think of this as an exec. Oppose the more modern `subshell'. 2. +n. A series of linked data areas within an operating system or +application. `Chain rattling' is the process of repeatedly +running through the linked data areas searching for one which is +of interest to the executing program. The implication is that +there is a very large number of links on the chain. + + +Node:channel, Next:channel hopping, Previous:chain, Up:= C = + +channel n. + +[IRC] The basic unit of discussion on IRC. Once one joins a channel, everything one +types is read by others on that channel. Channels are named with +strings that begin with a `#' sign and can have topic +descriptions (which are generally irrelevant to the actual +subject of discussion). Some notable channels are +#initgame, #hottub, +callahans, and #report. At times of +international crisis, #report has hundreds of +members, some of whom take turns listening to various news +services and typing in summaries of the news, or in some cases, +giving first-hand accounts of the action (e.g., Scud missile +attacks in Tel Aviv during the Gulf War in 1991). + + +Node:channel hopping, Next:channel op, Previous:channel, Up:= C = + +channel hopping n. + +[common; IRC, GEnie] To rapidly switch channels on IRC, or a GEnie chat board, just as a social +butterfly might hop from one group to another at a party. This +term may derive from the TV watcher's idiom, `channel +surfing'. + + +Node:channel op, Next:chanop, Previous:channel hopping, Up:= C = + +channel op /chan'l op/ n. + +[IRC] Someone who is endowed with privileges on a particular +IRC channel; commonly abbreviated +`chanop' or `CHOP' or just `op' (as of 2000 these short forms +have almost crowded out the parent usage). These privileges +include the right to kick users, to +change various status bits, and to make others into CHOPs. + + +Node:chanop, Next:char, Previous:channel op, Up:= C = + +chanop /chan'-op/ n. + +[IRC] See channel op. + + +Node:char, Next:charityware, Previous:chanop, Up:= C += + +char /keir/ or /char/; rarely, /kar/ n. + +Shorthand for `character'. Esp. used by C programmers, as +`char' is C's typename for character data. + + +Node:charityware, Next:chase pointers, Previous:char, Up:= C = + +charityware /cha'rit-ee-weir`/ n. + +Syn. careware. + + +Node:chase pointers, Next:chawmp, Previous:charityware, Up:= C = + +chase pointers + +1. vi. To go through multiple levels of indirection, as in +traversing a linked list or graph structure. Used esp. by +programmers in C, where explicit pointers are a very common data +type. This is techspeak, but it remains jargon when used of human +networks. "I'm chasing pointers. Bob said you could tell me who +to talk to about...." See dangling pointer and snap. 2. [Cambridge] `pointer chase' or `pointer +hunt': The process of going through a core dump (sense 1), interactively or on a +large piece of paper printed with hex runes, following dynamic data-structures. Used +only in a debugging context. + + +Node:chawmp, Next:check, Previous:chase pointers, Up:= C = + +chawmp n. + +[University of Florida] 16 or 18 bits (half of a machine +word). This term was used by FORTH hackers during the late +1970s/early 1980s; it is said to have been archaic then, and may +now be obsolete. It was coined in revolt against the promiscuous +use of `word' for anything between 16 and 32 bits; `word' has an +additional special meaning for FORTH hacks that made the +overloading intolerable. For similar reasons, /gaw'bl/ (spelled +`gawble' or possibly `gawbul') was in use as a term for 32 or 48 +bits (presumably a full machine word, but our sources are unclear +on this). These terms are more easily understood if one thinks of +them as faithful phonetic spellings of `chomp' and `gobble' +pronounced in a Florida or other Southern U.S. dialect. For +general discussion of similar terms, see nybble. + + +Node:check, Next:cheerfully, Previous:chawmp, Up:= C += + +check n. + +A hardware-detected error condition, most commonly used to +refer to actual hardware failures rather than software-induced +traps. E.g., a `parity check' is the result of a +hardware-detected parity error. Recorded here because the word +often humorously extended to non-technical problems. For example, +the term `child check' has been used to refer to the problems +caused by a small child who is curious to know what happens when +s/he presses all the cute buttons on a computer's console (of +course, this particular problem could have been prevented with +molly-guards). + + +Node:cheerfully, Next:chemist, Previous:check, Up:= C += + +cheerfully adv. + +See happily. + + +Node:chemist, Next:Chernobyl chicken, Previous:cheerfully, Up:= C = + +chemist n. + +[Cambridge] Someone who wastes computer time on number-crunching when you'd far +rather the machine were doing something more productive, such as +working out anagrams of your name or printing Snoopy calendars or +running life patterns. May or may not +refer to someone who actually studies chemistry. + + +Node:Chernobyl chicken, Next:Chernobyl packet, +Previous:chemist, Up:= C = + +Chernobyl chicken n. + +See laser chicken. + + +Node:Chernobyl packet, Next:chicken head, Previous:Chernobyl chicken, +Up:= C = + +Chernobyl packet /cher-noh'b*l pak'*t/ n. + +A network packet that induces a broadcast storm and/or network meltdown, in memory of the +April 1986 nuclear accident at Chernobyl in Ukraine. The typical +scenario involves an IP Ethernet datagram that passes through a +gateway with both source and destination Ether and IP address set +as the respective broadcast addresses for the subnetworks being +gated between. Compare Christmas tree packet. + + +Node:chicken head, Next:chiclet keyboard, +Previous:Chernobyl +packet, Up:= C = + +chicken head n. + +[Commodore] The Commodore Business Machines logo, which +strongly resembles a poultry part (within Commodore itself the +logo was always called `chicken lips'). Rendered in ASCII as +`C='. With the arguable exception of the Amiga (see amoeba), Commodore's machines were notoriously +crocky little bitty boxes (see +also PETSCII), albeit people have +written multitasking Unix-like operating systems with TCP/IP +networking for them. Thus, this usage may owe something to Philip +K. Dick's novel "Do Androids Dream of Electric Sheep?" (the basis +for the movie "Blade Runner"; the novel is now sold under that +title), in which a `chickenhead' is a mutant with below-average +intelligence. + + +Node:chiclet keyboard, Next:Chinese Army +technique, Previous:chicken head, Up:= C = + +chiclet keyboard n. + +A keyboard with a small, flat rectangular or lozenge-shaped +rubber or plastic keys that look like pieces of chewing gum. +(Chiclets is the brand name of a variety of chewing gum that does +in fact resemble the keys of chiclet keyboards.) Used esp. to +describe the original IBM PCjr keyboard. Vendors unanimously +liked these because they were cheap, and a lot of early portable +and laptop products got launched using them. Customers rejected +the idea with almost equal unanimity, and chiclets are not often +seen on anything larger than a digital watch any more. + + +Node:Chinese Army +technique, Next:choad, +Previous:chiclet +keyboard, Up:= C = + +Chinese Army technique n. + +Syn. Mongolian +Hordes technique. + + +Node:choad, Next:choke, Previous:Chinese Army technique, Up:= C = + +choad /chohd/ n. + +Synonym for `penis' used in _alt.tasteless_ and +popularized by the denizens thereof. They say: "We think maybe +it's from Middle English but we're all too damned lazy to check +the OED." [I'm not. It isn't. --ESR] This term is alleged to have +been inherited through 1960s underground comics, and to have been +recently sighted in the Beavis and Butthead cartoons. Speakers of +the Hindi, Bengali and Gujarati languages have confirmed that +`choad' is in fact an Indian vernacular word equivalent to +`fuck'; it is therefore likely to have entered English slang via +the British Raj. + + +Node:choke, Next:chomp, Previous:choad, Up:= C += + +choke v. + +1. [common] To reject input, often ungracefully. "NULs make +System V's lpr(1) choke." "I tried building an EMACS binary to use X, but cpp(1) choked on all those +#defines." See barf, +gag, vi. 2. +[MIT] More generally, to fail at any endeavor, but with some +flair or bravado; the popular definition is "to snatch defeat +from the jaws of victory." + + +Node:chomp, Next:chomper, Previous:choke, Up:= C += + +chomp vi. + +1. To lose; specifically, to chew +on something of which more was bitten off than one can. Probably +related to gnashing of teeth. 2. To bite the bag; See bagbiter. + +A hand gesture commonly accompanies this. To perform it, hold +the four fingers together and place the thumb against their tips. +Now open and close your hand rapidly to suggest a biting action +(much like what Pac-Man does in the classic video game, though +this pantomime seems to predate that). The gesture alone means +`chomp chomp' (see "Verb +Doubling" in the "Jargon Construction" section of +the Prependices). The hand may be pointed at the object of +complaint, and for real emphasis you can use both hands at once. +Doing this to a person is equivalent to saying "You chomper!" If +you point the gesture at yourself, it is a humble but humorous +admission of some failure. You might do this if someone told you +that a program you had written had failed in some surprising way +and you felt dumb for not having anticipated it. + + +Node:chomper, Next:CHOP, Previous:chomp, Up:= C += + +chomper n. + +Someone or something that is chomping; a loser. See loser, bagbiter, chomp. + + +Node:CHOP, Next:Christmas tree, Previous:chomper, Up:= C = + +CHOP /chop/ n. + +[IRC] See channel op. + + +Node:Christmas tree, Next:Christmas tree +packet, Previous:CHOP, +Up:= C = + +Christmas tree n. + +A kind of RS-232 line tester or breakout box featuring rows of +blinking red and green LEDs suggestive of Christmas lights. + + +Node:Christmas tree +packet, Next:chrome, +Previous:Christmas +tree, Up:= C = + +Christmas tree packet n. + +A packet with every single option set for whatever protocol is +in use. See kamikaze +packet, Chernobyl +packet. (The term doubtless derives from a fanciful image +of each little option bit being represented by a +different-colored light bulb, all turned on.) Compare Godzillagram. + + +Node:chrome, Next:chug, Previous:Christmas tree packet, Up:= C = + +chrome n. + +[from automotive slang via wargaming] Showy features added to +attract users but contributing little or nothing to the power of +a system. "The 3D icons in Motif are just chrome, but they +certainly are pretty chrome!" Distinguished from bells and whistles by the +fact that the latter are usually added to gratify developers' own +desires for featurefulness. Often used as a term of contempt. + + +Node:chug, Next:Church of the SubGenius, +Previous:chrome, Up:= C = + +chug vi. + +To run slowly; to grind or grovel. "The disk is chugging like +crazy." + + +Node:Church of the +SubGenius, Next:Cinderella Book, Previous:chug, Up:= C = + +Church of the SubGenius n. + +A mutant offshoot of Discordianism launched in 1981 as a +spoof of fundamentalist Christianity by the `Reverend' Ivan +Stang, a brilliant satirist with a gift for promotion. Popular +among hackers as a rich source of bizarre imagery and references +such as "Bob" the divine drilling-equipment salesman, the +Benevolent Space Xists, and the Stark Fist of Removal. Much +SubGenius theory is concerned with the acquisition of the +mystical substance or quality of slack. There is a home page at http://www.subgenius.com/. + + +Node:Cinderella Book, Next:CI$, Previous:Church of the SubGenius, +Up:= C = + +Cinderella Book [CMU] n. + +"Introduction to Automata Theory, Languages, and Computation", +by John Hopcroft and Jeffrey Ullman, (Addison-Wesley, 1979). So +called because the cover depicts a girl (putatively Cinderella) +sitting in front of a Rube Goldberg device and holding a rope +coming out of it. On the back cover, the device is in shambles +after she has (inevitably) pulled on the rope. See also book titles. + + +Node:CI$, Next:Classic C, Previous:Cinderella Book, Up:= C = + +CI$ // n. + +Hackerism for `CIS', CompuServe Information Service. The +dollar sign refers to CompuServe's rather steep line charges. +Often used in sig blocks just +before a CompuServe address. Syn. Compu$erve. + + +Node:Classic C, Next:clean, Previous:CI$, Up:= C = + + +Classic C /klas'ik C/ n. + +[a play on `Coke Classic'] The C programming language as +defined in the first edition of K&R, with some small additions. It is also +known as `K&R C'. The name came into use while C was being +standardized by the ANSI X3J11 committee. Also `C Classic'. + +An analogous construction is sometimes applied elsewhere: +thus, `X Classic', where X = Star Trek (referring to the original +TV series) or X = PC (referring to IBM's ISA-bus machines as +opposed to the PS/2 series). This construction is especially used +of product series in which the newer versions are considered +serious losers relative to the older ones. + + +Node:clean, Next:CLM, Previous:Classic C, Up:= C = + +clean 1. adj. + +Used of hardware or software designs, implies `elegance in the +small', that is, a design or implementation that may not hold any +surprises but does things in a way that is reasonably intuitive +and relatively easy to comprehend from the outside. The antonym +is `grungy' or crufty. 2. v. To +remove unneeded or undesired files in a effort to reduce clutter: +"I'm cleaning up my account." "I cleaned up the garbage and now +have 100 Meg free on that partition." + + +Node:CLM, Next:clobber, Previous:clean, Up:= C += + +CLM /C-L-M/ + +[Sun: `Career Limiting Move'] 1. n. An action endangering +one's future prospects of getting plum projects and raises, and +possibly one's job: "His Halloween costume was a parody of his +manager. He won the prize for `best CLM'." 2. adj. Denotes +extreme severity of a bug, discovered by a customer and obviously +missed earlier because of poor testing: "That's a CLM bug!" + + +Node:clobber, Next:clock, Previous:CLM, Up:= C = + + +clobber vt. + +To overwrite, usually unintentionally: "I walked off the end +of the array and clobbered the stack." Compare mung, scribble, +trash, and smash the stack. + + +Node:clock, Next:clocks, Previous:clobber, Up:= C += + +clock + +1. n 1. [techspeak] The master oscillator that steps a CPU or +other digital circuit through its paces. This has nothing to do +with the time of day, although the software counter that keeps +track of the latter may be derived from the former. 2. vt. To run +a CPU or other digital circuit at a particular rate. "If you +clock it at 100MHz, it gets warm.". See overclock. 3. vt. To force a digital circuit +from one state to the next by applying a single clock pulse. "The +data must be stable 10ns before you clock the latch." + + +Node:clocks, Next:clone, Previous:clock, Up:= C += + +clocks n. + +Processor logic cycles, so called because each generally +corresponds to one clock pulse in the processor's timing. The +relative execution times of instructions on a machine are usually +discussed in clocks rather than absolute fractions of a second; +one good reason for this is that clock speeds for various models +of the machine may increase as technology improves, and it is +usually the relative times one is interested in when discussing +the instruction set. Compare cycle, +jiffy. + + +Node:clone, Next:clone-and-hack coding, Previous:clocks, Up:= C = + +clone n. + +1. An exact duplicate: "Our product is a clone of their +product." Implies a legal reimplementation from documentation or +by reverse-engineering. Also connotes lower price. 2. A shoddy, +spurious copy: "Their product is a clone of our product." 3. A +blatant ripoff, most likely violating copyright, patent, or trade +secret protections: "Your product is a clone of my product." This +use implies legal action is pending. 4. `PC clone:' a PC-BUS/ISA +or EISA-compatible 80x86-based microcomputer (this use is +sometimes spelled `klone' or `PClone'). These invariably have +much more bang for the buck than the IBM archetypes they +resemble. 5. In the construction `Unix clone': An OS designed to +deliver a Unix-lookalike environment without Unix license fees, +or with additional `mission-critical' features such as support +for real-time programming. 6. v. To make an exact copy of +something. "Let me clone that" might mean "I want to borrow that +paper so I can make a photocopy" or "Let me get a copy of that +file before you mung it". + + +Node:clone-and-hack coding, +Next:clover key, +Previous:clone, Up:= C = + +clone-and-hack coding n. + +[DEC] Syn. case and +paste. + + +Node:clover key, Next:clue-by-four, Previous:clone-and-hack coding, Up:= C = + +clover key n. + +[Mac users] See feature +key. + + +Node:clue-by-four, Next:clustergeeking, Previous:clover key, Up:= C = + +clue-by-four + +[Usenet: portmanteau, clue + two-by-four] The notional stick +with which one whacks an aggressively clueless person. This term +derives from a western American folk saying about training a mule +"First, you got to hit him with a two-by-four. That's to get his +attention." The clue-by-four is a close relative of the LART. Syn. `clue stick'. This metaphor is +commonly elaborated; your editor once heard a hacker say "I +strike you with the great sword Clue-Bringer!" + + +Node:clustergeeking, Next:co-lo, Previous:clue-by-four, Up:= C = + +clustergeeking /kluh'st*r-gee`king/ n. + +[CMU] Spending more time at a computer cluster doing CS +homework than most people spend breathing. + + +Node:co-lo, Next:coaster, Previous:clustergeeking, Up:= C = + +co-lo /koh'loh`/ n. + +[very common; first heard c.1995] Short for `co-location', +used of a machine you own that is physically sited on the +premises of an ISP in order to take advantage of the ISP's direct +access to lots of network bandwidthm. Often in the phrases `co-lo +box' or `co-lo machines'. Co-lo boxes are typically web and FTP +servers remote-administered by their owners, who may seldom or +never visit the actual site. + + +Node:coaster, Next:COBOL, Previous:co-lo, Up:= C += + +coaster n. + +1. Unuseable CD produced during failed attempt at writing to +writeable or re-writeable CD media. Certainly related to the +coaster-like shape of a CD, and the relative value of these +failures. "I made a lot of coasters before I got a good CD." 2. +Useless CDs received in the mail from the likes of AOL, MSN, CI$, +Prodigy, ad nauseam. + +In the U.K., `beermat' is often used in these senses. + + +Node:COBOL, Next:COBOL fingers, Previous:coaster, Up:= C = + +COBOL /koh'bol/ n. + +[COmmon Business-Oriented Language] (Synonymous with evil.) A weak, verbose, and flabby language +used by card wallopers to +do boring mindless things on dinosaur mainframes. Hackers believe that all +COBOL programmers are suits or code grinders, and no +self-respecting hacker will ever admit to having learned the +language. Its very name is seldom uttered without ritual +expressions of disgust or horror. One popular one is Edsger W. +Dijkstra's famous observation that "The use of COBOL cripples the +mind; its teaching should, therefore, be regarded as a criminal +offense." (from "Selected Writings on Computing: A Personal +Perspective") See also fear +and loathing, software +rot. + + +Node:COBOL fingers, Next:cobweb site, Previous:COBOL, Up:= C = + +COBOL fingers /koh'bol fing'grz/ n. + +Reported from Sweden, a (hypothetical) disease one might get +from coding in COBOL. The language requires code verbose beyond +all reason (see candygrammar); +thus it is alleged that programming too much in COBOL causes +one's fingers to wear down to stubs by the endless typing. "I +refuse to type in all that source code again; it would give me +COBOL fingers!" + + +Node:cobweb site, Next:code, Previous:COBOL fingers, Up:= C = + +cobweb site n. + +A World Wide Web Site that hasn't been updated so long it has +figuratively grown cobwebs. + + +Node:code, Next:code grinder, Previous:cobweb site, Up:= C = + +code n. + +The stuff that software writers write, either in source form +or after translation by a compiler or assembler. Often used in +opposition to "data", which is the stuff that code operates on. +This is a mass noun, as in "How much code does it take to do a +bubble sort?", or "The code +is loaded at the high end of RAM." Anyone referring to software +as "the software codes" is probably a newbie or a suit. + + +Node:code grinder, Next:code monkey, Previous:code, Up:= C = + +code grinder n. + +1. A suit-wearing minion of the +sort hired in legion strength by banks and insurance companies to +implement payroll packages in RPG and other such unspeakable +horrors. In its native habitat, the code grinder often removes +the suit jacket to reveal an underplumage consisting of +button-down shirt (starch optional) and a tie. In times of dire +stress, the sleeves (if long) may be rolled up and the tie +loosened about half an inch. It seldom helps. The code grinder's milieu is about as far +from hackerdom as one can get and still touch a computer; the +term connotes pity. See Real +World, suit. 2. Used of or to +a hacker, a really serious slur on the person's creative ability; +connotes a design style characterized by primitive technique, +rule-boundedness, brute +force, and utter lack of imagination. Compare card walloper; contrast hacker, Real +Programmer. + + +Node:code monkey, Next:Code of the Geeks, +Previous:code +grinder, Up:= C = + +code monkey n + +1. A person only capable of grinding out code, but unable to +perform the higher-primate tasks of software architecture, +analysis, and design. Mildly insulting. Often applied to the most +junior people on a programming team. 2. Anyone who writes code +for a living; a programmer. 3. A self-deprecating way of denying +responsibility for a management +decision, or of complaining about having to live with such +decisions. As in "Don't ask me why we need to write a compiler +in+COBOL, I'm just a code monkey." + + +Node:Code of the Geeks, +Next:code police, +Previous:code monkey, +Up:= C = + +Code of the Geeks n. + +see geek code. + + +Node:code police, Next:codes, Previous:Code of the Geeks, Up:= C = + +code police n. + +[by analogy with George Orwell's `thought police'] A mythical +team of Gestapo-like storm troopers that might burst into one's +office and arrest one for violating programming style rules. May +be used either seriously, to underline a claim that a particular +style violation is dangerous, or ironically, to suggest that the +practice under discussion is condemned mainly by anal-retentive +weenies. "Dike out that goto or the +code police will get you!" The ironic usage is perhaps more +common. + + +Node:codes, Next:codewalker, Previous:code police, Up:= C = + +codes n. + +[scientific computing] Programs. This usage is common in +people who hack supercomputers and heavy-duty number-crunching, rare to unknown +elsewhere (if you say "codes" to hackers outside scientific +computing, their first association is likely to be "and +cyphers"). + + +Node:codewalker, Next:coefficient of X, Previous:codes, Up:= C = + +codewalker n. + +A program component that traverses other programs for a +living. Compilers have codewalkers in their front ends; so do +cross-reference generators and some database front ends. Other +utility programs that try to do too much with source code may +turn into codewalkers. As in "This new vgrind +feature would require a codewalker to implement." + + +Node:coefficient of X, Next:cokebottle, Previous:codewalker, Up:= C = + +coefficient of X n. + +Hackish speech makes heavy use of pseudo-mathematical +metaphors. Four particularly important ones involve the terms +`coefficient', `factor', `index of X', and `quotient'. They are +often loosely applied to things you cannot really be quantitative +about, but there are subtle distinctions among them that convey +information about the way the speaker mentally models whatever he +or she is describing. + +`Foo factor' and `foo quotient' tend to describe something for +which the issue is one of presence or absence. The canonical +example is fudge factor. +It's not important how much you're fudging; the term simply +acknowledges that some fudging is needed. You might talk of +liking a movie for its silliness factor. Quotient tends to imply +that the property is a ratio of two opposing factors: "I would +have won except for my luck quotient." This could also be "I +would have won except for the luck factor", but using +quotient emphasizes that it was bad luck overpowering +good luck (or someone else's good luck overpowering your +own). + +`Foo index' and `coefficient of foo' both tend to imply that +foo is, if not strictly measurable, at least something that can +be larger or smaller. Thus, you might refer to a paper or person +as having a `high bogosity index', whereas you would be less +likely to speak of a `high bogosity factor'. `Foo index' suggests +that foo is a condensation of many quantities, as in the mundane +cost-of-living index; `coefficient of foo' suggests that foo is a +fundamental quantity, as in a coefficient of friction. The choice +between these terms is often one of personal preference; e.g., +some people might feel that bogosity is a fundamental attribute +and thus say `coefficient of bogosity', whereas others might feel +it is a combination of factors and thus say `bogosity index'. + + +Node:cokebottle, Next:cold boot, Previous:coefficient of X, Up:= C = + +cokebottle /kohk'bot-l/ n. + +Any very unusual character, particularly one you can't type +because it isn't on your keyboard. MIT people used to complain +about the `control-meta-cokebottle' commands at SAIL, and SAIL +people complained right back about the `escape-escape-cokebottle' +commands at MIT. After the demise of the space-cadet keyboard, +`cokebottle' faded away as serious usage, but was often invoked +humorously to describe an (unspecified) weird or non-intuitive +keystroke command. It may be due for a second inning, however. +The OSF/Motif window manager, mwm(1), has a reserved +keystroke for switching to the default set of keybindings and +behavior. This keystroke is (believe it or not) +`control-meta-bang' (see bang). Since +the exclamation point looks a lot like an upside down Coke +bottle, Motif hackers have begun referring to this keystroke as +`cokebottle'. See also quadruple +bucky. + + +Node:cold boot, Next:COME FROM, Previous:cokebottle, Up:= C = + +cold boot n. + +See boot. + + +Node:COME FROM, Next:comm mode, Previous:cold boot, Up:= C = + +COME FROM n. + +A semi-mythical language construct dual to the `go to'; +COME FROM <label> would cause the referenced +label to act as a sort of trapdoor, so that if the program ever +reached it control would quietly and automagically be transferred to the +statement following the COME FROM. COME +FROM was first proposed in R. Lawrence Clark's "A +Linguistic Contribution to GOTO-less programming", which appeared +in a 1973 Datamation issue (and +was reprinted in the April 1984 issue of "Communications of the +ACM"). This parodied the then-raging `structured programming' +holy wars (see considered harmful). Mythically, +some variants are the `assigned COME FROM' and the `computed COME +FROM' (parodying some nasty control constructs in FORTRAN and +some extended BASICs). Of course, multi-tasking (or +non-determinism) could be implemented by having more than one +COME FROM statement coming from the same label. + +In some ways the FORTRAN DO looks like a +COME FROM statement. After the terminating statement +number/CONTINUE is reached, control continues at the +statement following the DO. Some generous FORTRANs would allow +arbitrary statements (other than CONTINUE) for the +statement, leading to examples like: + + DO 10 I=1,LIMIT +C imagine many lines of code here, leaving the +C original DO statement lost in the spaghetti... + WRITE(6,10) I,FROB(I) + 10 FORMAT(1X,I5,G10.4) + + +in which the trapdoor is just after the statement labeled 10. +(This is particularly surprising because the label doesn't appear +to have anything to do with the flow of control at all!) + +While sufficiently astonishing to the unsuspecting reader, +this form of COME FROM statement isn't completely +general. After all, control will eventually pass to the following +statement. The implementation of the general form was left to +Univac FORTRAN, ca. 1975 (though a roughly similar feature +existed on the IBM 7040 ten years earlier). The statement +AT 100 would perform a COME FROM 100. +It was intended strictly as a debugging aid, with dire +consequences promised to anyone so deranged as to use it in +production code. More horrible things had already been +perpetrated in production languages, however; doubters need only +contemplate the ALTER verb in COBOL. + +COME FROM was supported under its own name for +the first time 15 years later, in C-INTERCAL (see INTERCAL, retrocomputing); knowledgeable +observers are still reeling from the shock. + + +Node:comm mode, Next:command key, Previous:COME FROM, Up:= C = + +comm mode /kom mohd/ n. + +[ITS: from the feature supporting on-line chat; the term may +spelled with one or two m's] Syn. for talk mode. + + +Node:command key, Next:comment out, Previous:comm mode, Up:= C = + +command key n. + +[Mac users] Syn. feature +key. + + +Node:comment out, Next:Commonwealth Hackish, +Previous:command key, +Up:= C = + +comment out vt. + +To surround a section of code with comment delimiters or to +prefix every line in the section with a comment marker; this +prevents it from being compiled or interpreted. Often done when +the code is redundant or obsolete, but is being left in the +source to make the intent of the active code clearer; also when +the code in that section is broken and you want to bypass it in +order to debug some other part of the code. Compare condition out, usually the preferred +technique in languages (such as C) that +make it possible. + + +Node:Commonwealth Hackish, +Next:compact, Previous:comment out, Up:= C = + +Commonwealth Hackish n. + +Hacker jargon as spoken in English outside the U.S., esp. in +the British Commonwealth. It is reported that Commonwealth +speakers are more likely to pronounce truncations like `char' and +`soc', etc., as spelled (/char/, /sok/), as opposed to American +/keir/ and /sohsh/. Dots in newsgroup names (especially two-component +names) tend to be pronounced more often (so soc.wibble is /sok +dot wib'l/ rather than /sohsh wib'l/). + +Preferred metasyntactic +variables include blurgle, +eek, ook, frodo, and +bilbo; wibble, +wobble, and in emergencies wubble; +flob, banana, tom, +dick, harry, wombat, +frog, fish, womble and so on and on (see foo, sense 4). Alternatives to verb doubling +include suffixes `-o-rama', `frenzy' (as in feeding frenzy), and +`city' (examples: "barf city!" "hack-o-rama!" "core dump +frenzy!"). + +All the generic differences within the anglophone world +inevitably show themselves in the associated hackish dialects. +The Greek letters beta and zeta are usually pronounced /bee't*/ +and /zee't*/; meta may also be pronounced /mee't*/. Various +punctuators (and even letters - Z is called `zed', not `zee') are +named differently: most crucially, for hackish, where Americans +use `parens', `brackets' and `braces' for (), [] and {}, +Commonwealth English uses `brackets', `square brackets' and +`curly brackets', though `parentheses' may be used for the first; +the exclamation mark, `!', is called pling rather than bang and +the pound sign, `#', is called hash; furthermore, the term `the +pound sign' is understood to mean the pound currency symbol (of +course). + +See also attoparsec, calculator, chemist, console jockey, fish, go-faster +stripes, grunge, hakspek, heavy +metal, leaky heap, +lord high fixer, loose bytes, muddie, nadger, +noddy, psychedelicware, plingnet, raster blaster, RTBM, seggie, spod, sun +lounge, terminal +junkie, tick-list +features, weeble, weasel, YABA, +and notes or definitions under Bad +Thing, barf, bogus, bum, chase pointers, cosmic rays, crippleware, crunch, dodgy, +gonk, hamster, hardwarily, mess-dos, nybble, proglet, +root, SEX, +tweak, womble, and xyzzy. + + +Node:compact, Next:compiler jock, Previous:Commonwealth Hackish, Up:= C = + +compact adj. + +Of a design, describes the valuable property that it can all +be apprehended at once in one's head. This generally means the +thing created from the design can be used with greater facility +and fewer errors than an equivalent tool that is not compact. +Compactness does not imply triviality or lack of power; for +example, C is compact and FORTRAN is not, but C is more powerful +than FORTRAN. Designs become non-compact through accreting features and cruft that don't merge cleanly into the overall +design scheme (thus, some fans of Classic C maintain that ANSI C is no +longer compact). + + +Node:compiler jock, Next:compo, Previous:compact, Up:= C += + +compiler jock n. + +See jock (sense 2). + + +Node:compo, Next:compress, Previous:compiler jock, Up:= C = + +compo n. + +[demoscene] Finnish-originated +slang for `competition'. Demo compos are held at a demoparty. The usual protocol is that +several groups make demos for a compo, they are shown on a big +screen, and then the party participants vote for the best one. +Prizes (from sponsors and party entrance fees) are given. +Standard compo formats include intro +compos (4k or 64k demos), music compos, graphics compos, quick +demo compos (build a demo within 4 +hours for example), etc. + + +Node:compress, Next:Compu$erve, Previous:compo, Up:= C += + +compress [Unix] vt. + +When used without a qualifier, generally refers to crunching of a file using a particular C +implementation of compression by Joseph M. Orost et al. and +widely circulated via Usenet; use of +crunch itself in this sense is rare +among Unix hackers. Specifically, compress is built around the +Lempel-Ziv-Welch algorithm as described in "A Technique for High +Performance Data Compression", Terry A. Welch, "IEEE Computer", +vol. 17, no. 6 (June 1984), pp. 8-19. + + +Node:Compu$erve, Next:computer confetti, Previous:compress, Up:= C = + +Compu$erve n. + +See CI$. Synonyms CompuSpend and +Compu$pend are also reported. + + +Node:computer confetti, Next:computer geek, Previous:Compu$erve, Up:= C = + +computer confetti n. + +Syn. chad. Though this term is +common, this use of punched-card chad is not a good idea, as the +pieces are stiff and have sharp corners that could injure the +eyes. GLS reports that he once attended a wedding at MIT during +which he and a few other guests enthusiastically threw chad +instead of rice. The groom later grumbled that he and his bride +had spent most of the evening trying to get the stuff out of +their hair. + + +Node:computer geek, Next:computron, Previous:computer confetti, +Up:= C = + +computer geek n. + +1. One who eats (computer) bugs for a living. One who fulfills +all the dreariest negative stereotypes about hackers: an asocial, +malodorous, pasty-faced monomaniac with all the personality of a +cheese grater. Cannot be used by outsiders without implied insult +to all hackers; compare black-on-black vs. white-on-black usage +of `nigger'. A computer geek may be either a fundamentally +clueless individual or a proto-hacker in larval stage. Also called `turbo nerd', +`turbo geek'. See also propeller +head, clustergeeking, geek out, wannabee, terminal junkie, spod, weenie. 2. +Some self-described computer geeks use this term in a positive +sense and protest sense 1 (this seems to have been a post-1990 +development). For one such argument, see http://www.darkwater.com/omni/geek.html. +See also geek code. + + +Node:computron, Next:con, Previous:computer geek, Up:= C = + +computron /kom'pyoo-tron`/ + +n. 1. [common] A notional unit of computing power combining +instruction speed and storage capacity, dimensioned roughly in +instructions-per-second times megabytes-of-main-store times +megabytes-of-mass-storage. "That machine can't run GNU Emacs, it +doesn't have enough computrons!" This usage is usually found in +metaphors that treat computing power as a fungible commodity +good, like a crop yield or diesel horsepower. See bitty box, Get a real computer!, toy, crank. 2. A +mythical subatomic particle that bears the unit quantity of +computation or information, in much the same way that an electron +bears one unit of electric charge (see also bogon). An elaborate pseudo-scientific theory of +computrons has been developed based on the physical fact that the +molecules in a solid object move more rapidly as it is heated. It +is argued that an object melts because the molecules have lost +their information about where they are supposed to be (that is, +they have emitted computrons). This explains why computers get so +hot and require air conditioning; they use up computrons. +Conversely, it should be possible to cool down an object by +placing it in the path of a computron beam. It is believed that +this may also explain why machines that work at the factory fail +in the computer room: the computrons there have been all used up +by the other hardware. (The popularity of this theory probably +owes something to the "Warlock" stories by Larry Niven, the best +known being "What Good is a Glass Dagger?", in which magic is +fueled by an exhaustible natural resource called `mana'.) + + +Node:con, Next:condition out, Previous:computron, Up:= C = + +con n. + +[from SF fandom] A science-fiction convention. Not used of +other sorts of conventions, such as professional meetings. This +term, unlike many others imported from SF-fan slang, is widely +recognized even by hackers who aren't fans. "We'd been corresponding on the net for +months, then we met face-to-face at a con." + + +Node:condition out, Next:condom, Previous:con, Up:= C += + +condition out vt. + +To prevent a section of code from being compiled by +surrounding it with a conditional-compilation directive whose +condition is always false. The canonical examples of these directives are +#if 0 (or #ifdef notdef, though some +find the latter bletcherous) +and #endif in C. Compare comment out. + + +Node:condom, Next:confuser, Previous:condition out, Up:= C = + +condom n. + +1. The protective plastic bag that accompanies 3.5-inch +microfloppy diskettes. Rarely, also used of (paper) disk +envelopes. Unlike the write protect tab, the condom (when left +on) not only impedes the practice of SEX but has also been shown to have a high failure +rate as drive mechanisms attempt to access the disk -- and can +even fatally frustrate insertion. 2. The protective cladding on a +light pipe. 3. `keyboard +condom': A flexible, transparent plastic cover for a keyboard, +designed to provide some protection against dust and programming fluid without impeding +typing. 4. `elephant condom': the plastic shipping bags used +inside cardboard boxes to protect hardware in transit. 5. n. obs. +A dummy directory /usr/tmp/sh, created to foil the +Great Worm by exploiting a +portability bug in one of its parts. So named in the title of a +_comp.risks_ article by Gene Spafford during the Worm +crisis, and again in the text of "The Internet Worm Program: An +Analysis", Purdue Technical Report CSD-TR-823. + + +Node:confuser, Next:connector conspiracy, Previous:condom, Up:= C = + +confuser n. + +Common soundalike slang for `computer'. Usually encountered in +compounds such as `confuser room', `personal confuser', `confuser +guru'. Usage: silly. + + +Node:connector conspiracy, +Next:cons, Previous:confuser, Up:= C = + +connector conspiracy n. + +[probably came into prominence with the appearance of the +KL-10 (one model of the PDP-10), +none of whose connectors matched anything else] The tendency of +manufacturers (or, by extension, programmers or purveyors of +anything) to come up with new products that don't fit together +with the old stuff, thereby making you buy either all new stuff +or expensive interface devices. The KL-10 Massbus connector was +actually patented by DEC, +which reputedly refused to license the design and thus +effectively locked third parties out of competition for the +lucrative Massbus peripherals market. This policy is a source of +never-ending frustration for the diehards who maintain older +PDP-10 or VAX systems. Their CPUs work fine, but they are stuck +with dying, obsolescent disk and tape drives with low capacity +and high power requirements. + +(A closely related phenomenon, with a slightly different +intent, is the habit manufacturers have of inventing new screw +heads so that only Designated Persons, possessing the magic +screwdrivers, can remove covers and make repairs or install +options. A good 1990s example is the use of Torx screws for +cable-TV set-top boxes. Older Apple Macintoshes took this one +step further, requiring not only a long Torx screwdriver but a +specialized case-cracking tool to open the box.) + +In these latter days of open-systems computing this term has +fallen somewhat into disuse, to be replaced by the observation +that "Standards are great! There are so many of them to choose +from!" Compare backward +combatability. + + +Node:cons, Next:considered harmful, Previous:connector +conspiracy, Up:= C = + + +cons /konz/ or /kons/ + +[from LISP] 1. vt. To add a new element to a specified list, +esp. at the top. "OK, cons picking a replacement for the console +TTY onto the agenda." 2. `cons up': vt. To synthesize from +smaller pieces: "to cons up an example". + +In LISP itself, cons is the most fundamental +operation for building structures. It takes any two objects and +returns a `dot-pair' or two-branched tree with one object hanging +from each branch. Because the result of a cons is an object, it +can be used to build binary trees of any shape and complexity. +Hackers think of it as a sort of universal constructor, and that +is where the jargon meanings spring from. + + +Node:considered harmful, +Next:console, Previous:cons, Up:= C = + +considered harmful adj. + +[very common] Edsger W. Dijkstra's note in the March 1968 +"Communications of the ACM", "Goto Statement Considered Harmful", +fired the first salvo in the structured programming wars (text at +http://www.acm.org/classics). +Amusingly, the ACM considered the resulting acrimony sufficiently +harmful that it will (by policy) no longer print an article +taking so assertive a position against a coding practice. (Years +afterwards, a contrary view was uttered in a CACM letter called, +inevitably, "`Goto considered harmful' considered harmful'"'. In +the ensuing decades, a large number of both serious papers and +parodies have borne titles of the form "X considered Y". The +structured-programming wars eventually blew over with the +realization that both sides were wrong, but use of such titles +has remained as a persistent minor in-joke (the `considered +silly' found at various places in this lexicon is related). + + +Node:console, Next:console jockey, Previous:considered harmful, +Up:= C = + +console n. + +1. The operator's station of a mainframe. In times past, this was a +privileged location that conveyed godlike powers to anyone with +fingers on its keys. Under Unix and other modern timesharing +OSes, such privileges are guarded by passwords instead, and the +console is just the tty the system was +booted from. Some of the mystique remains, however, and it is +traditional for sysadmins to post urgent messages to all users +from the console (on Unix, /dev/console). 2. On microcomputer +Unix boxes, the main screen and keyboard (as opposed to +character-only terminals talking to a serial port). Typically +only the console can do real graphics or run X. + + +Node:console jockey, Next:content-free, Previous:console, Up:= C = + +console jockey n. + +See terminal +junkie. + + +Node:content-free, Next:control-C, Previous:console jockey, Up:= C = + +content-free adj. + +[by analogy with techspeak `context-free'] Used of a message +that adds nothing to the recipient's knowledge. Though this +adjective is sometimes applied to flamage, it more usually connotes derision for +communication styles that exalt form over substance or are +centered on concerns irrelevant to the subject ostensibly at +hand. Perhaps most used with reference to speeches by company +presidents and other professional manipulators. "Content-free? +Uh... that's anything printed on glossy paper." +(See also four-color +glossies.) "He gave a talk on the implications of +electronic networks for postmodernism and the fin-de-siecle +aesthetic. It was content-free." + + +Node:control-C, Next:control-O, Previous:content-free, Up:= C = + +control-C vi. + +1. "Stop whatever you are doing." From the interrupt character +used on many operating systems to abort a running program. +Considered silly. 2. interj. Among BSD Unix hackers, the +canonical humorous response to "Give me a break!" + + +Node:control-O, Next:control-Q, Previous:control-C, Up:= C = + +control-O vi. + +"Stop talking." From the character used on some operating +systems to abort output but allow the program to keep on running. +Generally means that you are not interested in hearing anything +more from that person, at least on that topic; a standard +response to someone who is flaming. Considered silly. Compare +control-S. + + +Node:control-Q, Next:control-S, Previous:control-O, Up:= C = + +control-Q vi. + +"Resume." From the ASCII DC1 or XON +character (the pronunciation /X-on/ is therefore also used), used +to undo a previous control-S. + + +Node:control-S, Next:Conway's Law, Previous:control-Q, Up:= C = + +control-S vi. + +"Stop talking for a second." From the ASCII DC3 or XOFF +character (the pronunciation /X-of/ is therefore also used). +Control-S differs from control-O +in that the person is asked to stop talking (perhaps because you +are on the phone) but will be allowed to continue when you're +ready to listen to him -- as opposed to control-O, which has more +of the meaning of "Shut up." Considered silly. + + +Node:Conway's Law, Next:cookbook, Previous:control-S, Up:= C = + +Conway's Law prov. + +The rule that the organization of the software and the +organization of the software team will be congruent; commonly +stated as "If you have four groups working on a compiler, you'll +get a 4-pass compiler". The original statement was more general, +"Organizations which design systems are constrained to produce +designs which are copies of the communication structures of these +organizations." This first appeared in the April 1968 issue of +Datamation. Compare SNAFU principle. + +The law was named after Melvin Conway, an early proto-hacker +who wrote an assembler for the Burroughs 220 called SAVE. (The +name `SAVE' didn't stand for anything; it was just that you lost +fewer card decks and listings because they all had SAVE written +on them.) + +There is also Tom Cheatham's amendment of Conway's Law: "If a +group of N persons implements a COBOL compiler, there will be N-1 +passes. Someone in the group has to be the manager." + + +Node:cookbook, Next:cooked mode, Previous:Conway's Law, Up:= C = + +cookbook n. + +[from amateur electronics and radio] A book of small code +segments that the reader can use to do various magic things in programs. One current example is +the "PostScript Language +Tutorial and Cookbook" by Adobe Systems, Inc (Addison-Wesley, +ISBN 0-201-10179-3), also known as the Blue Book which has recipes for things +like wrapping text around arbitrary curves and making 3D fonts. +Cookbooks, slavishly followed, can lead one into voodoo programming, but are +useful for hackers trying to monkey +up small programs in unknown languages. This function is +analogous to the role of phrasebooks in human languages. + + +Node:cooked mode, Next:cookie, Previous:cookbook, Up:= +C = + +cooked mode n. + +[Unix, by opposition from raw +mode] The normal character-input mode, with interrupts +enabled and with erase, kill and other special-character +interpretations performed directly by the tty driver. Oppose +raw mode, rare mode. This term is techspeak under +Unix but jargon elsewhere; other operating systems often have +similar mode distinctions, and the raw/rare/cooked way of +describing them has spread widely along with the C language and +other Unix exports. Most generally, `cooked mode' may refer to +any mode of a system that does extensive preprocessing before +presenting data to a program. + + +Node:cookie, Next:cookie bear, Previous:cooked mode, Up:= C = + +cookie n. + +A handle, transaction ID, or other token of agreement between +cooperating programs. "I give him a packet, he gives me back a +cookie." The claim check you get from a dry-cleaning shop is a +perfect mundane example of a cookie; the only thing it's useful +for is to relate a later transaction to this one (so you get the +same clothes back). Compare magic +cookie; see also fortune +cookie. Now mainstream in the specific sense of +web-browser cookies. + + +Node:cookie bear, Next:cookie file, Previous:cookie, Up:= +C = + +cookie bear n. obs. + +Original term, pre-Sesame-Street, for what is now universally +called a cookie monster. A +correspondent observes "In those days, hackers were actually +getting their yucks from...sit down +now...Andy Williams. Yes, that Andy +Williams. Seems he had a rather hip (by the standards of the day) +TV variety show. One of the best parts of the show was the +recurring `cookie bear' sketch. In these sketches, a guy in a +bear suit tried all sorts of tricks to get a cookie out of +Williams. The sketches would always end with Williams shrieking +(and I don't mean figuratively), `No cookies! Not now, not +ever...NEVER!!!' And the bear would fall down. +Great stuff." + + +Node:cookie file, Next:cookie jar, Previous:cookie bear, Up:= C = + +cookie file n. + +A collection of fortune +cookies in a format that facilitates retrieval by a +fortune program. There are several different cookie files in +public distribution, and site admins often assemble their own +from various sources including this lexicon. + + +Node:cookie jar, Next:cookie monster, Previous:cookie file, Up:= C = + +cookie jar n. + +An area of memory set aside for storing cookies. Most commonly heard in the Atari ST +community; many useful ST programs record their presence by +storing a distinctive magic +number in the jar. Programs can inquire after the +presence or otherwise of other programs by searching the contents +of the jar. + + +Node:cookie monster, Next:copious free time, +Previous:cookie jar, +Up:= C = + +cookie monster n. + +[from the children's TV program "Sesame Street"] Any of a +family of early (1970s) hacks reported on TOPS-10, ITS, Multics, and elsewhere that would lock up +either the victim's terminal (on a time-sharing machine) or the +console (on a batch mainframe), repeatedly demanding "I WANT A +COOKIE". The required responses ranged in complexity from +"COOKIE" through "HAVE A COOKIE" and upward. Folklorist Jan +Brunvand (see FOAF) has described +these programs as urban legends (implying they probably never +existed) but they existed, all right, in several different +versions. See also wabbit. +Interestingly, the term `cookie monster' appears to be a retcon; the original term was cookie bear. + + +Node:copious free time, +Next:copper, Previous:cookie monster, Up:= C = + +copious free time n. + +[Apple; orig. fr. the intro to Tom Lehrer's song "It Makes A +Fellow Proud To Be A Soldier"] 1. [used ironically to indicate +the speaker's lack of the quantity in question] A mythical +schedule slot for accomplishing tasks held to be unlikely or +impossible. Sometimes used to indicate that the speaker is +interested in accomplishing the task, but believes that the +opportunity will not arise. "I'll implement the automatic layout +stuff in my copious free time." 2. [Archly] Time reserved for +bogus or otherwise idiotic tasks, such as implementation of chrome, or the stroking of suits. "I'll get back to him on that feature in +my copious free time." + + +Node:copper, Next:copy protection, Previous:copious free time, +Up:= C = + +copper n. + +Conventional electron-carrying network cable with a core +conductor of copper -- or aluminum! Opposed to light pipe or, say, a short-range +microwave link. + + +Node:copy protection, Next:copybroke, Previous:copper, Up:= C = + +copy protection n. + +A class of methods for preventing incompetent pirates from +stealing software and legitimate customers from using it. +Considered silly. + + +Node:copybroke, Next:copycenter, Previous:copy protection, Up:= C = + +copybroke /kop'ee-brohk/ adj. + +1. [play on `copyright'] Used to describe an instance of a +copy-protected program that has been `broken'; that is, a copy +with the copy-protection scheme disabled. Syn. copywronged. 2. Copy-protected software +which is unusable because of some bit-rot or bug that has +confused the anti-piracy check. See also copy protection. + + +Node:copycenter, Next:copyleft, Previous:copybroke, Up:= C = + +copycenter n. + +[play on `copyright' and `copyleft'] 1. The copyright notice +carried by the various flavors of freeware BSD. According to Kirk +McKusick at BSDCon 1999: "The way it was characterized +politically, you had copyright, which is what the big companies +use to lock everything up; you had copyleft, which is free +software's way of making sure they can't lock it up; and then +Berkeley had what we called "copycenter", which is "take it down +to the copy center and make as many copies as you want". + + +Node:copyleft, Next:copyparty, Previous:copycenter, Up:= C = + +copyleft /kop'ee-left/ n. + +[play on `copyright'] 1. The copyright notice (`General Public +License') carried by GNU EMACS and other Free Software Foundation +software, granting reuse and reproduction rights to all comers +(but see also General +Public Virus). 2. By extension, any copyright notice +intended to achieve similar aims. + + +Node:copyparty, Next:copywronged, Previous:copyleft, Up:= +C = + +copyparty n. + +[C64/amiga demoscene ]A +computer party organized so demosceners can meet other in real +life, and to facilitate software copying (mostly pirated +software). The copyparty has become less common as the Internet +makes communication easier. The demoscene has gradually evolved +the demoparty to replace it. + + +Node:copywronged, Next:core, Previous:copyparty, Up:= C = + +copywronged /kop'ee-rongd/ adj. + +[play on `copyright'] Syn. for copybroke. + + +Node:core, Next:core cancer, Previous:copywronged, Up:= C = + +core n. + +Main storage or RAM. Dates from the days of ferrite-core +memory; now archaic as techspeak most places outside IBM, but +also still used in the Unix community and by old-time hackers or +those who would sound like them. Some derived idioms are quite +current; `in core', for example, means `in memory' (as opposed to +`on disk'), and both core dump +and the `core image' or `core file' produced by one are terms in +favor. Some varieties of Commonwealth hackish prefer store. + + +Node:core cancer, Next:core dump, Previous:core, Up:= C += + +core cancer n. + +[rare] A process that exhibits a slow but inexorable resource +leak -- like a cancer, it kills by +crowding out productive `tissue'. + + +Node:core dump, Next:core leak, Previous:core cancer, Up:= C = + +core dump n. + +[common Iron Age jargon, +preserved by Unix] 1. [techspeak] A copy of the contents of core, produced when a process is aborted by +certain kinds of internal error. 2. By extension, used for humans +passing out, vomiting, or registering extreme shock. "He dumped +core. All over the floor. What a mess." "He heard about X and +dumped core." 3. Occasionally used for a human rambling on +pointlessly at great length; esp. in apology: "Sorry, I dumped +core on you". 4. A recapitulation of knowledge (compare bits, sense 1). Hence, spewing all one knows +about a topic (syn. brain +dump), esp. in a lecture or answer to an exam question. +"Short, concise answers are better than core dumps" (from the +instructions to an exam at Columbia). See core. + + +Node:core leak, Next:Core Wars, Previous:core dump, Up:= C = + +core leak n. + +Syn. memory leak. + + +Node:Core Wars, Next:corge, Previous:core leak, Up:= C = + +Core Wars n. + +A game between `assembler' programs in a machine or machine +simulator, where the objective is to kill your opponent's program +by overwriting it. Popularized in the 1980s by A. K. Dewdney's +column in "Scientific American" magazine, but described in +"Software Practice And Experience" a decade earlier. The game was +actually devised and played by Victor Vyssotsky, Robert Morris +Sr., and Doug McIlroy in the early 1960s (Dennis Ritchie is +sometimes incorrectly cited as a co-author, but was not +involved). Their original game was called `Darwin' and ran on a +IBM 7090 at Bell Labs. See core. For +information on the modern game, do a web search for the +`rec.games.corewar FAQ' or surf to the King Of The Hill site. + + +Node:corge, Next:cosmic rays, Previous:Core Wars, Up:= C = + +corge /korj/ n. + +[originally, the name of a cat] Yet another metasyntactic variable, +invented by Mike Gallaher and propagated by the GOSMACS documentation. See grault. + + +Node:cosmic rays, Next:cough and die, Previous:corge, Up:= C = + +cosmic rays n. + +Notionally, the cause of bit +rot. However, this is a semi-independent usage that may +be invoked as a humorous way to handwave away any minor randomness that doesn't seem worth the +bother of investigating. "Hey, Eric -- I just got a burst of +garbage on my tube, where did that +come from?" "Cosmic rays, I guess." Compare sunspots, phase of the moon. The British +seem to prefer the usage `cosmic showers'; `alpha particles' is +also heard, because stray alpha particles passing through a +memory chip can cause single-bit errors (this becomes +increasingly more likely as memory sizes and densities +increase). + +Factual note: Alpha particles cause bit rot, cosmic rays do +not (except occasionally in spaceborne computers). Intel could +not explain random bit drops in their early chips, and one +hypothesis was cosmic rays. So they created the World's Largest +Lead Safe, using 25 tons of the stuff, and used two identical +boards for testing. One was placed in the safe, one outside. The +hypothesis was that if cosmic rays were causing the bit drops, +they should see a statistically significant difference between +the error rates on the two boards. They did not observe such a +difference. Further investigation demonstrated conclusively that +the bit drops were due to alpha particle emissions from thorium +(and to a much lesser degree uranium) in the encapsulation +material. Since it is impossible to eliminate these radioactives +(they are uniformly distributed through the earth's crust, with +the statistically insignificant exception of uranium lodes) it +became obvious that one has to design memories to withstand these +hits. + + +Node:cough and die, Next:courier, Previous:cosmic rays, Up:= C = + +cough and die v. + +Syn. barf. Connotes that the +program is throwing its hands up by design rather than because of +a bug or oversight. "The parser saw a control-A in its input +where it was looking for a printable, so it coughed and died." +Compare die, die horribly, scream and die. + + +Node:courier, Next:cow orker, Previous:cough and die, Up:= C = + +courier + +[BBS & cracker cultures] A person who distributes newly +cracked warez, as opposed to a server who makes them available for +download or a leech who merely +downloads them. Hackers recognize this term but don't use it +themselves, as the act is not part of their culture. See also +warez d00dz, cracker, elite. + + +Node:cow orker, Next:cowboy, Previous:courier, Up:= C += + +cow orker n. + +[Usenet] n. fortuitous typo for co-worker, widely used in +Usenet, with perhaps a hint that orking cows is illegal. This +term was popularized by Scott Adams (the creator of Dilbert) but already appears in the January +1996 version of the scary +devil monastery FAQ. There are plausible reports that it +was in use on _talk.bizarre_ as early as 1992. Compare hing, grilf, +filk, newsfroup. + + +Node:cowboy, Next:CP/M, Previous:cow orker, Up:= C = + +cowboy n. + +[Sun, from William Gibson's cyberpunk SF] Synonym for hacker. It is reported that at Sun this word is +often said with reverence. + + +Node:CP/M, Next:CPU Wars, Previous:cowboy, Up:= C += + +CP/M /C-P-M/ n. + +[Control Program/Monitor; later retconned to Control Program for +Microcomputers] An early microcomputer OS written by hacker Gary Kildall for 8080- and +Z80-based machines, very popular in the late 1970s but virtually +wiped out by MS-DOS after the release of the IBM PC in 1981. +Legend has it that Kildall's company blew its chance to write the +OS for the IBM PC because Kildall decided to spend a day IBM's +reps wanted to meet with him enjoying the perfect flying weather +in his private plane. Many of CP/M's features and conventions +strongly resemble those of early DEC +operating systems such as TOPS-10, +OS/8, RSTS, and RSX-11. See MS-DOS, +operating system. + + +Node:CPU Wars, Next:crack, Previous:CP/M, Up:= C += + +CPU Wars /C-P-U worz/ n. + +A 1979 large-format comic by Chas Andres chronicling the +attempts of the brainwashed androids of IPM (Impossible to +Program Machines) to conquer and destroy the peaceful denizens of +HEC (Human Engineered Computers). This rather transparent +allegory featured many references to ADVENT and the immortal line "Eat flaming +death, minicomputer mongrels!" (uttered, of course, by an IPM +stormtrooper). The whole shebang is now available on the +Web. + +It is alleged that the author subsequently received a letter +of appreciation on IBM company stationery from the head of IBM's +Thomas J. Watson Research Laboratories (then, as now, one of the +few islands of true hackerdom in the IBM archipelago). The lower +loop of the B in the IBM logo, it is said, had been carefully +whited out. See eat flaming +death. + + +Node:crack, Next:crack root, Previous:CPU Wars, Up:= C = + +crack + +[warez d00dz] 1. v. To break into a system (compare cracker). 2. v. Action of removing the +copy protection from a commercial program. People who write +cracks consider themselves challenged by the copy protection +measures. They will often do it as much to show that they are +smarter than the developper who designed the copy protection +scheme than to actually copy the program. 3. n. A program, +instructions or patch used to remove the copy protection of a +program or to uncripple features from a demo/time limited +program. 4. An exploit. + + +Node:crack root, Next:cracker, Previous:crack, Up:= C += + +crack root v. + +[very common] To defeat the security system of a Unix machine +and gain root privileges thereby; see +cracking. + + +Node:cracker, Next:cracking, Previous:crack root, Up:= C = + +cracker n. + +One who breaks security on a system. Coined ca. 1985 by +hackers in defense against journalistic misuse of hacker (q.v., sense 8). An earlier attempt to +establish `worm' in this sense around 1981-82 on Usenet was +largely a failure. + +Use of both these neologisms reflects a strong revulsion +against the theft and vandalism perpetrated by cracking rings. +While it is expected that any real hacker will have done some +playful cracking and knows many of the basic techniques, anyone +past larval stage is +expected to have outgrown the desire to do so except for +immediate, benign, practical reasons (for example, if it's +necessary to get around some security in order to get some work +done). + +Thus, there is far less overlap between hackerdom and +crackerdom than the mundane reader +misled by sensationalistic journalism might expect. Crackers tend +to gather in small, tight-knit, very secretive groups that have +little overlap with the huge, open poly-culture this lexicon +describes; though crackers often like to describe +themselves as hackers, most true hackers consider them a +separate and lower form of life. + +Ethical considerations aside, hackers figure that anyone who +can't imagine a more interesting way to play with their computers +than breaking into someone else's has to be pretty losing. Some other reasons crackers are looked +down on are discussed in the entries on cracking and phreaking. See also samurai, dark-side hacker, and hacker ethic. For a portrait of the +typical teenage cracker, see warez +d00dz. + + +Node:cracking, Next:crank, Previous:cracker, Up:= C += + +cracking n. + +[very common] The act of breaking into a computer system; what +a cracker does. Contrary to +widespread myth, this does not usually involve some mysterious +leap of hackerly brilliance, but rather persistence and the +dogged repetition of a handful of fairly well-known tricks that +exploit common weaknesses in the security of target systems. +Accordingly, most crackers are only mediocre hackers. + + +Node:crank, Next:crapplet, Previous:cracking, Up:= +C = + +crank vt. + +[from automotive slang] Verb used to describe the performance +of a machine, especially sustained performance. "This box cranks +(or, cranks at) about 6 megaflops, with a burst mode of twice +that on vectorized operations." + + +Node:crapplet, Next:CrApTeX, Previous:crank, Up:= C += + +crapplet n. + +[portmanteau, crap + applet] A worthless applet, esp. a Java +widget attached to a web page that doesn't work or even crashes +your browser. Also spelled `craplet'. + + +Node:CrApTeX, Next:crash, Previous:crapplet, Up:= +C = + +CrApTeX /krap'tekh/ n. + +[University of York, England] Term of abuse used to describe +TeX and LaTeX when they don't work (when used by TeXhackers), or +all the time (by everyone else). The non-TeX-enthusiasts +generally dislike it because it is more verbose than other +formatters (e.g. troff) and because +(particularly if the standard Computer Modern fonts are used) it +generates vast output files. See religious issues, TeX. + + +Node:crash, Next:crash and burn, Previous:CrApTeX, Up:= C = + +crash + +1. n. A sudden, usually drastic failure. Most often said of +the system (q.v., sense 1), esp. of +magnetic disk drives (the term originally described what happens +when the air gap of a hard disk collapses). "Three lusers lost their files in last night's disk +crash." A disk crash that involves the read/write heads dropping +onto the surface of the disks and scraping off the oxide may also +be referred to as a `head crash', whereas the term `system crash' +usually, though not always, implies that the operating system or +other software was at fault. 2. v. To fail suddenly. "Has the +system just crashed?" "Something crashed the OS!" See down. Also used transitively to indicate the +cause of the crash (usually a person or a program, or both). +"Those idiots playing SPACEWAR +crashed the system." 3. vi. Sometimes said of people hitting the +sack after a long hacking +run; see gronk out. + + +Node:crash and burn, Next:crawling horror, +Previous:crash, Up:= C = + +crash and burn vi.,n. + +A spectacular crash, in the mode of the conclusion of the +car-chase scene in the movie "Bullitt" and many subsequent +imitators (compare die +horribly). Sun-3 monitors losing the flyback transformer +and lightning strikes on VAX-11/780 backplanes are notable crash +and burn generators. The construction `crash-and-burn machine' is +reported for a computer used exclusively for alpha or beta testing, or reproducing bugs (i.e., not for +development). The implication is that it wouldn't be such a +disaster if that machine crashed, since only the testers would be +inconvenienced. + + +Node:crawling horror, Next:cray, Previous:crash and burn, Up:= C = + +crawling horror n. + +Ancient crufty hardware or software that is kept obstinately +alive by forces beyond the control of the hackers at a site. Like +dusty deck or gonkulator, but connotes that the thing +described is not just an irritation but an active menace to +health and sanity. "Mostly we code new stuff in C, but they pay +us to maintain one big FORTRAN II application from +nineteen-sixty-X that's a real crawling +horror...." Compare WOMBAT. + + +Node:cray, Next:cray instability, Previous:crawling horror, Up:= C = + +cray /kray/ n. + +1. (properly, capitalized) One of the line of supercomputers +designed by Cray Research. 2. Any supercomputer at all. 3. The +canonical number-crunching machine. + +The term is actually the lowercased last name of Seymour Cray, +a noted computer architect and co-founder of the company. +Numerous vivid legends surround him, some true and some +admittedly invented by Cray Research brass to shape their +corporate culture and image. + + +Node:cray instability, Next:crayola, Previous:cray, Up:= C = + +cray instability n. + +1. A shortcoming of a program or algorithm that manifests +itself only when a large problem is being run on a powerful +machine (see cray). Generally more +subtle than bugs that can be detected in smaller problems running +on a workstation or mini. 2. More specifically, a shortcoming of +algorithms which are well behaved when run on gentle floating +point hardware (such as IEEE-standard or PDP-series machines) but +which break down badly when exposed to a Cray's unique `rounding' +rules. + + +Node:crayola, Next:crayola books, Previous:cray instability, Up:= C = + +crayola /kray-oh'l*/ n. + +A super-mini or -micro computer that provides some reasonable +percentage of supercomputer performance for an unreasonably low +price. Might also be a killer +micro. + + +Node:crayola books, Next:crayon, Previous:crayola, Up:= C = + +crayola books n. + +The rainbow series of +National Computer Security Center (NCSC) computer security +standards (see Orange Book). +Usage: humorous and/or disparaging. + + +Node:crayon, Next:creationism, Previous:crayola books, Up:= C = + +crayon n. + +1. Someone who works on Cray supercomputers. More +specifically, it implies a programmer, probably of the CDC ilk, +probably male, and almost certainly wearing a tie (irrespective +of gender). Systems types who have a Unix background tend not to +be described as crayons. 2. Formerly, anyone who worked for Cray +Research; since the buyout by SGI, anyone they inherited from +Cray. 3. A computron (sense 2) +that participates only in number-crunching. 4. A unit of +computational power equal to that of a single Cray-1. There is a +standard joke about this usage that derives from an old Crayola +crayon promotional gimmick: When you buy 64 crayons you get a +free sharpener. + + +Node:creationism, Next:creep, Previous:crayon, Up:= C += + +creationism n. + +The (false) belief that large, innovative software designs can +be completely specified in advance and then painlessly magicked +out of the void by the normal efforts of a team of normally +talented programmers. In fact, experience has shown repeatedly +that good designs arise only from evolutionary, exploratory +interaction between one (or at most a small handful of) +exceptionally able designer(s) and an active user population -- +and that the first try at a big new idea is always wrong. +Unfortunately, because these truths don't fit the planning models +beloved of management, they are +generally ignored. + + +Node:creep, Next:creeping elegance, Previous:creationism, Up:= C = + +creep v. + +To advance, grow, or multiply inexorably. In hackish usage +this verb has overtones of menace and silliness, evoking the +creeping horrors of low-budget monster movies. + + +Node:creeping elegance, Next:creeping featurism, +Previous:creep, Up:= C = + +creeping elegance n. + +Describes a tendency for parts of a design to become elegant past the point of diminishing +return, something which often happens at the expense of the less +interesting parts of the design, the schedule, and other things +deemed important in the Real +World. See also creeping featurism, second-system effect, tense. + + +Node:creeping featurism, +Next:creeping +featuritis, Previous:creeping elegance, Up:= C = + +creeping featurism /kree'ping fee'chr-izm/ n. + +[common] 1. Describes a systematic tendency to load more chrome and features onto systems at the expense of +whatever elegance they may have possessed when originally +designed. See also feeping +creaturism. "You know, the main problem with BSD Unix has always been creeping featurism." 2. +More generally, the tendency for anything complicated to become +even more complicated because people keep saying "Gee, it would +be even better if it had this feature too". (See feature.) The result is usually a patchwork +because it grew one ad-hoc step at a time, rather than being +planned. Planning is a lot of work, but it's easy to add just one +extra little feature to help someone ... and then +another ... and another.... When +creeping featurism gets out of hand, it's like a cancer. Usually +this term is used to describe computer programs, but it could +also be said of the federal government, the IRS 1040 form, and +new cars. A similar phenomenon sometimes afflicts conscious +redesigns; see second-system +effect. See also creeping elegance. + + +Node:creeping featuritis, +Next:cretin, Previous:creeping featurism, +Up:= C = + +creeping featuritis /kree'ping fee'-chr-i:`t*s/ n. + +Variant of creeping +featurism, with its own spoonerization: `feeping +creaturitis'. Some people like to reserve this form for the +disease as it actually manifests in software or hardware, as +opposed to the lurking general tendency in designers' minds. +(After all, -ism means `condition' or `pursuit of', whereas -itis +usually means `inflammation of'.) + + +Node:cretin, Next:cretinous, Previous:creeping featuritis, Up:= C = + +cretin /kret'in/ or /kree'tn/ n. + +Congenital loser; an obnoxious +person; someone who can't do anything right. It has been observed +that many American hackers tend to favor the British +pronunciation /kret'in/ over standard American /kree'tn/; it is +thought this may be due to the insidious phonetic influence of +Monty Python's Flying Circus. + + +Node:cretinous, Next:crippleware, Previous:cretin, Up:= C += + +cretinous /kret'n-*s/ or /kreet'n-*s/ adj. + +Wrong; stupid; non-functional; very poorly designed. Also used +pejoratively of people. See dread high-bit disease for +an example. Approximate synonyms: bletcherous, bagbiting losing, brain-damaged. + + +Node:crippleware, Next:critical mass, Previous:cretinous, Up:= C = + +crippleware n. + +1. [common] Software that has some important functionality +deliberately removed, so as to entice potential users to pay for +a working version. 2. [Cambridge] Variety of guiltware that exhorts you to donate to some +charity (compare careware, nagware). 3. Hardware deliberately +crippled, which can be upgraded to a more expensive model by a +trivial change (e.g., cutting a jumper). + +An excellent example of crippleware (sense 3) is Intel's 486SX +chip, which is a standard 486DX chip with the co-processor diked +out (in some early versions it was present but disabled). To +upgrade, you buy a complete 486DX chip with working +co-processor (its identity thinly veiled by a different pinout) +and plug it into the board's expansion socket. It then disables +the SX, which becomes a fancy power sink. Don't you love +Intel? + + +Node:critical mass, Next:crlf, Previous:crippleware, Up:= C = + +critical mass n. + +In physics, the minimum amount of fissionable material +required to sustain a chain reaction. Of a software product, +describes a condition of the software such that fixing one bug +introduces one plus epsilon bugs. +(This malady has many causes: creeping featurism, ports to too +many disparate environments, poor initial design, etc.) When +software achieves critical mass, it can never be fixed; it can +only be discarded and rewritten. + + +Node:crlf, Next:crock, Previous:critical mass, Up:= C = + +crlf /ker'l*f/, sometimes /kru'l*f/ or /C-R-L-F/ n. + +(often capitalized as `CRLF') A carriage return (CR, ASCII +0001101) followed by a line feed (LF, ASCII 0001010). More +loosely, whatever it takes to get you from the end of one line of +text to the beginning of the next line. See newline, terpri. +Under Unix influence this usage has +become less common (Unix uses a bare line feed as its +`CRLF'). + + +Node:crock, Next:cross-post, Previous:crlf, Up:= C = + + +crock n. + +[from the American scatologism `crock of shit'] 1. An awkward +feature or programming technique that ought to be made cleaner. +For example, using small integers to represent error codes +without the program interpreting them to the user (as in, for +example, Unix make(1), which returns code 139 for a +process that dies due to segfault). 2. A technique that works +acceptably, but which is quite prone to failure if disturbed in +the least. For example, a too-clever programmer might write an +assembler which mapped instruction mnemonics to numeric opcodes +algorithmically, a trick which depends far too intimately on the +particular bit patterns of the opcodes. (For another example of +programming with a dependence on actual opcode values, see The Story of Mel in +Appendix A.) Many crocks have a tightly woven, almost completely +unmodifiable structure. See kluge, +brittle. The adjectives `crockish' +and `crocky', and the nouns `crockishness' and `crockitude', are +also used. + + +Node:cross-post, Next:crossload, Previous:crock, Up:= C += + +cross-post vi. + +[Usenet; very common] To post a single article simultaneously +to several newsgroups. Distinguished from posting the article +repeatedly, once to each newsgroup, which causes people to see it +multiple times (which is very bad form). Gratuitous cross-posting +without a Followup-To line directing responses to a single +followup group is frowned upon, as it tends to cause followup articles to go to inappropriate +newsgroups when people respond to only one part of the original +posting. + + +Node:crossload, Next:crudware, Previous:cross-post, Up:= C = + +crossload v.,n. + +[proposed, by analogy with upload +and download] To move files +between machines on a peer-to-peer network of nodes that act as +both servers and clients for a distributed file store. Esp. +appropriate for ananonymized networks like Gnutella and +Freenet. + + +Node:crudware, Next:cruft, Previous:crossload, Up:= C = + +crudware /kruhd'weir/ n. + +Pejorative term for the hundreds of megabytes of low-quality +freeware circulated by user's +groups and BBS systems in the micro-hobbyist world. "Yet +another set of disk catalog utilities for MS-DOS? What crudware!" + + +Node:cruft, Next:cruft together, Previous:crudware, Up:= C = + +cruft /kruhft/ + +[very common; back-formation from crufty] 1. n. An unpleasant substance. The dust +that gathers under your bed is cruft; the TMRC Dictionary +correctly noted that attacking it with a broom only produces +more. 2. n. The results of shoddy construction. 3. vt. [from +`hand cruft', pun on `hand craft'] To write assembler code for +something normally (and better) done by a compiler (see hand-hacking). 4. n. Excess; +superfluous junk; used esp. of redundant or superseded code. 5. +[University of Wisconsin] n. Cruft is to hackers as gaggle is to +geese; that is, at UW one properly says "a cruft of hackers". + + +Node:cruft together, Next:cruftsmanship, Previous:cruft, Up:= C = + +cruft together vt. + +(also `cruft up') To throw together something ugly but +temporarily workable. Like vt. kluge +up, but more pejorative. "There isn't any program now to +reverse all the lines of a file, but I can probably cruft one +together in about 10 minutes." See hack together, hack up, kluge +up, crufty. + + +Node:cruftsmanship, Next:crufty, Previous:cruft together, Up:= C = + +cruftsmanship /kruhfts'm*n-ship / n. + +[from cruft] The antithesis of +craftsmanship. + + +Node:crufty, Next:crumb, Previous:cruftsmanship, Up:= C = + +crufty /kruhf'tee/ adj. + +[very common; origin unknown; poss. from `crusty' or `cruddy'] +1. Poorly built, possibly over-complex. The canonical example is "This is standard old +crufty DEC software". In fact, one +fanciful theory of the origin of `crufty' holds that was +originally a mutation of `crusty' applied to DEC software so old +that the `s' characters were tall and skinny, looking more like +`f' characters. 2. Unpleasant, especially to the touch, often +with encrusted junk. Like spilled coffee smeared with peanut +butter and catsup. 3. Generally unpleasant. 4. (sometimes spelled +`cruftie') n. A small crufty object (see frob); often one that doesn't fit well into the +scheme of things. "A LISP property list is a good place to store +crufties (or, collectively, random +cruft)." + +This term is one of the oldest in the jargon and no one is +sure of its etymology, but it is suggestive that there is a Cruft +Hall at Harvard University which is part of the old physics +building; it's said to have been the physics department's radar +lab during WWII. To this day (early 1993) the windows appear to +be full of random techno-junk. MIT or Lincoln Labs people may +well have coined the term as a knock on the competition. + + +Node:crumb, Next:crunch, Previous:crufty, Up:= C += + +crumb n. + +Two binary digits; a quad. Larger +than a bit, smaller than a nybble. Considered silly. Syn. tayste. General discussion of such terms is +under nybble. + + +Node:crunch, Next:cryppie, Previous:crumb, Up:= C += + +crunch 1. vi. + +To process, usually in a time-consuming or complicated way. +Connotes an essentially trivial operation that is nonetheless +painful to perform. The pain may be due to the triviality's being +embedded in a loop from 1 to 1,000,000,000. "FORTRAN programs do +mostly number-crunching." +2. vt. To reduce the size of a file by a complicated scheme that +produces bit configurations completely unrelated to the original +data, such as by a Huffman code. (The file ends up looking +something like a paper document would if somebody crunched the +paper into a wad.) Since such compression usually takes more +computations than simpler methods such as run-length encoding, +the term is doubly appropriate. (This meaning is usually used in +the construction `file crunch(ing)' to distinguish it from number-crunching.) See compress. 3. n. The character +#. Used at XEROX and CMU, among other places. See +ASCII. 4. vt. To squeeze program +source into a minimum-size representation that will still compile +or execute. The term came into being specifically for a famous +program on the BBC micro that crunched BASIC source in order to +make it run more quickly (it was a wholly interpretive BASIC, so +the number of characters mattered). Obfuscated C Contest entries +are often crunched; see the first example under that entry. + + +Node:cryppie, Next:CTSS, Previous:crunch, Up:= C += + +cryppie /krip'ee/ n. + +A cryptographer. One who hacks or implements cryptographic +software or hardware. + + +Node:CTSS, Next:cube, Previous:cryppie, Up:= C += + +CTSS /C-T-S-S/ n. + +Compatible Time-Sharing System. An early (1963) experiment in +the design of interactive time-sharing operating systems, +ancestral to Multics, Unix, and ITS. The name +ITS (Incompatible Time-sharing System) +was a hack on CTSS, meant both as a joke and to express some +basic differences in philosophy about the way I/O services should +be presented to user programs. + + +Node:cube, Next:cubing, Previous:CTSS, Up:= C = + + +cube n. + +1. [short for `cubicle'] A module in the open-plan offices +used at many programming shops. "I've got the manuals in my +cube." 2. A NeXT machine (which resembles a matte-black +cube). + + +Node:cubing, Next:cup holder, Previous:cube, Up:= C = + + +cubing vi. + +[parallel with `tubing'] 1. Hacking on an IPSC (Intel Personal +SuperComputer) hypercube. "Louella's gone cubing +again!!" 2. Hacking Rubik's Cube or related puzzles, +either physically or mathematically. 3. An indescribable form of +self-torture (see sense 1 or 2). + + +Node:cup holder, Next:cursor dipped in X, +Previous:cubing, Up:= C = + +cup holder n. + +The tray of a CD-ROM drive, or by extension the CD drive +itself. So called because of a common tech support legend about +the idiot who called to complain that the cup holder on his +computer broke. A joke program was once distributed around the +net called "cupholder.exe", which when run simply extended the CD +drive tray. The humor of this was of course lost on people whose +drive had a slot or a caddy instead. + + +Node:cursor dipped in X, +Next:cuspy, Previous:cup holder, Up:= C = + +cursor dipped in X n. + +There are a couple of metaphors in English of the form `pen +dipped in X' (perhaps the most common values of X are `acid', +`bile', and `vitriol'). These map over neatly to this hackish +usage (the cursor being what moves, leaving letters behind, when +one is composing on-line). "Talk about a nastygram! He must've had his cursor dipped +in acid when he wrote that one!" + + +Node:cuspy, Next:cut a tape, Previous:cursor dipped in X, Up:= C = + +cuspy /kuhs'pee/ adj. + +[WPI: from the DEC abbreviation +CUSP, for `Commonly Used System Program', i.e., a utility program +used by many people] 1. (of a program) Well-written. 2. +Functionally excellent. A program that performs well and +interfaces well to users is cuspy. See rude. 3. [NYU] Said of an attractive woman, +especially one regarded as available. Implies a certain +curvaceousness. + + +Node:cut a tape, Next:cybercrud, Previous:cuspy, Up:= C += + +cut a tape vi. + +To write a software or document distribution on magnetic tape +for shipment. Has nothing to do with physically cutting the +medium! Early versions of this lexicon claimed that one never +analogously speaks of `cutting a disk', but this has since been +reported as live usage. Related slang usages are mainstream +business's `cut a check', the recording industry's `cut a +record', and the military's `cut an order'. + +All of these usages reflect physical processes in obsolete +recording and duplication technologies. The first stage in +manufacturing an old-style vinyl record involved cutting grooves +in a stamping die with a precision lathe. More mundanely, the +dominant technology for mass duplication of paper documents in +pre-photocopying days involved "cutting a stencil", punching away +portions of the wax overlay on a silk screen. More directly, +paper tape with holes punched in it was an important early +storage medium. + + +Node:cybercrud, Next:cyberpunk, Previous:cut a tape, Up:= C = + +cybercrud /si:'ber-kruhd/ n. + +1. [coined by Ted Nelson] Obfuscatory tech-talk. Verbiage with +a high MEGO factor. The computer +equivalent of bureaucratese. 2. Incomprehensible stuff embedded +in email. First there were the "Received" headers that show how +mail flows through systems, then MIME (Multi-purpose Internet +Mail Extensions) headers and part boundaries, and now huge blocks +of radix-64 for PEM (Privacy Enhanced Mail) or PGP (Pretty Good +Privacy) digital signatures and certificates of authenticity. +This stuff all services a purpose and good user interfaces should +hide it, but all too often users are forced to wade through +it. + + +Node:cyberpunk, Next:cyberspace, Previous:cybercrud, Up:= C = + +cyberpunk /si:'ber-puhnk/ n.,adj. + +[orig. by SF writer Bruce Bethke and/or editor Gardner Dozois] +A subgenre of SF launched in 1982 by William Gibson's +epoch-making novel "Neuromancer" (though its roots go back +through Vernor Vinge's "True Names" (see the Bibliography in Appendix C) to John +Brunner's 1975 novel "The Shockwave Rider"). Gibson's near-total +ignorance of computers and the present-day hacker culture enabled +him to speculate about the role of computers and hackers in the +future in ways hackers have since found both irritatingly +naïve and tremendously stimulating. Gibson's work was widely +imitated, in particular by the short-lived but innovative "Max +Headroom" TV series. See cyberspace, ice, +jack in, go flatline. + +Since 1990 or so, popular culture has included a movement or +fashion trend that calls itself `cyberpunk', associated +especially with the rave/techno subculture. Hackers have mixed +feelings about this. On the one hand, self-described cyberpunks +too often seem to be shallow trendoids in black leather who have +substituted enthusiastic blathering about technology for actually +learning and doing it. Attitude is no substitute for +competence. On the other hand, at least cyberpunks are excited +about the right things and properly respectful of hacking talent +in those who have it. The general consensus is to tolerate them +politely in hopes that they'll attract people who grow into being +true hackers. + + +Node:cyberspace, Next:cycle, Previous:cyberpunk, Up:= C = + +cyberspace /si:'br-spays`/ n. + +1. Notional `information-space' loaded with visual cues and +navigable with brain-computer interfaces called `cyberspace +decks'; a characteristic prop of cyberpunk SF. Serious efforts to construct +virtual reality +interfaces modeled explicitly on Gibsonian cyberspace are under +way, using more conventional devices such as glove sensors and +binocular TV headsets. Few hackers are prepared to deny outright +the possibility of a cyberspace someday evolving out of the +network (see the network). 2. +The Internet or Matrix (sense #2) as +a whole, considered as a crude cyberspace (sense 1). Although +this usage became widely popular in the mainstream press during +1994 when the Internet exploded into public awareness, it is +strongly deprecated among hackers because the Internet does not +meet the high, SF-inspired standards they have for true +cyberspace technology. Thus, this use of the term usually tags a +wannabee or outsider. Oppose meatspace. 3. Occasionally, the +metaphoric location of the mind of a person in hack mode. Some hackers report +experiencing strong eidetic imagery when in hack mode; +interestingly, independent reports from multiple sources suggest +that there are common features to the experience. In particular, +the dominant colors of this subjective `cyberspace' are often +gray and silver, and the imagery often involves constellations of +marching dots, elaborate shifting patterns of lines and angles, +or moire patterns. + + +Node:cycle, Next:cycle crunch, Previous:cyberspace, Up:= C = + +cycle + +1. n. The basic unit of computation. What every hacker wants +more of (noted hacker Bill Gosper described himself as a "cycle +junkie"). One can describe an instruction as taking so many +`clock cycles'. Often the computer can access its memory once on +every clock cycle, and so one speaks also of `memory cycles'. +These are technical meanings of cycle. The jargon meaning comes from the +observation that there are only so many cycles per second, and +when you are sharing a computer the cycles get divided up among +the users. The more cycles the computer spends working on your +program rather than someone else's, the faster your program will +run. That's why every hacker wants more cycles: so he can spend +less time waiting for the computer to respond. 2. By extension, a +notional unit of human thought power, emphasizing that +lots of things compete for the typical hacker's think time. "I +refused to get involved with the Rubik's Cube back when it was +big. Knew I'd burn too many cycles on it if I let myself." 3. vt. +Syn. bounce (sense 4), 120 reset; from the phrase `cycle power'. +"Cycle the machine again, that serial port's still hung." + + +Node:cycle crunch, Next:cycle drought, Previous:cycle, Up:= C = + +cycle crunch n.,obs. + +A situation wherein the number of people trying to use a +computer simultaneously has reached the point where no one can +get enough cycles because they are spread too thin and the system +has probably begun to thrash. This +scenario is an inevitable result of Parkinson's Law applied to +timesharing. Usually the only solution is to buy more computer. +Happily, this has rapidly become easier since the mid-1980s, so +much so that the very term `cycle crunch' now has a faintly +archaic flavor; most hackers now use workstations or personal +computers as opposed to traditional timesharing systems, and are +far more likely to complain of `bandwidth crunch' on their shared +networks rather than cycle crunch. + + +Node:cycle drought, Next:cycle of +reincarnation, Previous:cycle crunch, Up:= C = + +cycle drought n. + +A scarcity of cycles. It may be due to a cycle crunch, but it could also occur +because part of the computer is temporarily not working, leaving +fewer cycles to go around. "The high +moby is down, so we're running +with only half the usual amount of memory. There will be a cycle +drought until it's fixed." + + +Node:cycle of +reincarnation, Next:cycle server, Previous:cycle drought, Up:= C = + +cycle of reincarnation n. + +See wheel of +reincarnation. + + +Node:cycle server, Next:cypherpunk, Previous:cycle of +reincarnation, Up:= C = + + +cycle server n. + +A powerful machine that exists primarily for running large +compute-, disk-, or memory-intensive jobs (more formally called a +`compute server'). Implies that interactive tasks such as editing +are done on other machines on the network, such as +workstations. + + +Node:cypherpunk, Next:C|N>K, Previous:cycle server, Up:= C = + +cypherpunk n. + +[from cyberpunk] Someone interested in the uses of encryption via +electronic ciphers for enhancing personal privacy and guarding against +tyranny by centralized, authoritarian power structures, especially +government. There is an active cypherpunks mailing list at +cypherpunks-request@toad.com coordinating work on public-key encryption +freeware, privacy, and digital cash. See also tentacle. + + +Node:C|N>K, Next:D. C. Power Lab, Previous:cypherpunk, Up:= C = + +C|N>K n. + +[Usenet] Coffee through Nose to Keyboard; that is, "I laughed +so hard I snarfed my coffee onto my +keyboard.". Common on _alt.fan.pratchett_ and scary devil monastery; +recognized elsewhere. The Acronymphomania +FAQ on _alt.fan.pratchett_ recognizes variants such as +T|N>K = `Tea through Nose to Keyboard' and C|N>S = `Coffee +through Nose to Screen'. + + +Node:= D =, Next:= E =, Previous:= C =, Up:The Jargon Lexicon + += D = + + +D. C. Power Lab: + + +daemon: + + +daemon book: + + +dahmum: + + +dancing frog: + + +dangling pointer: + + +dark-side hacker: + + +Datamation: + + +DAU: + + +Dave the +Resurrector: + + +day mode: + + +dd: + + +DDT: + + +de-rezz: + + +dead: + + +dead beef attack: + + +dead code: + + +dead link: + + +DEADBEEF: + + +deadlock: + + +deadly embrace: + + +death code: + + +Death Square: + + +Death Star: + + +DEC: + + +DEC: + + +DEC Wars: + + +decay: + + +deckle: + + +DED: + + +deep hack mode: + + +deep magic: + + +deep space: + + +defenestration: + + +defined as: + + +dehose: + + +deletia: + + +deliminator: + + +delint: + + +delta: + + +demented: + + +demigod: + + +demo: + + +demo mode: + + +demoeffect: + + +demogroup: + + +demon: + + +demon dialer: + + +demoparty: + + +demoscene: + + +dentro: + + +depeditate: + + +deprecated: + + +derf: + + +deserves to lose: + + +desk check: + + +despew: + + +Devil Book: + + +/dev/null: + + +dickless +workstation: + + +dictionary flame: + + +diddle: + + +die: + + +die horribly: + + +diff: + + +digit: + + +dike: + + +Dilbert: + + +ding: + + +dink: + + +dinosaur: + + +dinosaur pen: + + +dinosaurs mating: + + +dirtball: + + +dirty power: + + +disclaimer: + + +Discordianism: + + +disk farm: + + +display hack: + + +dispress: + + +Dissociated Press: + + +distribution: + + +distro: + + +disusered: + + +do protocol: + + +doc: + + +documentation: + + +dodgy: + + +dogcow: + + +dogfood: + + +dogpile: + + +dogwash: + + +domainist: + + +Don't do that +then!: + + +dongle: + + +dongle-disk: + + +donuts: + + +doorstop: + + +DoS attack: + + +dot file: + + +double bucky: + + +doubled sig: + + +down: + + +download: + + +DP: + + +DPB: + + +DPer: + + +Dr. Fred Mbogo: + + +dragon: + + +Dragon Book: + + +drain: + + +dread high-bit +disease: + + +Dread Questionmark +Disease: + + +DRECNET: + + +driver: + + +droid: + + +drone: + + +drool-proof paper: + + +drop on the +floor: + + +drop-ins: + + +drop-outs: + + +drugged: + + +drum: + + +drunk mouse +syndrome: + + +dub dub dub: + + +Duff's device: + + +dumb terminal: + + +dumbass attack: + + +dumbed down: + + +dump: + + +dumpster diving: + + +dup killer: + + +dup loop: + + +dusty deck: + + +DWIM: + + +dynner: + + +Node:D. C. Power Lab, Next:daemon, Previous:C|N>K, Up:= D = + +D. C. Power Lab n. + +The former site of SAIL. Hackers +thought this was very funny because the obvious connection to +electrical engineering was nonexistent -- the lab was named for a +Donald C. Power. Compare Marginal +Hacks. + + +Node:daemon, Next:daemon book, Previous:D. C. Power Lab, Up:= D = + +daemon /day'mn/ or /dee'mn/ n. + +[from the mythological meaning, later rationalized as the +acronym `Disk And Execution MONitor'] A program that is not +invoked explicitly, but lies dormant waiting for some +condition(s) to occur. The idea is that the perpetrator of the +condition need not be aware that a daemon is lurking (though +often a program will commit an action only because it knows that +it will implicitly invoke a daemon). For example, under ITS writing a file on the LPT spooler's directory would invoke the spooling +daemon, which would then print the file. The advantage is that +programs wanting (in this example) files printed need neither +compete for access to nor understand any idiosyncrasies of the +LPT. They simply enter their implicit +requests and let the daemon decide what to do with them. Daemons +are usually spawned automatically by the system, and may either +live forever or be regenerated at intervals. + +Daemon and demon are often used +interchangeably, but seem to have distinct connotations. The term +`daemon' was introduced to computing by CTSS people (who pronounced it /dee'mon/) and +used it to refer to what ITS called a dragon; the prototype was a program called +DAEMON that automatically made tape backups of the file system. +Although the meaning and the pronunciation have drifted, we think +this glossary reflects current (2000) usage. + + +Node:daemon book, Next:dahmum, Previous:daemon, Up:= D += + +daemon book n. + +"The Design and Implementation of the 4.3BSD UNIX Operating +System", by Samuel J. Leffler, Marshall Kirk McKusick, Michael J. +Karels, and John S. Quarterman (Addison-Wesley Publishers, 1989, +ISBN 0-201-06196-1); or "The Design and Implementation of the 4.4 +BSD Operating System" by Marshall Kirk McKusick, Keith Bostic, +Michael J. Karels and John S. Quarterman (Addison-Wesley Longman, +1996, SBN 0-201-54979-4) Either of the standard reference books +on the internals of BSD Unix. So called +because the covers have a picture depicting a little devil (a +visual play on daemon) in sneakers, +holding a pitchfork (referring to one of the characteristic +features of Unix, the fork(2) system call). Also +known as the Devil Book. + + +Node:dahmum, Next:dancing frog, Previous:daemon book, Up:= D = + +dahmum /dah'mum/ n. + +[Usenet] The material of which protracted flame wars, especially those about +operating systems, is composed. Homeomorphic to spam. The term `dahmum' is derived from the name +of a militant OS/2 advocate, and +originated when an extensively crossposted OS/2-versus-Linux debate was fed through Dissociated Press. + + +Node:dancing frog, Next:dangling pointer, +Previous:dahmum, Up:= D = + +dancing frog n. + +[Vancouver area] A problem that occurs on a computer that will +not reappear while anyone else is watching. From the classic +Warner Brothers cartoon "One Froggy Evening", featuring a dancing +and singing Michigan J. Frog that just croaks when anyone else is +around (now the WB network mascot). + + +Node:dangling pointer, Next:dark-side hacker, +Previous:dancing +frog, Up:= D = + +dangling pointer n. + +[common] A reference that doesn't actually lead anywhere (in C +and some other languages, a pointer that doesn't actually point +at anything valid). Usually this happens because it formerly +pointed to something that has moved or disappeared. Used as +jargon in a generalization of its techspeak meaning; for example, +a local phone number for a person who has since moved to the +other coast is a dangling pointer. Compare dead link. + + +Node:dark-side hacker, Next:Datamation, Previous:dangling pointer, Up:= D = + +dark-side hacker n. + +A criminal or malicious hacker; a cracker. From George Lucas's Darth Vader, +"seduced by the dark side of the Force". The implication that +hackers form a sort of elite of technological Jedi Knights is +intended. Oppose samurai. + + +Node:Datamation, Next:DAU, Previous:dark-side hacker, Up:= D = + +Datamation /day`t*-may'sh*n/ n. + +A magazine that many hackers assume all suits read. Used to question an unbelieved quote, +as in "Did you read that in `Datamation?'" (But see below; this +slur may be dated by the time you read this.) It used to publish +something hackishly funny every once in a while, like the +original paper on COME FROM in +1973, and Ed Post's "Real Programmers Don't Use Pascal" ten years +later, but for a long time after that it was much more +exclusively suit-oriented and boring. +Following a change of editorship in 1994, Datamation is trying +for more of the technical content and irreverent humor that +marked its early days. + +Datamation now has a WWW page at http://www.datamation.com worth +visiting for its selection of computer humor, including "Real +Programmers Don't Use Pascal" and the `Bastard Operator From +Hell' stories by Simon Travaglia (see BOFH). + + +Node:DAU, Next:Dave the Resurrector, Previous:Datamation, Up:= D = + +DAU /dow/ n. + +[German FidoNet] German acronym for Dümmster +Anzunehmender User (stupidest imaginable user). From the +engineering-slang GAU for Grösster Anzunehmender Unfall, +worst assumable accident, esp. of a LNG tank farm plant or +something with similarly disastrous consequences. In popular +German, GAU is used only to refer to worst-case nuclear acidents +such as a core meltdown. See cretin, +fool, loser and weasel. + + +Node:Dave the Resurrector, +Next:day mode, Previous:DAU, Up:= D = + +Dave the Resurrector n. + +[Usenet; also abbreviated DtR] A cancelbot that cancels cancels. Dave the +Resurrector originated when some spam-spewers decided to try to impede +spam-fighting by wholesale cancellation of anti-spam coordination +messages in the _news.admin.net-abuse.usenet_ newsgroup. + + +Node:day mode, Next:dd, Previous:Dave the Resurrector, Up:= D = + +day mode n. + +See phase (sense 1). Used of +people only. + + +Node:dd, Next:DDT, +Previous:day mode, Up:= D = + +dd /dee-dee/ vt. + +[Unix: from IBM JCL] Equivalent to +cat or BLT. +Originally the name of a Unix copy command with special options +suitable for block-oriented devices; it was often used in +heavy-handed system maintenance, as in "Let's dd the +root partition onto a tape, then use the boot PROM to load it +back on to a new disk". The Unix dd(1) was designed +with a weird, distinctly non-Unixy keyword option syntax +reminiscent of IBM System/360 JCL (which had an elaborate DD +`Dataset Definition' specification for I/O devices); though the +command filled a need, the interface design was clearly a prank. +The jargon usage is now very rare outside Unix sites and now +nearly obsolete even there, as dd(1) has been deprecated for a long time (though it +has no exact replacement). The term has been displaced by BLT or simple English `copy'. + + +Node:DDT, Next:de-rezz, Previous:dd, Up:= D = + +DDT /D-D-T/ n. + +[from the insecticide para-dichloro-diphenyl-trichloroethene] +1. Generic term for a program that assists in debugging other +programs by showing individual machine instructions in a readable +symbolic form and letting the user change them. In this sense the +term DDT is now archaic, having been widely displaced by +`debugger' or names of individual programs like adb, +sdb, dbx, or gdb. 2. [ITS] +Under MIT's fabled ITS operating +system, DDT (running under the alias HACTRN, a six-letterism for +`Hack Translator') was also used as the shell or top level command language used to +execute other programs. 3. Any one of several specific DDTs +(sense 1) supported on early DEC +hardware and CP/M. The PDP-10 Reference Handbook (1969) contained +a footnote on the first page of the documentation for DDT that +illuminates the origin of the term: + +Historical footnote: DDT was developed at MIT for the +PDP-1 computer in 1961. At that time DDT stood for "DEC Debugging +Tape". Since then, the idea of an on-line debugging program has +propagated throughout the computer industry. DDT programs are now +available for all DEC computers. Since media other than tape are +now frequently used, the more descriptive name "Dynamic Debugging +Technique" has been adopted, retaining the DDT abbreviation. +Confusion between DDT-10 and another well known pesticide, +dichloro-diphenyl-trichloroethane (C14-H9-Cl5) should be minimal +since each attacks a different, and apparently mutually +exclusive, class of bugs. + + +(The `tape' referred to was, incidentally, not magnetic but +paper.) Sadly, this quotation was removed from later editions of +the handbook after the suits took over +and DEC became much more +`businesslike'. + +The history above is known to many old-time hackers. But +there's more: Peter Samson, compiler of the original TMRC lexicon, reports that he named `DDT' after a +similar tool on the TX-0 computer, the direct ancestor of the +PDP-1 built at MIT's Lincoln Lab in 1957. The debugger on that +ground-breaking machine (the first transistorized computer) +rejoiced in the name FLIT (FLexowriter Interrogation Tape). + + +Node:de-rezz, Next:dead, Previous:DDT, +Up:= D = + +de-rezz /dee-rez'/ + +[from `de-resolve' via the movie "Tron"] (also `derez') 1. vi. +To disappear or dissolve; the image that goes with it is of an +object breaking up into raster lines and static and then +dissolving. Occasionally used of a person who seems to have +suddenly `fuzzed out' mentally rather than physically. Usage: +extremely silly, also rare. This verb was actually invented as +fictional hacker jargon, and adopted in a spirit of +irony by real hackers years after the fact. 2. vt. The Macintosh +resource decompiler. On a Macintosh, many program structures +(including the code itself) are managed in small segments of the +program file known as `resources'; `Rez' and `DeRez' are a pair +of utilities for compiling and decompiling resource files. Thus, +decompiling a resource is `derezzing'. Usage: very common. + + +Node:dead, Next:dead beef attack, Previous:de-rezz, Up:= D = + +dead adj. + +1. Non-functional; down; crashed. Especially used of hardware. 2. At +XEROX PARC, software that is working but not undergoing continued +development and support. 3. Useless; inaccessible. Antonym: +`live'. Compare dead code. + + +Node:dead beef attack, Next:dead code, Previous:dead, Up:= D = + +dead beef attack n. + +[cypherpunks list, 1996] An attack on a public-key +cryptosystem consisting of publishing a key having the same ID as +another key (thus making it possible to spoof a user's identity +if recipients aren't careful about verifying keys). In PGP and +GPG the key ID is the last eight hex digits of (for RSA keys) the +product of two primes. The attack was demonstrated by creating a +key whose ID was 0xdeadbeef (see DEADBEEF). + + +Node:dead code, Next:dead link, Previous:dead beef attack, Up:= D = + +dead code n. + +Routines that can never be accessed because all calls to them +have been removed, or code that cannot be reached because it is +guarded by a control structure that provably must always transfer +control somewhere else. The presence of dead code may reveal +either logical errors due to alterations in the program or +significant changes in the assumptions and environment of the +program (see also software +rot); a good compiler should report dead code so a +maintainer can think about what it means. (Sometimes it simply +means that an extremely defensive programmer has +inserted can't happen tests +which really can't happen -- yet.) Syn. grunge. See also dead, and The Story of Mel. + + +Node:dead link, Next:DEADBEEF, Previous:dead code, Up:= D = + +dead link n. + +[very common] A World-Wide-Web URL that no longer points to +the information it was written to reach. Usually this happens +because the document has been moved or deleted. Lots of dead +links make a WWW page frustrating and useless and are the #1 sign +of poor page maintainance. Compare dangling pointer, link rot. + + +Node:DEADBEEF, Next:deadlock, Previous:dead link, Up:= D = + +DEADBEEF /ded-beef/ n. + +The hexadecimal word-fill pattern for freshly allocated memory +(decimal -21524111) under a number of IBM environments, including +the RS/6000. Some modern debugging tools deliberately fill freed +memory with this value as a way of converting heisenbugs into Bohr bugs. As in "Your program is DEADBEEF" +(meaning gone, aborted, flushed from memory); if you start from +an odd half-word boundary, of course, you have BEEFDEAD. See also +the anecdote under fool and dead beef attack. + + +Node:deadlock, Next:deadly embrace, Previous:DEADBEEF, Up:= D = + +deadlock n. + +1. [techspeak] A situation wherein two or more processes are +unable to proceed because each is waiting for one of the others +to do something. A common example is a program communicating to a +server, which may find itself waiting for output from the server +before sending anything more to it, while the server is similarly +waiting for more input from the controlling program before +outputting anything. (It is reported that this particular flavor +of deadlock is sometimes called a `starvation deadlock', though +the term `starvation' is more properly used for situations where +a program can never run simply because it never gets high enough +priority. Another common flavor is `constipation', in which each +process is trying to send stuff to the other but all buffers are +full because nobody is reading anything.) See deadly embrace. 2. Also used of +deadlock-like interactions between humans, as when two people +meet in a narrow corridor, and each tries to be polite by moving +aside to let the other pass, but they end up swaying from side to +side without making any progress because they always move the +same way at the same time. + + +Node:deadly embrace, Next:death code, Previous:deadlock, Up:= D = + +deadly embrace n. + +Same as deadlock, though +usually used only when exactly two processes are involved. This +is the more popular term in Europe, while deadlock predominates in the United +States. + + +Node:death code, Next:Death Square, Previous:deadly embrace, Up:= D = + +death code n. + +A routine whose job is to set everything in the computer -- +registers, memory, flags, everything -- to zero, including that +portion of memory where it is running; its last act is to stomp +on its own "store zero" instruction. Death code isn't very +useful, but writing it is an interesting hacking challenge on +architectures where the instruction set makes it possible, such +as the PDP-8 (it has also been done on the DG Nova). + +Perhaps the ultimate death code is on the TI 990 series, where +all registers are actually in RAM, and the instruction "store +immediate 0" has the opcode "0". The PC will immediately wrap +around core as many times as it can until a user hits HALT. Any +empty memory location is death code. Worse, the manufacturer +recommended use of this instruction in startup code (which would +be in ROM and therefore survive). + + +Node:Death Square, Next:Death Star, Previous:death code, Up:= D = + +Death Square n. + +The corporate logo of Novell, the people who acquired USL +after AT&T let go of it (Novell eventually sold the Unix +group to SCO). Coined by analogy with Death Star, because many people believed +Novell was bungling the lead in Unix systems exactly as AT&T +did for many years. + + +Node:Death Star, Next:DEC, Previous:Death Square, Up:= D = + +Death Star n. + +[from the movie "Star Wars"] 1. The AT&T corporate logo, +which appears on computers sold by AT&T and bears an uncanny +resemblance to the Death Star in the movie. This usage is +particularly common among partisans of BSD Unix, who tend to regard the AT&T versions +as inferior and AT&T as a bad guy. Copies still circulate of +a poster printed by Mt. Xinu showing a starscape with a space +fighter labeled 4.2 BSD streaking away from a broken AT&T +logo wreathed in flames. 2. AT&T's internal magazine, +"Focus", uses `death star' to describe an incorrectly done +AT&T logo in which the inner circle in the top left is dark +instead of light -- a frequent result of dark-on-light logo +images. + + +Node:DEC, Next:DEC Wars, Previous:Death Star, Up:= D = + +DEC /dek/ n. + +1. v. Verbal (and only rarely written) shorthand for +_decrement_, i.e. `decrease by one'. Especially used by +assembly programmers, as many assembly languages have a +dec mnemonic. Antonym: inc. 2. n. Commonly used abbreviation for Digital +Equipment Corporation, later deprecated by DEC itself in favor of +"Digital" and now entirely obsolete following the buyout by +Compaq. Before the killer +micro revolution of the late 1980s, hackerdom was closely +symbiotic with DEC's pioneering timesharing machines. The first +of the group of cultures described by this lexicon nucleated +around the PDP-1 (see TMRC). +Subsequently, the PDP-6, PDP-10, +PDP-20, PDP-11 and VAX were all foci of large and important +hackerdoms, and DEC machines long dominated the ARPANET and +Internet machine population. DEC was the technological leader of +the minicomputer era (roughly 1967 to 1987), but its failure to +embrace microcomputers and Unix early cost it heavily in profits +and prestige after silicon got +cheap. Nevertheless, the microprocessor design tradition owes a +major debt to the PDP-11 instruction set, and every one of the +major general-purpose microcomputer OSs so far (CP/M, MS-DOS, +Unix, OS/2, Windows NT) was either genetically descended from a +DEC OS, or incubated on DEC hardware, or both. Accordingly, DEC +was for many years still regarded with a certain wry affection +even among many hackers too young to have grown up on DEC +machines. + +DEC reclaimed some of its old reputation among techies in the +first half of the 1990s. The success of the Alpha, an +innovatively-designed and very high-performance killer micro, helped a lot. So did +DEC's newfound receptiveness to Unix and open systems in general. +When Compaq acquired DEC at the end of 1998 there was some +concern that these gains would be lost along with the DEC +nameplate, but the merged company has so far turned out to be +culturally dominated by the ex-DEC side. + + +Node:DEC Wars, Next:decay, Previous:DEC, Up:= D = + + +DEC Wars n. + +A 1983 Usenet posting by Alan +Hastings and Steve Tarr spoofing the "Star Wars" movies in +hackish terms. Some years later, ESR (disappointed by Hastings +and Tarr's failure to exploit a great premise more thoroughly) +posted a 3-times-longer complete rewrite called Unix +WARS; the two are often confused. + + +Node:decay, Next:deckle, Previous:DEC Wars, Up:= D = + +decay n.,vi + +[from nuclear physics] An automatic conversion which is +applied to most array-valued expressions in C; they `decay into' pointer-valued expressions +pointing to the array's first element. This term is borderline +techspeak, but is not used in the official standard for the +language. + + +Node:deckle, Next:DED, Previous:decay, Up:= D += + +deckle /dek'l/ n. + +[from dec- and nybble; the +original spelling seems to have been `decle'] Two nickles; 10 bits. Reported among developers for +Mattel's GI 1600 (the Intellivision games processor), a chip with +16-bit-wide RAM but 10-bit-wide ROM. See nybble for other such terms. + + +Node:DED, Next:deep hack mode, Previous:deckle, Up:= D = + +DED /D-E-D/ n. + +Dark-Emitting Diode (that is, a burned-out LED). Compare SED, LER, write-only memory. In the +early 1970s both Signetics and Texas instruments released DED +spec sheets as AFJs (suggested uses +included "as a power-off indicator"). + + +Node:deep hack mode, Next:deep magic, Previous:DED, Up:= D = + +deep hack mode n. + +See hack mode. + + +Node:deep magic, Next:deep space, Previous:deep hack mode, Up:= D = + +deep magic n. + +[poss. from C. S. Lewis's "Narnia" books] An awesomely arcane +technique central to a program or system, esp. one neither +generally published nor available to hackers at large (compare +black art); one that could only +have been composed by a true wizard. +Compiler optimization techniques and many aspects of OS design used to be deep magic; many techniques in +cryptography, signal processing, graphics, and AI still are. +Compare heavy wizardry. +Esp. found in comments of the form "Deep magic begins +here...". Compare voodoo programming. + + +Node:deep space, Next:defenestration, Previous:deep magic, Up:= D = + +deep space n. + +1. Describes the notional location of any program that has +gone off the trolley. +Esp. used of programs that just sit there silently grinding long +after either failure or some output is expected. "Uh oh. I should +have gotten a prompt ten seconds ago. The program's in deep space +somewhere." Compare buzz, catatonic, hyperspace. 2. The metaphorical location of +a human so dazed and/or confused or caught up in some esoteric +form of bogosity that he or she no +longer responds coherently to normal communication. Compare page out. + + +Node:defenestration, Next:defined as, Previous:deep space, Up:= D = + +defenestration n. + +[mythically from a traditional Czech assasination method, via +SF fandom] 1. Proper karmic retribution for an incorrigible +punster. "Oh, ghod, that was awful!" "Quick! +Defenestrate him!" 2. The act of exiting a window system in order +to get better response time from a full-screen program. This +comes from the dictionary meaning of `defenestrate', which is to +throw something out a window. 3. The act of discarding something +under the assumption that it will improve matters. "I don't have +any disk space left." "Well, why don't you defenestrate that 100 +megs worth of old core dumps?" 4. Under a GUI, the act of +dragging something out of a window (onto the screen). "Next, +defenestrate the MugWump icon." 5. The act of completely removing +Micro$oft Windows from a PC in favor of a better OS (typically +Linux). + + +Node:defined as, Next:dehose, Previous:defenestration, Up:= D = + +defined as adj. + +In the role of, usually in an organization-chart sense. "Pete +is currently defined as bug prioritizer." Compare logical. + + +Node:dehose, Next:deletia, Previous:defined as, Up:= D = + +dehose /dee-hohz/ vt. + +To clear a hosed condition. + + +Node:deletia, Next:deliminator, Previous:dehose, Up:= D += + +deletia n. /d*-lee'sha/ + +[USENET; common] In an email reply, material omitted from the +quote of the original. Usually written rather than spoken; often +appears as a pseudo-tag or ellipsis in the body of the reply, as +"[deletia]" or "<deletia>". + + +Node:deliminator, Next:delint, Previous:deletia, Up:= D += + +deliminator /de-lim'-in-ay-t*r/ n. + +[portmanteau, delimiter + eliminate] A string or pattern used +to delimit text into fields, but which is itself eliminated from +the resulting list of fields. This jargon seems to have +originated among Perl hackers in connection with the Perl split() +function; however, it has been sighted in live use among Java and +even Visual Basic programmers. + + +Node:delint, Next:delta, Previous:deliminator, Up:= D = + +delint /dee-lint/ v. obs. + +To modify code to remove problems detected when linting. Confusingly, this process is also +referred to as `linting' code. This term is no longer in general +use because ANSI C compilers typically issue compile-time +warnings almost as detailed as lint warnings. + + +Node:delta, Next:demented, Previous:delint, Up:= D += + +delta n. + +1. [techspeak] A quantitative change, especially a small or +incremental one (this use is general in physics and engineering). +"I just doubled the speed of my program!" "What was the delta on +program size?" "About 30 percent." (He doubled the speed of his +program, but increased its size by only 30 percent.) 2. [Unix] A +diff, especially a diff stored under the set of version-control +tools called SCCS (Source Code Control System) or RCS (Revision +Control System). 3. n. A small quantity, but not as small as +epsilon. The jargon usage of delta and epsilon stems from the traditional use of +these letters in mathematics for very small numerical quantities, +particularly in `epsilon-delta' proofs in limit theory (as in the +differential calculus). The term delta is often used, once epsilon has been mentioned, to mean a quantity +that is slightly bigger than epsilon but still very small. "The cost isn't +epsilon, but it's delta" means that the cost isn't totally +negligible, but it is nevertheless very small. Common +constructions include `within delta of --', `within epsilon of +--': that is, `close to' and `even closer to'. + + +Node:demented, Next:demigod, Previous:delta, Up:= D += + +demented adj. + +Yet another term of disgust used to describe a malfunctioning +program. The connotation in this case is that the program works +as designed, but the design is bad. Said, for example, of a +program that generates large numbers of meaningless error +messages, implying that it is on the brink of imminent collapse. +Compare wonky, brain-damaged, bozotic. + + +Node:demigod, Next:demo, Previous:demented, Up:= +D = + +demigod n. + +A hacker with years of experience, a world-wide reputation, +and a major role in the development of at least one design, tool, +or game used by or known to more than half of the hacker +community. To qualify as a genuine demigod, the person must +recognizably identify with the hacker community and have helped +shape it. Major demigods include Ken Thompson and Dennis Ritchie +(co-inventors of Unix and C), Richard M. Stallman (inventor of EMACS), Larry Wall (inventor of Perl), Linus Torvalds (inventor of Linux), and most recently James Gosling +(inventor of Java, NeWS, and GOSMACS) and Guido van Rossum (inventor +of Python). In their hearts of +hearts, most hackers dream of someday becoming demigods +themselves, and more than one major software project has been +driven to completion by the author's veiled hopes of apotheosis. +See also net.god, true-hacker. + + +Node:demo, Next:demo mode, Previous:demigod, Up:= D += + +demo /de'moh/ + +[short for `demonstration'] 1. v. To demonstrate a product or +prototype. A far more effective way of inducing bugs to manifest +than any number of test runs, +especially when important people are watching. 2. n. The act of +demoing. "I've gotta give a demo of the drool-proof interface; +how does it work again?" 3. n. Esp. as `demo version', can refer +either to an early, barely-functional version of a program which +can be used for demonstration purposes as long as the operator +uses exactly the right commands and skirts its numerous +bugs, deficiencies, and unimplemented portions, or to a special +version of a program (frequently with some features crippled) +which is distributed at little or no cost to the user for +enticement purposes. 4. [demoscene] A sequence of demoeffects (usually) combined with +self-composed music and hand-drawn ("pixelated") graphics. These +days (1997) usually built to attend a compo. Often called `eurodemos' outside Europe, +as most of the demoscene activity +seems to have gathered in northern Europe and especially +Scandinavia. See also intro, dentro. + + +Node:demo mode, Next:demoeffect, Previous:demo, Up:= D += + +demo mode n. + +1. [Sun] The state of being heads +down in order to finish code in time for a demo, usually due yesterday. 2. A mode in which +video games sit by themselves running through a portion of the +game, also known as `attract mode'. Some serious apps have a demo mode they use as a screen saver, +or may go through a demo mode on startup (for example, the +Microsoft Windows opening screen -- which lets you impress your +neighbors without actually having to put up with Microsloth Windows). + + +Node:demoeffect, Next:demogroup, Previous:demo mode, Up:= D = + +demoeffect n. + +[demoscene] What among hackers +is called a display hack. +Classical effects include "plasma" (colorful mess), "keftales" +(x*x+y*y and other similar patterns, usually combined with +color-cycling), realtime fractals, realtime 3d graphics, etc. +Historically, demo effects have cheated as much as possible to +gain more speed and more complexity, using low-precision math and +masses of assembler code and building animation realtime are +three common tricks, but use of special hardware to fake effects +is a Good Thing on the +demoscene (though this is becoming less common as platforms like +the Amiga fade away). + + +Node:demogroup, Next:demon, Previous:demoeffect, Up:= D = + +demogroup n. + +[demoscene] A group of demo (sense 4) composers. Job titles within +a group include coders (the ones who write programs), graphicians +(the ones who painstakingly pixelate the fine art), musicians +(the music composers), sysops, +traders/swappers (the ones who do the trading and other PR), and +organizers (in larger groups). It is not uncommon for one person +to do multiple jobs, but it has been observed that good coders +are rarely good composers and vice versa. [How odd. Musical +talent seems common among Internet/Unix hackers --ESR] + + +Node:demon, Next:demon dialer, Previous:demogroup, Up:= D = + +demon n. + +1. [MIT] A portion of a program that is not invoked +explicitly, but that lies dormant waiting for some condition(s) +to occur. See daemon. The +distinction is that demons are usually processes within a +program, while daemons are usually programs running on an +operating system. 2. [outside MIT] Often used equivalently to +daemon -- especially in the Unix world, where the latter spelling and +pronunciation is considered mildly archaic. + +Demons in sense 1 are particularly common in AI programs. For +example, a knowledge-manipulation program might implement +inference rules as demons. Whenever a new piece of knowledge was +added, various demons would activate (which demons depends on the +particular piece of data) and would create additional pieces of +knowledge by applying their respective inference rules to the +original piece. These new pieces could in turn activate more +demons as the inferences filtered down through chains of logic. +Meanwhile, the main program could continue with whatever its +primary task was. + + +Node:demon dialer, Next:demoparty, Previous:demon, Up:= D = + +demon dialer n. + +A program which repeatedly calls the same telephone number. +Demon dialing may be benign (as when a number of communications +programs contend for legitimate access to a BBS line) or malign (that is, used as a prank or +denial-of-service attack). This term dates from the blue box days of the 1970s and early 1980s +and is now semi-obsolescent among phreakers; see war +dialer for its contemporary progeny. + + +Node:demoparty, Next:demoscene, Previous:demon dialer, Up:= D = + +demoparty n. + +[demoscene] Aboveground +descendant of the copyparty, with +emphasis shifted away from software piracy and towards compos. Smaller demoparties, for 100 +persons or less, are held quite often, sometimes even once a +month, and usually last for one to two days. On the other end of +the scale, huge demo parties are held once a year (and four of +these have grown very large and occur annually - Assembly in +Finland, The Party in Denmark, The Gathering in Norway, and NAID +somewhere in north America). These parties usually last for three +to five days, have room for 3000-5000 people, and have a party +network with connection to the internet. + + +Node:demoscene, Next:dentro, Previous:demoparty, Up:= D = + +demoscene /dem'oh-seen/ + +[also `demo scene'] A culture of multimedia hackers located +primarily in Scandinavia and northern Europe. Demoscene folklore +recounts that when old-time warez +d00dz cracked some piece of software they often added an +advertisement of in the beginning, usually containing colorful +display hacks with greetings +to other cracking groups. The demoscene was born among people who +decided building these display hacks is more interesting than +hacking and began to build self-contained display hacks of +considerable elaboration and beauty (within the culture such a +hack is called a demo). The split +seems to have happened at the end of the 1980s. As more of these +demogroups emerged, they started +to have compos at copying parties +(see copyparty), which later +evolved to standalone events (see demoparty). The demoscene has retained some +traits from the warez d00dz, +including their style of handles and group names and some of +their jargon. + +Traditionally demos were written in assembly language, with +lots of smart tricks, self-modifying code, undocumented op-codes +and the like. Some time around 1995, people started coding demos +in C, and a couple of years after that, they also started using +Java. + +Ten years on (in 1998-1999), the demoscene is changing as its +original platforms (C64, Amiga, Spectrum, Atari ST, IBM PC under +DOS) die out and activity shifts towards Windows, Linux, and the +Internet. While deeply underground in the past, demoscene is +trying to get into the mainstream as accepted art form, and one +symptom of this is the commercialization of bigger demoparties. +Older demosceneers frown at this, but the majority think it's a +good direction. Many demosceneers end up working in the computer +game industry. Demoscene resource pages are available at http://www.oldskool.org/demos/explained/ +and http://www.scene.org/. + + +Node:dentro, Next:depeditate, Previous:demoscene, Up:= D = + +dentro /den'troh/ + +[demoscene] Combination of +demo (sense 4) and intro. Other name mixings include intmo, dentmo +etc. and are used usually when the authors are not quite sure +whether the program is a demo or an +intro. Special-purpose coinages like +wedtro (some member of a group got married), invtro (invitation +intro) etc. have also been sighted. + + +Node:depeditate, Next:deprecated, Previous:dentro, Up:= +D = + +depeditate /dee-ped'*-tayt/ n. + +[by (faulty) analogy with `decapitate'] Humorously, to cut off +the feet of. When one is using some computer-aided typesetting +tools, careless placement of text blocks within a page or above a +rule can result in chopped-off letter descenders. Such letters +are said to have been depeditated. + + +Node:deprecated, Next:derf, Previous:depeditate, Up:= D = + +deprecated adj. + +Said of a program or feature that is considered obsolescent +and in the process of being phased out, usually in favor of a +specified replacement. Deprecated features can, unfortunately, +linger on for many years. This term appears with distressing +frequency in standards documents when the committees writing the +documents realize that large amounts of extant (and presumably +happily working) code depend on the feature(s) that have passed +out of favor. See also dusty +deck. + +[Usage note: don't confuse this word with `depreciate', or the +verb form `deprecate' with `depreciated`. They are different +words; see any dictionary for discussion.] + + +Node:derf, Next:deserves to lose, Previous:deprecated, Up:= D = + +derf /derf/ v.,n. + +[PLATO] The act of exploiting a terminal which someone else +has absentmindedly left logged on, to use that person's account, +especially to post articles intended to make an ass of the victim +you're impersonating. It has been alleged that the term +originated as a reversal of the name of the gentleman who most +usually left himself vulnerable to it, who also happened to be +the head of the department that handled PLATO at the University +of Delaware. + + +Node:deserves to lose, Next:desk check, Previous:derf, Up:= D = + +deserves to lose adj. + +[common] Said of someone who willfully does the Wrong Thing; humorously, if one uses a +feature known to be marginal. What +is meant is that one deserves the consequences of one's losing actions. "Boy, anyone who tries to +use mess-dos deserves to lose!" (ITS fans +used to say the same thing of Unix; +many still do.) See also screw, chomp, bagbiter. + + +Node:desk check, Next:despew, Previous:deserves to lose, Up:= D = + +desk check n.,v. + +To grovel over hardcopy of source +code, mentally simulating the control flow; a method of catching +bugs. No longer common practice in this age of on-screen editing, +fast compiles, and sophisticated debuggers -- though some +maintain stoutly that it ought to be. Compare eyeball search, vdiff, vgrep. + + +Node:despew, Next:Devil Book, Previous:desk check, Up:= D = + +despew /d*-spyoo'/ v. + +[Usenet] To automatically generate a large amount of garbage +to the net, esp. from an automated posting program gone wild. See +ARMM. + + +Node:Devil Book, Next:/dev/null, Previous:despew, Up:= +D = + +Devil Book n. + +See daemon book, the term +preferred by its authors. + + +Node:/dev/null, Next:dickless workstation, +Previous:Devil Book, +Up:= D = + +/dev/null /dev-nuhl/ n. + +[from the Unix null device, used as a data sink] A notional +`black hole' in any information space being discussed, used, or +referred to. A controversial posting, for example, might end +"Kudos to rasputin@kremlin.org, flames to /dev/null". See bit bucket. + + +Node:dickless workstation, +Next:dictionary +flame, Previous:/dev/null, Up:= D = + +dickless workstation n. + +Extremely pejorative hackerism for `diskless workstation', a +class of botches including the Sun 3/50 and other machines +designed exclusively to network with an expensive central disk +server. These combine all the disadvantages of time-sharing with +all the disadvantages of distributed personal computers; +typically, they cannot even boot +themselves without help (in the form of some kind of breath-of-life packet) from +the server. + + +Node:dictionary flame, Next:diddle, Previous:dickless workstation, Up:= D = + +dictionary flame n. + +[Usenet] An attempt to sidetrack a debate away from issues by +insisting on meanings for key terms that presuppose a desired +conclusion or smuggle in an implicit premise. A common tactic of +people who prefer argument over definitions to disputes about +reality. Compare spelling +flame. + + +Node:diddle, Next:die, Previous:dictionary flame, Up:= D = + +diddle + +1. vt. To work with or modify in a not particularly serious +manner. "I diddled a copy of ADVENT +so it didn't double-space all the time." "Let's diddle this piece +of code and see if the problem goes away." See tweak and twiddle. +2. n. The action or result of diddling. See also tweak, twiddle, +frob. + + +Node:die, Next:die horribly, Previous:diddle, Up:= +D = + +die v. + +Syn. crash. Unlike crash, which is used primarily of hardware, this +verb is used of both hardware and software. See also go flatline, casters-up mode. + + +Node:die horribly, Next:diff, Previous:die, Up:= D = + + +die horribly v. + +The software equivalent of crash and burn, and the preferred +emphatic form of die. "The converter +choked on an FF in its input and died horribly". + + +Node:diff, Next:digit, Previous:die horribly, Up:= D = + +diff /dif/ n. + +1. A change listing, especially giving differences between +(and additions to) source code or documents (the term is often +used in the plural `diffs'). "Send me your diffs for the Jargon +File!" Compare vdiff. 2. +Specifically, such a listing produced by the diff(1) +command, esp. when used as specification input to the +patch(1) utility (which can actually perform the +modifications; see patch). This is a +common method of distributing patches and source updates in the +Unix/C world. 3. v. To compare (whether or not by use of +automated tools on machine-readable files); see also vdiff, mod. + + +Node:digit, Next:dike, Previous:diff, Up:= D = + + +digit n.,obs. + +An employee of Digital Equipment Corporation. See also VAX, VMS, PDP-10, TOPS-10, field +circus. + + +Node:dike, Next:Dilbert, Previous:digit, Up:= D += + +dike vt. + +To remove or disable a portion of something, as a wire from a +computer or a subroutine from a program. A standard slogan is +"When in doubt, dike it out". (The implication is that it is +usually more effective to attack software problems by reducing +complexity than by increasing it.) The word `dikes' is widely +used among mechanics and engineers to mean `diagonal cutters', +esp. the heavy-duty metal-cutting version, but may also refer to +a kind of wire-cutters used by electronics techs. To `dike +something out' means to use such cutters to remove something. +Indeed, the TMRC Dictionary defined dike as "to attack with +dikes". Among hackers this term has been metaphorically extended +to informational objects such as sections of code. + + +Node:Dilbert, Next:ding, Previous:dike, Up:= D = + + +Dilbert + +n. Name and title character of a comic strip nationally +syndicated in the U.S. and enormously popular among hackers. +Dilbert is an archetypical engineer-nerd who works at an +anonymous high-technology company; the strips present a +lacerating satire of insane working conditions and idiotic management practices all too readily +recognized by hackers. Adams, who spent nine years in cube 4S700R at Pacific Bell (not DEC as often reported), often remarks that he has +never been able to come up with a fictional management blunder +that his correspondents didn't quickly either report to have +actually happened or top with a similar but even more bizarre +incident. In 1996 Adams distilled his insights into the +collective psychology of businesses into an even funnier book, +"The Dilbert Principle" (HarperCollins, ISBN 0-887-30787-6). See +also pointy-haired, rat dance. + + +Node:ding, Next:dink, Previous:Dilbert, Up:= D += + +ding n.,vi. + +1. Synonym for feep. Usage: rare +among hackers, but more common in the Real World. 2. `dinged': What happens +when someone in authority gives you a minor bitching about +something, esp. something trivial. "I was dinged for having a +messy desk." + + +Node:dink, Next:dinosaur, Previous:ding, Up:= D = + + +dink /dink/ adj. + +Said of a machine that has the bitty +box nature; a machine too small to be worth bothering +with -- sometimes the system you're currently forced to work on. +First heard from an MIT hacker working on a CP/M system with 64K, +in reference to any 6502 system, then from fans of 32-bit +architectures about 16-bit machines. "GNUMACS will never work on +that dink machine." Probably derived from mainstream `dinky', +which isn't sufficiently pejorative. See macdink. + + +Node:dinosaur, Next:dinosaur pen, Previous:dink, Up:= D += + +dinosaur n. + +1. Any hardware requiring raised flooring and special power. +Used especially of old minis and mainframes, in contrast with +newer microprocessor-based machines. In a famous quote from the +1988 Unix EXPO, Bill Joy compared the liquid-cooled mainframe in +the massive IBM display with a grazing dinosaur "with a truck +outside pumping its bodily fluids through it". IBM was not +amused. Compare big iron; see +also mainframe. 2. [IBM] A very +conservative user; a zipperhead. + + +Node:dinosaur pen, Next:dinosaurs mating, +Previous:dinosaur, Up:= D = + +dinosaur pen n. + +A traditional mainframe +computer room complete with raised flooring, special power, its +own ultra-heavy-duty air conditioning, and a side order of Halon +fire extinguishers. See boa. + + +Node:dinosaurs mating, Next:dirtball, Previous:dinosaur pen, Up:= D = + +dinosaurs mating n. + +Said to occur when yet another big +iron merger or buyout occurs; reflects a perception by +hackers that these signal another stage in the long, slow dying +of the mainframe industry. In its +glory days of the 1960s, it was `IBM and the Seven Dwarves': +Burroughs, Control Data, General Electric, Honeywell, NCR, RCA, +and Univac. RCA and GE sold out early, and it was `IBM and the +Bunch' (Burroughs, Univac, NCR, Control Data, and Honeywell) for +a while. Honeywell was bought out by Bull; Burroughs merged with +Univac to form Unisys (in 1984 -- this was when the phrase +`dinosaurs mating' was coined); and in 1991 AT&T absorbed NCR +(but spat it back out a few years later). Control Data still +exists but is no longer in the mainframe business. More such +earth-shaking unions of doomed giants seem inevitable. + + +Node:dirtball, Next:dirty power, Previous:dinosaurs mating, Up:= D = + +dirtball n. + +[XEROX PARC] A small, perhaps struggling outsider; not in the +major or even the minor leagues. For example, "Xerox is not a +dirtball company". + +[Outsiders often observe in the PARC culture an institutional +arrogance which usage of this term exemplifies. The brilliance +and scope of PARC's contributions to computer science have been +such that this superior attitude is not much resented. --ESR] + + +Node:dirty power, Next:disclaimer, Previous:dirtball, Up:= D = + +dirty power n. + +Electrical mains voltage that is unfriendly to the delicate +innards of computers. Spikes, drop-outs, average voltage significantly +higher or lower than nominal, or just plain noise can all cause +problems of varying subtlety and severity (these are collectively +known as power hits). + + +Node:disclaimer, Next:Discordianism, Previous:dirty power, Up:= D = + +disclaimer n. + +[Usenet] Statement ritually appended to many Usenet postings +(sometimes automatically, by the posting software) reiterating +the fact (which should be obvious, but is easily forgotten) that +the article reflects its author's opinions and not necessarily +those of the organization running the machine through which the +article entered the network. + + +Node:Discordianism, Next:disk farm, Previous:disclaimer, Up:= D = + +Discordianism /dis-kor'di-*n-ism/ n. + +The veneration of Eris, a.k.a. +Discordia; widely popular among hackers. Discordianism was +popularized by Robert Shea and Robert Anton Wilson's novel +"Illuminatus!" as a sort of self-subverting Dada-Zen for +Westerners -- it should on no account be taken seriously but is +far more serious than most jokes. Consider, for example, the +Fifth Commandment of the Pentabarf, from "Principia Discordia": +"A Discordian is Prohibited of Believing What he Reads." +Discordianism is usually connected with an elaborate conspiracy +theory/joke involving millennia-long warfare between the +anarcho-surrealist partisans of Eris and a malevolent, +authoritarian secret society called the Illuminati. See Religion in Appendix B, Church of the SubGenius, +and ha ha only +serious. + + +Node:disk farm, Next:display hack, Previous:Discordianism, Up:= D = + +disk farm n. + +(also laundromat) A large +room or rooms filled with disk drives (esp. washing machines). + + +Node:display hack, Next:dispress, Previous:disk farm, Up:= D = + +display hack n. + +A program with the same approximate purpose as a kaleidoscope: +to make pretty pictures. Famous display hacks include munching squares, smoking clover, the BSD Unix +rain(6) program, worms(6) on +miscellaneous Unixes, and the X +kaleid(1) program. Display hacks can also be +implemented by creating text files containing numerous escape +sequences for interpretation by a video terminal; one notable +example displayed, on any VT100, a Christmas tree with twinkling +lights and a toy train circling its base. The hack value of a display hack is +proportional to the esthetic value of the images times the +cleverness of the algorithm divided by the size of the code. Syn. +psychedelicware. + + +Node:dispress, Next:Dissociated Press, Previous:display hack, Up:= D = + +dispress vt. + +[contraction of `Dissociated Press' due to eight-character +MS-DOS filenames] To apply the Dissociated Press algorithm to a +block of text. The resultant output is also referred to as a +'dispression'. + + +Node:Dissociated Press, Next:distribution, Previous:dispress, Up:= D = + +Dissociated Press n. + +[play on `Associated Press'; perhaps inspired by a reference +in the 1950 Bugs Bunny cartoon "What's Up, Doc?"] An algorithm +for transforming any text into potentially humorous garbage even +more efficiently than by passing it through a marketroid. The algorithm starts by +printing any N consecutive words (or letters) in the text. Then +at every step it searches for any random occurrence in the +original text of the last N words (or letters) already printed +and then prints the next word or letter. EMACS has a handy command for this. Here is a +short example of word-based Dissociated Press applied to an +earlier version of this Jargon File: + +wart: n. A small, crocky feature that sticks out of an array (C has no +checks for this). This is relatively benign and easy to spot if +the phrase is bent so as to be not worth paying attention to the +medium in question. + + +Here is a short example of letter-based Dissociated Press +applied to the same source: + +window sysIWYG: n. A bit was named aften /bee't*/ +prefer to use the other guy's re, especially in every cast a +chuckle on neithout getting into useful informash speech makes +removing a featuring a move or usage actual abstractionsidered +interj. Indeed spectace logic or problem! + + +A hackish idle pastime is to apply letter-based Dissociated +Press to a random body of text and vgrep the output in hopes of finding an +interesting new word. (In the preceding example, `window sysIWYG' +and `informash' show some promise.) Iterated applications of +Dissociated Press usually yield better results. Similar +techniques called `travesty generators' have been employed with +considerable satirical effect to the utterances of Usenet +flamers; see pseudo. + + +Node:distribution, Next:distro, Previous:Dissociated Press, Up:= D = + +distribution n. + +1. A software source tree packaged for distribution; but see +kit. Since about 1996 unqualified use +of this term often implies `Linux +distribution'. The short for distro +is often used for this sense. 2. A vague term encompassing +mailing lists and Usenet newsgroups (but not BBS fora); any +topic-oriented message channel with multiple recipients. 3. An +information-space domain (usually loosely correlated with +geography) to which propagation of a Usenet message is +restricted; a much-underutilized feature. + + +Node:distro, Next:disusered, Previous:distribution, Up:= D = + +distro n. + +Synonym for distribution, +sense 1. + + +Node:disusered, Next:do protocol, Previous:distro, Up:= +D = + +disusered adj. + +[Usenet] Said of a person whose account on a computer has been +removed, esp. for cause rather than through normal attrition. "He +got disusered when they found out he'd been cracking through the +school's Internet access." The verbal form `disuser' is live but +less common. Both usages probably derive from the DISUSER account +status flag on VMS; setting it disables the account. Compare +star out. + + +Node:do protocol, Next:doc, Previous:disusered, Up:= D = + +do protocol vi. + +[from network protocol programming] To perform an interaction +with somebody or something that follows a clearly defined +procedure. For example, "Let's do protocol with the check" at a +restaurant means to ask for the check, calculate the tip and +everybody's share, collect money from everybody, generate change +as necessary, and pay the bill. See protocol. + + +Node:doc, Next:documentation, Previous:do protocol, Up:= D = + +doc /dok/ n. + +Common spoken and written shorthand for `documentation'. Often +used in the plural `docs' and in the construction `doc file' +(i.e., documentation available on-line). + + +Node:documentation, Next:dodgy, Previous:doc, Up:= D = + + +documentation n. + +The multiple kilograms of macerated, pounded, steamed, +bleached, and pressed trees that accompany most modern software +or hardware products (see also tree-killer). Hackers seldom read paper +documentation and (too) often resist writing it; they prefer +theirs to be terse and on-line. A common comment on this +predilection is "You can't grep dead +trees". See drool-proof +paper, verbiage, treeware. + + +Node:dodgy, Next:dogcow, Previous:documentation, Up:= D = + +dodgy adj. + +Syn. with flaky. Preferred outside +the U.S. + + +Node:dogcow, Next:dogfood, Previous:dodgy, Up:= D += + +dogcow /dog'kow/ n. + +See Moof. The dogcow is a +semi-legendary creature that lurks in the depths of the Macintosh +Technical Notes Hypercard stack V3.1. The full story of the +dogcow is told in technical note #31 (the particular dogcow +illustrated is properly named `Clarus'). Option-shift-click will +cause it to emit a characteristic `Moof!' or `!fooM' sound. +Getting to tech note 31 is the hard part; to discover +how to do that, one must needs examine the stack script with a +hackerly eye. Clue: rot13 is +involved. A dogcow also appears if you choose `Page +Setup...' with a LaserWriter selected and click on +the `Options' button. It also lurks in other Mac printer drivers, +notably those for the now-discontinued Style Writers. Sadly, +Apple has removed the pages that used to describe the dogcow. + + +Node:dogfood, Next:dogpile, Previous:dogcow, Up:= D += + +dogfood n. + +[Microsoft, Netscape] Interim software used internally for +testing. "To eat one's own dogfood" (from which the slang noun +derives) means to use the software one is developing, as part of +one's everyday development environment (the phrase is used +outside Microsoft and Netscape). The practice is normal in the +Linux community and elsewhere, but the term `dogfood' is seldom +used as open-source betas tend to be quite tasty and nourishing. +The idea is that developers who are using their own software will +quickly learn what's missing or broken. Dogfood is typically not +even of beta quality. + + +Node:dogpile, Next:dogwash, Previous:dogfood, Up:= D += + +dogpile v. + +[Usenet: prob. fr. mainstream "puppy pile"] When many people +post unfriendly responses in short order to a single posting, +they are sometimes said to "dogpile" or "dogpile on" the person +to whom they're responding. For example, when a religious +missionary posts a simplistic appeal to _alt.atheism_, he +can expect to be dogpiled. It has been suggested that this +derives from U.S, football slang for a tackle involving three or +more people; among hackers, it seems at least as likely do derive +from an `autobiographical' Bugs Bunny cartoon in which a gang of +attacking canines actually yells "Dogpile on the rabbit!". + + +Node:dogwash, Next:domainist, Previous:dogpile, Up:= D += + +dogwash /dog'wosh/ + +[From a quip in the `urgency' field of a very optional +software change request, ca. 1982. It was something like +"Urgency: Wash your dog first".] 1. n. A project of minimal +priority, undertaken as an escape from more serious work. 2. v. +To engage in such a project. Many games and much freeware get written this way. + + +Node:domainist, Next:Don't do that then!, Previous:dogwash, Up:= D = + +domainist /doh-mayn'ist/ adj. + +1. [Usenet, by pointed analogy with "sexist", "racist", etc.] +Someone who judges people by the domain of their email addresses; +esp. someone who dismisses anyone who posts from a public +internet provider. "What do you expect from an article posted +from _aol.com_?" 2. Said of an Internet address (as opposed to a +bang path) because the part to +the right of the @ specifies a nested series of +`domains'; for example, esr@snark.thyrsus.com +specifies the machine called _snark_ in the subdomain called +_thyrsus_ within the top-level domain called _com_. See +also big-endian, sense 2. + +The meaning of this term has drifted. At one time sense 2 was +primary. In elder days it was also used of a site, mailer, or +routing program which knew how to handle domainist addresses; or +of a person (esp. a site admin) who preferred domain addressing, +supported a domainist mailer, or proselytized for domainist +addressing and disdained bang +paths. These senses are now (1996) obsolete, as +effectively all sites have converted. + + +Node:Don't do that then!, +Next:dongle, Previous:domainist, Up:= D = + +Don't do that then! imp. + +[from an old doctor's office joke about a patient with a +trivial complaint] Stock response to a user complaint. "When I +type control-S, the whole system comes to a halt for thirty +seconds." "Don't do that, then!" (or "So don't do that!"). +Compare RTFM. + +Here's a classic example of "Don't do that then!" from Neil +Stephenson's "In The Beginning Was The Command Line". A friend of +his built a network with a load of Macs and a few high-powered +database servers. He found that from time to time the whole +network would lock up for no apparent reason. The problem was +eventually tracked down to MacOS's cooperative multitasking: when +a user held down the mouse button for too long, the network stack +wouldn't get a chance to run... + + +Node:dongle, Next:dongle-disk, Previous:Don't do that then!, Up:= D = + +dongle /dong'gl/ n. + +1. [now obs.] A security or copy protection device for +proprietary software consisting of a serialized EPROM and some +drivers in a D-25 connector shell, which must be connected to an +I/O port of the computer while the program is run. Programs that +use a dongle query the port at startup and at programmed +intervals thereafter, and terminate if it does not respond with +the dongle's programmed validation code. Thus, users can make as +many copies of the program as they want but must pay for each +dongle. The idea was clever, but it was initially a failure, as +users disliked tying up a serial port this way. By 1993, dongles +would typically pass data through the port and monitor for magic codes (and combinations of status +lines) with minimal if any interference with devices further down +the line -- this innovation was necessary to allow daisy-chained +dongles for multiple pieces of software. These devices have +become rare as the industry has moved away from copy-protection +schemes in general. 2. By extension, any physical electronic key +or transferable ID required for a program to function. Common +variations on this theme have used parallel or even joystick +ports. See dongle-disk. 3. An +adaptor cable mating a special edge-type connector on a PCMCIA or +on-board Ethernet card to a standard RJ45 Ethernet jack. This +usage seems to have surfaced in 1999 and is now dominant. Laptop +owners curse these things because they're notoriously easy to +lose and the vendors commonly charge extortionate prices for +replacements. + +[Note: in early 1992, advertising copy from Rainbow +Technologies (a manufacturer of dongles) included a claim that +the word derived from "Don Gall", allegedly the inventor of the +device. The company's receptionist will cheerfully tell you that +the story is a myth invented for the ad copy. Nevertheless, I +expect it to haunt my life as a lexicographer for at least the +next ten years. :-( --ESR] + + +Node:dongle-disk, Next:donuts, Previous:dongle, Up:= D += + +dongle-disk /don'gl disk/ n. + +A special floppy disk that is required in order to perform +some task. Some contain special coding that allows an application +to identify it uniquely, others are special code that +does something that normally-resident programs don't or can't. +(For example, AT&T's "Unix PC" would only come up in root mode with a special boot disk.) +Also called a `key disk'. See dongle. + + +Node:donuts, Next:doorstop, Previous:dongle-disk, Up:= D = + +donuts n. obs. + +A collective noun for any set of memory bits. This usage is +extremely archaic and may no longer be live jargon; it dates from +the days of ferrite-core memories in +which each bit was implemented by a doughnut-shaped magnetic +flip-flop. + + +Node:doorstop, Next:DoS attack, Previous:donuts, Up:= D += + +doorstop n. + +Used to describe equipment that is non-functional and halfway +expected to remain so, especially obsolete equipment kept around +for political reasons or ostensibly as a backup. "When we get +another Wyse-50 in here, that ADM 3 will turn into a doorstop." +Compare boat anchor. + + +Node:DoS attack, Next:dot file, Previous:doorstop, Up:= +D = + +DoS attack // + +[Usenet,common; note that it's unrelated to `DOS' as name of +an operating system] Abbreviation for Denial-Of-Service attack. +This abbreviation is most often used of attempts to shut down +newsgroups with floods of spam, or to +flood network links with large amounts of traffic, or to flood +network links with large amounts of traffic, often by abusing +network broadcast addresses Compare slashdot effect. + + +Node:dot file, Next:double bucky, Previous:DoS attack, Up:= D = + +dot file [Unix] n. + +A file that is not visible by default to normal +directory-browsing tools (on Unix, files named with a leading dot +are, by convention, not normally presented in directory +listings). Many programs define one or more dot files in which +startup or configuration information may be optionally recorded; +a user can customize the program's behavior by creating the +appropriate file in the current or home directory. (Therefore, +dot files tend to creep -- with every +nontrivial application program defining at least one, a user's +home directory can be filled with scores of dot files, of course +without the user's really being aware of it.) See also profile (sense 1), rc file. + + +Node:double bucky, Next:doubled sig, Previous:dot file, Up:= D = + +double bucky adj. + +Using both the CTRL and META keys. "The command to burn all +LEDs is double bucky F." + +This term originated on the Stanford extended-ASCII keyboard, +and was later taken up by users of the space-cadet keyboard at MIT. A +typical MIT comment was that the Stanford bucky bits (control and meta shifting +keys) were nice, but there weren't enough of them; you could type +only 512 different characters on a Stanford keyboard. An obvious +way to address this was simply to add more shifting keys, and +this was eventually done; but a keyboard with that many shifting +keys is hard on touch-typists, who don't like to move their hands +away from the home position on the keyboard. It was +half-seriously suggested that the extra shifting keys be +implemented as pedals; typing on such a keyboard would be very +much like playing a full pipe organ. This idea is mentioned in a +parody of a very fine song by Jeffrey Moss called "Rubber +Duckie", which was published in "The Sesame Street Songbook" +(Simon and Schuster 1971, ISBN 0-671-21036-X). These lyrics were +written on May 27, 1978, in celebration of the Stanford +keyboard: + + Double Bucky + + Double bucky, you're the one! + You make my keyboard lots of fun. + Double bucky, an additional bit or two: + (Vo-vo-de-o!) + Control and meta, side by side, + Augmented ASCII, nine bits wide! + Double bucky! Half a thousand glyphs, plus a few! + Oh, + I sure wish that I + Had a couple of + Bits more! + Perhaps a + Set of pedals to + Make the number of + Bits four: + Double double bucky! + Double bucky, left and right + OR'd together, outta sight! + Double bucky, I'd like a whole word of + Double bucky, I'm happy I heard of + Double bucky, I'd like a whole word of you! + + --- The Great Quux (with apologies to Jeffrey Moss) + + +[This, by the way, is an excellent example of computer filk --ESR] See also meta bit, cokebottle, and quadruple bucky. + + +Node:doubled sig, Next:down, Previous:double bucky, Up:= D = + +doubled sig [Usenet] n. + +A sig block that has been +included twice in a Usenet article +or, less commonly, in an electronic mail message. An article or +message with a doubled sig can be caused by improperly configured +software. More often, however, it reveals the author's lack of +experience in electronic communication. See B1FF, pseudo. + + +Node:down, Next:download, Previous:doubled sig, Up:= D = + +down + +1. adj. Not operating. "The up escalator is down" is +considered a humorous thing to say (unless of course you were +expecting to use it), and "The elevator is down" always means +"The elevator isn't working" and never refers to what floor the +elevator is on. With respect to computers, this term has passed +into the mainstream; the extension to other kinds of machine is +still confined to techies (e.g. boiler mechanics may speak of a +boiler being down). 2. `go down' vi. To stop functioning; usually +said of the system. The message from +the console that every hacker hates +to hear from the operator is "System going down in 5 minutes". 3. +`take down', `bring down' vt. To deactivate purposely, usually +for repair work or PM. "I'm taking the +system down to work on that bug in the tape drive." Occasionally +one hears the word `down' by itself used as a verb in this vt. +sense. See crash; oppose up. + + +Node:download, Next:DP, Previous:down, +Up:= D = + +download vt. + +To transfer data or (esp.) code from a far-away system +(especially a larger `host' system) over a digital communications +link to a nearby system (especially a smaller `client' system. +Oppose upload. + +Historical use of these terms was at one time associated with +transfers from large timesharing machines to PCs or peripherals +(download) and vice-versa (upload). The modern usage relative to +the speaker (rather than as an indicator of the size and role of +the machines) evolved as machine categories lost most of their +former functional importance. + + +Node:DP, Next:DPB, +Previous:download, Up:= D = + +DP /D-P/ n. + +1. Data Processing. Listed here because, according to hackers, +use of the term marks one immediately as a suit. See DPer. 2. +Common abbrev for Dissociated +Press. + + +Node:DPB, Next:DPer, Previous:DP, +Up:= D = + +DPB /d*-pib'/ vt. + +[from the PDP-10 instruction set] To plop something down in +the middle. Usage: silly. "DPB yourself into that couch there." +The connotation would be that the couch is full except for one +slot just big enough for one last person to sit in. DPB means +`DePosit Byte', and was the name of a PDP-10 instruction that +inserts some bits into the middle of some other bits. Hackish +usage has been kept alive by the Common LISP function of the same +name. + + +Node:DPer, Next:Dr. Fred Mbogo, Previous:DPB, Up:= D = + +DPer /dee-pee-er/ n. + +Data Processor. Hackers are absolutely amazed that suits use this term self-referentially. +Computers process data, not people! See DP. + + +Node:Dr. Fred Mbogo, Next:dragon, Previous:DPer, Up:= D += + +Dr. Fred Mbogo /*m-boh'goh, dok'tr fred/ n. + +[Stanford] The archetypal man you don't want to see about a +problem, esp. an incompetent professional; a shyster. "Do you +know a good eye doctor?" "Sure, try Mbogo Eye Care and +Professional Dry Cleaning." The name comes from synergy between +bogus and the original Dr. Mbogo, a +witch doctor who was Gomez Addams' physician on the old "Addams +Family" TV show. Interestingly enough, it turns out that under +the rules for Swahili noun classes, `m-' is the characteristic +prefix of "nouns referring to human beings". As such, "mbogo" is +quite plausible as a Swahili coinage for a person having the +nature of a bogon. Compare Bloggs Family and J. Random Hacker; see also Fred Foobar and fred. + + +Node:dragon, Next:Dragon Book, Previous:Dr. Fred Mbogo, Up:= D = + +dragon n. + +[MIT] A program similar to a daemon, except that it is not invoked at all, +but is instead used by the system to perform various secondary +tasks. A typical example would be an accounting program, which +keeps track of who is logged in, accumulates load-average +statistics, etc. Under ITS, many terminals displayed a list of +people logged in, where they were, what they were running, etc., +along with some random picture (such as a unicorn, Snoopy, or the +Enterprise), which was generated by the `name dragon'. Usage: +rare outside MIT -- under Unix and most other OSes this would be +called a `background demon' or daemon. The best-known Unix example of a dragon +is cron(1). At SAIL, they called this sort of thing +a `phantom'. + + +Node:Dragon Book, Next:drain, Previous:dragon, Up:= D += + +Dragon Book n. + +The classic text "Compilers: Principles, Techniques and +Tools", by Alfred V. Aho, Ravi Sethi, and Jeffrey D. Ullman +(Addison-Wesley 1986; ISBN 0-201-10088-6), so called because of +the cover design featuring a dragon labeled `complexity of +compiler design' and a knight bearing the lance `LALR parser +generator' among his other trappings. This one is more +specifically known as the `Red Dragon Book' (1986); an earlier +edition, sans Sethi and titled "Principles Of Compiler Design" +(Alfred V. Aho and Jeffrey D. Ullman; Addison-Wesley, 1977; ISBN +0-201-00022-9), was the `Green Dragon Book' (1977). (Also `New +Dragon Book', `Old Dragon Book'.) The horsed knight and the Green +Dragon were warily eying each other at a distance; now the knight +is typing (wearing gauntlets!) at a terminal showing a video-game +representation of the Red Dragon's head while the rest of the +beast extends back in normal space. See also book titles. + + +Node:drain, Next:dread high-bit disease, +Previous:Dragon Book, +Up:= D = + +drain v. + +[IBM] Syn. for flush (sense 2). +Has a connotation of finality about it; one speaks of draining a +device before taking it offline. + + +Node:dread high-bit +disease, Next:Dread Questionmark Disease, +Previous:drain, Up:= D = + +dread high-bit disease n. + +A condition endemic to some now-obsolete computers and +peripherals (including ASR-33 teletypes and PRIME minicomputers) +that results in all characters having their high (0x80) bit +forced on. This of course makes transporting files to other +systems much more difficult, not to mention the problems these +machines have talking with true 8-bit devices. + +This term was originally used specifically of PRIME (a.k.a. +PR1ME) minicomputers. Folklore has it that PRIME adopted the +reversed-8-bit convention in order to save 25 cents per serial +line per machine; PRIME old-timers, on the other hand, claim they +inherited the disease from Honeywell via customer NASA's +compatibility requirements and struggled heroically to cure it. +Whoever was responsible, this probably qualifies as one of the +most cretinous design tradeoffs +ever made. See meta bit. + + +Node:Dread Questionmark +Disease, Next:DRECNET, +Previous:dread high-bit disease, Up:= D = + +Dread Questionmark Disease + +n. The result of saving HTML from Microsoft Word or some other +program that uses the nonstandard Microsoft variant of Latin-1; +the symptom is that various of those nonstandard characters in +positions 128-160 show up as questionmarks. The usual culprit is +the misnamed `smart quotes' feature in Microsoft Word. For more +details (and a program called `demoroniser' that cleans up the +mess) see http://www.fourmilab.ch/webtools/demoroniser/. + + +Node:DRECNET, Next:driver, Previous:Dread Questionmark Disease, +Up:= D = + +DRECNET /drek'net/ n. + +[from Yiddish/German `dreck', meaning filth] Deliberate +distortion of DECNET, a networking protocol used in the VMS community. So called because DEC helped write the Ethernet specification and +then (either stupidly or as a malignant customer-control tactic) +violated that spec in the design of DRECNET in a way that made it +incompatible. See also connector conspiracy. + + +Node:driver, Next:droid, Previous:DRECNET, Up:= D += + +driver n. + +1. The main loop of an +event-processing program; the code that gets commands and +dispatches them for execution. 2. [techspeak] In `device driver', +code designed to handle a particular peripheral device such as a +magnetic disk or tape unit. 3. In the TeX world and the +computerized typesetting world in general, a program that +translates some device-independent or other common format to +something a real device can actually understand. + + +Node:droid, Next:drone, Previous:driver, Up:= D += + +droid n. + +[from `android', SF terminology for a humanoid robot of +essentially biological (as opposed to mechanical/electronic) +construction] A person (esp. a low-level bureaucrat or +service-business employee) exhibiting most of the following +characteristics: (a) naive trust in the wisdom of the parent +organization or `the system'; (b) a blind-faith propensity to +believe obvious nonsense emitted by authority figures (or +computers!); (c) a rule-governed mentality, one unwilling or +unable to look beyond the `letter of the law' in exceptional +situations; (d) a paralyzing fear of official reprimand or worse +if Procedures are not followed No Matter What; and (e) no +interest in doing anything above or beyond the call of a very +narrowly-interpreted duty, or in particular in fixing that which +is broken; an "It's not my job, man" attitude. + +Typical droid positions include supermarket checkout assistant +and bank clerk; the syndrome is also endemic in low-level +government employees. The implication is that the rules and +official procedures constitute software that the droid is +executing; problems arise when the software has not been properly +debugged. The term `droid mentality' is also used to describe the +mindset behind this behavior. Compare suit, marketroid; see -oid. + +In England there is equivalent mainstream slang; a `jobsworth' +is an obstructive, rule-following bureaucrat, often of the +uniformed or suited variety. Named for the habit of denying a +reasonable request by sucking his teeth and saying "Oh no, guv, +sorry I can't help you: that's more than my job's worth". + + +Node:drone, Next:drool-proof paper, Previous:droid, Up:= D = + +drone n. + +Ignorant sales or customer service personnel in computer or +electronics superstores. Characterized by a lack of even +superficial knowledge about the products they sell, yet possessed +of the conviction that they are more competent than their hacker +customers. Usage: "That video board probably sucks, it was +recommended by a drone at Fry's" In the year 2000, their natural +habitats include Fry's Electronics, Best Buy, and CompUSA. + + +Node:drool-proof paper, Next:drop on the floor, +Previous:drone, Up:= D = + +drool-proof paper n. + +Documentation that has been obsessively dumbed down, to the point where only a +cretin could bear to read it, is +said to have succumbed to the `drool-proof paper syndrome' or to +have been `written on drool-proof paper'. For example, this is an +actual quote from Apple's LaserWriter manual: "Do not expose your +LaserWriter to open fire or flame." The SGI Indy manual is said +to include the line "Do not dangle the mouse by the cord or throw +it at coworkers.", but this sounds like parody. + + +Node:drop on the floor, +Next:drop-ins, Previous:drool-proof paper, +Up:= D = + +drop on the floor vt. + +To react to an error condition by silently discarding messages +or other valuable data. "The gateway ran out of memory, so it +just started dropping packets on the floor." Also frequently used +of faulty mail and netnews relay sites that lose messages. See +also black hole, bit bucket. + + +Node:drop-ins, Next:drop-outs, Previous:drop on the floor, Up:= D = + +drop-ins n. + +[prob. by analogy with drop-outs] Spurious characters appearing on +a terminal or console as a result of line noise or a system +malfunction of some sort. Esp. used when these are interspersed +with one's own typed input. Compare drop-outs, sense 2. + + +Node:drop-outs, Next:drugged, Previous:drop-ins, Up:= +D = + +drop-outs n. + +1. A variety of `power glitch' (see glitch); momentary 0 voltage on the electrical +mains. 2. Missing characters in typed input due to software +malfunction or system saturation (one cause of such behavior +under Unix when a bad connection to a modem swamps the processor +with spurious character interrupts; see screaming tty). 3. Mental glitches; +used as a way of describing those occasions when the mind just +seems to shut down for a couple of beats. See glitch, fried. + + +Node:drugged, Next:drum, Previous:drop-outs, Up:= D = + +drugged adj. + +(also `on drugs') 1. Conspicuously stupid, heading toward +brain-damaged. Often +accompanied by a pantomime of toking a joint. 2. Of hardware, +very slow relative to normal performance. + + +Node:drum, Next:drunk mouse syndrome, Previous:drugged, Up:= D = + +drum adj, n. + +Ancient techspeak term referring to slow, cylindrical magnetic +media that were once state-of-the-art storage devices. Under BSD +Unix the disk partition used for swapping is still called +/dev/drum; this has led to considerable humor and +not a few straight-faced but utterly bogus `explanations' getting +foisted on newbies. See also "The Story of Mel" in +Appendix A. + + +Node:drunk mouse syndrome, +Next:dub dub dub, +Previous:drum, Up:= D = + +drunk mouse syndrome n. + +(also `mouse on drugs') A malady exhibited by the mouse +pointing device of some computers. The typical symptom is for the +mouse cursor on the screen to move in random directions and not +in sync with the motion of the actual mouse. Can usually be +corrected by unplugging the mouse and plugging it back again. +Another recommended fix for optical mice is to rotate your mouse +pad 90 degrees. + +At Xerox PARC in the 1970s, most people kept a can of copier +cleaner (isopropyl alcohol) at their desks. When the steel ball +on the mouse had picked up enough cruft to be unreliable, the mouse was doused in +cleaner, which restored it for a while. However, this operation +left a fine residue that accelerated the accumulation of cruft, +so the dousings became more and more frequent. Finally, the mouse +was declared `alcoholic' and sent to the clinic to be dried out +in a CFC ultrasonic bath. + + +Node:dub dub dub, Next:Duff's device, Previous:drunk mouse +syndrome, Up:= D = + +dub dub dub + +[common] Spoken-only shorthand for the "www" (double-u +double-u double-u) in many web host names. Nothing to do with the +style of reggae music called `dub'. + + +Node:Duff's device, Next:dumb terminal, Previous:dub dub dub, Up:= D = + +Duff's device n. + +The most dramatic use yet seen of fall through in C, invented by Tom Duff +when he was at Lucasfilm. Trying to bum +all the instructions he could out of an inner loop that copied +data serially onto an output port, he decided to unroll it. He +then realized that the unrolled version could be implemented by +interlacing the structures of a switch and a loop: + + register n = (count + 7) / 8; /* count > 0 assumed */ + + switch (count % 8) + { + case 0: do { *to = *from++; + case 7: *to = *from++; + case 6: *to = *from++; + case 5: *to = *from++; + case 4: *to = *from++; + case 3: *to = *from++; + case 2: *to = *from++; + case 1: *to = *from++; + } while (--n > 0); + } + + +Shocking though it appears to all who encounter it for the +first time, the device is actually perfectly valid, legal C. C's +default fall through in case +statements has long been its most controversial single feature; +Duff observed that "This code forms some sort of argument in that +debate, but I'm not sure whether it's for or against." Duff has +discussed the device in detail at http://www.lysator.liu.se/c/duffs-device.html. +Note that the omission of postfix ++ from +*to was intentional (though confusing). Duff's +device can be used to implement memory copy, but the original aim +was to copy values serially into a magic IO register. + +[For maximal obscurity, the outermost pair of braces above +could actually be removed -- GLS] + + +Node:dumb terminal, Next:dumbass attack, Previous:Duff's device, Up:= D = + +dumb terminal n. + +A terminal that is one step above a glass tty, having a minimally addressable +cursor but no on-screen editing or other features normally +supported by a smart +terminal. Once upon a time, when glass ttys were common +and addressable cursors were something special, what is now +called a dumb terminal could pass for a smart terminal. + + +Node:dumbass attack, Next:dumbed down, Previous:dumb terminal, Up:= D = + +dumbass attack /duhm'as *-tak'/ n. + +[Purdue] Notional cause of a novice's mistake made by the +experienced, especially one made while running as root under Unix, e.g., typing rm -r +* or mkfs on a mounted file system. Compare +adger. + + +Node:dumbed down, Next:dump, Previous:dumbass attack, Up:= D = + +dumbed down adj. + +Simplified, with a strong connotation of +oversimplified. Often, a marketroid will insist that the interfaces +and documentation of software be dumbed down after the designer +has burned untold gallons of midnight oil making it smart. This +creates friction. See user-friendly. + + +Node:dump, Next:dumpster diving, Previous:dumbed down, Up:= D = + +dump n. + +1. An undigested and voluminous mass of information about a +problem or the state of a system, especially one routed to the +slowest available output device (compare core dump), and most especially one +consisting of hex or octal runes +describing the byte-by-byte state of memory, mass storage, or +some file. In elder days, +debugging was generally done by `groveling over' a dump (see +grovel); increasing use of +high-level languages and interactive debuggers has made such +tedium uncommon, and the term `dump' now has a faintly archaic +flavor. 2. A backup. This usage is typical only at large +timesharing installations. + + +Node:dumpster diving, Next:dup killer, Previous:dump, Up:= D = + +dumpster diving /dump'-ster di:'-ving/ n. + +1. The practice of sifting refuse from an office or technical +installation to extract confidential data, especially +security-compromising information (`dumpster' is an Americanism +for what is elsewhere called a `skip'). Back in AT&T's +monopoly days, before paper shredders became common office +equipment, phone phreaks (see phreaking) used to organize regular dumpster +runs against phone company plants and offices. Discarded and +damaged copies of AT&T internal manuals taught them much. The +technique is still rumored to be a favorite of crackers operating +against careless targets. 2. The practice of raiding the +dumpsters behind buildings where producers and/or consumers of +high-tech equipment are located, with the expectation (usually +justified) of finding discarded but still-valuable equipment to +be nursed back to health in some hacker's den. Experienced +dumpster-divers not infrequently accumulate basements full of +moldering (but still potentially useful) cruft. + + +Node:dup killer, Next:dup loop, Previous:dumpster diving, Up:= D = + +dup killer /d[y]oop kill'r/ n. + +[FidoNet] Software that is supposed to detect and delete +duplicates of a message that may have reached the FidoNet system +via different routes. + + +Node:dup loop, Next:dusty deck, Previous:dup killer, Up:= D = + +dup loop /d[y]oop loop/ (also `dupe loop') n. + +[FidoNet] An infinite stream of duplicated, near-identical +messages on a FidoNet echo, the only +difference being unique or mangled identification information +applied by a faulty or incorrectly configured system or network +gateway, thus rendering dup +killers ineffective. If such a duplicate message +eventually reaches a system through which it has already passed +(with the original identification information), all systems +passed on the way back to that system are said to be involved in +a dup loop. + + +Node:dusty deck, Next:DWIM, Previous:dup loop, Up:= D = + +dusty deck n. + +Old software (especially applications) which one is obliged to +remain compatible with, or to maintain (DP types call this `legacy code', a term hackers +consider smarmy and excessively reverent). The term implies that +the software in question is a holdover from card-punch days. Used +esp. when referring to old scientific and number-crunching software, much of +which was written in FORTRAN and very poorly documented but is +believed to be too expensive to replace. See fossil; compare crawling horror. + + +Node:DWIM, Next:dynner, Previous:dusty deck, Up:= D = + +DWIM /dwim/ + +[acronym, `Do What I Mean'] 1. adj. Able to guess, sometimes +even correctly, the result intended when bogus input was +provided. 2. n. obs. The BBNLISP/INTERLISP function that +attempted to accomplish this feat by correcting many of the more +common errors. See hairy. 3. +Occasionally, an interjection hurled at a balky computer, esp. +when one senses one might be tripping over legalisms (see legalese). 4. Of a person, someone whose +directions are incomprehensible and vague, but who nevertheless +has the expectation that you will solve the problem using the +specific method he/she has in mind. + +Warren Teitelman originally wrote DWIM to fix his typos and +spelling errors, so it was somewhat idiosyncratic to his style, +and would often make hash of anyone else's typos if they were +stylistically different. Some victims of DWIM thus claimed that +the acronym stood for `Damn Warren's Infernal Machine!'. + +In one notorious incident, Warren added a DWIM feature to the +command interpreter used at Xerox PARC. One day another hacker +there typed delete *$ to free up some disk space. +(The editor there named backup files by appending $ +to the original file name, so he was trying to delete any backup +files left over from old editing sessions.) It happened that +there weren't any editor backup files, so DWIM helpfully reported +*$ not found, assuming you meant 'delete *'. It then +started to delete all the files on the disk! The hacker managed +to stop it with a Vulcan +nerve pinch after only a half dozen or so files were +lost. + +The disgruntled victim later said he had been sorely tempted +to go to Warren's office, tie Warren down in his chair in front +of his workstation, and then type delete *$ +twice. + +DWIM is often suggested in jest as a desired feature for a +complex program; it is also occasionally described as the single +instruction the ideal computer would have. Back when proofs of +program correctness were in vogue, there were also jokes about +`DWIMC' (Do What I Mean, Correctly). A related term, more often +seen as a verb, is DTRT (Do The Right Thing); see Right Thing. + + +Node:dynner, Next:earthquake, Previous:DWIM, Up:= D = + + +dynner /din'r/ n. + +32 bits, by analogy with nybble +and byte. Usage: rare and extremely +silly. See also playte, tayste, crumb. +General discussion of such terms is under nybble. + + +Node:= E =, Next:= F =, Previous:= D =, Up:The Jargon Lexicon + += E = + + +earthquake: + + +Easter egg: + + +Easter egging: + + +eat flaming death: + + +EBCDIC: + + +echo: + + +ECP: + + +ed: + + +egosurf: + + +eighty-column mind: + + +El Camino Bignum: + + +elder days: + + +elegant: + + +elephantine: + + +elevator +controller: + + +elite: + + +ELIZA effect: + + +elvish: + + +EMACS: + + +email: + + +emoticon: + + +EMP: + + +empire: + + +engine: + + +English: + + +enhancement: + + +ENQ: + + +EOF: + + +EOL: + + +EOU: + + +epoch: + + +epsilon: + + +epsilon squared: + + +era the: + + +Eric Conspiracy: + + +Eris: + + +erotics: + + +error 33: + + +eurodemo: + + +evil: + + +evil and rude: + + +Evil Empire: + + +exa-: + + +examining the +entrails: + + +EXCH: + + +excl: + + +EXE: + + +exec: + + +exercise left as +an: + + +Exon: + + +Exploder: + + +exploit: + + +external memory: + + +eye candy: + + +eyeball search: + + +Node:earthquake, Next:Easter egg, Previous:dynner, Up:= +E = + +earthquake n. + +[IBM] The ultimate real-world shock test for computer +hardware. Hackish sources at IBM deny the rumor that the Bay Area +quake of 1989 was initiated by the company to test +quality-assurance procedures at its California plants. + + +Node:Easter egg, Next:Easter egging, Previous:earthquake, Up:= E = + +Easter egg n. + +[from the custom of the Easter Egg hunt observed in the U.S. +and many parts of Europe] 1. A message hidden in the object code +of a program as a joke, intended to be found by persons +disassembling or browsing the code. 2. A message, graphic, or +sound effect emitted by a program (or, on a PC, the BIOS ROM) in +response to some undocumented set of commands or keystrokes, +intended as a joke or to display program credits. One well-known +early Easter egg found in a couple of OSes caused them to respond +to the command make love with not war?. +Many personal computers have much more elaborate eggs hidden in +ROM, including lists of the developers' names, political +exhortations, snatches of music, and (in one case) graphics +images of the entire development team. + + +Node:Easter egging, Next:eat flaming death, +Previous:Easter egg, +Up:= E = + +Easter egging n. + +[IBM] The act of replacing unrelated components more or less +at random in hopes that a malfunction will go away. Hackers +consider this the normal operating mode of field circus techs and do not love them +for it. See also the jokes under field circus. Compare shotgun debugging. + + +Node:eat flaming death, +Next:EBCDIC, Previous:Easter egging, Up:= E = + +eat flaming death imp. + +A construction popularized among hackers by the infamous CPU Wars comic; supposedly derive from +a famously turgid line in a WWII-era anti-Nazi propaganda comic +that ran "Eat flaming death, non-Aryan mongrels!" or something of +the sort (however, it is also reported that the Firesign +Theatre's 1975 album "In The Next World, You're On Your Own" a +character won the right to scream "Eat flaming death, fascist +media pigs" in the middle of Oscar night on a game show; this may +have been an influence). Used in humorously overblown expressions +of hostility. "Eat flaming death, EBCDIC users!" + + +Node:EBCDIC, Next:echo, Previous:eat flaming death, Up:= E = + +EBCDIC /eb's*-dik/, /eb'see`dik/, or /eb'k*-dik/ n. + +[abbreviation, Extended Binary Coded Decimal Interchange Code] +An alleged character set used on IBM dinosaurs. It exists in at least six mutually +incompatible versions, all featuring such delights as +non-contiguous letter sequences and the absence of several ASCII +punctuation characters fairly important for modern computer +languages (exactly which characters are absent varies according +to which version of EBCDIC you're looking at). IBM adapted EBCDIC +from punched card code in +the early 1960s and promulgated it as a customer-control tactic +(see connector +conspiracy), spurning the already established ASCII +standard. Today, IBM claims to be an open-systems company, but +IBM's own description of the EBCDIC variants and how to convert +between them is still internally classified top-secret, +burn-before-reading. Hackers blanch at the very name of +EBCDIC and consider it a manifestation of purest evil. See also fear and loathing. + + +Node:echo, Next:ECP, Previous:EBCDIC, Up:= E += + +echo [FidoNet] n. + +A topic group on FidoNet's echomail system. Compare newsgroup. + + +Node:ECP, Next:ed, +Previous:echo, Up:= E = + +ECP /E-C-P/ n. + +See spam and velveeta. + + +Node:ed, Next:egosurf, Previous:ECP, Up:= E = + + +ed n. + +"ed is the standard text editor." Line taken from original the +Unix manual page on ed, an ancient +line-oriented editor that is by now used only by a few Real Programmers, and even then +only for batch operations. The original line is sometimes uttered +near the beginning of an emacs vs. vi holy war on Usenet, with the (vain) hope to quench the +discussion before it really takes off. Often followed by a +standard text describing the many virtues of ed (such as the +small memory footprint on a Timex +Sinclair, and the consistent (because nearly non-existent) user +interface). + + +Node:egosurf, Next:eighty-column mind, Previous:ed, Up:= E = + +egosurf vi. + +To search the net for your name or links to your web pages. +Perhaps connected to long-established SF-fan slang `egoscan', to +search for one's name in a fanzine. + + +Node:eighty-column mind, +Next:El Camino +Bignum, Previous:egosurf, Up:= E += + +eighty-column mind n. + +[IBM] The sort said to be possessed by persons for whom the +transition from punched card +to tape was traumatic (nobody has dared tell them about disks +yet). It is said that these people, including (according to an +old joke) the founder of IBM, will be buried `face down, 9-edge +first' (the 9-edge being the bottom of the card). This directive +is inscribed on IBM's 1402 and 1622 card readers and is +referenced in a famous bit of doggerel called "The Last Bug", the +climactic lines of which are as follows: + + He died at the console + Of hunger and thirst. + Next day he was buried, + Face down, 9-edge first. + + +The eighty-column mind was thought by most hackers to dominate +IBM's customer base and its thinking. This only began to change +in the mid-1990s when IBM began to reinvent itself after the +triumph of the killer micro. +See IBM, fear and loathing, card walloper. A copy of "The Last +Bug" lives on the the GNU site at http://www.gnu.org/fun/jokes/last.bug.html. + + +Node:El Camino Bignum, Next:elder days, Previous:eighty-column mind, +Up:= E = + +El Camino Bignum /el' k*-mee'noh big'nuhm/ n. + +The road mundanely called El Camino Real, running along San +Francisco peninsula. It originally extended all the way down to +Mexico City; many portions of the old road are still intact. +Navigation on the San Francisco peninsula is usually done +relative to El Camino Real, which defines logical north and south even though it isn't +really north-south in many places. El Camino Real runs right past +Stanford University and so is familiar to hackers. + +The Spanish word `real' (which has two syllables: /ray-ahl'/) +means `royal'; El Camino Real is `the royal road'. In the FORTRAN +language, a `real' quantity is a number typically precise to +seven significant digits, and a `double precision' quantity is a +larger floating-point number, precise to perhaps fourteen +significant digits (other languages have similar `real' +types). + +When a hacker from MIT visited Stanford in 1976, he remarked +what a long road El Camino Real was. Making a pun on `real', he +started calling it `El Camino Double Precision' -- but when the +hacker was told that the road was hundreds of miles long, he +renamed it `El Camino Bignum', and that name has stuck. (See +bignum.) + +[GLS has since let slip that the unnamed hacker in this story +was in fact himself --ESR] + +In recent years, the synonym `El Camino Virtual' has been +reported as an alternate at IBM and Amdahl sites in the Valley. +Mathematically literate hackers in the Valley have also been +heard to refer to some major cross-street intersecting El Camino +Real as "El Camino Imaginary". One popular theory is that the +intersection is located near Moffett Field - where they keep all +those complex planes. + + +Node:elder days, Next:elegant, Previous:El Camino Bignum, Up:= E = + +elder days n. + +The heroic age of hackerdom (roughly, pre-1980); the era of +the PDP-10, TECO, ITS, and the +ARPANET. This term has been rather consciously adopted from J. R. +R. Tolkien's fantasy epic "The Lord of the Rings". Compare Iron Age; see also elvish and Great +Worm. + + +Node:elegant, Next:elephantine, Previous:elder days, Up:= E = + +elegant adj. + +[common; from mathematical usage] Combining simplicity, power, +and a certain ineffable grace of design. Higher praise than +`clever', `winning', or even cuspy. + +The French aviator, adventurer, and author Antoine de +Saint-Exupéry, probably best known for his classic +children's book "The Little Prince", was also an aircraft +designer. He gave us perhaps the best definition of engineering +elegance when he said "A designer knows he has achieved +perfection not when there is nothing left to add, but when there +is nothing left to take away." + + +Node:elephantine, Next:elevator controller, +Previous:elegant, Up:= E = + +elephantine adj. + +Used of programs or systems that are both conspicuous hogs (owing perhaps to poor design founded on +brute force and +ignorance) and exceedingly hairy in source form. An elephantine program may +be functional and even friendly, but (as in the old joke about +being in bed with an elephant) it's tough to have around all the +same (and, like a pachyderm, difficult to maintain). In extreme +cases, hackers have been known to make trumpeting sounds or +perform expressive proboscatory mime at the mention of the +offending program. Usage: semi-humorous. Compare `has the +elephant nature' and the somewhat more pejorative monstrosity. See also second-system effect and baroque. + + +Node:elevator controller, +Next:elite, Previous:elephantine, Up:= E = + +elevator controller n. + +An archetypal dumb embedded-systems application, like toaster (which superseded it). During one +period (1983-84) in the deliberations of ANSI X3J11 (the C +standardization committee) this was the canonical example of a +really stupid, memory-limited computation environment. "You can't +require printf(3) to be part of the default runtime +library -- what if you're targeting an elevator controller?" +Elevator controllers became important rhetorical weapons on both +sides of several holy wars. + + +Node:elite, Next:ELIZA effect, Previous:elevator controller, Up:= E = + +elite adj. + +Clueful. Plugged-in. One of the cognoscenti. Also used as a +general positive adjective. This term is not actually native +hacker slang; it is used primarily by crackers and warez d00dz, for which reason hackers +use it only with heavy irony. The term used to refer to the folks +allowed in to the "hidden" or "privileged" sections of BBSes in +the early 1980s (which, typically, contained pirated software). +Frequently, early boards would only let you post, or even see, a +certain subset of the sections (or `boards') on a BBS. Those who +got to the frequently legendary `triple super secret' boards were +elite. Misspellings of this term in warez d00dz style abound; the +forms `eleet', and `31337' (among others) have been sighted. + +A true hacker would be more likely to use `wizardly'. Oppose +lamer. + + +Node:ELIZA effect, Next:elvish, Previous:elite, Up:= E += + +ELIZA effect /*-li:'z* *-fekt'/ n. + +[AI community] The tendency of humans to attach associations +to terms from prior experience. For example, there is nothing +magic about the symbol + that makes it well-suited +to indicate addition; it's just that people associate it with +addition. Using + or `plus' to mean addition in a +computer language is taking advantage of the ELIZA effect. + +This term comes from the famous ELIZA program by Joseph +Weizenbaum, which simulated a Rogerian psychotherapist by +rephrasing many of the patient's statements as questions and +posing them to the patient. It worked by simple pattern +recognition and substitution of key words into canned phrases. It +was so convincing, however, that there are many anecdotes about +people becoming very emotionally caught up in dealing with ELIZA. +All this was due to people's tendency to attach to words meanings +which the computer never put there. The ELIZA effect is a Good Thing when writing a +programming language, but it can blind you to serious +shortcomings when analyzing an Artificial Intelligence system. +Compare ad-hockery; see also +AI-complete. Sources for a +clone of the original Eliza are available at +ftp://ftp.cc.utexas.edu/pub/AI_ATTIC/Programs/Classic/Eliza/Eliza.c. + + +Node:elvish, Next:EMACS, Previous:ELIZA effect, Up:= E = + +elvish n. + +1. The Tengwar of Feanor, a table of letterforms resembling +the beautiful Celtic half-uncial hand of the "Book of Kells". +Invented and described by J. R. R. Tolkien in "The Lord of The +Rings" as an orthography for his fictional `elvish' languages, +this system (which is both visually and phonetically elegant) has long fascinated hackers (who tend +to be intrigued by artificial languages in general). It is +traditional for graphics printers, plotters, window systems, and +the like to support a Feanorian typeface as one of their demo +items. See also elder days. 2. +By extension, any odd or unreadable typeface produced by a +graphics device. 3. The typeface mundanely called `Böcklin', +an art-Noveau display font. + + +Node:EMACS, Next:email, Previous:elvish, Up:= E += + +EMACS /ee'maks/ n. + +[from Editing MACroS] The ne plus ultra of hacker editors, a +programmable text editor with an entire LISP system inside it. It +was originally written by Richard Stallman in TECO under ITS at the +MIT AI lab; AI Memo 554 described it as "an advanced, +self-documenting, customizable, extensible real-time display +editor". It has since been reimplemented any number of times, by +various hackers, and versions exist that run under most major +operating systems. Perhaps the most widely used version, also +written by Stallman and now called "GNU +EMACS" or GNUMACS, runs principally +under Unix. (Its close relative XEmacs is the second most popular +version.) It includes facilities to run compilation subprocesses +and send and receive mail or news; many hackers spend up to 80% +of their tube time inside it. +Other variants include GOSMACS, CCA +EMACS, UniPress EMACS, Montgomery EMACS, jove, epsilon, and +MicroEMACS. (Though we use the original all-caps spelling here, +it is nowadays very commonly `Emacs'.) + +Some EMACS versions running under window managers iconify as +an overflowing kitchen sink, perhaps to suggest the one feature +the editor does not (yet) include. Indeed, some hackers find +EMACS too heavyweight and baroque for their taste, and expand the +name as `Escape Meta Alt Control Shift' to spoof its heavy +reliance on keystrokes decorated with bucky bits. Other spoof expansions +include `Eight Megabytes And Constantly Swapping' (from when that +was a lot of core), `Eventually +malloc()s All Computer Storage', and `EMACS Makes A +Computer Slow' (see recursive +acronym). See also vi. + + +Node:email, Next:emoticon, Previous:EMACS, Up:= E += + +email /ee'mayl/ + +(also written `e-mail' and `E-mail') 1. n. Electronic mail +automatically passed through computer networks and/or via modems +over common-carrier lines. Contrast snail-mail, paper-net, voice-net. See network address. 2. vt. To send +electronic mail. + +Oddly enough, the word `emailed' is actually listed in the +OED; it means "embossed (with a raised pattern) or perh. arranged +in a net or open work". A use from 1480 is given. The word is +probably derived from French `émaillé' (enameled) +and related to Old French `emmailleüre' (network). A French +correspondent tells us that in modern French, `email' is a hard +enamel obtained by heating special paints in a furnace; an +`emailleur' (no final e) is a craftsman who makes email (he +generally paints some objects (like, say, jewelry) and cooks them +in a furnace). + +There are numerous spelling variants of this word. In Internet +traffic up to 1995, `email' predominates, `e-mail' runs a +not-too-distant second, and `E-mail' and `Email' are a distant +third and fourth. + + +Node:emoticon, Next:EMP, Previous:email, Up:= E += + +emoticon /ee-moh'ti-kon/ n. + +[common] An ASCII glyph used to indicate an emotional state in +email or news. Although originally intended mostly as jokes, +emoticons (or some other explicit humor indication) are virtually +required under certain circumstances in high-volume text-only +communication forums such as Usenet; the lack of verbal and +visual cues can otherwise cause what were intended to be +humorous, sarcastic, ironic, or otherwise non-100%-serious +comments to be badly misinterpreted (not always even by newbies), resulting in arguments and flame wars. + +Hundreds of emoticons have been proposed, but only a few are +in common use. These include: + + + +:-) + + +`smiley face' (for humor, laughter, friendliness, +occasionally sarcasm) + + +:-( + + +`frowney face' (for sadness, anger, or upset) + + +;-) + + +`half-smiley' (ha ha +only serious); also known as `semi-smiley' or `winkey +face'. + + +:-/ + + +`wry face' + + +(These may become more comprehensible if you tilt your head +sideways, to the left.) + +The first two listed are by far the most frequently +encountered. Hyphenless forms of them are common on CompuServe, +GEnie, and BIX; see also bixie. On +Usenet, `smiley' is often used as a +generic term synonymous with emoticon, as well as specifically for the +happy-face emoticon. + +It appears that the emoticon was invented by one Scott Fahlman +on the CMU bboard systems sometime +between early 1981 and mid-1982. He later wrote: "I wish I had +saved the original post, or at least recorded the date for +posterity, but I had no idea that I was starting something that +would soon pollute all the world's communication channels." [GLS +confirms that he remembers this original posting]. + +Note for the newbie: Overuse of +the smiley is a mark of loserhood! More than one per paragraph is +a fairly sure sign that you've gone over the line. + + +Node:EMP, Next:empire, Previous:emoticon, Up:= +E = + +EMP /E-M-P/ + +See spam. + + +Node:empire, Next:engine, Previous:EMP, Up:= E = + + +empire n. + +Any of a family of military simulations derived from a game +written by Peter Langston many years ago. A number of +multi-player variants of varying degrees of sophistication exist, +and one single-player version implemented for both Unix and VMS; +the latter is even available as MS-DOS freeware. All are +notoriously addictive. Of various commercial derivatives the best +known is probably "Empire Deluxe" on PCs and Amigas. + +Modern empire is a real-time wargame played over the internet +by up to 120 players. Typical games last from 24 hours (blitz) to +a couple of months (long term). The amount of sleep you can get +while playing is a function of the rate at which updates occur +and the number of co-rulers of your country. Empire server +software is available for unix-like machines, and clients for +Unix and other platforms. A comprehensive history of the game is +available at http://www.empire.cx/infopages/History.html. +The Empire resource site is at http://www.empire.cx/. + + +Node:engine, Next:English, Previous:empire, Up:= E += + +engine n. + +1. A piece of hardware that encapsulates some function but +can't be used without some kind of front end. Today we have, especially, +`print engine': the guts of a laser printer. 2. An analogous +piece of software; notionally, one that does a lot of noisy +crunching, such as a `database engine'. + +The hacker senses of `engine' are actually close to its +original, pre-Industrial-Revolution sense of a skill, clever +device, or instrument (the word is cognate to `ingenuity'). This +sense had not been completely eclipsed by the modern connotation +of power-transducing machinery in Charles Babbage's time, which +explains why he named the stored-program computer that he +designed in 1844 the `Analytical Engine'. + + +Node:English, Next:enhancement, Previous:engine, Up:= E += + +English + +1. n. obs. The source code for a program, which may be in any +language, as opposed to the linkable or executable binary +produced from it by a compiler. The idea behind the term is that +to a real hacker, a program written in his favorite programming +language is at least as readable as English. Usage: mostly by +old-time hackers, though recognizable in context. Today the +prefereed shorthand is sinply source. 2. The official name of the database +language used by the old Pick Operating System, actually a sort +of crufty, brain-damaged SQL with delusions of grandeur. The name +permitted marketroids to say +"Yes, and you can program our computers in English!" to ignorant +suits without quite running afoul of +the truth-in-advertising laws. + + +Node:enhancement, Next:ENQ, Previous:English, Up:= E += + +enhancement n. + +Common marketroid-speak for a +bug fix. This abuse of language is a +popular and time-tested way to turn incompetence into increased +revenue. A hacker being ironic would instead call the fix a feature -- or perhaps save some effort by +declaring the bug itself to be a feature. + + +Node:ENQ, Next:EOF, Previous:enhancement, Up:= E = + +ENQ /enkw/ or /enk/ + +[from the ASCII mnemonic ENQuire for 0000101] An on-line +convention for querying someone's availability. After opening a +talk mode connection to someone +apparently in heavy hack mode, one might type SYN SYN +ENQ? (the SYNs representing notional synchronization +bytes), and expect a return of ACK or +NAK depending on whether or not the +person felt interruptible. Compare ping, finger, and +the usage of FOO? listed under talk mode. + + +Node:EOF, Next:EOL, Previous:ENQ, +Up:= E = + +EOF /E-O-F/ n. + +[abbreviation, `End Of File'] 1. [techspeak] The out-of-band value returned by C's +sequential character-input functions (and their equivalents in +other environments) when end of file has been reached. This value +is usually -1 under C libraries postdating V6 Unix, but was +originally 0. DOS hackers think EOF is ^Z, and a few Amiga +hackers think it's ^\. 2. [Unix] The keyboard character (usually +control-D, the ASCII EOT (End Of Transmission) character) that is +mapped by the terminal driver into an end-of-file condition. 3. +Used by extension in non-computer contexts when a human is doing +something that can be modeled as a sequential read and can't go +further. "Yeah, I looked for a list of 360 mnemonics to post as a +joke, but I hit EOF pretty fast; all the library had was a JCL manual." See also EOL. + + +Node:EOL, Next:EOU, Previous:EOF, +Up:= E = + +EOL /E-O-L/ n. + +[End Of Line] Syn. for newline, +derived perhaps from the original CDC6600 Pascal. Now rare, but +widely recognized and occasionally used for brevity. Used in the +example entry under BNF. See also EOF. + + +Node:EOU, Next:epoch, Previous:EOL, Up:= E = + + +EOU /E-O-U/ n. + +The mnemonic of a mythical ASCII control character (End Of +User) that would make an ASR-33 Teletype explode on receipt. This +construction parodies the numerous obscure delimiter and control +characters left in ASCII from the days when it was associated +more with wire-service teletypes than computers (e.g., FS, GS, +RS, US, EM, SUB, ETX, and esp. EOT). It is worth remembering that +ASR-33s were big, noisy mechanical beasts with a lot of +clattering parts; the notion that one might explode was nowhere +near as ridiculous as it might seem to someone sitting in front +of a tube or flatscreen today. + + +Node:epoch, Next:epsilon, Previous:EOU, Up:= E = + + +epoch n. + +[Unix: prob. from astronomical timekeeping] The time and date +corresponding to 0 in an operating system's clock and timestamp +values. Under most Unix versions the epoch is 00:00:00 GMT, +January 1, 1970; under VMS, it's 00:00:00 of November 17, 1858 +(base date of the U.S. Naval Observatory's ephemerides); on a +Macintosh, it's the midnight beginning January 1 1904. System +time is measured in seconds or ticks +past the epoch. Weird problems may ensue when the clock wraps +around (see wrap around), +which is not necessarily a rare event; on systems counting 10 +ticks per second, a signed 32-bit count of ticks is good only for +6.8 years. The 1-tick-per-second clock of Unix is good only until +January 18, 2038, assuming at least some software continues to +consider it signed and that word lengths don't increase by then. +See also wall time. Microsoft +Windows, on the other hand, has an epoch problem every 49.7 days +- but this is seldom noticed as Windows is almost incapable of +staying up continuously for that long. + + +Node:epsilon, Next:epsilon squared, Previous:epoch, Up:= E = + +epsilon + +[see delta] 1. n. A small quantity +of anything. "The cost is epsilon." 2. adj. Very small, +negligible; less than marginal. +"We can get this feature for epsilon cost." 3. `within epsilon +of': close enough to be indistinguishable for all practical +purposes, even closer than being `within delta of'. "That's not +what I asked for, but it's within epsilon of what I wanted." +Alternatively, it may mean not close enough, but very little is +required to get it there: "My program is within epsilon of +working." + + +Node:epsilon squared, Next:era the, Previous:epsilon, Up:= E = + +epsilon squared n. + +A quantity even smaller than epsilon, as small in comparison to epsilon as +epsilon is to something normal; completely negligible. If you buy +a supercomputer for a million dollars, the cost of the +thousand-dollar terminal to go with it is epsilon, and the cost of the ten-dollar cable +to connect them is epsilon squared. Compare lost in the underflow, +lost in the +noise. + + +Node:era the, Next:Eric Conspiracy, Previous:epsilon squared, Up:= E = + +era n. + +Syn. epoch. Webster's Unabridged +makes these words almost synonymous, but `era' more often +connotes a span of time rather than a point in time, whereas the +reverse is true for epoch. The epoch usage is recommended. + + +Node:Eric Conspiracy, Next:Eris, Previous:era the, Up:= E = + +Eric Conspiracy n. + +A shadowy group of mustachioed hackers named Eric first +pinpointed as a sinister conspiracy by an infamous +_talk.bizarre_ posting ca. 1987; this was doubtless +influenced by the numerous `Eric' jokes in the Monty Python +oeuvre. There do indeed seem to be considerably more mustachioed +Erics in hackerdom than the frequency of these three traits can +account for unless they are correlated in some arcane way. +Well-known examples include Eric Allman (he of the `Allman style' +described under indent +style) and Erik Fair (co-author of NNTP); your editor has +heard from more than sixty others by email, and the organization +line `Eric Conspiracy Secret Laboratories' now emanates regularly +from more than one site. See the Eric Conspiracy Web Page at http://www.ccil.org/~esr/ecsl/ +for full details. + + +Node:Eris, Next:erotics, Previous:Eric Conspiracy, Up:= E = + +Eris /e'ris/ n. + +The Greek goddess of Chaos, Discord, Confusion, and Things You +Know Not Of; her name was latinized to Discordia and she was +worshiped by that name in Rome. Not a very friendly deity in the +Classical original, she was reinvented as a more benign +personification of creative anarchy starting in 1959 by the +adherents of Discordianism +and has since been a semi-serious subject of veneration in +several `fringe' cultures, including hackerdom. See Discordianism, Church of the +SubGenius. + + +Node:erotics, Next:error 33, Previous:Eris, Up:= E = + + +erotics /ee-ro'tiks/ n. + +[Helsinki University of Technology, Finland] n. +English-language university slang for electronics. Often used by +hackers in Helsinki, maybe because good electronics excites them +and makes them warm. + + +Node:error 33, Next:eurodemo, Previous:erotics, Up:= E += + +error 33 [XEROX PARC] n. + +1. Predicating one research effort upon the success of +another. 2. Allowing your own research effort to be placed on the +critical path of some other project (be it a research effort or +not). + + +Node:eurodemo, Next:evil, Previous:error 33, Up:= E = + +eurodemo /yoor'o-dem`-o/ + +a demo, sense 4 + + +Node:evil, Next:evil and rude, Previous:eurodemo, Up:= E = + +evil adj. + +As used by hackers, implies that some system, program, person, +or institution is sufficiently maldesigned as to be not worth the +bother of dealing with. Unlike the adjectives in the cretinous/losing/brain-damaged series, `evil' does not +imply incompetence or bad design, but rather a set of goals or +design criteria fatally incompatible with the speaker's. This +usage is more an esthetic and engineering judgment than a moral +one in the mainstream sense. "We thought about adding a Blue Glue interface but decided it +was too evil to deal with." "TECO is +neat, but it can be pretty evil if you're prone to typos." Often +pronounced with the first syllable lengthened, as /eeee'vil/. +Compare evil and +rude. + + +Node:evil and rude, Next:Evil Empire, Previous:evil, Up:= E = + +evil and rude adj. + +Both evil and rude, but with the additional connotation that +the rudeness was due to malice rather than incompetence. Thus, +for example: Microsoft's Windows NT is _evil_ because it's a +competent implementation of a bad design; it's _rude_ +because it's gratuitously incompatible with Unix in places where +compatibility would have been as easy and effective to do; but +it's _evil and rude_ because the incompatibilities are +apparently there not to fix design bugs in Unix but rather to +lock hapless customers and developers into the Microsoft way. +Hackish _evil and rude_ is close to the mainstream sense of +`evil'. + + +Node:Evil Empire, Next:exa-, Previous:evil and rude, Up:= E = + +Evil Empire n. + +[from Ronald Reagan's famous characterization of the communist +Soviet Union] Formerly IBM, now Microsoft. Functionally, the company +most hackers love to hate at any given time. Hackers like to see +themselves as romantic rebels against the Evil Empire, and +frequently adopt this role to the point of ascribing rather more +power and malice to the Empire than it actually has. See also +Borg and search for Evil Empire +pages on the Web. + + +Node:exa-, Next:examining the entrails, +Previous:Evil Empire, +Up:= E = + +exa- /ek's*/ pref. + +[SI] See quantifiers. + + +Node:examining the +entrails, Next:EXCH, +Previous:exa-, Up:= E = + +examining the entrails n. + +The process of grovelling through +a core dump or hex image in an +attempt to discover the bug that brought a program or system +down. The reference is to divination from the entrails of a +sacrified animal. Compare runes, +incantation, black art, desk +check. + + +Node:EXCH, Next:excl, Previous:examining the entrails, Up:= E = + +EXCH /eks'ch*/ or /eksch/ vt. + +To exchange two things, each for the other; to swap places. If +you point to two people sitting down and say "Exch!", you are +asking them to trade places. EXCH, meaning EXCHange, was +originally the name of a PDP-10 instruction that exchanged the +contents of a register and a memory location. Many newer hackers +are probably thinking instead of the PostScript exchange operator (which is +usually written in lowercase). + + +Node:excl, Next:EXE, Previous:EXCH, +Up:= E = + +excl /eks'kl/ n. + +Abbreviation for `exclamation point'. See bang, shriek, ASCII. + + +Node:EXE, Next:exec, Previous:excl, Up:= E = + + +EXE /eks'ee/ or /eek'see/ or /E-X-E/ n. + +An executable binary file. Some operating systems (notably +MS-DOS, VMS, and TWENEX) use the extension .EXE to mark such +files. This usage is also occasionally found among Unix +programmers even though Unix executables don't have any required +suffix. + + +Node:exec, Next:exercise left as an, Previous:EXE, Up:= E = + +exec /eg-zek'/ or /eks'ek/ vt., n. + +1. [Unix: from `execute'] Synonym for chain, derives from the exec(2) +call. 2. [from `executive'] obs. The command interpreter for an +OS (see shell); term esp. used around mainframes, and +prob. derived from UNIVAC's archaic EXEC 2 and EXEC 8 operating +systems. 3. At IBM and VM/CMS shops, the equivalent of a shell +command file (among VM/CMS users). + +The mainstream `exec' as an abbreviation for (human) executive +is not used. To a hacker, an `exec' is a always a +program, never a person. + + +Node:exercise left as an, +Next:Exon, Previous:exec, Up:= E = + +exercise, left as an adj. + +[from technical books] Used to complete a proof when one +doesn't mind a handwave, or to +avoid one entirely. The complete phrase is: "The proof [or `the +rest'] is left as an exercise for the reader." This comment +has occasionally been attached to unsolved research +problems by authors possessed of either an evil sense of humor or +a vast faith in the capabilities of their audiences. + + +Node:Exon, Next:Exploder, Previous:exercise left as an, Up:= E = + +Exon /eks'on/ excl. + +A generic obscenity that quickly entered wide use on the +Internet and Usenet after Black +Thursday. From the last name of Senator James Exon +(Democrat-Nebraska), primary author of the CDA. + + +Node:Exploder, Next:exploit, Previous:Exon, Up:= E = + + +Exploder n. + +Used within Microsoft to refer to the Windows Explorer, the +interface component of Windows 95 and WinNT 4. Our spies report +that most of the heavy guns at MS came from a Unix background and +use command line utilities; even they are scornful of the +over-gingerbreaded WIMP +environments that they have been called upon to +create. + + +Node:exploit, Next:external memory, Previous:Exploder, Up:= E = + +exploit n. + +[originally cracker slang] 1. A vulnerability in software that +can be used for breaking security or otherwise attacking an +Internet host over the network. The Ping O' Death is a famous exploit. +2. More grammatically, a program that exploits an exploit in +sense 1, + + +Node:external memory, Next:eye candy, Previous:exploit, Up:= E = + +external memory n. + +A memo pad, palmtop computer, or written notes. "Hold on while +I write that to external memory". The analogy is with store or +DRAM versus nonvolatile disk storage on computers. + + +Node:eye candy, Next:eyeball search, Previous:external memory, Up:= E = + +eye candy /i:' kand`ee/ n. + +[from mainstream slang "ear candy"] A display of some sort +that's presented to lusers to keep +them distracted while the program performs necessary background +tasks. "Give 'em some eye candy while the back-end slurps that BLOB into +core." Reported as mainstream usage among players of +graphics-heavy computer games. We're also told this term is +mainstream slang for soft pornography, but that sense does not +appear to be live among hackers. + + +Node:eyeball search, Next:face time, Previous:eye candy, Up:= E = + +eyeball search n.,v. + +To look for something in a mass of code or data with one's own +native optical sensors, as opposed to using some sort of pattern +matching software like grep or any +other automated search tool. Also called a vgrep; compare vdiff, desk +check. + + +Node:= F =, Next:= G =, Previous:= E =, Up:The Jargon Lexicon + += F = + + +face time: + + +factor: + + +fairings: + + +fall over: + + +fall through: + + +fan: + + +fandango on core: + + +FAQ: + + +FAQ list: + + +FAQL: + + +faradize: + + +farkled: + + +farming: + + +fascist: + + +fat electrons: + + +fat-finger: + + +faulty: + + +fd leak: + + +fear and loathing: + + +feature: + + +feature creature: + + +feature creep: + + +feature key: + + +feature shock: + + +featurectomy: + + +feep: + + +feeper: + + +feeping creature: + + +feeping creaturism: + + +feetch feetch: + + +fence: + + +fencepost error: + + +fiber-seeking +backhoe: + + +FidoNet: + + +field circus: + + +field servoid: + + +Fight-o-net: + + +File Attach: + + +File Request: + + +file signature: + + +filk: + + +film at 11: + + +filter: + + +Finagle's Law: + + +fine: + + +finger: + + +finger trouble: + + +finger-pointing +syndrome: + + +finn: + + +firebottle: + + +firefighting: + + +firehose syndrome: + + +firewall code: + + +firewall machine: + + +fireworks mode: + + +firmware: + + +firmy: + + +fish: + + +FISH queue: + + +FITNR: + + +fix: + + +FIXME: + + +flag: + + +flag day: + + +flaky: + + +flamage: + + +flame: + + +flame bait: + + +flame on: + + +flame war: + + +flamer: + + +flap: + + +flarp: + + +flash crowd: + + +flat: + + +flat-ASCII: + + +flat-file: + + +flatten: + + +flavor: + + +flavorful: + + +flippy: + + +flood: + + +flowchart: + + +flower key: + + +flush: + + +flypage: + + +Flyspeck 3: + + +flytrap: + + +FM: + + +fnord: + + +FOAF: + + +FOD: + + +fold case: + + +followup: + + +fontology: + + +foo: + + +foobar: + + +fool: + + +fool file: + + +Foonly: + + +footprint: + + +for free: + + +for the rest of +us: + + +for values of: + + +fora: + + +foreground: + + +fork: + + +fork bomb: + + +forked: + + +Fortrash: + + +fortune cookie: + + +forum: + + +fossil: + + +four-color +glossies: + + +frag: + + +fragile: + + +fred: + + +Fred Foobar: + + +frednet: + + +free software: + + +freeware: + + +freeze: + + +fried: + + +frink: + + +friode: + + +fritterware: + + +frob: + + +frobnicate: + + +frobnitz: + + +frog: + + +frogging: + + +front end: + + +frotz: + + +frotzed: + + +frowney: + + +FRS: + + +fry: + + +fscking: + + +FSF: + + +FTP: + + +-fu: + + +FUBAR: + + +fuck me harder: + + +FUD: + + +FUD wars: + + +fudge: + + +fudge factor: + + +fuel up: + + +Full Monty: + + +fum: + + +functino: + + +funky: + + +funny money: + + +furrfu: + + +fuzzball: + + +Node:face time, Next:factor, Previous:eyeball search, Up:= F = + +face time n. + +[common] Time spent interacting with somebody face-to-face (as +opposed to via electronic links). "Oh, yeah, I spent some face +time with him at the last Usenix." + + +Node:factor, Next:fairings, Previous:face time, Up:= F = + +factor n. + +See coefficient of +X. + + +Node:fairings, Next:fall over, Previous:factor, Up:= F += + +fairings n. /fer'ingz/ + +[FreeBSD; orig. a typo for `fairness'] A term thrown out in +discussion whenever a completely and transparently nonsensical +argument in one's favor(?) seems called for, e,g. at the end of a +really long thread for which the outcome is no longer even cared +about since everyone is now so sick of it; or in rebuttal to +another nonsensical argument ("Change the loader to look for +/kernel.pl? What about fairings?") + + +Node:fall over, Next:fall through, Previous:fairings, Up:= F = + +fall over vi. + +[IBM] Yet another synonym for crash or lose. `Fall +over hard' equates to crash and +burn. + + +Node:fall through, Next:fan, Previous:fall over, Up:= F = + +fall through v. + +(n. `fallthrough', var. `fall-through') 1. To exit a loop by +exhaustion, i.e., by having fulfilled its exit condition rather +than via a break or exception condition that exits from the +middle of it. This usage appears to be really old, +dating from the 1940s and 1950s. 2. To fail a test that would +have passed control to a subroutine or some other distant portion +of code. 3. In C, `fall-through' occurs when the flow of +execution in a switch statement reaches a case label +other than by jumping there from the switch header, passing a +point where one would normally expect to find a +break. A trivial example: + +switch (color) +{ +case GREEN: + do_green(); + break; +case PINK: + do_pink(); + /* FALL THROUGH */ +case RED: + do_red(); + break; +default: + do_blue(); + break; +} + + +The variant spelling /* FALL THRU */ is also +common. + +The effect of the above code is to do_green() +when color is GREEN, do_red() when +color is RED, do_blue() on any other +color other than PINK, and (and this is the +important part) do_pink() and then +do_red() when color is PINK. +Fall-through is considered +harmful by some, though there are contexts (such as the +coding of state machines) in which it is natural; it is generally +considered good practice to include a comment highlighting the +fall-through where one would normally expect a break. See also +Duff's device. + + +Node:fan, Next:fandango on core, Previous:fall through, Up:= F = + +fan n. + +Without qualification, indicates a fan of science fiction, +especially one who goes to cons and +tends to hang out with other fans. Many hackers are fans, so this +term has been imported from fannish slang; however, unlike much +fannish slang it is recognized by most non-fannish hackers. Among +SF fans the plural is correctly `fen', but this usage is not +automatic to hackers. "Laura reads the stuff occasionally but +isn't really a fan." + + +Node:fandango on core, Next:FAQ, Previous:fan, Up:= F = + + +fandango on core n. + +[Unix/C hackers, from the Iberian dance] In C, a wild pointer +that runs out of bounds, causing a core +dump, or corrupts the malloc(3) arena in such a way as to cause mysterious +failures later on, is sometimes said to have `done a fandango on +core'. On low-end personal machines without an MMU (or Windows +boxes, which have an MMU but use it incompetently), this can +corrupt the OS itself, causing massive lossage. Other frenetic +dances such as the cha-cha or the watusi, may be substituted. See +aliasing bug, precedence lossage, smash the stack, memory leak, memory smash, overrun screw, core. + + +Node:FAQ, Next:FAQ list, Previous:fandango on core, Up:= F = + +FAQ /F-A-Q/ or /fak/ n. + +[Usenet] 1. A Frequently Asked Question. 2. A compendium of +accumulated lore, posted periodically to high-volume newsgroups +in an attempt to forestall such questions. Some people prefer the +term `FAQ list' or `FAQL' /fa'kl/, reserving `FAQ' for sense +1. + +This lexicon itself serves as a good example of a collection +of one kind of lore, although it is far too big for a regular FAQ +posting. Examples: "What is the proper type of NULL?" and "What's +that funny name for the # character?" are both +Frequently Asked Questions. Several FAQs refer readers to this +file. + + +Node:FAQ list, Next:FAQL, Previous:FAQ, +Up:= F = + +FAQ list /F-A-Q list/ or /fak list/ n. + +[common; Usenet] Syn FAQ, sense +2. + + +Node:FAQL, Next:faradize, Previous:FAQ list, Up:= F = + +FAQL /fa'kl/ n. + +Syn. FAQ list. + + +Node:faradize, Next:farkled, Previous:FAQL, Up:= F = + + +faradize /far'*-di:z/ v. + +[US Geological Survey] To start any hyper-addictive process or +trend, or to continue adding current to such a trend. Telling one +user about a new octo-tetris game you compiled would be a +faradizing act -- in two weeks you might find your entire +department playing the faradic game. + + +Node:farkled, Next:farming, Previous:faradize, Up:= +F = + +farkled /far'kld/ adj. + +[DeVry Institute of Technology, Atlanta] Syn. hosed. Poss. owes something to Yiddish +`farblondjet' and/or the `Farkle Family' skits on "Rowan and +Martin's Laugh-In", a popular comedy show of the late 1960s. + + +Node:farming, Next:fascist, Previous:farkled, Up:= F += + +farming n. + +[Adelaide University, Australia] What the heads of a disk +drive are said to do when they plow little furrows in the +magnetic media. Associated with a crash. Typically used as follows: "Oh no, the +machine has just crashed; I hope the hard drive hasn't gone farming again." No longer common; modern +drives automatically park their heads in a safe zone on +power-down, so it takes a real mechanical problem to induce +this. + + +Node:fascist, Next:fat electrons, Previous:farming, Up:= F = + +fascist adj. + +1. [common] Said of a computer system with excessive or +annoying security barriers, usage limits, or access policies. The +implication is that said policies are preventing hackers from +getting interesting work done. The variant `fascistic' seems to +have been preferred at MIT, poss. by analogy with `touristic' +(see tourist or under the influence +of German/Yiddish `faschistisch'). 2. In the design of languages +and other software tools, `the fascist alternative' is the most +restrictive and structured way of capturing a particular +function; the implication is that this may be desirable in order +to simplify the implementation or provide tighter error checking. +Compare bondage-and-discipline +language, although that term is global rather than +local. + + +Node:fat electrons, Next:fat-finger, Previous:fascist, Up:= F = + +fat electrons n. + +Old-time hacker David Cargill's theory on the causation of +computer glitches. Your typical electric utility draws its line +current out of the big generators with a pair of coil taps +located near the top of the dynamo. When the normal tap brushes +get dirty, they take them off line to clean them up, and use +special auxiliary taps on the bottom of the coil. Now, +this is a problem, because when they do that they get not +ordinary or `thin' electrons, but the fat'n'sloppy electrons that +are heavier and so settle to the bottom of the generator. These +flow down ordinary wires just fine, but when they have to turn a +sharp corner (as in an integrated-circuit via), they're apt to +get stuck. This is what causes computer glitches. [Fascinating. +Obviously, fat electrons must gain mass by bogon absorption --ESR] Compare bogon, magic +smoke. + + +Node:fat-finger, Next:faulty, Previous:fat electrons, Up:= F = + +fat-finger vt. + +1. To introduce a typo while editing in such a way that the +resulting manglification of a configuration file does something +useless, damaging, or wildly unexpected. "NSI fat-fingered their +DNS zone file and took half the net down again." 2. More +generally, any typo that produces dramatically bad results. + + +Node:faulty, Next:fd leak, Previous:fat-finger, Up:= F = + +faulty adj. + +Non-functional; buggy. Same denotation as bletcherous, losing, q.v., but the connotation is much +milder. + + +Node:fd leak, Next:fear and loathing, Previous:faulty, Up:= F = + +fd leak /F-D leek/ n. + +A kind of programming bug analogous to a core leak, in which a program fails to +close file descriptors (`fd's) after file operations are +completed, and thus eventually runs out of them. See leak. + + +Node:fear and loathing, +Next:feature, Previous:fd leak, Up:= F = + +fear and loathing n. + +[from Hunter S. Thompson] A state inspired by the prospect of +dealing with certain real-world systems and standards that are +totally brain-damaged but +ubiquitous -- Intel 8086s, or COBOL, +or EBCDIC, or any IBM machine bigger than a workstation. "Ack! They +want PCs to be able to talk to the AI machine. Fear and loathing +time!" + + +Node:feature, Next:feature creature, Previous:fear and loathing, +Up:= F = + +feature n. + +1. [common] A good property or behavior (as of a program). +Whether it was intended or not is immaterial. 2. [common] An +intended property or behavior (as of a program). Whether it is +good or not is immaterial (but if bad, it is also a misfeature). 3. A surprising property or +behavior; in particular, one that is purposely inconsistent +because it works better that way -- such an inconsistency is +therefore a feature and not a bug. This kind of feature is sometimes called +a miswart; see that entry for a +classic example. 4. A property or behavior that is gratuitous or +unnecessary, though perhaps also impressive or cute. For example, +one feature of Common LISP's format function is the +ability to print numbers in two different Roman-numeral formats +(see bells whistles +and gongs). 5. A property or behavior that was put in to +help someone else but that happens to be in your way. 6. [common] +A bug that has been documented. To call something a feature +sometimes means the author of the program did not consider the +particular case, and that the program responded in a way that was +unexpected but not strictly incorrect. A standard joke is that a +bug can be turned into a feature +simply by documenting it (then theoretically no one can complain +about it because it's in the manual), or even by simply declaring +it to be good. "That's not a bug, that's a feature!" is a common +catchphrase. See also feetch +feetch, creeping +featurism, wart, green lightning. + +The relationship among bugs, features, misfeatures, warts, and +miswarts might be clarified by the following hypothetical +exchange between two hackers on an airliner: + +A: "This seat doesn't recline." + +B: "That's not a bug, that's a feature. There is an emergency +exit door built around the window behind you, and the route has +to be kept clear." + +A: "Oh. Then it's a misfeature; they should have increased the +spacing between rows here." + +B: "Yes. But if they'd increased spacing in only one section +it would have been a wart -- they would've had to make +nonstandard-length ceiling panels to fit over the displaced +seats." + +A: "A miswart, actually. If they increased spacing throughout +they'd lose several rows and a chunk out of the profit margin. So +unequal spacing would actually be the Right Thing." + +B: "Indeed." + +`Undocumented feature' is a common, allegedly humorous +euphemism for a bug. There's a related +joke that is sometimes referred to as the "one-question geek +test". You say to someone "I saw a Volkswagen Beetle today with a +vanity license plate that read FEATURE". If he/she laughs, he/she +is a geek (see computer +geek, sense 2). + + +Node:feature creature, Next:feature creep, Previous:feature, Up:= F = + +feature creature n. + +[poss. fr. slang `creature feature' for a horror movie] 1. One +who loves to add features to designs or programs, perhaps at the +expense of coherence, concision, or taste. 2. Alternately, a mythical being that +induces otherwise rational programmers to perpetrate such crocks. +See also feeping +creaturism, creeping +featurism. + + +Node:feature creep, Next:feature key, Previous:feature creature, Up:= F = + +feature creep n. + +[common] The result of creeping featurism, as in "Emacs +has a bad case of feature creep". + + +Node:feature key, Next:feature shock, Previous:feature creep, Up:= F = + +feature key n. + +[common] The Macintosh key with the cloverleaf graphic on its +keytop; sometimes referred to as `flower', `pretzel', `clover', +`propeller', `beanie' (an apparent reference to the major feature +of a propeller beanie), splat, +`open-apple' or (officially, in Mac documentation) the `command +key'. In French, the term `papillon' (butterfly) has been +reported. The proliferation of terms for this creature may +illustrate one subtle peril of iconic interfaces. + +Many people have been mystified by the cloverleaf-like symbol +that appears on the feature key. Its oldest name is `cross of St. +Hannes', but it occurs in pre-Christian Viking art as a +decorative motif. Throughout Scandinavia today the road agencies +use it to mark sites of historical interest. Apple picked up the +symbol from an early Mac developer who happened to be Swedish. +Apple documentation gives the translation "interesting +feature"! + +There is some dispute as to the proper (Swedish) name of this +symbol. It technically stands for the word `sevärdhet' +(thing worth seeing); many of these are old churches. Some Swedes +report as an idiom for the sign the word `kyrka', cognate to +English `church' and pronounced (roughly) /chur'ka/ in modern +Swedish. Others say this is nonsense. Other idioms reported for +the sign are `runa' (rune) or `runsten' /roon'stn/ (runestone), +derived from the fact that many of the interesting features are +Viking rune-stones. The term `fornminne' /foorn'min'*/ (relic of +antiquity, ancient monument) is also reported, especially among +those who think that the Mac itself is a relic of antiquity. + + +Node:feature shock, Next:featurectomy, Previous:feature key, Up:= F = + +feature shock n. + +[from Alvin Toffler's book title "Future Shock"] A user's (or +programmer's!) confusion when confronted with a package that has +too many features and poor introductory material. + + +Node:featurectomy, Next:feep, Previous:feature shock, Up:= F = + +featurectomy /fee`ch*r-ek't*-mee/ n. + +The act of removing a feature from a program. Featurectomies +come in two flavors, the `righteous' and the `reluctant'. +Righteous featurectomies are performed because the remover +believes the program would be more elegant without the feature, +or there is already an equivalent and better way to achieve the +same end. (Doing so is not quite the same thing as removing a +misfeature.) Reluctant +featurectomies are performed to satisfy some external constraint +such as code size or execution speed. + + +Node:feep, Next:feeper, Previous:featurectomy, Up:= F = + +feep /feep/ + +1. n. The soft electronic `bell' sound of a display terminal +(except for a VT-52); a beep (in fact, the microcomputer world +seems to prefer beep). 2. vi. To cause +the display to make a feep sound. ASR-33s (the original TTYs) do +not feep; they have mechanical bells that ring. Alternate forms: +beep, `bleep', or just about anything +suitably onomatopoeic. (Jeff MacNelly, in his comic strip "Shoe", +uses the word `eep' for sounds made by computer terminals and +video games; this is perhaps the closest written approximation +yet.) The term `breedle' was sometimes heard at SAIL, where the +terminal bleepers are not particularly soft (they sound more like +the musical equivalent of a raspberry or Bronx cheer; for a close +approximation, imagine the sound of a Star Trek communicator's +beep lasting for five seconds). The `feeper' on a VT-52 has been +compared to the sound of a '52 Chevy stripping its gears. See +also ding. + + +Node:feeper, Next:feeping creature, Previous:feep, Up:= F = + +feeper /fee'pr/ n. + +The device in a terminal or workstation (usually a loudspeaker +of some kind) that makes the feep +sound. + + +Node:feeping creature, Next:feeping creaturism, +Previous:feeper, Up:= F = + +feeping creature n. + +[from feeping +creaturism] An unnecessary feature; a bit of chrome that, in the speaker's judgment, is the +camel's nose for a whole horde of new features. + + +Node:feeping creaturism, +Next:feetch feetch, +Previous:feeping +creature, Up:= F = + +feeping creaturism /fee'ping kree`ch*r-izm/ n. + +A deliberate spoonerism for creeping featurism, meant to +imply that the system or program in question has become a +misshapen creature of hacks. This term isn't really well defined, +but it sounds so neat that most hackers have said or heard it. It +is probably reinforced by an image of terminals prowling about in +the dark making their customary noises. + + +Node:feetch feetch, Next:fence, Previous:feeping creaturism, Up:= F = + +feetch feetch /feech feech/ interj. + +If someone tells you about some new improvement to a program, +you might respond: "Feetch, feetch!" The meaning of this depends +critically on vocal inflection. With enthusiasm, it means +something like "Boy, that's great! What a great hack!" Grudgingly +or with obvious doubt, it means "I don't know; it sounds like +just one more unnecessary and complicated thing". With a tone of +resignation, it means, "Well, I'd rather keep it simple, but I +suppose it has to be done". + + +Node:fence, Next:fencepost error, Previous:feetch feetch, Up:= F = + +fence n. 1. + +A sequence of one or more distinguished (out-of-band) characters (or other data +items), used to delimit a piece of data intended to be treated as +a unit (the computer-science literature calls this a `sentinel'). +The NUL (ASCII 0000000) character that terminates strings in C is +a fence. Hex FF is also (though slightly less frequently) used +this way. See zigamorph. 2. An +extra data value inserted in an array or other data structure in +order to allow some normal test on the array's contents also to +function as a termination test. For example, a highly optimized +routine for finding a value in an array might artificially place +a copy of the value to be searched for after the last slot of the +array, thus allowing the main search loop to search for the value +without having to check at each pass whether the end of the array +had been reached. 3. [among users of optimizing compilers] Any +technique, usually exploiting knowledge about the compiler, that +blocks certain optimizations. Used when explicit mechanisms are +not available or are overkill. Typically a hack: "I call a dummy +procedure there to force a flush of the optimizer's +register-coloring info" can be expressed by the shorter "That's a +fence procedure". + + +Node:fencepost error, Next:fiber-seeking +backhoe, Previous:fence, +Up:= F = + +fencepost error n. + +1. [common] A problem with the discrete equivalent of a +boundary condition, often exhibited in programs by iterative +loops. From the following problem: "If you build a fence 100 feet +long with posts 10 feet apart, how many posts do you need?" +(Either 9 or 11 is a better answer than the obvious 10.) For +example, suppose you have a long list or array of items, and want +to process items m through n; how many items are there? The +obvious answer is n - m, but that is off by one; the right answer +is n - m + 1. A program that used the `obvious' formula would +have a fencepost error in it. See also zeroth and off-by-one error, and note that not +all off-by-one errors are fencepost errors. The game of Musical +Chairs involves a catastrophic off-by-one error where N people +try to sit in N - 1 chairs, but it's not a fencepost error. +Fencepost errors come from counting things rather than the spaces +between them, or vice versa, or by neglecting to consider whether +one should count one or both ends of a row. 2. [rare] An error +induced by unexpected regularities in input values, which can +(for instance) completely thwart a theoretically efficient binary +tree or hash table implementation. (The error here involves the +difference between expected and worst case behaviors of an +algorithm.) + + +Node:fiber-seeking backhoe, +Next:FidoNet, Previous:fencepost error, Up:= F = + +fiber-seeking backhoe + +[common among backbone ISP personnel] Any of a genus of large, +disruptive machines which routinely cut critical backbone links, +creating Internet outages and packet over air problems. + + +Node:FidoNet, Next:field circus, Previous:fiber-seeking backhoe, Up:= F = + +FidoNet n. + +A worldwide hobbyist network of personal computers which +exchanges mail, discussion groups, and files. Founded in 1984 and +originally consisting only of IBM PCs and compatibles, FidoNet +now includes such diverse machines as Apple ][s, Ataris, Amigas, +and Unix systems. For years FidoNet actually grew faster than +Usenet, but the advent of cheap Internet access probably means +its days are numbered. In early 1999 Fidonet has approximately +30,000 nodes, down from 38K in 1996. + + +Node:field circus, Next:field servoid, Previous:FidoNet, Up:= F = + +field circus n. + +[a derogatory pun on `field service'] The field service +organization of any hardware manufacturer, but originally DEC. There is an entire genre of jokes about +field circus engineers: + +Q: How can you recognize a field circus engineer + with a flat tire? +A: He's changing one tire at a time to see which one is flat. + +Q: How can you recognize a field circus engineer + who is out of gas? +A: He's changing one tire at a time to see which one is flat. + +Q: How can you tell it's your field circus engineer? +A: The spare is flat, too. + + +[See Easter egging for +additional insight on these jokes.] + +There is also the `Field Circus Cheer' (from the old plan file for DEC on MIT-AI): + +Maynard! Maynard! +Don't mess with us! +We're mean and we're tough! +If you get us confused +We'll screw up your stuff. + + +(DEC's service HQ, still extant under the Compaq regime, is +located in Maynard, Massachusetts.) + + +Node:field servoid, Next:Fight-o-net, Previous:field circus, Up:= F = + +field servoid [play on `android'] /fee'ld ser'voyd/ +n. + +Representative of a field service organization (see field circus). This has many of +the implications of droid. + + +Node:Fight-o-net, Next:File Attach, Previous:field servoid, Up:= F = + +Fight-o-net n. + +[FidoNet] Deliberate distortion of FidoNet, often applied after a flurry of flamage in a particular echo, especially the SYSOP echo or Fidonews (see +'Snooze). + + +Node:File Attach, Next:File Request, Previous:Fight-o-net, Up:= F = + +File Attach [FidoNet] + +1. n. A file sent along with a mail message from one FidoNet +to another. 2. vt. Sending someone a file by using the File +Attach option in a FidoNet mailer. + + +Node:File Request, Next:file signature, Previous:File Attach, Up:= F = + +File Request [FidoNet] + +1. n. The FidoNet equivalent of +FTP, in which one FidoNet system +automatically dials another and snarfs one or more files. Often abbreviated +`FReq'; files are often announced as being "available for FReq" +in the same way that files are announced as being "available +for/by anonymous FTP" on the Internet. 2. vt. The act of getting +a copy of a file by using the File Request option of the FidoNet +mailer. + + +Node:file signature, Next:filk, Previous:File Request, Up:= F = + +file signature n. + +A magic number, sense +3. + + +Node:filk, Next:film at 11, Previous:file signature, Up:= F = + +filk /filk/ n.,v. + +[from SF fandom, where a typo for `folk' was adopted as a new +word] A popular or folk song with lyrics revised or completely +new lyrics and/or music, intended for humorous effect when read, +and/or to be sung late at night at SF conventions. There is a +flourishing subgenre of these called `computer filks', written by +hackers and often containing rather sophisticated technical +humor. See double bucky for +an example. Compare grilf, hing, pr0n, and +newsfroup. + + +Node:film at 11, Next:filter, Previous:filk, Up:= F = + + +film at 11 + +[MIT: in parody of TV newscasters] 1. Used in conversation to +announce ordinary events, with a sarcastic implication that these +events are earth-shattering. "ITS +crashes; film at 11." "Bug found in scheduler; film at 11." 2. +Also widely used outside MIT to indicate that additional +information will be available at some future time, +without the implication of anything particularly +ordinary about the referenced event. For example, "The mail file +server died this morning; we found garbage all over the root +directory. Film at 11." would indicate that a major failure had +occurred but that the people working on it have no additional +information about it as yet; use of the phrase in this way +suggests gently that the problem is liable to be fixed more +quickly if the people doing the fixing can spend time doing the +fixing rather than responding to questions, the answers to which +will appear on the normal "11:00 news", if people will just be +patient. + +The variant "MPEGs at 11" has recently been cited (MPEG is a +digital-video format.) + + +Node:filter, Next:Finagle's Law, Previous:film at 11, Up:= F = + +filter n. + +[very common; orig. Unix, now also +in MS-DOS] A program that processes +an input data stream into an output data stream in some +well-defined way, and does no I/O to anywhere else except +possibly on error conditions; one designed to be used as a stage +in a `pipeline' (see plumbing). +Compare sponge. + + +Node:Finagle's Law, Next:fine, Previous:filter, Up:= F += + +Finagle's Law n. + +The generalized or `folk' version of Murphy's Law, fully named "Finagle's +Law of Dynamic Negatives" and usually rendered "Anything that can +go wrong, will". One variant favored among hackers is "The +perversity of the Universe tends towards a maximum" (but see also +Hanlon's Razor). The label +`Finagle's Law' was popularized by SF author Larry Niven in +several stories depicting a frontier culture of asteroid miners; +this `Belter' culture professed a religion and/or running joke +involving the worship of the dread god Finagle and his mad +prophet Murphy. Some technical and scientific cultures (e.g., +paleontologists) know it under the name `Sod's Law'; this usage +may be more common in Great Britain. + + +Node:fine, Next:finger, Previous:Finagle's Law, Up:= F = + +fine adj. + +[WPI] Good, but not good enough to be cuspy. The word `fine' is used elsewhere, of +course, but without the implicit comparison to the higher level +implied by cuspy. + + +Node:finger, Next:finger trouble, Previous:fine, Up:= F = + +finger + +[WAITS, via BSD Unix] 1. n. A program that displays +information about a particular user or all users logged on the +system, or a remote system. Typically shows full name, last login +time, idle time, terminal line, and terminal location (where +applicable). May also display a plan +file left by the user (see also Hacking X for Y). 2. vt. To +apply finger to a username. 3. vt. By extension, to check a +human's current state by any means. "Foodp?" "T!" "OK, finger +Lisa and see if she's idle." 4. Any picture (composed of ASCII +characters) depicting `the finger'. Originally a humorous +component of one's plan file to deter the curious fingerer (sense +2), it has entered the arsenal of some flamers. + + +Node:finger trouble, Next:finger-pointing +syndrome, Previous:finger, Up:= F += + +finger trouble n. + +Mistyping, typos, or generalized keyboard incompetence (this +is surprisingly common among hackers, given the amount of time +they spend at keyboards). "I keep putting colons at the end of +statements instead of semicolons", "Finger trouble again, +eh?". + + +Node:finger-pointing +syndrome, Next:finn, +Previous:finger +trouble, Up:= F = + +finger-pointing syndrome n. + +All-too-frequent result of bugs, esp. in new or experimental +configurations. The hardware vendor points a finger at the +software. The software vendor points a finger at the hardware. +All the poor users get is the finger. + + +Node:finn, Next:firebottle, Previous:finger-pointing syndrome, Up:= F = + +finn v. + +[IRC] To pull rank on somebody based on the amount of time one +has spent on IRC. The term derives from +the fact that IRC was originally written in Finland in 1987. +There may be some influence from the `Finn' character in William +Gibson's seminal cyberpunk novel "Count Zero", who at one point +says to another (much younger) character "I have a pair of shoes +older than you are, so shut up!" + + +Node:firebottle, Next:firefighting, Previous:finn, Up:= F += + +firebottle n.obs. + +A large, primitive, power-hungry active electrical device, +similar in function to a FET but constructed out of glass, metal, +and vacuum. Characterized by high cost, low density, low +reliability, high-temperature operation, and high power +dissipation. Sometimes mistakenly called a `tube' in the U.S. or +a `valve' in England; another hackish term is glassfet. + + +Node:firefighting, Next:firehose syndrome, Previous:firebottle, Up:= F = + +firefighting n. + +1. What sysadmins have to do to correct sudden operational +problems. An opposite of hacking. "Been hacking your new +newsreader?" "No, a power glitch hosed the network and I spent +the whole afternoon fighting fires." 2. The act of throwing lots +of manpower and late nights at a project, esp. to get it out +before deadline. See also gang +bang, Mongolian Hordes +technique; however, the term `firefighting' connotes that +the effort is going into chasing bugs rather than adding +features. + + +Node:firehose syndrome, Next:firewall code, Previous:firefighting, Up:= F = + +firehose syndrome n. + +In mainstream folklore it is observed that trying to drink +from a firehose can be a good way to rip your lips off. On +computer networks, the absence or failure of flow control +mechanisms can lead to situations in which the sending system +sprays a massive flood of packets at an unfortunate receiving +system, more than it can handle. Compare overrun, buffer overflow. + + +Node:firewall code, Next:firewall machine, +Previous:firehose +syndrome, Up:= F = + +firewall code n. + +1. The code you put in a system (say, a telephone switch) to +make sure that the users can't do any damage. Since users always +want to be able to do everything but never want to suffer for any +mistakes, the construction of a firewall is a question not only +of defensive coding but also of interface presentation, so that +users don't even get curious about those corners of a system +where they can burn themselves. 2. Any sanity check inserted to +catch a can't happen error. +Wise programmers often change code to fix a bug twice: once to +fix the bug, and once to insert a firewall which would have +arrested the bug before it did quite as much damage. + + +Node:firewall machine, Next:fireworks mode, +Previous:firewall +code, Up:= F = + +firewall machine n. + +A dedicated gateway machine with special security precautions +on it, used to service outside network connections and dial-in +lines. The idea is to protect a cluster of more loosely +administered machines hidden behind it from crackers. The typical firewall is an +inexpensive micro-based Unix box kept clean of critical data, +with a bunch of modems and public network ports on it but just +one carefully watched connection back to the rest of the cluster. +The special precautions may include threat monitoring, callback, +and even a complete iron box +keyable to particular incoming IDs or activity patterns. Syn. +flytrap, Venus flytrap. + +[When first coined in the mid-1980s this term was pure jargon. +Now (1999) it is techspeak, and has been retained only as an +example of uptake --ESR] + + +Node:fireworks mode, Next:firmware, Previous:firewall machine, Up:= F = + +fireworks mode n. + +1. The mode a machine is sometimes said to be in when it is +performing a crash and +burn operation. 2. There is (or was) a more specific +meaning of this term in the Amiga community. The word fireworks +described the effects of a particularly serious crash which +prevented the video pointer(s) from getting reset at the start of +the vertical blank. This caused the DAC to scroll through the +entire contents of CHIP (video or video+CPU) memory. Since each +bit plane would scroll separately this was quite a spectacular +effect. + + +Node:firmware, Next:firmy, Previous:fireworks mode, Up:= F = + +firmware /ferm'weir/ n. + +Embedded software contained in EPROM or flash memory. It isn't +quite hardware, but at least doesn't have to be loaded from a +disk like regular software. Hacker usage differs from straight +techspeak in that hackers don't normally apply it to stuff that +you can't possibly get at, such as the program that runs a pocket +calculator. Instead, it implies that the firmware could be +changed, even if doing so would mean opening a box and plugging +in a new chip. A computer's BIOS is the classic example, although +nowadays there is firmware in disk controllers, modems, video +cards and even CD-ROM drives. + + +Node:firmy, Next:fish, Previous:firmware, Up:= +F = + +firmy /fer'mee/ n. + +Syn. stiffy (a 3.5-inch floppy +disk). + + +Node:fish, Next:FISH queue, Previous:firmy, Up:= F += + +fish n. + +[Adelaide University, Australia] 1. Another metasyntactic variable. See +foo. Derived originally from the Monty +Python skit in the middle of "The Meaning of Life" entitled "Find +the Fish". 2. A pun for `microfiche'. A microfiche file cabinet +may be referred to as a `fish tank'. + + +Node:FISH queue, Next:FITNR, Previous:fish, Up:= F = + + +FISH queue n. + +[acronym, by analogy with FIFO (First In, First Out)] `First +In, Still Here'. A joking way of pointing out that processing of +a particular sequence of events or requests has stopped dead. +Also `FISH mode' and `FISHnet'; the latter may be applied to any +network that is running really slowly or exhibiting extreme +flakiness. + + +Node:FITNR, Next:fix, Previous:FISH queue, Up:= F = + +FITNR // adj. + +[Thinking Machines, Inc.] Fixed In The Next Release. A +written-only notation attached to bug reports. Often wishful +thinking. + + +Node:fix, Next:FIXME, Previous:FITNR, Up:= F += + +fix n.,v. + +What one does when a problem has been reported too many times +to be ignored. + + +Node:FIXME, Next:flag, Previous:fix, +Up:= F = + +FIXME imp. + +[common] A standard tag often put in C comments near a piece +of code that needs work. The point of doing so is that a +grep or a similar pattern-matching tool can find all +such places quickly. + +/* FIXME: note this is common in GNU code. */ + + +Compare XXX. + + +Node:flag, Next:flag day, Previous:FIXME, Up:= F += + +flag n. + +[very common] A variable or quantity that can take on one of +two values; a bit, particularly one that is used to indicate one +of two outcomes or is used to control which of two things is to +be done. "This flag controls whether to clear the screen before +printing the message." "The program status word contains several +flag bits." Used of humans analogously to bit. See also hidden +flag, mode bit. + + +Node:flag day, Next:flaky, Previous:flag, Up:= F = + + +flag day n. + +A software change that is neither forward- nor +backward-compatible, and which is costly to make and costly to +reverse. "Can we install that without causing a flag day for all +users?" This term has nothing to do with the use of the word +flag to mean a variable that has two +values. It came into use when a massive change was made to the +Multics timesharing system to +convert from the short-lived 1965 version of the ASCII code to +the 1967 version (in draft at the time); this was scheduled for +Flag Day (a U.S. holiday), June 14, 1966. The actual change moved +the code point for the ASCII newline character; this required +that all of the Multics source code, documentation, and device +drivers be changed simultaneously. See also backward combatability. + + +Node:flaky, Next:flamage, Previous:flag day, Up:= F = + +flaky adj. + +(var sp. `flakey') Subject to frequent lossage. This use is of course related to the +common slang use of the word to describe a person as eccentric, +crazy, or just unreliable. A system that is flaky is working, +sort of -- enough that you are tempted to try to use it -- but +fails frequently enough that the odds in favor of finishing what +you start are low. Commonwealth hackish prefers dodgy or wonky. + + +Node:flamage, Next:flame, Previous:flaky, Up:= F += + +flamage /flay'm*j/ n. + +[very common] Flaming verbiage, esp. high-noise, low-signal +postings to Usenet or other +electronic fora. Often in the phrase +`the usual flamage'. `Flaming' is the act itself; `flamage' the +content; a `flame' is a single flaming message. See flame, also dahmum. + + +Node:flame, Next:flame bait, Previous:flamage, Up:= F += + +flame + +[at MIT, orig. from the phrase `flaming asshole'] 1. vi. To +post an email message intended to insult and provoke. 2. vi. To +speak incessantly and/or rabidly on some relatively uninteresting +subject or with a patently ridiculous attitude. 3. vt. Either of +senses 1 or 2, directed with hostility at a particular person or +people. 4. n. An instance of flaming. When a discussion +degenerates into useless controversy, one might tell the +participants "Now you're just flaming" or "Stop all that +flamage!" to try to get them to cool down (so to speak). + +The term may have been independently invented at several +different places. It has been reported from MIT, Carleton College +and RPI (among many other places) from as far back as 1969, and +from the University of Virginia in the early 1960s. + +It is possible that the hackish sense of `flame' is much older +than that. The poet Chaucer was also what passed for a wizard +hacker in his time; he wrote a treatise on the astrolabe, the +most advanced computing device of the day. In Chaucer's "Troilus +and Cressida", Cressida laments her inability to grasp the proof +of a particular mathematical theorem; her uncle Pandarus then +observes that it's called "the fleminge of wrecches." This phrase +seems to have been intended in context as "that which puts the +wretches to flight" but was probably just as ambiguous in Middle +English as "the flaming of wretches" would be today. One suspects +that Chaucer would feel right at home on Usenet. + + +Node:flame bait, Next:flame on, Previous:flame, Up:= F += + +flame bait n. + +[common] A posting intended to trigger a flame war, or one that invites flames in +reply. See also troll. + + +Node:flame on, Next:flame war, Previous:flame bait, Up:= F = + +flame on vi.,interj. + +1. To begin to flame. The punning +reference to Marvel Comics's Human Torch is no longer widely +recognized. 2. To continue to flame. See rave, burble. + + +Node:flame war, Next:flamer, Previous:flame on, Up:= F = + +flame war n. + +[common] (var. `flamewar') An acrimonious dispute, especially +when conducted on a public electronic forum such as Usenet. + + +Node:flamer, Next:flap, Previous:flame war, Up:= F = + +flamer n. + +[common] One who habitually flames. Said esp. of obnoxious Usenet personalities. + + +Node:flap, Next:flarp, Previous:flamer, Up:= F += + +flap vt. + +1. [obs.] To unload a DECtape (so it goes flap, flap, +flap...). Old-time hackers at MIT tell of the days +when the disk was device 0 and DEC microtapes were 1, +2,... and attempting to flap device 0 would +instead start a motor banging inside a cabinet near the disk. 2. +By extension, to unload any magnetic tape. See also macrotape. Modern cartridge tapes no longer +actually flap, but the usage has remained. (The term could well +be re-applied to DEC's TK50 cartridge tape drive, a spectacularly +misengineered contraption which makes a loud flapping sound, +almost like an old reel-type lawnmower, in one of its many +tape-eating failure modes.) + + +Node:flarp, Next:flash crowd, Previous:flap, Up:= F += + +flarp /flarp/ n. + +[Rutgers University] Yet another metasyntactic variable (see +foo). Among those who use it, it is +associated with a legend that any program not containing the word +`flarp' somewhere will not work. The legend is discreetly silent +on the reliability of programs which do contain the +magic word. + + +Node:flash crowd, Next:flat, Previous:flarp, Up:= F += + +flash crowd + +Larry Niven's 1973 SF short story "Flash Crowd" predicted that +one consequence of cheap teleportation would be huge crowds +materializing almost instantly at the sites of interesting news +stories. Twenty years later the term passed into common use on +the Internet to describe exponential spikes in website or server +usage when one passes a certain threshold of popular interest +(this may also be called slashdot +effect). + + +Node:flat, Next:flat-ASCII, Previous:flash crowd, Up:= F = + +flat adj. + +1. [common] Lacking any complex internal structure. "That +bitty box has only a flat +filesystem, not a hierarchical one." The verb form is flatten. 2. Said of a memory architecture +(like that of the VAX or 680x0) that is one big linear address +space (typically with each possible value of a processor register +corresponding to a unique core address), as opposed to a +`segmented' architecture (like that of the 80x86) in which +addresses are composed from a base-register/offset pair +(segmented designs are generally considered cretinous). + +Note that sense 1 (at least with respect to filesystems) is +usually used pejoratively, while sense 2 is a Good Thing. + + +Node:flat-ASCII, Next:flat-file, Previous:flat, Up:= F = + + +flat-ASCII adj. + +[common] Said of a text file that contains only 7-bit ASCII +characters and uses only ASCII-standard control characters (that +is, has no embedded codes specific to a particular text formatter +markup language, or output device, and no meta-characters). Syn. plain-ASCII. Compare flat-file. + + +Node:flat-file, Next:flatten, Previous:flat-ASCII, Up:= F = + +flat-file adj. + +A flattened representation of +some database or tree or network structure as a single file from +which the structure could implicitly be rebuilt, esp. one in +flat-ASCII form. See also sharchive. + + +Node:flatten, Next:flavor, Previous:flat-file, Up:= F = + +flatten vt. + +[common] To remove structural information, esp. to filter +something with an implicit tree structure into a simple sequence +of leaves; also tends to imply mapping to flat-ASCII. "This code flattens an +expression with parentheses into an equivalent canonical form." + + +Node:flavor, Next:flavorful, Previous:flatten, Up:= F += + +flavor n. + +1. [common] Variety, type, kind. "DDT commands come in two +flavors." "These lights come in two flavors, big red ones and +small green ones." "Linux is a flavor of Unix" See vanilla. 2. The attribute that causes +something to be flavorful. +Usually used in the phrase "yields additional flavor". "This +convention yields additional flavor by allowing one to print text +either right-side-up or upside-down." See vanilla. This usage was certainly reinforced +by the terminology of quantum chromodynamics, in which quarks +(the constituents of, e.g., protons) come in six flavors (up, +down, strange, charm, top, bottom) and three colors (red, blue, +green) -- however, hackish use of `flavor' at MIT predated QCD. +3. The term for `class' (in the object-oriented sense) in the +LISP Machine Flavors system. Though the Flavors design has been +superseded (notably by the Common LISP CLOS facility), the term +`flavor' is still used as a general synonym for `class' by some +LISP hackers. + + +Node:flavorful, Next:flippy, Previous:flavor, Up:= F += + +flavorful adj. + +Full of flavor (sense 2); +esthetically pleasing. See random +and losing for antonyms. See also +the entries for taste and elegant. + + +Node:flippy, Next:flood, Previous:flavorful, Up:= F = + +flippy /flip'ee/ n. + +A single-sided floppy disk altered for double-sided use by +addition of a second write-notch, so called because it must be +flipped over for the second side to be accessible. No longer +common. + + +Node:flood, Next:flowchart, Previous:flippy, Up:= F += + +flood v. + +[common] 1. To overwhelm a network channel with +mechanically-generated traffic; especially used of IP, TCP/IP, +UDP, or ICMP denial-of-service attacks. 2. To dump large amounts +of text onto an IRC channel. This is +especially rude when the text is uninteresting and the other +users are trying to carry on a serious conversation. Also used in +a similar sense on Usenet. 3. [Usenet] To post an unusually large +number or volume of files on a related topic. + + +Node:flowchart, Next:flower key, Previous:flood, Up:= F += + +flowchart n. + +[techspeak] An archaic form of visual control-flow +specification employing arrows and `speech balloons' of various +shapes. Hackers never use flowcharts, consider them extremely +silly, and associate them with COBOL +programmers, card +wallopers, and other lower forms of life. This attitude +follows from the observations that flowcharts (at least from a +hacker's point of view) are no easier to read than code, are less +precise, and tend to fall out of sync with the code (so that they +either obfuscate it rather than explaining it, or require extra +maintenance effort that doesn't improve the code). See also PDL, sense 1. + + +Node:flower key, Next:flush, Previous:flowchart, Up:= F = + +flower key n. + +[Mac users] See feature +key. + + +Node:flush, Next:flypage, Previous:flower key, Up:= F = + +flush v. + +1. [common] To delete something, usually superfluous, or to +abort an operation. "All that nonsense has been flushed." 2. +[Unix/C] To force buffered I/O to disk, as with an +fflush(3) call. This is not an abort or +deletion as in sense 1, but a demand for early completion! 3. To +leave at the end of a day's work (as opposed to leaving for a +meal). "I'm going to flush now." "Time to flush." 4. To exclude +someone from an activity, or to ignore a person. + +`Flush' was standard ITS terminology for aborting an output +operation; one spoke of the text that would have been printed, +but was not, as having been flushed. It is speculated that this +term arose from a vivid image of flushing unwanted characters by +hosing down the internal output buffer, washing the characters +away before they could be printed. The Unix/C usage, on the other +hand, was propagated by the fflush(3) call in C's +standard I/O library (though it is reported to have been in use +among BLISS programmers at DEC and on +Honeywell and IBM machines as far back as 1965). Unix/C hackers +found the ITS usage confusing, and vice versa. + + +Node:flypage, Next:Flyspeck 3, Previous:flush, Up:= F += + +flypage /fli:'payj/ n. + +(alt. `fly page') A banner, sense +1. + + +Node:Flyspeck 3, Next:flytrap, Previous:flypage, Up:= F += + +Flyspeck 3 n. + +Standard name for any font that is so tiny as to be unreadable +(by analogy with names like `Helvetica 10' for 10-point +Helvetica). Legal boilerplate is usually printed in Flyspeck +3. + + +Node:flytrap, Next:FM, Previous:Flyspeck 3, Up:= F = + +flytrap n. + +[rare] See firewall +machine. + + +Node:FM, Next:fnord, Previous:flytrap, Up:= F += + +FM /F-M/ n. + +1. [common] Not `Frequency Modulation' but rather an +abbreviation for `Fucking Manual', the back-formation from RTFM. Used to refer to the manual itself in +the RTFM. "Have you seen the +Networking FM lately?" 2. Abbreviation for "Fucking Magic", used +in the sense of black +magic. + + +Node:fnord, Next:FOAF, Previous:FM, +Up:= F = + +fnord n. + +[from the "Illuminatus Trilogy"] 1. A word used in email and +news postings to tag utterances as surrealist mind-play or humor, +esp. in connection with Discordianism and elaborate conspiracy +theories. "I heard that David Koresh is sharing an apartment in +Argentina with Hitler. (Fnord.)" "Where can I fnord get the +Principia Discordia from?" 2. A metasyntactic variable, +commonly used by hackers with ties to Discordianism or the Church of the +SubGenius. + + +Node:FOAF, Next:FOD, Previous:fnord, Up:= F += + +FOAF // n. + +[Usenet; common] Acronym for `Friend Of A Friend'. The source +of an unverified, possibly untrue story. This term was not +originated by hackers (it is used in Jan Brunvand's books on +urban folklore), but is much better recognized on Usenet and +elsewhere than in mainstream English. + + +Node:FOD, Next:fold case, Previous:FOAF, Up:= F = + + +FOD /fod/ v. + +[Abbreviation for `Finger of Death', originally a spell-name +from fantasy gaming] To terminate with extreme prejudice and with +no regard for other people. From MUDs +where the wizard command `FOD <player>' results in the +immediate and total death of <player>, usually as +punishment for obnoxious behavior. This usage migrated to other +circumstances, such as "I'm going to fod the process that is +burning all the cycles." Compare gun. + +In aviation, FOD means Foreign Object Damage, e.g., what +happens when a jet engine sucks up a rock on the runway or a bird +in flight. Finger of Death is a distressingly apt description of +what this generally does to the engine. + + +Node:fold case, Next:followup, Previous:FOD, Up:= F = + + +fold case v. + +See smash case. This term +tends to be used more by people who don't mind that their tools +smash case. It also connotes that case is ignored but case +distinctions in data processed by the tool in question aren't +destroyed. + + +Node:followup, Next:fontology, Previous:fold case, Up:= F = + +followup n. + +[common] On Usenet, a posting +generated in response to another posting (as opposed to a reply, which goes by email rather than +being broadcast). Followups include the ID of the parent message in their headers; +smart news-readers can use this information to present Usenet +news in `conversation' sequence rather than order-of-arrival. See +thread. + + +Node:fontology, Next:foo, Previous:followup, Up:= +F = + +fontology n. + +[XEROX PARC] The body of knowledge dealing with the +construction and use of new fonts (e.g., for window systems and +typesetting software). It has been said that fontology +recapitulates file-ogeny. + +[Unfortunately, this reference to the embryological dictum +that "Ontogeny recapitulates phylogeny" is not merely a joke. On +the Macintosh, for example, System 7 has to go through +contortions to compensate for an earlier design error that +created a whole different set of abstractions for fonts parallel +to `files' and `folders' --ESR] + + +Node:foo, Next:foobar, Previous:fontology, Up:= F = + +foo /foo/ + +1. interj. Term of disgust. 2. [very common] Used very +generally as a sample name for absolutely anything, esp. programs +and files (esp. scratch files). 3. First on the standard list of +metasyntactic +variables used in syntax examples. See also bar, baz, qux, quux, corge, grault, +garply, waldo, fred, plugh, xyzzy, +thud. + +When `foo' is used in connection with `bar' it has generally +traced to the WWII-era Army slang acronym FUBAR (`Fucked Up Beyond All Repair'), later +modified to foobar. Early versions +of the Jargon File interpreted this change as a post-war +bowdlerization, but it it now seems more likely that FUBAR was +itself a derivative of `foo' perhaps influenced by German +`furchtbar' (terrible) - `foobar' may actually have been the +original form. + +For, it seems, the word `foo' itself had an immediate prewar +history in comic strips and cartoons. The earliest documented +uses were in the "Smokey Stover" comic strip popular in the +1930s, which frequently included the word "foo". Bill Holman, the +author of the strip, filled it with odd jokes and personal +contrivances, including other nonsense phrases such as "Notary +Sojac" and "1506 nix nix". According to the Warner Brothers Cartoon +Companion Holman claimed to have found the word "foo" on the +bottom of a Chinese figurine. This is plausible; Chinese +statuettes often have apotropaic inscriptions, and this may have +been the Chinese word `fu' (sometimes transliterated `foo'), +which can mean "happiness" when spoken with the proper tone (the +lion-dog guardians flanking the steps of many Chinese restaurants +are properly called "fu dogs"). English speakers' reception of +Holman's `foo' nonsense word was undoubtedly influenced by +Yiddish `feh' and English `fooey' and `fool'. + +Holman's strip featured a firetruck called the Foomobile that +rode on two wheels. The comic strip was tremendously popular in +the late 1930s, and legend has it that a manufacturer in Indiana +even produced an operable version of Holman's Foomobile. +According to the Encyclopedia of American Comics, `Foo' fever +swept the U.S., finding its way into popular songs and generating +over 500 `Foo Clubs.' The fad left `foo' references embedded in +popular culture (including a couple of appearances in Warner +Brothers cartoons of 1938-39) but with their origins rapidly +forgotten. + +One place they are known to have remained live is in the U.S. +military during the WWII years. In 1944-45, the term `foo +fighters' was in use by radar operators for the kind of +mysterious or spurious trace that would later be called a UFO +(the older term resurfaced in popular American usage in 1995 via +the name of one of the better grunge-rock bands). Informants +connected the term to the Smokey Stover strip. + +The U.S. and British militaries frequently swapped slang terms +during the war (see kluge and kludge for another important example) +Period sources reported that `FOO' became a semi-legendary +subject of WWII British-army graffiti more or less equivalent to +the American Kilroy. Where British troops went, the graffito "FOO +was here" or something similar showed up. Several slang +dictionaries aver that FOO probably came from Forward Observation +Officer, but this (like the contemporaneous "FUBAR") was probably +a backronym . Forty years later, +Paul Dickson's excellent book "Words" (Dell, 1982, ISBN +0-440-52260-7) traced "Foo" to an unspecified British naval +magazine in 1946, quoting as follows: "Mr. Foo is a mysterious +Second World War product, gifted with bitter omniscience and +sarcasm." + +Earlier versions of this entry suggested the possibility that +hacker usage actually sprang from "FOO, Lampoons and Parody", the +title of a comic book first issued in September 1958, a joint +project of Charles and Robert Crumb. Though Robert Crumb (then in +his mid-teens) later became one of the most important and +influential artists in underground comics, this venture was +hardly a success; indeed, the brothers later burned most of the +existing copies in disgust. The title FOO was featured in large +letters on the front cover. However, very few copies of this +comic actually circulated, and students of Crumb's `oeuvre' have +established that this title was a reference to the earlier Smokey +Stover comics. The Crumbs may also have been influenced by a +short-lived Canadian parody magazine named `Foo' published in +1951-52. + +An old-time member reports that in the 1959 "Dictionary of the +TMRC Language", compiled at TMRC, +there was an entry that went something like this: + +FOO: The first syllable of the sacred chant phrase +"FOO MANE PADME HUM." Our first obligation is to keep the foo +counters turning. + + +(For more about the legendary foo counters, see TMRC.) This definition used Bill Holman's +nonsense word, only then two decades old and demonstrably still +live in popular culture and slang, to a ha ha only serious analogy +with esoteric Tibetan Buddhism. Today's hackers would find it +difficult to resist elaborating a joke like that, and it is not +likely 1959's were any less susceptible. Almost the entire staff +of what later became the MIT AI Lab was involved with TMRC, and +the word spread from there. + + +Node:foobar, Next:fool, Previous:foo, +Up:= F = + +foobar n. + +[very common] Another widely used metasyntactic variable; see +foo for etymology. Probably originally +propagated through DECsystem manuals by Digital Equipment +Corporation (DEC) in 1960s and early +1970s; confirmed sightings there go back to 1972. Hackers do +not generally use this to mean FUBAR in either the slang or jargon sense. See +also Fred Foobar. In RFC1639, +"FOOBAR" was made an abbreviation for "FTP Operation Over Big +Address Records", but this was an obvious backronym. + + +Node:fool, Next:fool file, Previous:foobar, Up:= F += + +fool n. + +As used by hackers, specifically describes a person who +habitually reasons from obviously or demonstrably incorrect +premises and cannot be persuaded by evidence to do otherwise; it +is not generally used in its other senses, i.e., to describe a +person with a native incapacity to reason correctly, or a clown. +Indeed, in hackish experience many fools are capable of reasoning +all too effectively in executing their errors. See also cretin, loser, +fool file. + +The Algol 68-R compiler used to initialize its storage to the +character string "F00LF00LF00LF00L..." because as a pointer or as +a floating point number it caused a crash, and as an integer or a +character string it was very recognizable in a dump. Sadly, one +day a very senior professor at Nottingham University wrote a +program that called him a fool. He proceeded to demonstrate the +correctness of this assertion by lobbying the university (not +quite successfully) to forbid the use of Algol on its computers. +See also DEADBEEF. + + +Node:fool file, Next:Foonly, Previous:fool, Up:= F = + + +fool file n. + +[Usenet] A notional repository of all the most dramatically +and abysmally stupid utterances ever. An entire subgenre of sig blocks consists of the header +"From the fool file:" followed by some quote the poster wishes to +represent as an immortal gem of dimwittery; for this usage to be +really effective, the quote has to be so obviously wrong as to be +laughable. More than one Usenetter has achieved an unwanted +notoriety by being quoted in this way. + + +Node:Foonly, Next:footprint, Previous:fool file, Up:= F = + +Foonly n. + +1. The PDP-10 successor that was +to have been built by the Super Foonly project at the Stanford +Artificial Intelligence Laboratory along with a new operating +system. (The name itself came from FOO NLI, an error message +emitted by a PDP-10 assembler at SAIL meaning "FOO is Not a Legal +Identifier". The intention was to leapfrog from the old DEC timesharing system SAIL was then running +to a new generation, bypassing TENEX which at that time was the +ARPANET standard. ARPA funding for both the Super Foonly and the +new operating system was cut in 1974. Most of the design team +went to DEC and contributed greatly to the design of the PDP-10 +model KL10. 2. The name of the company formed by Dave Poole, one +of the principal Super Foonly designers, and one of hackerdom's +more colorful personalities. Many people remember the parrot +which sat on Poole's shoulder and was a regular companion. 3. Any +of the machines built by Poole's company. The first was the F-1 +(a.k.a. Super Foonly), which was the computational engine used to +create the graphics in the movie "TRON". The F-1 was the fastest +PDP-10 ever built, but only one was ever made. The effort drained +Foonly of its financial resources, and the company turned towards +building smaller, slower, and much less expensive machines. +Unfortunately, these ran not the popular TOPS-20 but a TENEX variant called Foonex; +this seriously limited their market. Also, the machines shipped +were actually wire-wrapped engineering prototypes requiring +individual attention from more than usually competent site +personnel, and thus had significant reliability problems. Poole's +legendary temper and unwillingness to suffer fools gladly did not +help matters. By the time of the Jupiter project cancellation in +1983, Foonly's proposal to build another F-1 was eclipsed by the +Mars, and the company never quite +recovered. See the Mars entry for the +continuation and moral of this story. + + +Node:footprint, Next:for free, Previous:Foonly, Up:= F += + +footprint n. + +1. The floor or desk area taken up by a piece of hardware. 2. +[IBM] The audit trail (if any) left by a crashed program (often +in plural, `footprints'). See also toeprint. 3. RAM footprint: The +minimum amount of RAM which an OS or other program takes; this +figure gives one an idea of how much will be left for other +applications. How actively this RAM is used is another matter +entirely. Recent tendencies to featuritis and software bloat can +expand the RAM footprint of an OS to the point of making it +nearly unusable in practice. [This problem is, thankfully, +limited to operating systems so stupid that they don't do virtual +memory - ESR] + + +Node:for free, Next:for the rest of us, Previous:footprint, Up:= F = + +for free adj. + +[common] Said of a capability of a programming language or +hardware that is available by its design without needing +cleverness to implement: "In APL, we get the matrix operations +for free." "And owing to the way revisions are stored in this +system, you get revision trees for free." The term usually refers +to a serendipitous feature of doing things a certain way (compare +big win), but it may refer to an +intentional but secondary feature. + + +Node:for the rest of us, +Next:for values of, +Previous:for free, Up:= F = + +for the rest of us adj. + +[from the Mac slogan "The computer for the rest of us"] 1. +Used to describe a spiffy product +whose affordability shames other comparable products, or (more +often) used sarcastically to describe spiffy but very overpriced products. 2. +Describes a program with a limited interface, deliberately +limited capabilities, non-orthogonality, inability to compose +primitives, or any other limitation designed to not `confuse' a +naive user. This places an upper bound on how far that user can +go before the program begins to get in the way of the task +instead of helping accomplish it. Used in reference to Macintosh +software which doesn't provide obvious capabilities because it is +thought that the poor lusers might not be able to handle them. +Becomes `the rest of them' when used in third-party +reference; thus, "Yes, it is an attractive program, but it's +designed for The Rest Of Them" means a program that superficially +looks neat but has no depth beyond the surface flash. See also +WIMP environment, Macintrash, point-and-drool interface, +user-friendly. + + +Node:for values of, Next:fora, Previous:for the rest of us, Up:= F = + +for values of + +[MIT] A common rhetorical maneuver at MIT is to use any of the +canonical random numbers +as placeholders for variables. "The max function takes 42 +arguments, for arbitrary values of 42." "There are 69 ways to +leave your lover, for 69 = 50." This is especially likely when +the speaker has uttered a random number and realizes that it was +not recognized as such, but even `non-random' numbers are +occasionally used in this fashion. A related joke is that pi +equals 3 -- for small values of pi and large values of 3. + +Historical note: at MIT this usage has traditionally been +traced to the programming language MAD (Michigan Algorithm +Decoder), an Algol-58-like language that was the most common +choice among mainstream (non-hacker) users at MIT in the mid-60s. +It inherited from Algol-58 a control structure FOR VALUES OF X = +3, 7, 99 DO ... that would repeat the indicated instructions for +each value in the list (unlike the usual FOR that only works for +arithmetic sequences of values). MAD is long extinct, but similar +for-constructs still flourish (e.g., in Unix's shell +languages). + + +Node:fora, Next:foreground, Previous:for values of, Up:= F = + +fora pl.n. + +Plural of forum. + + +Node:foreground, Next:fork, Previous:fora, Up:= F = + + +foreground vt. + +[Unix; common] To bring a task to the top of one's stack for immediate processing, and hackers +often use it in this sense for non-computer tasks. "If your +presentation is due next week, I guess I'd better foreground +writing up the design document." + +Technically, on a time-sharing system, a task executing in +foreground is one able to accept input from and return output to +the user; oppose background. +Nowadays this term is primarily associated with Unix, but it appears first to have been used in +this sense on OS/360. Normally, there is only one foreground task +per terminal (or terminal window); having multiple processes +simultaneously reading the keyboard is a good way to lose. + + +Node:fork, Next:fork bomb, Previous:foreground, Up:= F = + +fork + +In the open-source community, a fork is what occurs when two +(or more) versions of a software package's source code are being +developed in parallel which once shared a common code base, and +these multiple versions of the source code have irreconcilable +differences between them. This should not be confused with a +development branch, which may later be folded back into the +original source code base. Nor should it be confused with what +happens when a new distribution of Linux or some other +distribution is created, because that largely assembles pieces +than can and will be used in other distributions without +conflict. + + +Forking is uncommon; in fact, it is so uncommon that individual instances loom +large in hacker folklore. Notable in this class were the GCC/EGCS fork (later +healed by a merger) and the forks among the FreeBSD, NetBSD, and OpenBSD +operating systems. + + +Node:fork bomb, Next:forked, Previous:fork, Up:= F = + + +fork bomb n. + +[Unix] A particular species of wabbit that can be written in one line of C +(main() {for(;;)fork();}) or shell ($0 & +$0 &) on any Unix system, or occasionally created by +an egregious coding bug. A fork bomb process `explodes' by +recursively spawning copies of itself (using the Unix system call +fork(2)). Eventually it eats all the process table +entries and effectively wedges the system. Fortunately, fork +bombs are relatively easy to spot and kill, so creating one +deliberately seldom accomplishes more than to bring the just +wrath of the gods down upon the perpetrator. See also logic bomb. + + +Node:forked, Next:Fortrash, Previous:fork bomb, Up:= F = + +forked adj.,vi. + +1. [common after 1997, esp. in the Linux community] An +open-source software project is said to have forked or be forked +when the project group fissions into two or more parts pursuing +separate lines of development (or, less commonly, when a third +party unconnected to the project group ). Forking is considered a +Bad Thing - not merely because +it implies a lot of wasted effort in the future, but because +forks tend to be accompanied by a great deal of strife and +acrimony between the successor groups over issues of legitimacy, +succession, and design direction. There is serious social +pressure against forking. As a result, major forks (such as the +Gnu-Emacs/XEmacs split, the fissionings of the 386BSD group into +three daughter project, and the short-lived GCC/EGCS split) are +rare enough that they are remembered individually in hacker +folklore. 2. [Unix; uncommon; prob. influenced by a mainstream +expletive] Terminally slow, or dead. Originated when one system +was slowed to a snail's pace by an inadvertent fork bomb. + + +Node:Fortrash, Next:fortune cookie, Previous:forked, Up:= F = + +Fortrash /for'trash/ n. + +Hackerism for the FORTRAN (FORmula TRANslator) language, +referring to its primitive design, gross and irregular syntax, +limited control constructs, and slippery, exception-filled +semantics. + + +Node:fortune cookie, Next:forum, Previous:Fortrash, Up:= +F = + +fortune cookie n. + +[WAITS, via Unix; common] A random quote, item of trivia, +joke, or maxim printed to the user's tty at login time or (less +commonly) at logout time. Items from this lexicon have often been +used as fortune cookies. See cookie +file. + + +Node:forum, Next:fossil, Previous:fortune cookie, Up:= F = + +forum n. + +[Usenet, GEnie, CI$; pl. `fora' or `forums'] Any discussion +group accessible through a dial-in BBS, +a mailing list, or a newsgroup (see the network). A forum functions much +like a bulletin board; users submit postings for all to read and discussion +ensues. Contrast real-time chat via talk mode or point-to-point personal email. + + +Node:fossil, Next:four-color glossies, Previous:forum, Up:= F = + +fossil n. + +1. In software, a misfeature that becomes understandable only +in historical context, as a remnant of times past retained so as +not to break compatibility. Example: the retention of octal as +default base for string escapes in C, in +spite of the better match of hexadecimal to ASCII and modern +byte-addressable architectures. See dusty deck. 2. More restrictively, a +feature with past but no present utility. Example: the +force-all-caps (LCASE) bits in the V7 and BSD Unix tty driver, designed for use with +monocase terminals. (In a perversion of the usual +backward-compatibility goal, this functionality has actually been +expanded and renamed in some later USG +Unix releases as the IUCLC and OLCUC bits.) 3. The FOSSIL +(Fido/Opus/Seadog Standard Interface Level) driver specification +for serial-port access to replace the brain-dead routines in the IBM PC ROMs. +Fossils are used by most MS-DOS BBS +software in preference to the `supported' ROM routines, which do +not support interrupt-driven operation or setting speeds above +9600; the use of a semistandard FOSSIL library is preferable to +the bare metal serial port +programming otherwise required. Since the FOSSIL specification +allows additional functionality to be hooked in, drivers that use +the hook but do not provide +serial-port access themselves are named with a modifier, as in +`video fossil'. + + +Node:four-color glossies, +Next:frag, Previous:fossil, Up:= F = + +four-color glossies n. + +1. Literature created by marketroids that allegedly contains +technical specs but which is in fact as superficial as possible +without being totally content-free. "Forget the four-color +glossies, give me the tech ref manuals." Often applied as an +indication of superficiality even when the material is printed on +ordinary paper in black and white. Four-color-glossy manuals are +never useful for solving a problem. 2. [rare] Applied by +extension to manual pages that don't contain enough information +to diagnose why the program doesn't produce the expected or +desired output. + + +Node:frag, Next:fragile, Previous:four-color glossies, Up:= F = + +frag n.,v. + +[from Vietnam-era U.S. military slang via the games Doom and +Quake] 1. To kill another player's avatar in a multiuser game. "I hold the office +Quake record with 40 frags." 2. To completely ruin something. +"Forget that power supply, the lightning strike fragged it. See +also gib. + + +Node:fragile, Next:fred, Previous:frag, Up:= F = + + +fragile adj. + +Syn brittle. + + +Node:fred, Next:Fred Foobar, Previous:fragile, Up:= F = + +fred n. + +1. The personal name most frequently used as a metasyntactic variable (see +foo). Allegedly popular because it's +easy for a non-touch-typist to type on a standard QWERTY +keyboard. In Great Britain, `fred', `jim' and `sheila' are common +metasyntactic variables because their uppercase versions were +official names given to the 3 memory areas that held I/O +status registers on the lovingly-remembered BBC Microcomputer! +(It is reported that SHEILA was poked the most often.) Unlike +J. Random Hacker or +`J. Random Loser', the name `fred' has no positive or negative +loading (but see Dr. Fred +Mbogo). See also barney. 2. +An acronym for `Flipping Ridiculous Electronic Device'; other +F-verbs may be substituted for `flipping'. + + +Node:Fred Foobar, Next:frednet, Previous:fred, Up:= F = + + +Fred Foobar n. + +J. Random Hacker's +cousin. Any typical human being, more or less synomous with +`someone' except that Fred Foobar can be backreferenced by name later on. "So +Fred Foobar will enter his phone number into the database, and +it'll be archived with the others. Months later, when Fred +searches..." See also Bloggs +Family and Dr. Fred +Mbogo + + +Node:frednet, Next:free software, Previous:Fred Foobar, Up:= F = + +frednet /fred'net/ n. + +Used to refer to some random and +uncommon protocol encountered on a network. "We're implementing +bridging in our router to solve the frednet problem." + + +Node:free software, Next:freeware, Previous:frednet, Up:= F = + +free software n. + +As defined by Richard M. Stallman and used by the Free +Software movement, this means software that gives users enough +freedom to be used by the free software community. Specifically, +users must be free to modify the software for their private use, +and free to redistribute it either with or without modifications, +either commercially or noncommercially, either gratis or charging +a distribution fee. Free software has existed since the dawn of +computing; Free Software as a movement began in 1984 with the GNU +Project. See also open +source. + + +Node:freeware, Next:freeze, Previous:free software, Up:= F = + +freeware n. + +[common] Free software, often written by enthusiasts and +distributed by users' groups, or via electronic mail, local +bulletin boards, Usenet, or other +electronic media. At one time, `freeware' was a trademark of +Andrew Fluegelman, the author of the well-known MS-DOS comm +program PC-TALK III. It wasn't enforced after his mysterious +disappearance and presumed death in 1984. See shareware, FRS. + + +Node:freeze, Next:fried, Previous:freeware, Up:= +F = + +freeze v. + +To lock an evolving software distribution or document against +changes so it can be released with some hope of stability. +Carries the strong implication that the item in question will +`unfreeze' at some future date. "OK, fix that bug and we'll +freeze for release." + +There are more specific constructions on this term. A `feature +freeze', for example, locks out modifications intended to +introduce new features but still allows bugfixes and completion +of existing features; a `code freeze' connotes no more changes at +all. At Sun Microsystems and elsewhere, one may also hear +references to `code slush' -- that is, an almost-but-not-quite +frozen state. + + +Node:fried, Next:frink, Previous:freeze, Up:= F += + +fried adj. + +1. [common] Non-working due to hardware failure; burnt out. +Especially used of hardware brought down by a `power glitch' (see +glitch), drop-outs, a short, or some other electrical +event. (Sometimes this literally happens to electronic circuits! +In particular, resistors can burn out and transformers can melt +down, emitting noxious smoke -- see friode, SED and LER. However, this term is also used +metaphorically.) Compare frotzed. +2. [common] Of people, exhausted. Said particularly of those who +continue to work in such a state. Often used as an explanation or +excuse. "Yeah, I know that fix destroyed the file system, but I +was fried when I put it in." Esp. common in conjunction with +`brain': "My brain is fried today, I'm very short on sleep." + + +Node:frink, Next:friode, Previous:fried, Up:= F += + +frink /frink/ v. + +The unknown ur-verb, fill in your own meaning. Found esp. on +the Usenet newsgroup _alt.fan.lemurs_, where it is said that +the lemurs know what `frink' means, but they aren't telling. +Compare gorets. + + +Node:friode, Next:fritterware, Previous:frink, Up:= F += + +friode /fri:'ohd/ n. + +[TMRC] A reversible (that is, fused or blown) diode. Compare +fried; see also SED, LER. + + +Node:fritterware, Next:frob, Previous:friode, Up:= F += + +fritterware n. + +An excess of capability that serves no productive end. The +canonical example is font-diddling software on the Mac (see macdink); the term describes anything +that eats huge amounts of time for quite marginal gains in +function but seduces people into using it anyway. See also window shopping. + + +Node:frob, Next:frobnicate, Previous:fritterware, Up:= F = + +frob /frob/ 1. n. + +[MIT; very common] The TMRC +definition was "FROB = a protruding arm or trunnion"; by +metaphoric extension, a `frob' is any random small thing; an +object that you can comfortably hold in one hand; something you +can frob (sense 2). See frobnitz. +2. vt. Abbreviated form of frobnicate. 3. [from the MUD world] A command on some MUDs that changes a +player's experience level (this can be used to make wizards); +also, to request wizard privileges +on the `professional courtesy' grounds that one is a wizard +elsewhere. The command is actually `frobnicate' but is +universally abbreviated to the shorter form. + + +Node:frobnicate, Next:frobnitz, Previous:frob, Up:= F = + + +frobnicate /frob'ni-kayt/ vt. + +[Poss. derived from frobnitz, +and usually abbreviated to frob, but +`frobnicate' is recognized as the official full form.] To +manipulate or adjust, to tweak. One frequently frobs bits or +other 2-state devices. Thus: "Please frob the light switch" (that +is, flip it), but also "Stop frobbing that clasp; you'll break +it". One also sees the construction `to frob a frob'. See tweak and twiddle. + +Usage: frob, twiddle, and tweak sometimes connote points along +a continuum. `Frob' connotes aimless manipulation; `twiddle' +connotes gross manipulation, often a coarse search for a proper +setting; `tweak' connotes fine-tuning. If someone is turning a +knob on an oscilloscope, then if he's carefully adjusting it, he +is probably tweaking it; if he is just turning it but looking at +the screen, he is probably twiddling it; but if he's just doing +it because turning a knob is fun, he's frobbing it. The variant +`frobnosticate' has been recently reported. + + +Node:frobnitz, Next:frog, Previous:frobnicate, Up:= F = + +frobnitz /frob'nits/, pl. `frobnitzem' /frob'nit-zm/ or +`frobni' /frob'ni:/ n. + +[TMRC] An unspecified physical object, a widget. Also refers +to electronic black boxes. This rare form is usually abbreviated +to `frotz', or more commonly to frob. +Also used are `frobnule' (/frob'n[y]ool/) and `frobule' +(/frob'yool/). Starting perhaps in 1979, `frobozz' /fr*-boz'/ +(plural: `frobbotzim' /fr*-bot'zm/) has also become very popular, +largely through its exposure as a name via Zork. These variants can also be applied to +nonphysical objects, such as data structures. + +Pete Samson, compiler of the original TMRC lexicon, adds, "Under the TMRC [railroad] +layout were many storage boxes, managed (in 1958) by David R. +Sawyer. Several had fanciful designations written on them, such +as `Frobnitz Coil Oil'. Perhaps DRS intended Frobnitz to be a +proper name, but the name was quickly taken for the thing". This +was almost certainly the origin of the term. + + +Node:frog, Next:frogging, Previous:frobnitz, Up:= +F = + +frog alt. `phrog' + +1. interj. Term of disgust (we seem to have a lot of them). 2. +Used as a name for just about anything. See foo. 3. n. Of things, a crock. 4. n. Of people, +somewhere in between a turkey and a toad. 5. `froggy': adj. +Similar to bagbiting, but milder. +"This froggy program is taking forever to run!" + + +Node:frogging, Next:front end, Previous:frog, Up:= F = + + +frogging [University of Waterloo] v. + +1. Partial corruption of a text file or input stream by some +bug or consistent glitch, as opposed to random events like line +noise or media failures. Might occur, for example, if one bit of +each incoming character on a tty were stuck, so that some +characters were correct and others were not. See terminak for a historical example and compare +dread high-bit +disease. 2. By extension, accidental display of text in a +mode where the output device emits special symbols or mnemonics +rather than conventional ASCII. This often happens, for example, +when using a terminal or comm program on a device like an IBM PC +with a special `high-half' character set and with the bit-parity +assumption wrong. A hacker sufficiently familiar with ASCII bit +patterns might be able to read the display anyway. + + +Node:front end, Next:frotz, Previous:frogging, Up:= +F = + +front end n. + +1. An intermediary computer that does set-up and filtering for +another (usually more powerful but less friendly) machine (a +`back end'). 2. What you're talking to when you have a +conversation with someone who is making replies without paying +attention. "Look at the dancing elephants!" "Uh-huh." "Do you +know what I just said?" "Sorry, you were talking to the front +end." 3. Software that provides an interface to another program +`behind' it, which may not be as user-friendly. Probably from +analogy with hardware front-ends (see sense 1) that interfaced +with mainframes. + + +Node:frotz, Next:frotzed, Previous:front end, Up:= F = + +frotz /frots/ + +1. n. See frobnitz. 2. `mumble +frotz': An interjection of mildest disgust. + + +Node:frotzed, Next:frowney, Previous:frotz, Up:= F += + +frotzed /frotst/ adj. + +down because of hardware problems. +Compare fried. A machine that is +merely frotzed may be fixable without replacing parts, but a +fried machine is more seriously damaged. + + +Node:frowney, Next:FRS, Previous:frotzed, Up:= F += + +frowney n. + +(alt. `frowney face') See emoticon. + + +Node:FRS, Next:fry, Previous:frowney, Up:= F += + +FRS // n.,obs. + +Abbreviation for "Freely Redistributable Software" which +entered general use on the Internet in 1995 after years of +low-level confusion over what exactly to call software written to +be passed around and shared (contending terms including freeware, shareware, and `sourceware' were never +universally felt to be satisfactory for various subtle reasons). +The first formal conference on freely redistributable software +was held in Cambridge, Massachussetts, in February 1996 +(sponsored by the Free Software Foundation). The conference +organizers used the FRS abbreviation heavily in its calls for +papers and other literature during 1995. The term was in steady +though not common use until 1998 and the invention of open source. + + +Node:fry, Next:fscking, Previous:FRS, Up:= F = + + +fry + +1. vi. To fail. Said especially of smoke-producing hardware +failures. More generally, to become non-working. Usage: never +said of software, only of hardware and humans. See fried, magic +smoke. 2. vt. To cause to fail; to roach, toast, or +hose a piece of hardware. Never used +of software or humans, but compare fried. + + +Node:fscking, Next:FSF, Previous:fry, +Up:= F = + +fscking /fus'-king/ or /eff'-seek-ing/ adj. + +[Usenet; common] Fucking, in the expletive sense (it refers to +the Unix filesystem-repair command fsck(1), of which it can be +said that if you have to use it at all you are having a bad day). +Originated on scary devil +monastery and the _bofh.net_ newsgroups, but became +much more widespread following the passage of CDA. Also occasionally seen in the variant "What +the fsck?" + + +Node:FSF, Next:FTP, Previous:fscking, Up:= F += + +FSF /F-S-F/ abbrev. + +Common abbreviation (both spoken and written) for the name of +the Free Software Foundation, a nonprofit educational association +formed to support the GNU project. + + +Node:FTP, Next:-fu, Previous:FSF, +Up:= F = + +FTP /F-T-P/, not /fit'ip/ + +1. [techspeak] n. The File Transfer Protocol for transmitting +files between systems on the Internet. 2. vt. To beam a file using the File Transfer Protocol. 3. +Sometimes used as a generic even for file transfers not using +FTP. "Lemme get a copy of "Wuthering +Heights" ftp'd from uunet." + + +Node:-fu, Next:FUBAR, Previous:FTP, Up:= F = + + +-fu + +[common; generalized from `kung-fu'] Combining form denoting +expert practice of a skill. "That's going to take some serious +code-fu." First sighted in connection with the GIMP's +remote-scripting facility, script-fu, in 1998. + + +Node:FUBAR, Next:fuck me harder, Previous:-fu, Up:= F = + +FUBAR n. + +The Failed UniBus Address Register in a VAX. A good example of +how jargon can occasionally be snuck past the suits; see foobar, +and foo for a fuller etymology. + + +Node:fuck me harder, Next:FUD, Previous:FUBAR, Up:= F += + +fuck me harder excl. + +Sometimes uttered in response to egregious misbehavior, esp. +in software, and esp. of misbehaviors which seem unfairly +persistent (as though designed in by the imp of the perverse). +Often theatrically elaborated: "Aiighhh! Fuck me with a +piledriver and 16 feet of curare-tipped wrought-iron fence +and no lubricants!" The phrase is sometimes heard +abbreviated `FMH' in polite company. + +[This entry is an extreme example of the hackish habit of +coining elaborate and evocative terms for lossage. Here we see a +quite self-conscious parody of mainstream expletives that has +become a running gag in part of the hacker culture; it +illustrates the hackish tendency to turn any situation, even one +of extreme frustration, into an intellectual game (the point +being, in this case, to creatively produce a long-winded +description of the most anatomically absurd mental image possible +-- the short forms implicitly allude to all the ridiculous long +forms ever spoken). Scatological language is actually relatively +uncommon among hackers, and there was some controversy over +whether this entry ought to be included at all. As it reflects a +live usage recognizably peculiar to the hacker culture, we feel +it is in the hackish spirit of truthfulness and opposition to all +forms of censorship to record it here. --ESR & GLS] + + +Node:FUD, Next:FUD wars, Previous:fuck me harder, Up:= F = + +FUD /fuhd/ n. + +Defined by Gene Amdahl after he left IBM to found his own +company: "FUD is the fear, uncertainty, and doubt that IBM sales +people instill in the minds of potential customers who might be +considering [Amdahl] products." The idea, of course, was to +persuade them to go with safe IBM gear rather than with +competitors' equipment. This implicit coercion was traditionally +accomplished by promising that Good Things would happen to people +who stuck with IBM, but Dark Shadows loomed over the future of +competitors' equipment or software. See IBM. After 1990 the term FUD was associated +increasingly frequently with Microsoft, and has become generalized to +refer to any kind of disinformation used as a competitive +weapon. + + +Node:FUD wars, Next:fudge, Previous:FUD, Up:= F = + + +FUD wars /fuhd worz/ n. + +[from FUD] Political posturing +engaged in by hardware and software vendors ostensibly committed +to standardization but actually willing to fragment the market to +protect their own shares. The Unix International vs. OSF conflict +about Unix standards was one outstanding example; Microsoft vs. +Netscape vs. W3C about HTML standards is another. + + +Node:fudge, Next:fudge factor, Previous:FUD wars, Up:= F = + +fudge + +1. vt. To perform in an incomplete but marginally acceptable +way, particularly with respect to the writing of a program. "I +didn't feel like going through that pain and suffering, so I +fudged it -- I'll fix it later." 2. n. The resulting code. + + +Node:fudge factor, Next:fuel up, Previous:fudge, Up:= F += + +fudge factor n. + +[common] A value or parameter that is varied in an ad hoc way +to produce the desired result. The terms `tolerance' and slop are also used, though these usually +indicate a one-sided leeway, such as a buffer that is made larger +than necessary because one isn't sure exactly how large it needs +to be, and it is better to waste a little space than to lose +completely for not having enough. A fudge factor, on the other +hand, can often be tweaked in more than one direction. A good +example is the `fuzz' typically allowed in floating-point +calculations: two numbers being compared for equality must be +allowed to differ by a small amount; if that amount is too small, +a computation may never terminate, while if it is too large, +results will be needlessly inaccurate. Fudge factors are +frequently adjusted incorrectly by programmers who don't fully +understand their import. See also coefficient of X. + + +Node:fuel up, Next:Full Monty, Previous:fudge factor, Up:= F = + +fuel up vi. + +To eat or drink hurriedly in order to get back to hacking. +"Food-p?" "Yeah, let's fuel up." "Time for a great-wall!" See also oriental food. + + +Node:Full Monty, Next:fum, Previous:fuel up, Up:= +F = + +Full Monty n. + +See monty, sense 2. + + +Node:fum, Next:functino, Previous:Full Monty, Up:= F = + +fum n. + +[XEROX PARC] At PARC, often the third of the standard metasyntactic variables +(after foo and bar). Competes with baz, +which is more common outside PARC. + + +Node:functino, Next:funky, Previous:fum, Up:= F = + + +functino n. + +[uncommon, U.K.; originally a serendipitous typo in 1994] A +pointer to a function in C and C++. By association with +sub-atomic particles such as the neutrino, it accurately conveys +an impression of smallness (one pointer is four bytes on most +systems) and speed (hackers can and do use arrays of functinos to +replace a switch() statement). + + +Node:funky, Next:funny money, Previous:functino, Up:= F = + +funky adj. + +Said of something that functions, but in a slightly strange, +klugey way. It does the job and would be difficult to change, so +its obvious non-optimality is left alone. Often used to describe +interfaces. The more bugs something has that nobody has bothered +to fix because workarounds are easier, the funkier it is. TECO and UUCP are funky. The Intel i860's +exception handling is extraordinarily funky. Most standards +acquire funkiness as they age. "The new mailer is installed, but +is still somewhat funky; if it bounces your mail for no reason, +try resubmitting it." "This UART is pretty funky. The data ready +line is active-high in interrupt mode and active-low in DMA +mode." + + +Node:funny money, Next:furrfu, Previous:funky, Up:= F += + +funny money n. + +1. Notional `dollar' units of computing time and/or storage +handed to students at the beginning of a computer course; also +called `play money' or `purple money' (in implicit opposition to +real or `green' money). In New Zealand and Germany the odd usage +`paper money' has been recorded; in Germany, the particularly +amusing synonym `transfer ruble' commemmorates the funny money +used for trade between COMECON countries back when the Soviet +Bloc still existed. When your funny money ran out, your account +froze and you needed to go to a professor to get more. +Fortunately, the plunging cost of timesharing cycles has made +this less common. The amounts allocated were almost invariably +too small, even for the non-hackers who wanted to slide by with +minimum work. In extreme cases, the practice led to small-scale +black markets in bootlegged computer accounts. 2. By extension, +phantom money or quantity tickets of any kind used as a +resource-allocation hack within a system. Antonym: `real +money'. + + +Node:furrfu, Next:fuzzball, Previous:funny money, Up:= F = + +furrfu excl. + +[Usenet; written, only rarely spoken] Written-only equivalent +of "Sheesh!"; it is, in fact, "sheesh" modified by rot13. Evolved in mid-1992 as a response to +notably silly postings repeating urban myths on the Usenet +newsgroup _alt.folklore.urban_, after some posters +complained that "Sheesh!" as a response to newbies was being overused. See also FOAF. + + +Node:fuzzball, Next:G, Previous:furrfu, +Up:= F = + +fuzzball n. + +[TCP/IP hackers] A DEC LSI-11 running a particular suite of +homebrewed software written by Dave Mills and assorted +co-conspirators, used in the early 1980s for Internet protocol +testbedding and experimentation. These were used as NSFnet +backbone sites in its early 56kb-line days; a few were still +active on the Internet as late as mid-1993, doing odd jobs such +as network time service. + + +Node:= G =, Next:= H =, Previous:= F =, Up:The Jargon Lexicon + += G = + + +G: + + +g-file: + + +gabriel: + + +gag: + + +gang bang: + + +garbage collect: + + +garply: + + +gas: + + +gaseous: + + +Gates's Law: + + +gawble: + + +GC: + + +GCOS: + + +GECOS: + + +gedanken: + + +geef: + + +geek code: + + +geek out: + + +gen: + + +gender mender: + + +General Public +Virus: + + +generate: + + +Genius From Mars +Technique: + + +gensym: + + +Get a life!: + + +Get a real +computer!: + + +GFR: + + +gib: + + +GIFs at 11: + + +gig: + + +giga-: + + +GIGO: + + +gilley: + + +gillion: + + +ginger: + + +GIPS: + + +glark: + + +glass: + + +glass tty: + + +glassfet: + + +glitch: + + +glob: + + +glork: + + +glue: + + +gnarly: + + +GNU: + + +gnubie: + + +GNUMACS: + + +go flatline: + + +go root: + + +go-faster stripes: + + +GoAT: + + +gobble: + + +Godwin's Law: + + +Godzillagram: + + +golden: + + +golf-ball printer: + + +gonk: + + +gonkulator: + + +gonzo: + + +Good Thing: + + +gopher: + + +gopher hole: + + +gorets: + + +gorilla arm: + + +gorp: + + +GOSMACS: + + +Gosperism: + + +gotcha: + + +GPL: + + +GPV: + + +grault: + + +gray goo: + + +Great Renaming: + + +Great Runes: + + +Great Worm: + + +great-wall: + + +Green Book: + + +green bytes: + + +green card: + + +green lightning: + + +green machine: + + +Green's Theorem: + + +greenbar: + + +grep: + + +gribble: + + +grilf: + + +grind: + + +grind crank: + + +gripenet: + + +gritch: + + +grok: + + +gronk: + + +gronk out: + + +gronked: + + +grovel: + + +grue: + + +grunge: + + +gubbish: + + +Guido: + + +guiltware: + + +gumby: + + +gun: + + +gunch: + + +gunpowder chicken: + + +gurfle: + + +guru: + + +guru meditation: + + +gweep: + + +Node:G, Next:g-file, Previous:fuzzball, Up:= +G = + +G pref.,suff. + +[SI] See quantifiers. + + +Node:g-file, Next:gabriel, Previous:G, Up:= G = + +g-file n. + +[Commodore BBS culture] Any file that is written with the +intention of being read by a human rather than a machine, such as +the Jargon File, documentation, humor files, hacker lore, and +technical materials. + +This term survives from the nearly forgotten Commodore 64 +underground and BBS community. In the early 80s, C-Net had +emerged as the most popular C64 BBS software for systems which +encouraged messaging (as opposed to file transfer). There were +three main options for files: Program files (p-files), which +served the same function as `doors' in today's systems, UD files +(the user upload/download section), and g-files. Anything that +was meant to be read was included in g-files. + + +Node:gabriel, Next:gag, Previous:g-file, Up:= G += + +gabriel /gay'bree-*l/ n. + +[for Dick Gabriel, SAIL LISP hacker and volleyball fanatic] An +unnecessary (in the opinion of the opponent) stalling tactic, +e.g., tying one's shoelaces or combing one's hair repeatedly, +asking the time, etc. Also used to refer to the perpetrator of +such tactics. Also, `pulling a Gabriel', `Gabriel mode'. + + +Node:gag, Next:gang bang, Previous:gabriel, Up:= G += + +gag vi. + +Equivalent to choke, but connotes +more disgust. "Hey, this is FORTRAN code. No wonder the C +compiler gagged." See also barf. + + +Node:gang bang, Next:garbage collect, Previous:gag, Up:= G = + +gang bang n. + +The use of large numbers of loosely coupled programmers in an +attempt to wedge a great many features into a product in a short +time. Though there have been memorable gang bangs (e.g., that +over-the-weekend assembler port mentioned in Steven Levy's +"Hackers"), most are perpetrated by large companies trying to +meet deadlines; the inevitable result is enormous buggy masses of +code entirely lacking in orthogonality. When market-driven managers +make a list of all the features the competition has and assign +one programmer to implement each, the probability of maintaining +a coherent (or even functional) design goes infinitesimal. See +also firefighting, Mongolian Hordes +technique, Conway's +Law. + + +Node:garbage collect, Next:garply, Previous:gang bang, Up:= G = + +garbage collect vi. + +(also `garbage collection', n.) See GC. + + +Node:garply, Next:gas, Previous:garbage collect, Up:= G = + +garply /gar'plee/ n. + +[Stanford] Another metasyntactic variable (see foo); once popular among SAIL hackers. + + +Node:gas, Next:gaseous, Previous:garply, Up:= G += + +gas + +[as in `gas chamber'] 1. interj. A term of disgust and hatred, +implying that gas should be dispensed in generous quantities, +thereby exterminating the source of irritation. "Some loser just +reloaded the system for no reason! Gas!" 2. interj. A suggestion +that someone or something ought to be flushed out of mercy. "The +system's getting wedged every few +minutes. Gas!" 3. vt. To flush (sense +1). "You should gas that old crufty software." 4. [IBM] n. Dead +space in nonsequentially organized files that was occupied by +data that has since been deleted; the compression operation that +removes it is called `degassing' (by analogy, perhaps, with the +use of the same term in vacuum technology). 5. [IBM] n. Empty +space on a disk that has been clandestinely allocated against +future need. + + +Node:gaseous, Next:Gates's Law, Previous:gas, Up:= G += + +gaseous adj. + +Deserving of being gassed. +Disseminated by Geoff Goodfellow while at SRI; became +particularly popular after the Moscone-Milk killings in San +Francisco, when it was learned that the defendant Dan White (a +politician who had supported Proposition 7) would get the gas +chamber under Proposition 7 if convicted of first-degree murder +(he was eventually convicted of manslaughter). + + +Node:Gates's Law, Next:gawble, Previous:gaseous, Up:= G += + +Gates's Law + +"The speed of software halves every 18 months." This oft-cited +law is an ironic comment on the tendency of software bloat to +outpace the every-18-month doubling in hardware caopacity per +dollar predicted by Moore's +Law. The reference is to Bill Gates; Microsoft is widely +considered among the worst if not the worst of the perpetrators +of bloat. + + +Node:gawble, Next:GC, Previous:Gates's Law, Up:= G = + +gawble /gaw'bl/ n. + +See chawmp. + + +Node:GC, Next:GCOS, Previous:gawble, Up:= G += + +GC /G-C/ + +[from LISP terminology; `Garbage Collect'] 1. vt. To clean up +and throw away useless things. "I think I'll GC the top of my +desk today." When said of files, this is equivalent to GFR. 2. vt. To recycle, reclaim, or put to +another use. 3. n. An instantiation of the garbage collector +process. + +`Garbage collection' is computer-science techspeak for a +particular class of strategies for dynamically but transparently +reallocating computer memory (i.e., without requiring explicit +allocation and deallocation by higher-level software). One such +strategy involves periodically scanning all the data in memory +and determining what is no longer accessible; useless data items +are then discarded so that the memory they occupy can be recycled +and used for another purpose. Implementations of the LISP +language usually use garbage collection. + +In jargon, the full phrase is sometimes heard but the abbrev GC is more frequently used because +it is shorter. Note that there is an ambiguity in usage that has +to be resolved by context: "I'm going to garbage-collect my desk" +usually means to clean out the drawers, but it could also mean to +throw away or recycle the desk itself. + + +Node:GCOS, Next:GECOS, Previous:GC, +Up:= G = + +GCOS /jee'kohs/ n. + +A quick-and-dirty clone of System/360 DOS that emerged from +GE around 1970; originally called GECOS (the General Electric +Comprehensive Operating System). Later kluged to support +primitive timesharing and transaction processing. After the +buyout of GE's computer division by Honeywell, the name was +changed to General Comprehensive Operating System (GCOS). Other +OS groups at Honeywell began referring to it as `God's Chosen +Operating System', allegedly in reaction to the GCOS crowd's +uninformed and snotty attitude about the superiority of their +product. All this might be of zero interest, except for two +facts: (1) The GCOS people won the political war, and this led in +the orphaning and eventual death of Honeywell Multics, and (2) GECOS/GCOS left one permanent +mark on Unix. Some early Unix systems at Bell Labs used GCOS +machines for print spooling and various other services; the field +added to /etc/passwd to carry GCOS ID information +was called the `GECOS field' and survives today as the +pw_gecos member used for the user's full name and +other human-ID information. GCOS later played a major role in +keeping Honeywell a dismal also-ran in the mainframe market, and +was itself mostly ditched for Unix in the late 1980s when +Honeywell began to retire its aging big +iron designs. + + +Node:GECOS, Next:gedanken, Previous:GCOS, Up:= G = + + +GECOS /jee'kohs/ n. + +See GCOS. + + +Node:gedanken, Next:geef, Previous:GECOS, Up:= G += + +gedanken /g*-dahn'kn/ adj. + +Ungrounded; impractical; not well-thought-out; untried; +untested. + +`Gedanken' is a German word for `thought'. A thought +experiment is one you carry out in your head. In physics, the +term `gedanken experiment' is used to refer to an experiment that +is impractical to carry out, but useful to consider because it +can be reasoned about theoretically. (A classic gedanken +experiment of relativity theory involves thinking about a man in +an elevator accelerating through space.) Gedanken experiments are +very useful in physics, but must be used with care. It's too easy +to idealize away some important aspect of the real world in +constructing the `apparatus'. + +Among hackers, accordingly, the word has a pejorative +connotation. It is typically used of a project, especially one in +artificial intelligence research, that is written up in grand +detail (typically as a Ph.D. thesis) without ever being +implemented to any great extent. Such a project is usually +perpetrated by people who aren't very good hackers or find +programming distasteful or are just in a hurry. A `gedanken +thesis' is usually marked by an obvious lack of intuition about +what is programmable and what is not, and about what does and +does not constitute a clear specification of an algorithm. See +also AI-complete, DWIM. + + +Node:geef, Next:geek code, Previous:gedanken, Up:= +G = + +geef v. + +[ostensibly from `gefingerpoken'] vt. Syn. mung. See also blinkenlights. + + +Node:geek code, Next:geek out, Previous:geef, Up:= G = + + +geek code n. + +(also "Code of the Geeks"). A set of codes commonly used in +sig blocks to broadcast the +interests, skills, and aspirations of the poster. Features a G at +the left margin followed by numerous letter codes, often suffixed +with plusses or minuses. Because many net users are involved in +computer science, the most common prefix is `GCS'. To see a copy +of the current code, browse http://www.geekcode.com. Here is a +sample geek code (that of Robert Hayden, the code's inventor) +from that page: + +-----BEGIN GEEK CODE BLOCK----- +Version: 3.1 +GED/J d-- s:++>: a- C++(++++)$ ULUO++ P+>+++ L++ !E---- W+(---) N+++ +o+ K+++ w+(---) O- M+$>++ V-- PS++(+++)>$ PE++(+)>$ Y++ PGP++ t- 5+++ +X++ R+++>$ tv+ b+ DI+++ D+++ G+++++>$ e++$>++++ h r-- y+** +------END GEEK CODE BLOCK------ + + +The geek code originated in 1993; it was inspired (according +to the inventor) by previous "bear", "smurf" and "twink" +style-and-sexual-preference codes from lesbian and gay newsgroups. It has in turn spawned +imitators; there is now even a "Saturn geek code" for owners of +the Saturn car. See also computer +geek. + + +Node:geek out, Next:gen, Previous:geek code, Up:= G = + +geek out vi. + +To temporarily enter techno-nerd mode while in a non-hackish +context, for example at parties held near computer equipment. +Especially used when you need to do or say something highly +technical and don't have time to explain: "Pardon me while I geek +out for a moment." See computer +geek; see also propeller +head. + + +Node:gen, Next:gender mender, Previous:geek out, Up:= G = + +gen /jen/ n.,v. + +Short for generate, used +frequently in both spoken and written contexts. + + +Node:gender mender, Next:General Public Virus, +Previous:gen, Up:= G = + +gender mender n. + +[common] A cable connector shell with either two male or two +female connectors on it, used to correct the mismatches that +result when some loser didn't +understand the RS232C specification and the distinction between +DTE and DCE. Used esp. for RS-232C parts in either the original +D-25 or the IBM PC's bogus D-9 format. Also called `gender +bender', `gender blender', `sex changer', and even `homosexual +adapter;' however, there appears to be some confusion as to +whether a `male homosexual adapter' has pins on both sides (is +doubly male) or sockets on both sides (connects two males). + + +Node:General Public Virus, +Next:generate, Previous:gender mender, Up:= G = + +General Public Virus n. + +Pejorative name for some versions of the GNU project copyleft or General Public License (GPL), +which requires that any tools or apps +incorporating copylefted code must be source-distributed on the +same anti-proprietary terms as GNU stuff. Thus it is alleged that +the copyleft `infects' software generated with GNU tools, which +may in turn infect other software that reuses any of its code. +The Free Software Foundation's official position as of January +1991 is that copyright law limits the scope of the GPL to +"programs textually incorporating significant amounts of GNU +code", and that the `infection' is not passed on to third parties +unless actual GNU source is transmitted. Nevertheless, widespread +suspicion that the copyleft +language is `boobytrapped' has caused many developers to avoid +using GNU tools and the GPL. Changes in the language of the +version 2.0 GPL did not eliminate this problem. + + +Node:generate, Next:Genius From Mars +Technique, Previous:General Public Virus, Up:= G = + +generate vt. + +To produce something according to an algorithm or program or +set of rules, or as a (possibly unintended) side effect of the +execution of an algorithm or program. The opposite of parse. This term retains its mechanistic +connotations (though often humorously) when used of human +behavior. "The guy is rational most of the time, but mention +nuclear energy around him and he'll generate infinite flamage." + + +Node:Genius From Mars +Technique, Next:gensym, +Previous:generate, Up:= G = + +Genius From Mars Technique n. + +[TMRC] A visionary quality which enables one to ignore the +standard approach and come up with a totally unexpected new +algorithm. An attack on a problem from an offbeat angle that no +one has ever thought of before, but that in retrospect makes +total sense. Compare grok, zen. + + +Node:gensym, Next:Get a life!, Previous:Genius From Mars +Technique, Up:= G = + + +gensym /jen'sim/ + +[from MacLISP for `generated symbol'] 1. v. To invent a new +name for something temporary, in such a way that the name is +almost certainly not in conflict with one already in use. 2. n. +The resulting name. The canonical form of a gensym is `Gnnnn' +where nnnn represents a number; any LISP hacker would recognize +G0093 (for example) as a gensym. 3. A freshly generated data +structure with a gensymmed name. Gensymmed names are useful for +storing or uniquely identifying crufties (see cruft). + + +Node:Get a life!, Next:Get a real +computer!, Previous:gensym, Up:= G += + +Get a life! imp. + +Hacker-standard way of suggesting that the person to whom it +is directed has succumbed to terminal geekdom (see computer geek). Often heard on Usenet, esp. as a way of suggesting that +the target is taking some obscure issue of theology too seriously. This exhortation was +popularized by William Shatner on a 1987 "Saturday Night Live" +episode in a speech that ended "Get a life!", but some +respondents believe it to have been in use before then. It was +certainly in wide use among hackers for years before achieving +mainstream currency via the sitcom "Get A Life" in 1990. + + +Node:Get a real +computer!, Next:GFR, +Previous:Get a +life!, Up:= G = + +Get a real computer! imp. + +Typical hacker response to news that somebody is having +trouble getting work done on a system that (a) is single-tasking, +(b) has no hard disk, or (c) has an address space smaller than 16 +megabytes. This is as of early 1996; note that the threshold for +`real computer' rises with time. See bitty box and toy. + + +Node:GFR, Next:gib, Previous:Get a real computer!, Up:= G = + +GFR /G-F-R/ vt. + +[ITS: from `Grim File Reaper', an ITS and LISP Machine +utility] To remove a file or files according to some +program-automated or semi-automatic manual procedure, especially +one designed to reclaim mass storage space or reduce name-space +clutter (the original GFR actually moved files to tape). Often +generalized to pieces of data below file level. "I used to have +his phone number, but I guess I GFRed +it." See also prowler, reaper. Compare GC, +which discards only provably worthless stuff. + + +Node:gib, Next:GIFs at 11, Previous:GFR, Up:= G += + +gib /jib/ + +1. vi. To destroy utterly. Like frag, but much more violent and final. "There's +no trace left. You definitely gibbed that bug". 2. n. Remnants +after total obliteration. + +Originated first by id software in the game Quake. It's short +for giblets (thus pronounced "jib"), and referred to the bloody +remains of slain opponents. Eventually the word was verbed, and +leaked into general usage afterward. + + +Node:GIFs at 11, Next:gig, Previous:gib, Up:= G = + + +GIFs at 11 + +[Fidonet] Fidonet alternative to film at 11, especially in echoes +(Fidonet topic areas) where uuencoded GIFs are permitted. Other +formats, especially JPEG and MPEG, may be referenced instead. + + +Node:gig, Next:giga-, Previous:GIFs at 11, Up:= G = + +gig /jig/ or /gig/ n. + +[SI] See quantifiers. + + +Node:giga-, Next:GIGO, Previous:gig, +Up:= G = + +giga- /ji'ga/ or /gi'ga/ pref. + +[SI] See quantifiers. + + +Node:GIGO, Next:gilley, Previous:giga-, Up:= G += + +GIGO /gi:'goh/ [acronym] + +1. `Garbage In, Garbage Out' -- usually said in response to +lusers who complain that a program +didn't "do the right thing" when given imperfect input or +otherwise mistreated in some way. Also commonly used to describe +failures in human decision making due to faulty, incomplete, or +imprecise data. 2. `Garbage In, Gospel Out': this more recent +expansion is a sardonic comment on the tendency human beings have +to put excessive trust in `computerized' data. + + +Node:gilley, Next:gillion, Previous:GIGO, Up:= G = + + +gilley n. + +[Usenet] The unit of analogical bogosity. According to its originator, the +standard for one gilley was "the act of bogotoficiously comparing +the shutting down of 1000 machines for a day with the killing of +one person". The milligilley has been found to suffice for most +normal conversational exchanges. + + +Node:gillion, Next:ginger, Previous:gilley, Up:= G += + +gillion /gil'y*n/ or /jil'y*n/ n. + +[formed from giga- by analogy with +mega/million and tera/trillion] 10^9. Same as an American billion +or a British `milliard'. How one pronounces this depends on +whether one speaks giga- with a hard +or soft `g'. + + +Node:ginger, Next:GIPS, Previous:gillion, Up:= G += + +ginger n. + +See saga. + + +Node:GIPS, Next:glark, Previous:ginger, Up:= G += + +GIPS /gips/ or /jips/ n. + +[analogy with MIPS] +Giga-Instructions per Second (also possibly `Gillions of +Instructions per Second'; see gillion). In 1991, this is used of only a +handful of highly parallel machines, but this is expected to +change. Compare KIPS. + + +Node:glark, Next:glass, Previous:GIPS, Up:= G = + + +glark /glark/ vt. + +To figure something out from context. "The System III manuals +are pretty poor, but you can generally glark the meaning from +context." Interestingly, the word was originally `glork'; the +context was "This gubblick contains many nonsklarkish English +flutzpahs, but the overall pluggandisp can be glorked [sic] from +context" (David Moser, quoted by Douglas Hofstadter in his +"Metamagical Themas" column in the January 1981 "Scientific +American"). It is conjectured that hacker usage mutated the verb +to `glark' because glork was already +an established jargon term (some hackers do report using the +original term). Compare grok, zen. + + +Node:glass, Next:glass tty, Previous:glark, Up:= G += + +glass n. + +[IBM] Synonym for silicon. + + +Node:glass tty, Next:glassfet, Previous:glass, Up:= G += + +glass tty /glas T-T-Y/ or /glas ti'tee/ n. + +A terminal that has a display screen but which, because of +hardware or software limitations, behaves like a teletype or some +other printing terminal, thereby combining the disadvantages of +both: like a printing terminal, it can't do fancy display hacks, +and like a display terminal, it doesn't produce hard copy. An +example is the early `dumb' version of Lear-Siegler ADM 3 +(without cursor control). See tube, +tty; compare dumb terminal, smart terminal. See "TV Typewriters" (Appendix A) for an +interesting true story about a glass tty. + + +Node:glassfet, Next:glitch, Previous:glass tty, Up:= G = + +glassfet /glas'fet/ n. + +[by analogy with MOSFET, the acronym for +`Metal-Oxide-Semiconductor Field-Effect Transistor'] Syn. firebottle, a humorous way to refer to +a vacuum tube. + + +Node:glitch, Next:glob, Previous:glassfet, Up:= +G = + +glitch /glich/ + +[very common; from German `glitschig' to slip, via Yiddish +`glitshen', to slide or skid] 1. n. A sudden interruption in +electric service, sanity, continuity, or program function. +Sometimes recoverable. An interruption in electric service is +specifically called a `power glitch' (also power hit), of grave concern because it +usually crashes all the computers. In jargon, though, a hacker +who got to the middle of a sentence and then forgot how he or she +intended to complete it might say, "Sorry, I just glitched". 2. +vi. To commit a glitch. See gritch. +3. vt. [Stanford] To scroll a display screen, esp. several lines +at a time. WAITS terminals used to do +this in order to avoid continuous scrolling, which is distracting +to the eye. 4. obs. Same as magic +cookie, sense 2. + +All these uses of `glitch' derive from the specific technical +meaning the term has in the electronic hardware world, where it +is now techspeak. A glitch can occur when the inputs of a circuit +change, and the outputs change to some random value for some very brief time before +they settle down to the correct value. If another circuit +inspects the output at just the wrong time, reading the random +value, the results can be very wrong and very hard to debug (a +glitch is one of many causes of electronic heisenbugs). + + +Node:glob, Next:glork, Previous:glitch, Up:= G += + +glob /glob/, not /glohb/ v.,n. + +[Unix; common] To expand special characters in a wildcarded +name, or the act of so doing (the action is also called +`globbing'). The Unix conventions for filename wildcarding have +become sufficiently pervasive that many hackers use some of them +in written English, especially in email or news on technical +topics. Those commonly encountered include the following: + + + +* + + +wildcard for any string (see also UN*X) + + +? + + +wildcard for any single character (generally read this way +only at the beginning or in the middle of a word) + + +[] + + +delimits a wildcard matching any of the enclosed +characters + + +{} + + +alternation of comma-separated alternatives; thus, +`foo{baz,qux}' would be read as `foobaz' or `fooqux' + + + + +Some examples: "He said his name was [KC]arl" (expresses +ambiguity). "I don't read talk.politics.*" (any of the +talk.politics subgroups on Usenet). +Other examples are given under the entry for X. Note that glob patterns are similar, but not +identical, to those used in regexps. + +Historical note: The jargon usage derives from +glob, the name of a subprogram that expanded +wildcards in archaic pre-Bourne versions of the Unix shell. + + +Node:glork, Next:glue, Previous:glob, Up:= G = + + +glork /glork/ + +1. interj. Term of mild surprise, usually tinged with outrage, +as when one attempts to save the results of two hours of editing +and finds that the system has just crashed. 2. Used as a name for +just about anything. See foo. 3. vt. +Similar to glitch, but usually used +reflexively. "My program just glorked itself." 4. Syn. for glark, which see. + + +Node:glue, Next:gnarly, Previous:glork, Up:= G += + +glue n. + +Generic term for any interface logic or protocol that connects +two component blocks. For example, Blue +Glue is IBM's SNA protocol, and hardware designers call +anything used to connect large VLSI's or circuit blocks `glue +logic'. + + +Node:gnarly, Next:GNU, Previous:glue, +Up:= G = + +gnarly /nar'lee/ adj. + +Both obscure and hairy (sense 1). "Yow! -- the tuned assembler implementation of +BitBlt is really gnarly!" From a similar but less specific usage +in surfer slang. + + +Node:GNU, Next:gnubie, Previous:gnarly, Up:= G += + +GNU /gnoo/, not /noo/ + +1. [acronym: `GNU's Not Unix!', see recursive acronym] A Unix-workalike +development effort of the Free Software Foundation headed by Richard +Stallman. GNU EMACS and the GNU C compiler, two tools designed for this +project, have become very popular in hackerdom and elsewhere. The GNU +project was designed partly to proselytize for RMS's position that +information is community property and all software source should be +shared. One of its slogans is "Help stamp out software hoarding!" +Though this remains controversial (because it implicitly denies any +right of designers to own, assign, and sell the results of their +labors), many hackers who disagree with RMS have nevertheless +cooperated to produce large amounts of high-quality software for free +redistribution under the Free Software Foundation's imprimatur. The GNU +project has a web page at http://www.gnu.org. See EMACS, copyleft, +General Public Virus, Linux. 2. Noted Unix hacker John Gilmore, founder +of Usenet's anarchic alt.* hierarchy. + + +Node:gnubie, Next:GNUMACS, Previous:GNU, Up:= G = + + +gnubie /noo'bee/ n. + +Written-only variant of newbie in +common use on IRC channels, which implies specifically someone +who is new to the Linux/open source/free software world. + + +Node:GNUMACS, Next:go flatline, Previous:gnubie, Up:= +G = + +GNUMACS /gnoo'maks/ n. + +[contraction of `GNU EMACS'] Often-heard abbreviated name for +the GNU project's flagship tool, EMACS. Used esp. in contrast with +GOSMACS. + + +Node:go flatline, Next:go root, Previous:GNUMACS, Up:= G += + +go flatline v. + +[from cyberpunk SF, refers to flattening of EEG traces upon +brain-death] (also adjectival `flatlined'). 1. To die, terminate, or fail, esp. irreversibly. In +hacker parlance, this is used of machines only, human death being +considered somewhat too serious a matter to employ jargon-jokes +about. 2. To go completely quiescent; said of machines undergoing +controlled shutdown. "You can suffer file damage if you shut down +Unix but power off before the system has gone flatline." 3. Of a +video tube, to fail by losing vertical scan, so all one sees is a +bright horizontal line bisecting the screen. + + +Node:go root, Next:go-faster stripes, Previous:go flatline, Up:= G = + +go root vi. + +[Unix; common] To temporarily enter root mode in order to perform a privileged +operation. This use is deprecated in Australia, where v. `root' +is a synonym for "fuck". + + +Node:go-faster stripes, Next:GoAT, Previous:go root, Up:= G = + +go-faster stripes n. + +[UK] Syn. chrome. Mainstream in +some parts of UK. + + +Node:GoAT, Next:gobble, Previous:go-faster stripes, Up:= G = + +GoAT // + +[Usenet] Abbreviation: "Go Away, Troll". See troll. + + +Node:gobble, Next:Godwin's Law, Previous:GoAT, Up:= G += + +gobble vt. + +1. To consume, usu. used with `up'. "The output spy gobbles +characters out of a tty output buffer." +2. To obtain, usu. used with `down'. "I guess I'll gobble down a +copy of the documentation tomorrow." See also snarf. + + +Node:Godwin's Law, Next:Godzillagram, Previous:gobble, Up:= G = + +Godwin's Law prov. + +[Usenet] "As a Usenet discussion grows longer, the probability +of a comparison involving Nazis or Hitler approaches one." There +is a tradition in many groups that, once this occurs, that thread +is over, and whoever mentioned the Nazis has automatically lost +whatever argument was in progress. Godwin's Law thus practically +guarantees the existence of an upper bound on thread length in +those groups. However there is also a widely- recognized codicil +that any intentional triggering of Godwin's Law in order +to invoke its thread-ending effects will be unsuccessful. + + +Node:Godzillagram, Next:golden, Previous:Godwin's Law, Up:= G = + +Godzillagram /god-zil'*-gram/ n. + +[from Japan's national hero] 1. A network packet that in +theory is a broadcast to every machine in the universe. The +typical case is an IP datagram whose destination IP address is +[255.255.255.255]. Fortunately, few gateways are foolish enough +to attempt to implement this case! 2. A network packet of maximum +size. An IP Godzillagram has 65,536 octets. Compare super source quench, Christmas tree packet, +martian. + + +Node:golden, Next:golf-ball printer, Previous:Godzillagram, Up:= G = + +golden adj. + +[prob. from folklore's `golden egg'] When used to describe a +magnetic medium (e.g., `golden disk', `golden tape'), describes +one containing a tested, up-to-spec, ready-to-ship software +version. Compare platinum-iridium. + + +Node:golf-ball printer, Next:gonk, Previous:golden, Up:= +G = + +golf-ball printer n. obs. + +The IBM 2741, a slow but letter-quality printing device and +terminal based on the IBM Selectric typewriter. The `golf ball' +was a little spherical frob bearing reversed embossed images of +88 different characters arranged on four parallels of latitude; +one could change the font by swapping in a different golf ball. +The print element spun and jerked alarmingly in action and when +in motion was sometimes described as an `infuriated golf ball'. +This was the technology that enabled APL to use a non-EBCDIC, +non-ASCII, and in fact completely non-standard character set. +This put it 10 years ahead of its time -- where it stayed, firmly +rooted, for the next 20, until character displays gave way to +programmable bit-mapped devices with the flexibility to support +other character sets. + + +Node:gonk, Next:gonkulator, Previous:golf-ball printer, Up:= G = + +gonk /gonk/ vi.,n. + +1. To prevaricate or to embellish the truth beyond any +reasonable recognition. In German the term is (mythically) +`gonken'; in Spanish the verb becomes `gonkar'. "You're gonking +me. That story you just told me is a bunch of gonk." In German, +for example, "Du gonkst mich" (You're pulling my leg). See also +gonkulator. 2. [British] To grab +some sleep at an odd time; compare gronk out. + + +Node:gonkulator, Next:gonzo, Previous:gonk, Up:= G = + + +gonkulator /gon'kyoo-lay-tr/ n. + +[common; from the 1960s "Hogan's Heroes" TV series] A +pretentious piece of equipment that actually serves no useful +purpose. Usually used to describe one's least favorite piece of +computer hardware. See gonk. + + +Node:gonzo, Next:Good Thing, Previous:gonkulator, Up:= G = + +gonzo /gon'zoh/ adj. + +[from Hunter S. Thompson] 1. With total commitment, total +concentration, and a mad sort of panache. (Thompson's original +sense.) 2. More loosely: Overwhelming; outrageous; over the top; +very large, esp. used of collections of source code, source +files, or individual functions. Has some of the connotations of +moby and hairy, but without the implication of obscurity +or complexity. + + +Node:Good Thing, Next:gopher, Previous:gonzo, Up:= G += + +Good Thing n.,adj. + +[very common; often capitalized; always pronounced as if +capitalized.] 1. Self-evidently wonderful to anyone in a position +to notice: "A language that manages dynamic memory automatically +for you is a Good Thing." 2. Something that can't possibly have +any ill side-effects and may save considerable grief later: +"Removing the self-modifying code from that shared library would +be a Good Thing." 3. When said of software tools or libraries, as +in "YACC is a Good Thing", specifically connotes that the thing +has drastically reduced a programmer's work load. Oppose Bad Thing. + + +Node:gopher, Next:gopher hole, Previous:Good Thing, Up:= G = + +gopher n. + +A type of Internet service first floated around 1991 and +obsolesced around 1995 by the World Wide Web. Gopher presents a +menuing interface to a tree or graph of links; the links can be +to documents, runnable programs, or other gopher menus +arbitrarily far across the net. + +Some claim that the gopher software, which was originally +developed at the University of Minnesota, was named after the +Minnesota Gophers (a sports team). Others claim the word derives +from American slang `gofer' (from "go for", dialectal "go fer"), +one whose job is to run and fetch things. Finally, observe that +gophers dig long tunnels, and the idea of tunneling through the +net to find information was a defining metaphor for the +developers. Probably all three things were true, but with the +first two coming first and the gopher-tunnel metaphor +serendipitously adding flavor and impetus to the project as it +developed out of its concept stage. + + +Node:gopher hole, Next:gorets, Previous:gopher, Up:= G += + +gopher hole n. + +1. Any access to a gopher. 2. +[Amateur Packet Radio] The terrestrial analog of a wormhole (sense 2), from which this term was +coined. A gopher hole links two amateur packet relays through +some non-ham radio medium. + + +Node:gorets, Next:gorilla arm, Previous:gopher hole, Up:= G = + +gorets /gor'ets/ n. + +The unknown ur-noun, fill in your own meaning. Found esp. on +the Usenet newsgroup _alt.gorets_, which seems to be a +running contest to redefine the word by implication in the +funniest and most peculiar way, with the understanding that no +definition is ever final. [A correspondent from the Former Soviet +Union informs me that `gorets' is Russian for `mountain dweller'. +Another from France informs me that `goret' is archaic French for +a young pig --ESR] Compare frink. + + +Node:gorilla arm, Next:gorp, Previous:gorets, Up:= G += + +gorilla arm n. + +The side-effect that destroyed touch-screens as a mainstream +input technology despite a promising start in the early 1980s. It +seems the designers of all those spiffy touch-menu systems failed to notice that +humans aren't designed to hold their arms in front of their faces +making small motions. After more than a very few selections, the +arm begins to feel sore, cramped, and oversized -- the operator +looks like a gorilla while using the touch screen and feels like +one afterwards. This is now considered a classic cautionary tale +to human-factors designers; "Remember the gorilla arm!" is +shorthand for "How is this going to fly in real +use?". + + +Node:gorp, Next:GOSMACS, Previous:gorilla arm, Up:= G = + +gorp /gorp/ n. + +[CMU: perhaps from the canonical hiker's food, Good Old +Raisins and Peanuts] Another metasyntactic variable, like +foo and bar. + + +Node:GOSMACS, Next:Gosperism, Previous:gorp, Up:= G = + + +GOSMACS /goz'maks/ n. + +[contraction of `Gosling EMACS'] The first EMACS-in-C implementation, predating but now +largely eclipsed by GNUMACS. +Originally freeware; a commercial version was modestly popular as +`UniPress EMACS' during the 1980s. The author, James Gosling, +went on to invent NeWS and the +programming language Java; the latter earned him demigod status. + + +Node:Gosperism, Next:gotcha, Previous:GOSMACS, Up:= G += + +Gosperism /gos'p*r-izm/ n. + +A hack, invention, or saying due to elder days arch-hacker R. William (Bill) +Gosper. This notion merits its own term because there are so many +of them. Many of the entries in HAKMEM are Gosperisms; see also life. + + +Node:gotcha, Next:GPL, Previous:Gosperism, Up:= G = + +gotcha n. + +A misfeature of a system, +especially a programming language or environment, that tends to +breed bugs or mistakes because it both enticingly easy to invoke +and completely unexpected and/or unreasonable in its outcome. For +example, a classic gotcha in C is the +fact that if (a=b) {code;} is syntactically valid +and sometimes even correct. It puts the value of b +into a and then executes code if +a is non-zero. What the programmer probably meant +was if (a==b) {code;}, which executes +code if a and b are +equal. + + +Node:GPL, Next:GPV, Previous:gotcha, Up:= G += + +GPL /G-P-L/ n. + +Abbreviation for `General Public License' in widespread use; +see copyleft, General Public Virus. Often +mis-expanded as `GNU Public License'. + + +Node:GPV, Next:grault, Previous:GPL, Up:= G = + + +GPV /G-P-V/ n. + +Abbrev. for General +Public Virus in widespread use. + + +Node:grault, Next:gray goo, Previous:GPV, Up:= G = + + +grault /grawlt/ n. + +Yet another metasyntactic variable, +invented by Mike Gallaher and propagated by the GOSMACS documentation. See corge. + + +Node:gray goo, Next:Great Renaming, Previous:grault, Up:= G = + +gray goo n. + +A hypothetical substance composed of sagans of sub-micron-sized self-replicating +robots programmed to make copies of themselves out of whatever is +available. The image that goes with the term is one of the entire +biosphere of Earth being eventually converted to robot goo. This +is the simplest of the nanotechnology disaster scenarios, +easily refuted by arguments from energy requirements and +elemental abundances. Compare blue +goo. + + +Node:Great Renaming, Next:Great Runes, Previous:gray goo, Up:= G = + +Great Renaming n. + +The flag day in 1987 on which +all of the non-local groups on the Usenet had their names changed from the net.- +format to the current multiple-hierarchies scheme. Used esp. in +discussing the history of newsgroup names. "The oldest sources +group is _comp.sources.misc_; before the Great Renaming, it +was _net.sources_." There is a Great Renaming +FAQ on the Web. + + +Node:Great Runes, Next:Great Worm, Previous:Great Renaming, Up:= G = + +Great Runes n. + +Uppercase-only text or display messages. Some archaic +operating systems still emit these. See also runes, smash +case, fold case. + +There is a widespread legend (repeated by earlier versions of +this entry, though tagged as folklore) that the uppercase-only +support of various old character codes and I/O equipment was +chosen by a religious person in a position of power at the +Teletype Company because supporting both upper and lower cases +was too expensive and supporting lower case only would have made +it impossible to spell `God' correctly. Not true; the upper-case +interpretation of teleprinter codes was well established by 1870, +long before Teletype was even founded. + + +Node:Great Worm, Next:great-wall, Previous:Great Runes, Up:= G = + +Great Worm n. + +The 1988 Internet worm perpetrated +by RTM. This is a play on Tolkien +(compare elvish, elder days). In the fantasy history of +his Middle Earth books, there were dragons powerful enough to lay +waste to entire regions; two of these (Scatha and Glaurung) were +known as "the Great Worms". This usage expresses the connotation +that the RTM crack was a sort of devastating watershed event in +hacker history; certainly it did more to make non-hackers nervous +about the Internet than anything before or since. + + +Node:great-wall, Next:Green Book, Previous:Great Worm, Up:= G = + +great-wall vi.,n. + +[from SF fandom] A mass expedition to an oriental restaurant, +esp. one where food is served family-style and shared. There is a +common heuristic about the amount of food to order, expressed as +"Get N - 1 entrees"; the value of N, which is the number of +people in the group, can be inferred from context (see N). See oriental +food, ravs, stir-fried random. + + +Node:Green Book, Next:green bytes, Previous:great-wall, Up:= G = + +Green Book n. + +1. One of the three standard PostScript references: "PostScript Language +Program Design", bylined `Adobe Systems' (Addison-Wesley, 1988; +QA76.73.P67P66 ISBN 0-201-14396-8); see also Red Book, Blue +Book, and the White +Book (sense 2). 2. Informal name for one of the three +standard references on SmallTalk: "Smalltalk-80: Bits of History, +Words of Advice", by Glenn Krasner (Addison-Wesley, 1983; +QA76.8.S635S58; ISBN 0-201-11669-3) (this, too, is associated +with blue and red books). 3. The "X/Open Compatibility Guide", +which defines an international standard Unix environment that is a proper superset of +POSIX/SVID; also includes descriptions of a standard utility +toolkit, systems administrations features, and the like. This +grimoire is taken with particular seriousness in Europe. See +Purple Book. 4. The IEEE +1003.1 POSIX Operating Systems Interface standard has been dubbed +"The Ugly Green Book". 5. Any of the 1992 standards issued by the +CCITT's tenth plenary assembly. These include, among other +things, the X.400 email standard and the Group 1 through 4 fax +standards. See also book +titles. + + +Node:green bytes, Next:green card, Previous:Green Book, Up:= G = + +green bytes n. + +(also `green words') 1. Meta-information embedded in a file, +such as the length of the file or its name; as opposed to keeping +such information in a separate description file or record. The +term comes from an IBM user's group meeting (ca. 1962) at which +these two approaches were being debated and the diagram of the +file on the blackboard had the `green bytes' drawn in green. 2. +By extension, the non-data bits in any self-describing format. "A +GIF file contains, among other things, green bytes describing the +packing method for the image." Compare out-of-band, zigamorph, fence +(sense 1). + + +Node:green card, Next:green lightning, Previous:green bytes, Up:= G = + +green card n. + +[after the "IBM System/360 Reference Data" card] A summary of +an assembly language, even if the color is not green and not a +card. Less frequently used now because of the decrease in the use +of assembly language. "I'll go get my green card so I can check +the addressing mode for that instruction." + +The original green card became a yellow card when the +System/370 was introduced, and later a yellow booklet. An +anecdote from IBM refers to a scene that took place in a +programmers' terminal room at Yorktown in 1978. A luser overheard one of the programmers ask +another "Do you have a green card?" The other grunted and passed +the first a thick yellow booklet. At this point the luser turned +a delicate shade of olive and rapidly left the room, never to +return. + +In fall 2000 it was reported from Electronic Data Systems that +the green card for 370 machines has been a blue-green booklet +since 1989. + + +Node:green lightning, Next:green machine, Previous:green card, Up:= G = + +green lightning n. + +[IBM] 1. Apparently random flashing streaks on the face of +3278-9 terminals while a new symbol set is being downloaded. This +hardware bug was left deliberately unfixed, as some genius within +IBM suggested it would let the user know that `something is +happening'. That, it certainly does. Later microprocessor-driven +IBM color graphics displays were actually programmed to +produce green lightning! 2. [proposed] Any bug perverted into an +alleged feature by adroit rationalization or marketing. "Motorola +calls the CISC cruft in the 88000 architecture `compatibility +logic', but I call it green lightning". See also feature (sense 6). + + +Node:green machine, Next:Green's Theorem, Previous:green lightning, +Up:= G = + +green machine n. + +A computer or peripheral device that has been designed and +built to military specifications for field equipment (that is, to +withstand mechanical shock, extremes of temperature and humidity, +and so forth). Comes from the olive-drab `uniform' paint used for +military equipment. + + +Node:Green's Theorem, Next:greenbar, Previous:green machine, Up:= G = + +Green's Theorem prov. + +[TMRC] For any story, in any group of people there will be at +least one person who has not heard the story. A refinement of the +theorem states that there will be exactly one person (if +there were more than one, it wouldn't be as bad to re-tell the +story). [The name of this theorem is a play on a fundamental +theorem in calculus. --ESR] + + +Node:greenbar, Next:grep, Previous:Green's Theorem, Up:= G = + +greenbar n. + +A style of fanfolded continuous-feed paper with alternating +green and white bars on it, especially used in old-style line +printers. This slang almost certainly dates way back to mainframe +days. + + +Node:grep, Next:gribble, Previous:greenbar, Up:= +G = + +grep /grep/ vi. + +[from the qed/ed editor idiom g/_re_/p, where _re_ +stands for a regular expression, to Globally search for the +Regular Expression and Print the lines containing matches to it, +via Unix grep(1)] To +rapidly scan a file or set of files looking for a particular +string or pattern (when browsing through a large set of files, +one may speak of `grepping around'). By extension, to look for +something by pattern. "Grep the bulletin board for the system +backup schedule, would you?" See also vgrep. + +[It has also been alleged that the source is from the title of +a paper "A General Regular Expression Parser" -ESR] + + +Node:gribble, Next:grilf, Previous:grep, Up:= G = + + +gribble n. + +Random binary data rendered as unreadable text. Noise +characters in a data stream are displayed as gribble. Modems with +mismatched bitrates usually generate gribble (more specifically, +baud barf). Dumping a binary +file to the screen is an excellent source of gribble, and (if the +bell/speaker is active) headaches. + + +Node:grilf, Next:grind, Previous:gribble, Up:= G += + +grilf // n. + +Girlfriend. Like newsfroup and +filk, a typo reincarnated as a new +word. Seems to have originated sometime in 1992 on Usenet. [A friend tells me there was a Lloyd +Biggle SF novel "Watchers Of The Dark", in which alien species +after species goes insane and begins to chant "Grilf! Grilf!". A +human detective eventually determines that the word means "Liar!" +I hope this has nothing to do with the popularity of the Usenet +term. --ESR] + + +Node:grind, Next:grind crank, Previous:grilf, Up:= G += + +grind vt. + +1. [MIT and Berkeley; now rare] To prettify hardcopy of code, +especially LISP code, by reindenting lines, printing keywords and +comments in distinct fonts (if available), etc. This usage was +associated with the MacLISP community and is now rare; +prettyprint was and is the generic term for such +operations. 2. [Unix] To generate the formatted version of a +document from the nroff, troff, TeX, or Scribe +source. 3. [common] To run seemingly interminably, esp. (but not +necessarily) if performing some tedious and inherently useless +task. Similar to crunch or grovel. Grinding has a connotation of +using a lot of CPU time, but it is possible to grind a disk, +network, etc. See also hog. 4. To make +the whole system slow. "Troff really grinds a PDP-11." 5. `grind +grind' excl. Roughly, "Isn't the machine slow today!" + + +Node:grind crank, Next:gripenet, Previous:grind, Up:= G += + +grind crank n. // + +A mythical accessory to a terminal. A crank on the side of a +monitor, which when operated makes a zizzing noise and causes the +computer to run faster. Usually one does not refer to a grind +crank out loud, but merely makes the appropriate gesture and +noise. See grind. + +Historical note: At least one real machine actually had a +grind crank -- the R1, a research machine built toward the end of +the days of the great vacuum tube computers, in 1959. R1 (also +known as `The Rice Institute Computer' (TRIC) and later as `The +Rice University Computer' (TRUC)) had a single-step/free-run +switch for use when debugging programs. Since single-stepping +through a large program was rather tedious, there was also a +crank with a cam and gear arrangement that repeatedly pushed the +single-step button. This allowed one to `crank' through a lot of +code, then slow down to single-step for a bit when you got near +the code of interest, poke at some registers using the console +typewriter, and then keep on cranking. + + +Node:gripenet, Next:gritch, Previous:grind crank, Up:= G = + +gripenet n. + +[IBM] A wry (and thoroughly unofficial) name for IBM's +internal VNET system, deriving from its common use by IBMers to +voice pointed criticism of IBM management that would be taboo in +more formal channels. + + +Node:gritch, Next:grok, Previous:gripenet, Up:= +G = + +gritch /grich/ + +[MIT] 1. n. A complaint (often caused by a glitch). 2. vi. To complain. Often +verb-doubled: "Gritch gritch". 3. A synonym for glitch (as verb or noun). + +Interestingly, this word seems to have a separate history from +glitch, with which it is often +confused. Back in the early 1960s, when `glitch' was strictly a +hardware-tech's term of art, the Burton House dorm at M.I.T. +maintained a "Gritch Book", a blank volume, into which the +residents hand-wrote complaints, suggestions, and witticisms. +Previous years' volumes of this tradition were maintained, dating +back to antiquity. The word "gritch" was described as a +portmanteau of "gripe" and "bitch". Thus, sense 3 above is at +least historically incorrect. + + +Node:grok, Next:gronk, Previous:gritch, Up:= G += + +grok /grok/, var. /grohk/ vt. + +[from the novel "Stranger in a Strange Land", by Robert A. +Heinlein, where it is a Martian word meaning literally `to drink' +and metaphorically `to be one with'] The emphatic form is `grok +in fullness'. 1. To understand, usually in a global sense. +Connotes intimate and exhaustive knowledge. Contrast zen, which is similar supernal understanding +experienced as a single brief flash. See also glark. 2. Used of programs, may connote merely +sufficient understanding. "Almost all C compilers grok the +void type these days." + + +Node:gronk, Next:gronk out, Previous:grok, Up:= G = + + +gronk /gronk/ vt. + +[popularized by Johnny Hart's comic strip "B.C." but the word +apparently predates that] 1. To clear the state of a wedged +device and restart it. More severe than `to frob' (sense 2). 2. [TMRC] To cut, sever, smash, +or similarly disable. 3. The sound made by many 3.5-inch diskette +drives. In particular, the microfloppies on a Commodore Amiga go +"grink, gronk". + + +Node:gronk out, Next:gronked, Previous:gronk, Up:= G += + +gronk out vi. + +To cease functioning. Of people, to go home and go to sleep. +"I guess I'll gronk out now; see you all tomorrow." + + +Node:gronked, Next:grovel, Previous:gronk out, Up:= G = + +gronked adj. + +1. Broken. "The teletype scanner was gronked, so we took the +system down." 2. Of people, the condition of feeling very tired +or (less commonly) sick. "I've been chasing that bug for 17 hours +now and I am thoroughly gronked!" Compare broken, which means about the same as gronk used of hardware, but connotes +depression or mental/emotional problems in people. + + +Node:grovel, Next:grue, Previous:gronked, Up:= G += + +grovel vi. + +1. To work interminably and without apparent progress. Often +used transitively with `over' or `through'. "The file scavenger +has been groveling through the /usr directories for 10 minutes +now." Compare grind and crunch. Emphatic form: `grovel obscenely'. 2. +To examine minutely or in complete detail. "The compiler grovels +over the entire source program before beginning to translate it." +"I grovelled through all the documentation, but I still couldn't +find the command I wanted." + + +Node:grue, Next:grunge, Previous:grovel, Up:= G += + +grue n. + +[from archaic English verb for `shudder', as with fear] The +grue was originated in the game Zork +(Dave Lebling took the name from Jack Vance's "Dying Earth" +fantasies) and used in several other Infocom games as a hint that you should +perhaps look for a lamp, torch or some type of light source. +Wandering into a dark area would cause the game to prompt you, +"It is very dark. If you continue you are likely to be eaten by a +grue." If you failed to locate a light source within the next +couple of moves this would indeed be the case. + +The grue, according to scholars of the Great Underground +Empire, is a sinister, lurking presence in the dark places of the +earth. Its favorite diet is either adventurers or enchanters, but +its insatiable appetite is tempered by its extreme fear of light. +No grues have ever been seen by the light of day, and only a few +have been observed in their underground lairs. Of those who have +seen grues, few have survived their fearsome jaws to tell the +tale. Grues have sharp claws and fangs, and an uncontrollable +tendency to slaver and gurgle. They are certainly the most +evil-tempered of all creatures; to say they are touchy is a +dangerous understatement. "Sour as a grue" is a common +expression, even among themselves. + +All this folklore is widely known among hackers. + + +Node:grunge, Next:gubbish, Previous:grue, Up:= G = + + +grunge /gruhnj/ n. + +1. That which is grungy, or that which makes it so. 2. +[Cambridge] Code which is inaccessible due to changes in other +parts of the program. The preferred term in North America is +dead code. + + +Node:gubbish, Next:Guido, Previous:grunge, Up:= G += + +gubbish /guhb'*sh/ n. + +[a portmanteau of `garbage' and `rubbish'; may have originated +with SF author Philip K. Dick] Garbage; crap; nonsense. "What is +all this gubbish?" The opposite portmanteau `rubbage' is also +reported; in fact, it was British slang during the 19th century +and appears in Dickens. + + +Node:Guido, Next:guiltware, Previous:gubbish, Up:= G += + +Guido /gwee'do/ or /khwee'do/ + +Without qualification, Guido van Rossum (author of Python). Note that Guido answers to English +/gwee'do/ but in Dutch it's /khwee'do/. + + +Node:guiltware, Next:gumby, Previous:Guido, Up:= G += + +guiltware /gilt'weir/ n. + +1. A piece of freeware +decorated with a message telling one how long and hard the author +worked on it and intimating that one is a no-good freeloader if +one does not immediately send the poor suffering martyr gobs of +money. 2. A piece of shareware +that works. + + +Node:gumby, Next:gun, Previous:guiltware, Up:= G = + +gumby /guhm'bee/ n. + +[from a class of Monty Python characters, poss. with some +influence from the 1960s claymation character] 1. An act of minor +but conspicuous stupidity, often in `gumby maneuver' or `pull a +gumby'. 2. [NRL] n. A bureaucrat, or other technical incompetent +who impedes the progress of real work. 3. adj. Relating to things +typically associated with people in sense 2. (e.g. "Ran would be +writing code, but Richard gave him gumby work that's due on +Friday", or, "Dammit! Travel screwed up my plane tickets. I have +to go out on gumby patrol.") + + +Node:gun, Next:gunch, Previous:gumby, Up:= G += + +gun vt. + +[ITS, now rare: from the :GUN command] To +forcibly terminate a program or job (computer, not career). "Some +idiot left a background process running soaking up half the +cycles, so I gunned it." Usage: now rare. Compare can, blammo. + + +Node:gunch, Next:gunpowder chicken, Previous:gun, Up:= G = + +gunch /guhnch/ vt. + +[TMRC] To push, prod, or poke at a device that has almost (but +not quite) produced the desired result. Implies a threat to mung. + + +Node:gunpowder chicken, Next:gurfle, Previous:gunch, Up:= G += + +gunpowder chicken n. + +Same as laser +chicken. + + +Node:gurfle, Next:guru, Previous:gunpowder chicken, Up:= G = + +gurfle /ger'fl/ interj. + +An expression of shocked disbelief. "He said we have to recode +this thing in FORTRAN by next week. Gurfle!" Compare weeble. + + +Node:guru, Next:guru meditation, Previous:gurfle, Up:= G = + +guru n. + +[Unix] An expert. Implies not only wizard skill but also a history of being a +knowledge resource for others. Less often, used (with a +qualifier) for other experts on other systems, as in `VMS guru'. +See source of all +good bits. + + +Node:guru meditation, Next:gweep, Previous:guru, Up:= G += + +guru meditation n. + +Amiga equivalent of `panic' in Unix (sometimes just called a +`guru' or `guru event'). When the system crashes, a cryptic +message of the form "GURU MEDITATION #XXXXXXXX.YYYYYYYY" may +appear, indicating what the problem was. An Amiga guru can figure +things out from the numbers. Sometimes a guru event must be followed by a Vulcan nerve pinch. + +This term is (no surprise) an in-joke from the earliest days +of the Amiga. An earlier product of the Amiga corporation was a +device called a `Joyboard' which was basically a plastic board +built onto a joystick-like device; it was sold with a skiing game +cartridge for the Atari game machine. It is said that whenever +the prototype OS crashed, the system programmer responsible would +calm down by concentrating on a solution while sitting +cross-legged on a Joyboard trying to keep the board in balance. +This position resembled that of a meditating guru. Sadly, the +joke was removed fairly early on (but there's a well-known patch +to restore it in more recent versions). + + +Node:gweep, Next:h, Previous:guru meditation, Up:= G = + +gweep /gweep/ + +[WPI] 1. v. To hack, usually at +night. At WPI, from 1975 onwards, one who gweeped could often be +found at the College Computing Center punching cards or crashing +the PDP-10 or, later, the DEC-20. A +correspondent who was there at the time opines that the term was +originally onomatopoetic, describing the keyclick sound of the +Datapoint terminals long connected to the PDP-10. The term has +survived the demise of those technologies, however, and was still +alive in early 1999. "I'm going to go gweep for a while. See you +in the morning." "I gweep from 8 PM till 3 AM during the week." +2. n. One who habitually gweeps in sense 1; a hacker. "He's a hard-core gweep, mumbles code +in his sleep." + + +Node:= H =, Next:= I =, Previous:= G =, Up:The Jargon Lexicon + += H = + + +h: + + +ha ha only +serious: + + +hack: + + +hack attack: + + +hack mode: + + +hack on: + + +hack together: + + +hack up: + + +hack value: + + +hacked off: + + +hacked up: + + +hacker: + + +hacker ethic: + + +hacker humor: + + +Hackers (the +movie): + + +hacking run: + + +Hacking X for Y: + + +Hackintosh: + + +hackish: + + +hackishness: + + +hackitude: + + +hair: + + +hairball: + + +hairy: + + +HAKMEM: + + +hakspek: + + +Halloween +Documents: + + +hammer: + + +hamster: + + +HAND: + + +hand cruft: + + +hand-hacking: + + +handle: + + +handle: + + +hand-roll: + + +handshaking: + + +handwave: + + +hang: + + +Hanlon's Razor: + + +happily: + + +haque: + + +hard boot: + + +hardcoded: + + +hardwarily: + + +hardwired: + + +has the X nature: + + +hash bucket: + + +hash collision: + + +hat: + + +HCF: + + +heads down: + + +heartbeat: + + +heatseeker: + + +heavy metal: + + +heavy wizardry: + + +heavyweight: + + +heisenbug: + + +Helen Keller mode: + + +hello sailor!: + + +hello wall!: + + +hello world: + + +hex: + + +hexadecimal: + + +hexit: + + +HHOK: + + +HHOS: + + +hidden flag: + + +high bit: + + +high moby: + + +highly: + + +hing: + + +hired gun: + + +hirsute: + + +HLL: + + +hoarding: + + +hobbit: + + +hog: + + +hole: + + +hollised: + + +holy wars: + + +home box: + + +home machine: + + +home page: + + +honey pot: + + +hook: + + +hop: + + +hose: + + +hosed: + + +hot chat: + + +hot spot: + + +hotlink: + + +house wizard: + + +HP-SUX: + + +HTH: + + +huff: + + +humma: + + +hung: + + +hungry puppy: + + +hungus: + + +hyperspace: + + +hysterical reasons: + + +Node:h, Next:ha ha only serious, Previous:gweep, Up:= H = + +h + +[from SF fandom] A method of `marking' common words, i.e., +calling attention to the fact that they are being used in a +nonstandard, ironic, or humorous way. Originated in the fannish +catchphrase "Bheer is the One True Ghod!" from decades ago. +H-infix marking of `Ghod' and other words spread into the 1960s +counterculture via underground comix, and into early hackerdom +either from the counterculture or from SF fandom (the three +overlapped heavily at the time). More recently, the h infix has +become an expected feature of benchmark names (Dhrystone, +Rhealstone, etc.); this is probably patterning on the original +Whetstone (the name of a laboratory) but influenced by the +fannish/counterculture h infix. + + +Node:ha ha only serious, +Next:hack, Previous:h, Up:= H = + +ha ha only serious + +[from SF fandom, orig. as mutation of HHOK, `Ha Ha Only +Kidding'] A phrase (often seen abbreviated as HHOS) that aptly +captures the flavor of much hacker discourse. Applied especially +to parodies, absurdities, and ironic jokes that are both intended +and perceived to contain a possibly disquieting amount of truth, +or truths that are constructed on in-joke and self-parody. This +lexicon contains many examples of ha-ha-only-serious in both form +and content. Indeed, the entirety of hacker culture is often +perceived as ha-ha-only-serious by hackers themselves; to take it +either too lightly or too seriously marks a person as an +outsider, a wannabee, or in larval stage. For further +enlightenment on this subject, consult any Zen master. See also +hacker humor, and AI koans. + + +Node:hack, Next:hack attack, Previous:ha ha only serious, Up:= H = + +hack + +[very common] 1. n. Originally, a quick job that produces what +is needed, but not well. 2. n. An incredibly good, and perhaps +very time-consuming, piece of work that produces exactly what is +needed. 3. vt. To bear emotionally or physically. "I can't hack +this heat!" 4. vt. To work on something (typically a program). In +an immediate sense: "What are you doing?" "I'm hacking TECO." In +a general (time-extended) sense: "What do you do around here?" "I +hack TECO." More generally, "I hack `foo'" is roughly equivalent +to "`foo' is my major interest (or project)". "I hack solid-state +physics." See Hacking X for +Y. 5. vt. To pull a prank on. See sense 2 and hacker (sense 5). 6. vi. To interact with a +computer in a playful and exploratory rather than goal-directed +way. "Whatcha up to?" "Oh, just hacking." 7. n. Short for hacker. 8. See nethack. 9. [MIT] v. To explore the basements, +roof ledges, and steam tunnels of a large, institutional +building, to the dismay of Physical Plant workers and (since this +is usually performed at educational institutions) the Campus +Police. This activity has been found to be eerily similar to +playing adventure games such as Dungeons and Dragons and Zork. See also vadding. + +Constructions on this term abound. They include `happy +hacking' (a farewell), `how's hacking?' (a friendly greeting +among hackers) and `hack, hack' (a fairly content-free but +friendly comment, often used as a temporary farewell). For more +on this totipotent term see "The Meaning of Hack". See +also neat hack, real hack. + + +Node:hack attack, Next:hack mode, Previous:hack, Up:= H += + +hack attack n. + +[poss. by analogy with `Big Mac Attack' from ads for the +McDonald's fast-food chain; the variant `big hack attack' is +reported] Nearly synonymous with hacking run, though the latter more +strongly implies an all-nighter. + + +Node:hack mode, Next:hack on, Previous:hack attack, Up:= H = + +hack mode n. + +1. What one is in when hacking, of course. 2. More +specifically, a Zen-like state of total focus on The Problem that +may be achieved when one is hacking (this is why every good +hacker is part mystic). Ability to enter such concentration at +will correlates strongly with wizardliness; it is one of the most +important skills learned during larval stage. Sometimes amplified as +`deep hack mode'. + +Being yanked out of hack mode (see priority interrupt) may be +experienced as a physical shock, and the sensation of being in +hack mode is more than a little habituating. The intensity of +this experience is probably by itself sufficient explanation for +the existence of hackers, and explains why many resist being +promoted out of positions where they can code. See also cyberspace (sense 2). + +Some aspects of hacker etiquette will appear quite odd to an +observer unaware of the high value placed on hack mode. For +example, if someone appears at your door, it is perfectly okay to +hold up a hand (without turning one's eyes away from the screen) +to avoid being interrupted. One may read, type, and interact with +the computer for quite some time before further acknowledging the +other's presence (of course, he or she is reciprocally free to +leave without a word). The understanding is that you might be in +hack mode with a lot of +delicate state (sense 2) in your +head, and you dare not swap that +context out until you have reached a good point to pause. See +also juggling eggs. + + +Node:hack on, Next:hack together, Previous:hack mode, Up:= H = + +hack on vt. + +[very common] To hack; implies that +the subject is some pre-existing hunk of code that one is +evolving, as opposed to something one might hack up. + + +Node:hack together, Next:hack up, Previous:hack on, Up:= H = + +hack together vt. + +[common] To throw something together so it will work. Unlike +`kluge together' or cruft +together, this does not necessarily have negative +connotations. + + +Node:hack up, Next:hack value, Previous:hack together, Up:= H = + +hack up vt. + +To hack, but generally implies that +the result is a hack in sense 1 (a quick hack). Contrast this +with hack on. To `hack up on' +implies a quick-and-dirty +modification to an existing system. Contrast hacked up; compare kluge up, monkey +up, cruft +together. + + +Node:hack value, Next:hacked off, Previous:hack up, Up:= H = + +hack value n. + +Often adduced as the reason or motivation for expending effort +toward a seemingly useless goal, the point being that the +accomplished goal is a hack. For example, MacLISP had features +for reading and printing Roman numerals, which were installed +purely for hack value. See display +hack for one method of computing hack value, but this +cannot really be explained, only experienced. As Louis Armstrong +once said when asked to explain jazz: "Man, if you gotta ask +you'll never know." (Feminists please note Fats Waller's +explanation of rhythm: "Lady, if you got to ask, you ain't got +it.") + + +Node:hacked off, Next:hacked up, Previous:hack value, Up:= H = + +hacked off adj. + +[analogous to `pissed off'] Said of system administrators who +have become annoyed, upset, or touchy owing to suspicions that +their sites have been or are going to be victimized by crackers, +or used for inappropriate, technically illegal, or even overtly +criminal activities. For example, having unreadable files in your +home directory called `worm', `lockpick', or `goroot' would +probably be an effective (as well as impressively obvious and +stupid) way to get your sysadmin hacked off at you. + +It has been pointed out that there is precedent for this usage +in U.S. Navy slang, in which officers under discipline are +sometimes said to be "in hack" and one may speak of "hacking off +the C.O.". + + +Node:hacked up, Next:hacker, Previous:hacked off, Up:= H = + +hacked up adj. + +Sufficiently patched, kluged, and tweaked that the surgical +scars are beginning to crowd out normal tissue (compare critical mass). Not all programs +that are hacked become `hacked up'; if modifications are done +with some eye to coherence and continued maintainability, the +software may emerge better for the experience. Contrast hack up. + + +Node:hacker, Next:hacker ethic, Previous:hacked up, Up:= H = + +hacker n. + +[originally, someone who makes furniture with an axe] 1. A +person who enjoys exploring the details of programmable systems +and how to stretch their capabilities, as opposed to most users, +who prefer to learn only the minimum necessary. 2. One who +programs enthusiastically (even obsessively) or who enjoys +programming rather than just theorizing about programming. 3. A +person capable of appreciating hack +value. 4. A person who is good at programming quickly. 5. +An expert at a particular program, or one who frequently does +work using it or on it; as in `a Unix hacker'. (Definitions 1 +through 5 are correlated, and people who fit them congregate.) 6. +An expert or enthusiast of any kind. One might be an astronomy +hacker, for example. 7. One who enjoys the intellectual challenge +of creatively overcoming or circumventing limitations. 8. +[deprecated] A malicious meddler who tries to discover sensitive +information by poking around. Hence `password hacker', `network +hacker'. The correct term for this sense is cracker. + +The term `hacker' also tends to connote membership in the +global community defined by the net (see the network and Internet address). For discussion +of some of the basics of this culture, see the How To Become +A Hacker FAQ. It also implies that the person described is +seen to subscribe to some version of the hacker ethic (see hacker ethic). + +It is better to be described as a hacker by others than to +describe oneself that way. Hackers consider themselves something +of an elite (a meritocracy based on ability), though one to which +new members are gladly welcome. There is thus a certain ego +satisfaction to be had in identifying yourself as a hacker (but +if you claim to be one and are not, you'll quickly be labeled +bogus). See also wannabee. + +This term seems to have been first adopted as a badge in the +1960s by the hacker culture surrounding TMRC and the MIT AI Lab. +We have a report that it was used in a sense close to this +entry's by teenage radio hams and electronics tinkerers in the +mid-1950s. + + +Node:hacker ethic, Next:hacker humor, Previous:hacker, Up:= H = + +hacker ethic n. + +1. The belief that information-sharing is a powerful positive +good, and that it is an ethical duty of hackers to share their +expertise by writing open-source and facilitating access to +information and to computing resources wherever possible. 2. The +belief that system-cracking for fun and exploration is ethically +OK as long as the cracker commits no theft, vandalism, or breach +of confidentiality. + +Both of these normative ethical principles are widely, but by +no means universally, accepted among hackers. Most hackers +subscribe to the hacker ethic in sense 1, and many act on it by +writing and giving away open-source software. A few go further +and assert that all information should be free and +any proprietary control of it is bad; this is the +philosophy behind the GNU project. + +Sense 2 is more controversial: some people consider the act of +cracking itself to be unethical, like breaking and entering. But +the belief that `ethical' cracking excludes destruction at least +moderates the behavior of people who see themselves as `benign' +crackers (see also samurai). On +this view, it may be one of the highest forms of hackerly +courtesy to (a) break into a system, and then (b) explain to the +sysop, preferably by email from a superuser account, exactly how it was done +and how the hole can be plugged -- acting as an unpaid (and +unsolicited) tiger team. + +The most reliable manifestation of either version of the +hacker ethic is that almost all hackers are actively willing to +share technical tricks, software, and (where possible) computing +resources with other hackers. Huge cooperative networks such as +Usenet, FidoNet and Internet (see Internet address) can function +without central control because of this trait; they both rely on +and reinforce a sense of community that may be hackerdom's most +valuable intangible asset. + + +Node:hacker humor, Next:Hackers (the movie), +Previous:hacker +ethic, Up:= H = + +hacker humor + +A distinctive style of shared intellectual humor found among +hackers, having the following marked characteristics: + +1. Fascination with form-vs.-content jokes, paradoxes, and +humor having to do with confusion of metalevels (see meta). One way to make a hacker laugh: hold a red +index card in front of him/her with "GREEN" written on it, or +vice-versa (note, however, that this is funny only the first +time). + +2. Elaborate deadpan parodies of large intellectual +constructs, such as specifications (see write-only memory), standards +documents, language descriptions (see INTERCAL), and even entire scientific +theories (see quantum +bogodynamics, computron). + +3. Jokes that involve screwily precise reasoning from bizarre, +ludicrous, or just grossly counter-intuitive premises. + +4. Fascination with puns and wordplay. + +5. A fondness for apparently mindless humor with subversive +currents of intelligence in it -- for example, old Warner +Brothers and Rocky & Bullwinkle cartoons, the Marx brothers, +the early B-52s, and Monty Python's Flying Circus. Humor that +combines this trait with elements of high camp and slapstick is +especially favored. + +6. References to the symbol-object antinomies and associated +ideas in Zen Buddhism and (less often) Taoism. See has the X nature, Discordianism, zen, ha ha +only serious, koan, AI koans. + +See also filk, retrocomputing, and the Portrait of J. +Random Hacker in Appendix B. +If you have an itchy feeling that all six of these traits are +really aspects of one thing that is incredibly difficult to talk +about exactly, you are (a) correct and (b) responding like a +hacker. These traits are also recognizable (though in a less +marked form) throughout science-fiction fandom. + + +Node:Hackers (the movie), +Next:hacking run, +Previous:hacker +humor, Up:= H = + +Hackers (the movie) n. + +A notable bomb from 1995. Should have been titled "Crackers", +because cracking is what the movie was about. It's understandable +that they didn't however; titles redolent of snack food are +probably a tough sell in Hollywood. + + +Node:hacking run, Next:Hacking X for Y, Previous:Hackers (the +movie), Up:= H = + +hacking run n. + +[analogy with `bombing run' or `speed run'] A hack session +extended long outside normal working times, especially one longer +than 12 hours. May cause you to `change phase the hard way' (see +phase). + + +Node:Hacking X for Y, Next:Hackintosh, Previous:hacking run, Up:= H = + +Hacking X for Y n. + +[ITS] Ritual phrasing of part of the information which ITS +made publicly available about each user. This information (the +INQUIR record) was a sort of form in which the user could fill +out various fields. On display, two of these fields were always +combined into a project description of the form "Hacking X for Y" +(e.g., "Hacking perceptrons for Minsky"). This form +of description became traditional and has since been carried over +to other systems with more general facilities for +self-advertisement (such as Unix plan +files). + + +Node:Hackintosh, Next:hackish, Previous:Hacking X for Y, Up:= H = + +Hackintosh n. + +1. An Apple Lisa that has been hacked into emulating a +Macintosh (also called a `Mac XL'). 2. A Macintosh assembled from +parts theoretically belonging to different models in the +line. + + +Node:hackish, Next:hackishness, Previous:Hackintosh, Up:= H = + +hackish /hak'ish/ adj. + +(also hackishness n.) 1. +Said of something that is or involves a hack. 2. Of or pertaining +to hackers or the hacker subculture. See also true-hacker. + + +Node:hackishness, Next:hackitude, Previous:hackish, Up:= H += + +hackishness n. + +The quality of being or involving a hack. This term is +considered mildly silly. Syn. hackitude. + + +Node:hackitude, Next:hair, Previous:hackishness, Up:= H = + +hackitude n. + +Syn. hackishness; this word +is considered sillier. + + +Node:hair, Next:hairball, Previous:hackitude, Up:= H = + +hair n. + +[back-formation from hairy] The +complications that make something hairy. "Decoding TECO commands requires a certain amount of hair." +Often seen in the phrase `infinite hair', which connotes extreme +complexity. Also in `hairiferous' (tending to promote hair +growth): "GNUMACS elisp encourages lusers to write complex +editing modes." "Yeah, it's pretty hairiferous all right." (or +just: "Hair squared!") + + +Node:hairball, Next:hairy, Previous:hair, Up:= H = + + +hairball n. + +1. [Fidonet] A large batch of messages that a +store-and-forward network is failing to forward when it should. +Often used in the phrase "Fido coughed up a hairball today", +meaning that the stuck messages have just come unstuck, producing +a flood of mail where there had previously been drought. 2. An +unmanageably huge mass of source code. "JWZ thought the Mozilla +effort bogged down because the code was a huge hairball." 3. Any +large amount of garbage coming out suddenly. "Sendmail is +coughing up a hairball, so expect some slowness accessing the +Internet." + + +Node:hairy, Next:HAKMEM, Previous:hairball, Up:= +H = + +hairy adj. + +1. Annoyingly complicated. "DWIM is +incredibly hairy." 2. Incomprehensible. "DWIM is incredibly hairy." 3. Of people, +high-powered, authoritative, rare, expert, and/or +incomprehensible. Hard to explain except in context: "He knows +this hairy lawyer who says there's nothing to worry about." See +also hirsute. + +A well-known result in topology called the Brouwer Fixed-Point +Theorem states that any continuous transformation of a 2-sphere +into itself has at least one fixed point. Mathematically literate +hackers tend to associate the term `hairy' with the informal +version of this theorem; "You can't comb a hairy ball +smooth." + +The adjective `long-haired' is well-attested to have been in +slang use among scientists and engineers during the early 1950s; +it was equivalent to modern `hairy' senses 1 and 2, and was very +likely ancestral to the hackish use. In fact the noun `long-hair' +was at the time used to describe a person satisfying sense 3. +Both senses probably passed out of use when long hair was adopted +as a signature trait by the 1960s counterculture, leaving hackish +`hairy' as a sort of stunted mutant relic. + +In British mainstream use, "hairy" means "dangerous", and +consequently, in British programming terms, "hairy" may be used +to denote complicated and/or incomprehensible code, but only if +that complexity or incomprehesiveness is also considered +dangerous. + + +Node:HAKMEM, Next:hakspek, Previous:hairy, Up:= H += + +HAKMEM /hak'mem/ n. + +MIT AI Memo 239 (February 1972). A legendary collection of +neat mathematical and programming hacks contributed by many +people at MIT and elsewhere. (The title of the memo really is +"HAKMEM", which is a 6-letterism for `hacks memo'.) Some of them +are very useful techniques, powerful theorems, or interesting +unsolved problems, but most fall into the category of +mathematical and computer trivia. Here is a sampling of the +entries (with authors), slightly paraphrased: + +Item 41 (Gene Salamin): There are exactly 23,000 prime numbers +less than 2^(18). + +Item 46 (Rich Schroeppel): The most probable suit +distribution in bridge hands is 4-4-3-2, as compared to 4-3-3-3, +which is the most evenly distributed. This is because +the world likes to have unequal numbers: a thermodynamic effect +saying things will not be in the state of lowest energy, but in +the state of lowest disordered energy. + +Item 81 (Rich Schroeppel): Count the magic squares of order 5 +(that is, all the 5-by-5 arrangements of the numbers from 1 to 25 +such that all rows, columns, and diagonals add up to the same +number). There are about 320 million, not counting those that +differ only by rotation and reflection. + +Item 154 (Bill Gosper): The myth that any given programming +language is machine independent is easily exploded by computing +the sum of powers of 2. If the result loops with period = 1 with +sign +, you are on a sign-magnitude machine. If the result loops +with period = 1 at -1, you are on a twos-complement machine. If +the result loops with period greater than 1, including the +beginning, you are on a ones-complement machine. If the result +loops with period greater than 1, not including the beginning, +your machine isn't binary -- the pattern should tell you the +base. If you run out of memory, you are on a string or bignum +system. If arithmetic overflow is a fatal error, some fascist pig +with a read-only mind is trying to enforce machine independence. +But the very ability to trap overflow is machine dependent. By +this strategy, consider the universe, or, more precisely, +algebra: Let X = the sum of many powers of 2 = +...111111 (base 2). Now add X to itself: X + X = +...111110. Thus, 2X = X - 1, so X = -1. Therefore +algebra is run on a machine (the universe) that is +two's-complement. + +Item 174 (Bill Gosper and Stuart Nelson): 21963283741 is the +only number such that if you represent it on the PDP-10 as both an integer and a floating-point +number, the bit patterns of the two representations are +identical. + +Item 176 (Gosper): The "banana phenomenon" was encountered +when processing a character string by taking the last 3 letters +typed out, searching for a random occurrence of that sequence in +the text, taking the letter following that occurrence, typing it +out, and iterating. This ensures that every 4-letter string +output occurs in the original. The program typed +BANANANANANANANA.... We note an ambiguity in the +phrase, "the Nth occurrence of." In one sense, there are five +00's in 0000000000; in another, there are nine. The editing +program TECO finds five. Thus it finds only the first ANA in +BANANA, and is thus obligated to type N next. By Murphy's Law, +there is but one NAN, thus forcing A, and thus a loop. An option +to find overlapped instances would be useful, although it would +require backing up N - 1 characters before seeking the next +N-character string. + +Note: This last item refers to a Dissociated Press implementation. +See also banana +problem. + +HAKMEM also contains some rather more complicated mathematical +and technical items, but these examples show some of its fun +flavor. + +An HTML transcription of the entire document is available at +http://www.inwap.com/pdp10/hbaker/hakmem/hakmem.html. + + +Node:hakspek, Next:Halloween Documents, Previous:HAKMEM, Up:= H = + +hakspek /hak'speek/ n. + +A shorthand method of spelling found on many British academic +bulletin boards and talker +systems. Syllables and whole words in a sentence are +replaced by single ASCII characters the names of which are +phonetically similar or equivalent, while multiple letters are +usually dropped. Hence, `for' becomes `4'; `two', `too', and `to' +become `2'; `ck' becomes `k'. "Before I see you tomorrow" becomes +"b4 i c u 2moro". First appeared in London about 1986, and was +probably caused by the slowness of available talker systems, +which operated on archaic machines with outdated operating +systems and no standard methods of communication. Has become +rarer since. See also talk +mode. + + +Node:Halloween Documents, +Next:hammer, Previous:hakspek, Up:= H = + +Halloween Documents n. + +A pair of Microsoft internal strategy memoranda leaked to ESR +in late 1998 that confirmed everybody's paranoia about the +current Evil Empire. These documents +praised the technical excellence of Linux and outlined a counterstrategy of +attempting to lock in customers by "de-commoditizing" Internet +protocols and services. They were extensively cited on the +Internet and in the press and proved so embarrassing that +Microsoft PR barely said a word in public for six months +afterwards. + + +Node:hammer, Next:hamster, Previous:Halloween Documents, Up:= H = + +hammer vt. + +Commonwealth hackish syn. for bang +on. + + +Node:hamster, Next:HAND, Previous:hammer, Up:= H += + +hamster n. + +1. [Fairchild] A particularly slick little piece of code that +does one thing well; a small, self-contained hack. The image is +of a hamster happily spinning its +exercise wheel. 2. A tailless mouse; that is, one with an +infrared link to a receiver on the machine, as opposed to the +conventional cable. 3. [UK] Any item of hardware made by Amstrad, +a company famous for its cheap plastic PC-almost-compatibles. + + +Node:HAND, Next:hand cruft, Previous:hamster, Up:= H += + +HAND // + +[Usenet: very common] Abbreviation: Have A Nice Day. Typically +used to close a Usenet posting, but +also used to informally close emails; often preceded by HTH. + + +Node:hand cruft, Next:hand-hacking, Previous:HAND, Up:= H += + +hand cruft vt. + +[pun on `hand craft'] See cruft, +sense 3. + + +Node:hand-hacking, Next:hand-roll, Previous:hand cruft, Up:= H = + +hand-hacking n. + +1. [rare] The practice of translating hot spots from an HLL into hand-tuned assembler, as opposed to +trying to coerce the compiler into generating better code. Both +the term and the practice are becoming uncommon. See tune, bum, by hand; syn. with v. cruft. 2. [common] More generally, manual +construction or patching of data sets that would normally be +generated by a translation utility and interpreted by another +program, and aren't really designed to be read or modified by +humans. + + +Node:hand-roll, Next:handle, Previous:hand-hacking, Up:= H = + +hand-roll v. + +[from obs. mainstream slang `hand-rolled' in opposition to +`ready-made', referring to cigarettes] To perform a normally +automated software installation or configuration process by hand; implies that the normal +process failed due to bugs in the configurator or was defeated by +something exceptional in the local environment. "The worst thing +about being a gateway between four different nets is having to +hand-roll a new sendmail configuration every time any of them +upgrades." + + +Node:handle, Next:handshaking, Previous:hand-roll, Up:= H = + +handle n. + +1. [from CB slang] An electronic pseudonym; a `nom de guerre' +intended to conceal the user's true identity. Network and BBS +handles function as the same sort of simultaneous concealment and +display one finds on Citizen's Band radio, from which the term +was adopted. Use of grandiose handles is characteristic of warez d00dz, crackers, weenies, spods, and +other lower forms of network life; true hackers travel on their +own reputations rather than invented legendry. Compare nick, screen +name. 2. A magic +cookie, often in the form of a numeric index into some +array somewhere, through which you can manipulate an object like +a file or window. The form `file handle' is especially common. 3. +[Mac] A pointer to a pointer to dynamically-allocated memory; the +extra level of indirection allows on-the-fly memory compaction +(to cut down on fragmentation) or aging out of unused resources, +with minimal impact on the (possibly multiple) parts of the +larger program containing references to the allocated memory. +Compare snap (to snap a handle would +defeat its purpose); see also aliasing bug, dangling pointer. + + +Node:handshaking, Next:handwave, Previous:handle, Up:= H += + +handshaking n. + +[very common] Hardware or software activity designed to start +or keep two machines or programs in synchronization as they do protocol. Often applied to human +activity; thus, a hacker might watch two people in conversation +nodding their heads to indicate that they have heard each others' +points and say "Oh, they're handshaking!". See also protocol. + + +Node:handwave, Next:hang, Previous:handshaking, Up:= H = + +handwave + +[poss. from gestures characteristic of stage magicians] 1. v. +To gloss over a complex point; to distract a listener; to support +a (possibly actually valid) point with blatantly faulty logic. 2. +n. The act of handwaving. "Boy, what a handwave!" + +If someone starts a sentence with "Clearly..." +or "Obviously..." or "It is self-evident +that...", it is a good bet he is about to handwave +(alternatively, use of these constructions in a sarcastic tone +before a paraphrase of someone else's argument suggests that it +is a handwave). The theory behind this term is that if you wave +your hands at the right moment, the listener may be sufficiently +distracted to not notice that what you have said is bogus. Failing that, if a listener does object, +you might try to dismiss the objection with a wave of your +hand. + +The use of this word is often accompanied by gestures: both +hands up, palms forward, swinging the hands in a vertical plane +pivoting at the elbows and/or shoulders (depending on the +magnitude of the handwave); alternatively, holding the forearms +in one position while rotating the hands at the wrist to make +them flutter. In context, the gestures alone can suffice as a +remark; if a speaker makes an outrageously unsupported +assumption, you might simply wave your hands in this way, as an +accusation, far more eloquent than words could express, that his +logic is faulty. + + +Node:hang, Next:Hanlon's Razor, Previous:handwave, Up:= H = + +hang v. + +1. [very common] To wait for an event that will never occur. +"The system is hanging because it can't read from the crashed +drive". See wedged, hung. 2. To wait for some event to occur; to hang +around until something happens. "The program displays a menu and +then hangs until you type a character." Compare block. 3. To attach a peripheral device, esp. in +the construction `hang off': "We're going to hang another tape +drive off the file server." Implies a device attached with +cables, rather than something that is strictly inside the +machine's chassis. + + +Node:Hanlon's Razor, Next:happily, Previous:hang, Up:= H += + +Hanlon's Razor prov. + +A corollary of Finagle's +Law, similar to Occam's Razor, that reads "Never +attribute to malice that which can be adequately explained by +stupidity." The derivation of the Hanlon eponym is not definitely +known, but a very similar remark ("You have attributed conditions +to villainy that simply result from stupidity.") appears in +"Logic of Empire", a classic 1941 SF story by Robert A. Heinlein, +who calls it the `devil theory' of sociology. Heinlein's +popularity in the hacker culture makes plausible the supposition +that `Hanlon' is derived from `Heinlein' by phonetic corruption. +A similar epigram has been attributed to William James, but +Heinlein more probably got the idea from Alfred Korzybski and +other practitioners of General Semantics. Quoted here because it +seems to be a particular favorite of hackers, often showing up in +sig blocks, fortune cookie files and the login +banners of BBS systems and commercial networks. This probably +reflects the hacker's daily experience of environments created by +well-intentioned but short-sighted people. Compare Sturgeon's Law, Ninety-Ninety Rule. + + +Node:happily, Next:haque, Previous:Hanlon's Razor, Up:= H = + +happily adv. + +Of software, used to emphasize that a program is unaware of +some important fact about its environment, either because it has +been fooled into believing a lie, or because it doesn't care. The +sense of `happy' here is not that of elation, but rather that of +blissful ignorance. "The program continues to run, happily +unaware that its output is going to /dev/null." Also used to +suggest that a program or device would really rather be doing +something destructive, and is being given an opportunity to do +so. "If you enter an O here instead of a zero, the program will +happily erase all your data." Neverheless, use of this term +implies a basically benign attitude towards the program: It +didn't mean any harm, it was just eager to do its job. We'd like +to be angry at it but we shouldn't, we should try to understand +it instead. The adjective "cheerfully" is often used in exactly +the same way. + + +Node:haque, Next:hard boot, Previous:happily, Up:= H += + +haque /hak/ n. + +[Usenet] Variant spelling of hack, +used only for the noun form and connoting an elegant hack. that is a hack in sense 2. + + +Node:hard boot, Next:hardcoded, Previous:haque, Up:= H += + +hard boot n. + +See boot. + + +Node:hardcoded, Next:hardwarily, Previous:hard boot, Up:= H = + +hardcoded adj. + +1. [common] Said of data inserted directly into a program, +where it cannot be easily modified, as opposed to data in some +profile, resource (see de-rezz sense 2), or environment variable that +a user or hacker can easily modify. 2. +In C, this is esp. applied to use of a literal instead of a +#define macro (see magic number). + + +Node:hardwarily, Next:hardwired, Previous:hardcoded, Up:= H = + +hardwarily /hard-weir'*-lee/ adv. + +In a way pertaining to hardware. "The system is hardwarily +unreliable." The adjective `hardwary' is not +traditionally used, though it has recently been reported from the +U.K. See softwarily. + + +Node:hardwired, Next:has the X nature, Previous:hardwarily, Up:= H = + +hardwired adj. + +1. In software, syn. for hardcoded. 2. By extension, anything that is +not modifiable, especially in the sense of customizable to one's +particular needs or tastes. + + +Node:has the X nature, +Next:hash bucket, +Previous:hardwired, Up:= H = + +has the X nature + +[seems to derive from Zen Buddhist koans of the form "Does an +X have the Buddha-nature?"] adj. Common hacker construction for +`is an X', used for humorous emphasis. "Anyone who can't even use +a program with on-screen help embedded in it truly has the loser nature!" See also the +X that can be Y is not the true X. See also mu. + + +Node:hash bucket, Next:hash collision, Previous:has the X nature, +Up:= H = + +hash bucket n. + +A notional receptacle, a set of which might be used to +apportion data items for sorting or lookup purposes. When you +look up a name in the phone book (for example), you typically +hash it by extracting its first letter; the hash buckets are the +alphabetically ordered letter sections. This term is used as +techspeak with respect to code that uses actual hash functions; +in jargon, it is used for human associative memory as well. Thus, +two things `in the same hash bucket' are more difficult to +discriminate, and may be confused. "If you hash English words +only by length, you get too many common grammar words in the +first couple of hash buckets." Compare hash collision. + + +Node:hash collision, Next:hat, Previous:hash bucket, Up:= H = + +hash collision n. + +[from the techspeak] (var. `hash clash') When used of people, +signifies a confusion in associative memory or imagination, +especially a persistent one (see thinko). True story: One of us [ESR] was once +on the phone with a friend about to move out to Berkeley. When +asked what he expected Berkeley to be like, the friend replied: +"Well, I have this mental picture of naked women throwing Molotov +cocktails, but I think that's just a collision in my hash +tables." Compare hash +bucket. + + +Node:hat, Next:HCF, Previous:hash collision, Up:= H = + +hat n. + +Common (spoken) name for the circumflex (`^', ASCII 1011110) +character. See ASCII for other +synonyms. + + +Node:HCF, Next:heads down, Previous:hat, Up:= H = + + +HCF /H-C-F/ n. + +Mnemonic for `Halt and Catch Fire', any of several +undocumented and semi-mythical machine instructions with +destructive side-effects, supposedly included for test purposes +on several well-known architectures going as far back as the IBM +360. The MC6800 microprocessor was the first for which an HCF +opcode became widely known. This instruction caused the processor +to toggle a subset of the bus lines +as rapidly as it could; in some configurations this could +actually cause lines to burn up. Compare killer poke. + + +Node:heads down, Next:heartbeat, Previous:HCF, Up:= H = + + +heads down [Sun] adj. + +Concentrating, usually so heavily and for so long that +everything outside the focus area is missed. See also hack mode and larval stage, although this mode is +hardly confined to fledgling hackers. + + +Node:heartbeat, Next:heatseeker, Previous:heads down, Up:= H = + +heartbeat n. + +1. The signal emitted by a Level 2 Ethernet transceiver at the +end of every packet to show that the collision-detection circuit +is still connected. 2. A periodic synchronization signal used by +software or hardware, such as a bus clock or a periodic +interrupt. 3. The `natural' oscillation frequency of a computer's +clock crystal, before frequency division down to the machine's +clock rate. 4. A signal emitted at regular intervals by software +to demonstrate that it is still alive. Sometimes hardware is +designed to reboot the machine if it stops hearing a heartbeat. +See also breath-of-life +packet. + + +Node:heatseeker, Next:heavy metal, Previous:heartbeat, Up:= H = + +heatseeker n. + +[IBM] A customer who can be relied upon to buy, without fail, +the latest version of an existing product (not quite the same as +a member of the lunatic +fringe). A 1993 example of a heatseeker was someone who, +owning a 286 PC and Windows 3.0, went out and bought Windows 3.1 +(which offers no worthwhile benefits unless you have a 386). If +all customers were heatseekers, vast amounts of money could be +made by just fixing some of the bugs in each release (n) and +selling it to them as release (n+1). Microsoft in fact seems to +have mastered this technique. + + +Node:heavy metal, Next:heavy wizardry, Previous:heatseeker, Up:= H = + +heavy metal n. + +[Cambridge] Syn. big +iron. + + +Node:heavy wizardry, Next:heavyweight, Previous:heavy metal, Up:= H = + +heavy wizardry n. + +Code or designs that trade on a particularly intimate +knowledge or experience of a particular operating system or +language or complex application interface. Distinguished from +deep magic, which trades more +on arcane theoretical knowledge. Writing device drivers +is heavy wizardry; so is interfacing to X +(sense 2) without a toolkit. Esp. found in source-code comments +of the form "Heavy wizardry begins here". Compare voodoo programming. + + +Node:heavyweight, Next:heisenbug, Previous:heavy wizardry, Up:= H = + +heavyweight adj. + +[common] High-overhead; baroque; +code-intensive; featureful, but costly. Esp. used of +communication protocols, language designs, and any sort of +implementation in which maximum generality and/or ease of +implementation has been pushed at the expense of mundane +considerations such as speed, memory utilization, and startup +time. EMACS is a heavyweight editor; +X is an extremely heavyweight +window system. This term isn't pejorative, but one hacker's +heavyweight is another's elephantine and a third's monstrosity. Oppose `lightweight'. Usage: +now borders on techspeak, especially in the compound `heavyweight +process'. + + +Node:heisenbug, Next:Helen Keller mode, Previous:heavyweight, Up:= H = + +heisenbug /hi:'zen-buhg/ n. + +[from Heisenberg's Uncertainty Principle in quantum physics] A +bug that disappears or alters its behavior when one attempts to +probe or isolate it. (This usage is not even particularly +fanciful; the use of a debugger sometimes alters a program's +operating environment significantly enough that buggy code, such +as that which relies on the values of uninitialized memory, +behaves quite differently.) Antonym of Bohr bug; see also mandelbug, schroedinbug. In C, nine out of ten +heisenbugs result from uninitialized auto variables, fandango on core phenomena (esp. +lossage related to corruption of the malloc arena) or errors that smash the stack. + + +Node:Helen Keller mode, +Next:hello sailor!, +Previous:heisenbug, Up:= H = + +Helen Keller mode n. + +1. State of a hardware or software system that is deaf, dumb, +and blind, i.e., accepting no input and generating no output, +usually due to an infinite loop or some other excursion into +deep space. (Unfair to the +real Helen Keller, whose success at learning speech was +triumphant.) See also go +flatline, catatonic. 2. +On IBM PCs under DOS, refers to a specific failure mode in which +a screen saver has kicked in over an ill-behaved application which bypasses the +very interrupts the screen saver watches for activity. Your +choices are to try to get from the program's current state +through a successful save-and-exit without being able to see what +you're doing, or to re-boot the machine. This isn't (strictly +speaking) a crash. + + +Node:hello sailor!, Next:hello wall!, Previous:Helen Keller mode, +Up:= H = + +hello sailor! interj. + +Occasional West Coast equivalent of hello world; seems to have originated at +SAIL, later associated with the game Zork (which also included "hello, aviator" and +"hello, implementor"). Originally from the traditional hooker's +greeting to a swabbie fresh off the boat, of course. The standard +response is "Nothing happens here."; of all the Zork/Dungeon +games, only in Infocom's Zork 3 is "Hello, Sailor" actually +useful (excluding the unique situation where _knowing_ this fact +is important in Dungeon...). + + +Node:hello wall!, Next:hello world, Previous:hello sailor!, Up:= H = + +hello, wall! excl. + +See wall. + + +Node:hello world, Next:hex, Previous:hello wall!, Up:= H = + +hello world interj. + +1. The canonical minimal test message in the C/Unix universe. +2. Any of the minimal programs that emit this message. +Traditionally, the first program a C coder is supposed to write +in a new environment is one that just prints "hello, world" to +standard output (and indeed it is the first example program in +K&R). Environments that +generate an unreasonably large executable for this trivial test +or which require a hairy +compiler-linker invocation to generate it are considered to lose (see X). 3. +Greeting uttered by a hacker making an entrance or requesting +information from anyone present. "Hello, world! Is the LAN back +up yet?" + + +Node:hex, Next:hexadecimal, Previous:hello world, Up:= H = + +hex n. + +1. Short for hexadecimal, +base 16. 2. A 6-pack of anything (compare quad, sense 2). Neither usage has anything to do +with magic or black art, though the pun is appreciated +and occasionally used by hackers. True story: As a joke, some +hackers once offered some surplus ICs for sale to be worn as +protective amulets against hostile magic. The chips were, of +course, hex inverters. + + +Node:hexadecimal, Next:hexit, Previous:hex, Up:= H = + + +hexadecimal n. + +Base 16. Coined in the early 1960s to replace earlier +`sexadecimal', which was too racy and amusing for stuffy IBM, and +later adopted by the rest of the industry. + +Actually, neither term is etymologically pure. If we take +`binary' to be paradigmatic, the most etymologically correct term +for base 10, for example, is `denary', which comes from `deni' +(ten at a time, ten each), a Latin `distributive' number; the +corresponding term for base-16 would be something like +`sendenary'. `Decimal' is from an ordinal number; the +corresponding prefix for 6 would imply something like +`sextidecimal'. The `sexa-' prefix is Latin but incorrect in this +context, and `hexa-' is Greek. The word `octal' is similarly +incorrect; a correct form would be `octaval' (to go with +decimal), or `octonary' (to go with binary). If anyone ever +implements a base-3 computer, computer scientists will be faced +with the unprecedented dilemma of a choice between two +correct forms; both `ternary' and `trinary' have a claim +to this throne. + + +Node:hexit, Next:HHOK, Previous:hexadecimal, Up:= H = + +hexit /hek'sit/ n. + +A hexadecimal digit (0-9, and A-F or a-f). Used by people who +claim that there are only ten digits, dammit; +sixteen-fingered human beings are rather rare, despite what some +keyboard designs might seem to imply (see space-cadet keyboard). + + +Node:HHOK, Next:HHOS, Previous:hexit, Up:= H += + +HHOK + +See ha ha only +serious. + + +Node:HHOS, Next:hidden flag, Previous:HHOK, Up:= H += + +HHOS + +See ha ha only +serious. + + +Node:hidden flag, Next:high bit, Previous:HHOS, Up:= H = + + +hidden flag n. + +[scientific computation] An extra option added to a routine +without changing the calling sequence. For example, instead of +adding an explicit input variable to instruct a routine to give +extra diagnostic output, the programmer might just add a test for +some otherwise meaningless feature of the existing inputs, such +as a negative mass. The use of hidden flags can make a program +very hard to debug and understand, but is all too common wherever +programs are hacked on in a hurry. + + +Node:high bit, Next:high moby, Previous:hidden flag, Up:= H = + +high bit n. + +[from `high-order bit'] 1. The most significant bit in a byte. +2. [common] By extension, the most significant part of something +other than a data byte: "Spare me the whole saga, just give me the high bit." See also meta bit, hobbit, dread high-bit disease, and +compare the mainstream slang `bottom line'. + + +Node:high moby, Next:highly, Previous:high bit, Up:= H = + +high moby /hi:' mohb'ee/ n. + +The high half of a 512K PDP-10's +physical address space; the other half was of course the low +moby. This usage has been generalized in a way that has outlasted +the PDP-10; for example, at the 1990 +Washington D.C. Area Science Fiction Conclave (Disclave), when a +miscommunication resulted in two separate wakes being held in +commemoration of the shutdown of MIT's last ITS machines, the one on the upper floor was +dubbed the `high moby' and the other the `low moby'. All parties +involved grokked this instantly. See +moby. + + +Node:highly, Next:hing, Previous:high moby, Up:= H = + +highly adv. + +[scientific computation] The preferred modifier for +overstating an understatement. As in: `highly nonoptimal', the +worst possible way to do something; `highly nontrivial', either +impossible or requiring a major research project; `highly +nonlinear', completely erratic and unpredictable; `highly +nontechnical', drivel written for lusers, oversimplified to the point of being +misleading or incorrect (compare drool-proof paper). In other +computing cultures, postfixing of in the extreme might be +preferred. + + +Node:hing, Next:hired gun, Previous:highly, Up:= H += + +hing // n. + +[IRC] Fortuitous typo for `hint', now in wide intentional use +among players of initgame. Compare +newsfroup, filk. + + +Node:hired gun, Next:hirsute, Previous:hing, Up:= H = + + +hired gun n. + +A contract programmer, as opposed to a full-time staff member. +All the connotations of this term suggested by innumerable +spaghetti Westerns are intentional. + + +Node:hirsute, Next:HLL, Previous:hired gun, Up:= H = + +hirsute adj. + +Occasionally used humorously as a synonym for hairy. + + +Node:HLL, Next:hoarding, Previous:hirsute, Up:= H += + +HLL /H-L-L/ n. + +[High-Level Language (as opposed to assembler)] Found +primarily in email and news rather than speech. Rarely, the +variants `VHLL' and `MLL' are found. VHLL stands for +`Very-High-Level Language' and is used to describe a bondage-and-discipline +language that the speaker happens to like; Prolog and +Backus's FP are often called VHLLs. `MLL' stands for +`Medium-Level Language' and is sometimes used half-jokingly to +describe C, alluding to its +`structured-assembler' image. See also languages of choice. + + +Node:hoarding, Next:hobbit, Previous:HLL, Up:= H = + + +hoarding n. + +See software +hoarding. + + +Node:hobbit, Next:hog, Previous:hoarding, Up:= +H = + +hobbit n. + +1. [rare] The High Order BIT of a byte; same as the meta bit or high bit. 2. +The non-ITS name of vad@ai.mit.edu (*Hobbit*), master of lasers. + + +Node:hog, Next:hole, Previous:hobbit, Up:= H += + +hog n.,vt. + +1. Favored term to describe programs or hardware that seem to +eat far more than their share of a system's resources, esp. those +which noticeably degrade interactive response. Not used +of programs that are simply extremely large or complex or that +are merely painfully slow themselves. More often than not +encountered in qualified forms, e.g., `memory hog', `core hog', +`hog the processor', `hog the disk'. "A controller that never +gives up the I/O bus gets killed after the bus-hog timer +expires." 2. Also said of people who use more than their +fair share of resources (particularly disk, where it seems that +10% of the people use 90% of the disk, no matter how big the disk +is or how many people use it). Of course, once disk hogs fill up +one filesystem, they typically find some other new one to infect, +claiming to the sysadmin that they have an important new project +to complete. + + +Node:hole, Next:hollised, Previous:hog, Up:= H = + + +hole n. + +A region in an otherwise flat +entity which is not actually present. For example, some Unix +filesystems can store large files with holes so that unused +regions of the file are never actually stored on disk. (In +techspeak, these are referred to as `sparse' files.) As another +example, the region of memory in IBM PCs reserved for +memory-mapped I/O devices which may not actually be present is +called `the I/O hole', since memory-management systems must skip +over this area when filling user requests for memory. + + +Node:hollised, Next:holy wars, Previous:hole, Up:= H = + + +hollised /hol'ist/ adj. + +[Usenet: _sci.space_] To be hollised is to have been +ordered by one's employer not to post any even remotely +job-related material to Usenet (or, by extension, to other +Internet media). The original and most notorious case of this +involved one Ken Hollis, a Lockheed employee and space-program +enthusiast who posted publicly available material on access to +Space Shuttle launches to _sci.space_. He was gagged under +threat of being fired in 1994 at the behest of NASA +public-relations officers. The result was, of course, a huge +publicity black eye for NASA. Nevertheless several other NASA +contractor employees were subsequently hollised for similar +activities. Use of this term carries the strong connotation that +the persons doing the gagging are bureaucratic idiots blinded to +their own best interests by territorial reflexes. + + +Node:holy wars, Next:home box, Previous:hollised, Up:= +H = + +holy wars n. + +[from Usenet, but may predate it; +common] n. flame wars over +religious issues. The +paper by Danny Cohen that popularized the terms big-endian and little-endian in connection with the +LSB-first/MSB-first controversy was entitled "On Holy Wars and a +Plea for Peace". + +Great holy wars of the past have included ITS vs. Unix, Unix vs. VMS, +BSD Unix vs. USG Unix, C vs. +Pascal, C +vs. FORTRAN, etc. In the year 2000, popular favorites of the day +are KDE vs, GNOME, vim vs. elvis, Linux vs. [Free|Net|Open]BSD. +Hardy perennials include EMACS vs. +vi, my personal computer vs. everyone +else's personal computer, ad nauseam. The characteristic that +distinguishes holy wars from normal technical disputes is that in +a holy war most of the participants spend their time trying to +pass off personal value choices and cultural attachments as +objective technical evaluations. This happens precisely because +in a true holy war, the actual substantive differences between +the sides are relatively minor. See also theology. + + +Node:home box, Next:home machine, Previous:holy wars, Up:= H = + +home box n. + +A hacker's personal machine, especially one he or she owns. +"Yeah? Well, my home box runs a full 4.4 BSD, so +there!" + + +Node:home machine, Next:home page, Previous:home box, Up:= H = + +home machine n. + +1. Syn. home box. 2. The +machine that receives your email. These senses might be distinct, +for example, for a hacker who owns one computer at home, but +reads email at work. + + +Node:home page, Next:honey pot, Previous:home machine, Up:= H = + +home page n. + +1. One's personal billboard on the World Wide Web. The term +`home page' is perhaps a bit misleading because home directories +and physical homes in RL are private, +but home pages are designed to be very public. 2. By extension, a +WWW repository for information and links related to a project or +organization. Compare home +box. + + +Node:honey pot, Next:hook, Previous:home page, Up:= H = + +honey pot n. + +A box designed to attract crackers so that they can be observed in +action. It is usually well isolated from the rest of the network, +but has extensive logging (usually network layer, on a different +machine). Different from an iron +box in that it's purpose is to attract, not merely +observe. Sometimes, it is also a defensive network security +tactic - you set up an easy-to-crack box so that your real +servers don't get messed with. The concept was presented in +Cheswick & Bellovin's book "Firewalls and Internet +Security". + + +Node:hook, Next:hop, Previous:honey pot, Up:= H = + +hook n. + +A software or hardware feature included in order to simplify +later additions or changes by a user. For example, a simple +program that prints numbers might always print them in base 10, +but a more flexible version would let a variable determine what +base to use; setting the variable to 5 would make the program +print numbers in base 5. The variable is a simple hook. An even +more flexible program might examine the variable and treat a +value of 16 or less as the base to use, but treat any other +number as the address of a user-supplied routine for printing a +number. This is a hairy but powerful +hook; one can then write a routine to print numbers as Roman +numerals, say, or as Hebrew characters, and plug it into the +program through the hook. Often the difference between a good +program and a superb one is that the latter has useful hooks in +judiciously chosen places. Both may do the original job about +equally well, but the one with the hooks is much more flexible +for future expansion of capabilities (EMACS, for example, is all hooks). The +term `user exit' is synonymous but much more formal and less +hackish. + + +Node:hop, Next:hose, Previous:hook, Up:= H = + + +hop + +1. n. [common] One file transmission in a series required to +get a file from point A to point B on a store-and-forward +network. On such networks (including UUCPNET and FidoNet), an important inter-machine metric is +the number of hops in the shortest path between them, which can +be more significant than their geographical separation. See bang path. 2. v. [rare] To log in to +a remote machine, esp. via rlogin or telnet. "I'll hop over to +foovax to FTP that." + + +Node:hose, Next:hosed, Previous:hop, Up:= H = + + +hose + +1. vt. [common] To make non-functional or greatly degraded in +performance. "That big ray-tracing program really hoses the +system." See hosed. 2. n. A narrow +channel through which data flows under pressure. Generally +denotes data paths that represent performance bottlenecks. 3. n. +Cabling, especially thick Ethernet cable. This is sometimes +called `bit hose' or `hosery' (play on `hosiery') or `etherhose'. +See also washing +machine. + + +Node:hosed, Next:hot chat, Previous:hose, Up:= H = + + +hosed adj. + +Same as down. Used primarily by +Unix hackers. Humorous: also implies a condition thought to be +relatively easy to reverse. Probably derived from the Canadian +slang `hoser' popularized by the Bob and Doug Mackenzie skits on +SCTV, but this usage predated SCTV by years in hackerdom (it was +certainly already live at CMU in the 1970s). See hose. It is also widely used of people in the +mainstream sense of `in an extremely unfortunate situation'. + +Once upon a time, a Cray that had been experiencing periodic +difficulties crashed, and it was announced to have been hosed. It +was discovered that the crash was due to the disconnection of +some coolant hoses. The problem was corrected, and users were +then assured that everything was OK because the system had been +rehosed. See also dehose. + + +Node:hot chat, Next:hot spot, Previous:hosed, Up:= H += + +hot chat n. + +Sexually explicit one-on-one chat. See teledildonics. + + +Node:hot spot, Next:hotlink, Previous:hot chat, Up:= H = + +hot spot n. + +1. [primarily used by C/Unix programmers, but spreading] It is +received wisdom that in most programs, less than 10% of the code +eats 90% of the execution time; if one were to graph instruction +visits versus code addresses, one would typically see a few huge +spikes amidst a lot of low-level noise. Such spikes are called +`hot spots' and are good candidates for heavy optimization or +hand-hacking. The term is +especially used of tight loops and recursions in the code's +central algorithm, as opposed to (say) initial set-up costs or +large but infrequent I/O operations. See tune, bum, hand-hacking. 2. The active location of a +cursor on a bit-map display. "Put the mouse's hot spot on the +`ON' widget and click the left button." 3. A screen region that +is sensitive to mouse gestures, which trigger some action. World +Wide Web pages now provide the canonical examples; WWW browsers present +hypertext links as hot spots which, when clicked on, point the +browser at another document (these are specifically called hotlinks). 4. In a massively parallel +computer with shared memory, the one location that all 10,000 +processors are trying to read or write at once (perhaps because +they are all doing a busy-wait on +the same lock). 5. More generally, any place in a hardware design +that turns into a performance bottleneck due to resource +contention. + + +Node:hotlink, Next:house wizard, Previous:hot spot, Up:= H = + +hotlink /hot'link/ n. + +A hot spot on a World Wide +Web page; an area, which, when clicked or selected, chases a URL. +Also spelled `hot link'. Use of this term focuses on the link's +role as an immediate part of your display, as opposed to the +timeless sense of logical connection suggested by web pointer. Your screen shows hotlinks +but your document has web pointers, not (in normal usage) the +other way around. + + +Node:house wizard, Next:HP-SUX, Previous:hotlink, Up:= H = + +house wizard n. + +[prob. from ad-agency tradetalk, `house freak'] A hacker +occupying a technical-specialist, R&D, or systems position at +a commercial shop. A really effective house wizard can have +influence out of all proportion to his/her ostensible rank and +still not have to wear a suit. Used esp. of Unix wizards. The +term `house guru' is equivalent. + + +Node:HP-SUX, Next:HTH, Previous:house wizard, Up:= H = + +HP-SUX /H-P suhks/ n. + +Unflattering hackerism for HP-UX, Hewlett-Packard's Unix port, +which features some truly unique bogosities in the filesystem +internals and elsewhere (these occasionally create portability +problems). HP-UX is often referred to as `hockey-pux' inside HP, +and one respondent claims that the proper pronunciation is /H-P +ukkkhhhh/ as though one were about to spit. Another such +alternate spelling and pronunciation is "H-PUX" /H-puhks/. +Hackers at HP/Apollo (the former Apollo Computers which was +swallowed by HP in 1989) have been heard to complain that Mr. +Packard should have pushed to have his name first, if for no +other reason than the greater eloquence of the resulting acronym. +Compare AIDX, buglix. See also Nominal Semidestructor, Telerat, ScumOS, sun-stools, Slowlaris. + + +Node:HTH, Next:huff, Previous:HP-SUX, Up:= H += + +HTH // + +[Usenet: very common] Abbreviation: Hope This Helps (e.g. +following a response to a technical question). Often used just +before HAND. See also YHBT. + + +Node:huff, Next:humma, Previous:HTH, Up:= H = + + +huff v. + +To compress data using a Huffman code. Various programs that +use such methods have been called `HUFF' or some variant thereof. +Oppose puff. Compare crunch, compress. + + +Node:humma, Next:hung, Previous:huff, Up:= H = + + +humma // excl. + +A filler word used on various `chat' and `talk' programs when +you had nothing to say but felt that it was important to say +something. The word apparently originated (at least with this +definition) on the MECC Timeshare System (MTS, a now-defunct +educational time-sharing system running in Minnesota during the +1970s and the early 1980s) but was later sighted on early Unix +systems. Compare the U.K's wibble. + + +Node:hung, Next:hungry puppy, Previous:humma, Up:= H += + +hung adj. + +[from `hung up'; common] Equivalent to wedged, but more common at Unix/C sites. Not +generally used of people. Syn. with locked up, wedged; compare hosed. See also hang. +A hung state is distinguished from crashed or down, +where the program or system is also unusable but because it is +not running rather than because it is waiting for something. +However, the recovery from both situations is often the same. It +is also distinguished from the similar but more drastic state +wedged - hung software can be woken +up with easy things like interrupt keys, but wedged will need a +kill -9 or even reboot. + + +Node:hungry puppy, Next:hungus, Previous:hung, Up:= H += + +hungry puppy n. + +Syn. slopsucker. + + +Node:hungus, Next:hyperspace, Previous:hungry puppy, Up:= H = + +hungus /huhng'g*s/ adj. + +[perhaps related to slang `humongous'] Large, unwieldy, +usually unmanageable. "TCP is a hungus piece of code." "This is a +hungus set of modifications." The Infocom text adventure game "Beyond Zork" +included two monsters called hunguses. + + +Node:hyperspace, Next:hysterical reasons, Previous:hungus, Up:= H = + +hyperspace /hi:'per-spays/ n. + +A memory location that is far away from where the +program counter should be pointing, especially a place that is +inaccessible because it is not even mapped in by the +virtual-memory system. "Another core dump -- looks like the +program jumped off to hyperspace somehow." (Compare jump off into +never-never land.) This usage is from the SF notion of a +spaceship jumping `into hyperspace', that is, taking a shortcut +through higher-dimensional space -- in other words, bypassing +this universe. The variant `east hyperspace' is recorded among +CMU and Bliss hackers. + + +Node:hysterical reasons, +Next:I +didn't change anything!, Previous:hyperspace, Up:= H = + +hysterical reasons n. + +(also `hysterical raisins') A variant on the stock phrase "for +historical reasons", indicating specifically that something must +be done in some stupid way for backwards compatibility, and +moreover that the feature it must be compatible with was the +result of a bad design in the first place. "All IBM PC video +adapters have to support MDA text mode for hysterical reasons." +Compare bug-for-bug +compatible. + + +Node:= I =, Next:= J =, Previous:= H =, Up:The Jargon Lexicon + += I = + + +I didn't change +anything!: + + +I see no X +here.: + + +IANAL: + + +IBM: + + +IBM discount: + + +ICBM address: + + +ice: + + +ID10T error: + + +idempotent: + + +IDP: + + +If +you want X you know where to find it.: + + +ifdef out: + + +IIRC: + + +ill-behaved: + + +IMHO: + + +Imminent Death +Of The Net Predicted!: + + +in the extreme: + + +inc: + + +incantation: + + +include: + + +include war: + + +indent style: + + +index of X: + + +infant mortality: + + +infinite: + + +infinite loop: + + +Infinite-Monkey +Theorem: + + +infinity: + + +inflate: + + +Infocom: + + +initgame: + + +insanely great: + + +installfest: + + +INTERCAL: + + +interesting: + + +Internet: + + +Internet address: + + +Internet Death +Penalty: + + +Internet Exploder: + + +Internet Exploiter: + + +interrupt: + + +interrupt list: + + +interrupts locked +out: + + +intro: + + +IRC: + + +iron: + + +Iron Age: + + +iron box: + + +ironmonger: + + +ISO standard cup +of tea: + + +ISP: + + +ITS: + + +IWBNI: + + +IYFEG: + + +Node:I didn't change +anything!, Next:I see no X here., Previous:hysterical +reasons, Up:= I = + +I didn't change anything! interj. + +An aggrieved cry often heard as bugs manifest during a +regression test. The canonical +reply to this assertion is "Then it works just the same as it did +before, doesn't it?" See also one-line fix. This is also heard from +applications programmers trying to blame an obvious applications +problem on an unrelated systems software change, for example a +divide-by-0 fault after terminals were added to a network. +Usually, their statement is found to be false. Upon close +questioning, they will admit some major restructuring of the +program that shouldn't have broken anything, in their opinion, +but which actually hosed the code +completely. + + +Node:I see no X here., +Next:IANAL, Previous:I didn't +change anything!, Up:= I += + +I see no X here. + +Hackers (and the interactive computer games they write) +traditionally favor this slightly marked usage over other +possible equivalents such as "There's no X here!" or "X is +missing." or "Where's the X?". This goes back to the original +PDP-10 ADVENT, which would respond +in this wise if you asked it to do something involving an object +not present at your location in the game. + + +Node:IANAL, Next:IBM, Previous:I see no X here., Up:= I = + +IANAL // + +[Usenet] Abbreviation, "I Am Not A Lawyer". Usually precedes +legal advice. + + +Node:IBM, Next:IBM discount, Previous:IANAL, Up:= I += + +IBM /I-B-M/ + +Inferior But Marketable; It's Better Manually; Insidious Black +Magic; It's Been Malfunctioning; Incontinent Bowel Movement; and +a near-infinite number of even +less complimentary expansions, including `International Business +Machines'. See TLA. These abbreviations +illustrate the considerable antipathy most hackers long felt +toward the `industry leader' (see fear and loathing). + +What galled hackers about most IBM machines above the PC level +wasn't so much that they were underpowered and overpriced (though +that does count against them), but that the designs are +incredibly archaic, crufty, and +elephantine ... +and you can't fix them -- source code is locked up +tight, and programming tools are expensive, hard to find, and +bletcherous to use once you've found them. For many years, before +Microsoft, IBM was the company hackers loved to hate. + +But everything changes. In the 1980s IBM had its own troubles +with Microsoft. In the late 1990s IBM re-invented itself as a +services company, began to release open-source software through +its AlphaWorks group, and began shipping Linux systems and building ties to the Linux +community. To the astonishment of all parties, IBM emerged as a +friend of the hacker community + +This lexicon includes a number of entries attributed to `IBM'; +these derive from some rampantly unofficial jargon lists +circulated within IBM's own beleaguered hacker underground. + + +Node:IBM discount, Next:ICBM address, Previous:IBM, Up:= I = + +IBM discount n. + +A price increase. Outside IBM, this derives from the common +perception that IBM products are generally overpriced (see clone); inside, it is said to spring from a +belief that large numbers of IBM employees living in an area +cause prices to rise. + + +Node:ICBM address, Next:ice, Previous:IBM discount, Up:= I = + +ICBM address n. + +(Also `missile address') The form used to register a site with +the Usenet mapping project, back before the day of pervasive +Internet, included a blank for longitude and latitude, preferably +to seconds-of-arc accuracy. This was actually used for generating +geographically-correct maps of Usenet links on a plotter; +however, it became traditional to refer to this as one's `ICBM +address' or `missile address', and some people include it in +their sig block with that name. +(A real missile address would include target elevation.) + + +Node:ice, Next:ID10T error, Previous:ICBM address, Up:= I = + +ice n. + +[coined by Usenetter Tom Maddox, popularized by William +Gibson's cyberpunk SF novels: a contrived acronym for `Intrusion +Countermeasure Electronics'] Security software (in Gibson's +novels, software that responds to intrusion by attempting to +immobilize or even literally kill the intruder). Hence, +`icebreaker': a program designed for cracking security on a +system. + +Neither term is in serious use yet as of early 1999, but many +hackers find the metaphor attractive, and each may develop a +denotation in the future. In the meantime, the speculative usage +could be confused with `ICE', an acronym for "in-circuit +emulator". + +In ironic reference to the speculative usage, however, some +hackers and computer scientists formed ICE (International +Cryptographic Experiment) in 1994. ICE is a consortium to promote +uniform international access to strong cryptography. + + +Node:ID10T error, Next:idempotent, Previous:ice, Up:= I += + +ID10T error /I-D-ten-T er'*r/ + +Synonym for PEBKAC, e.g. "The +user is being an idiot". Tech-support people passing a problem +report to someone higher up the food chain (and presumably better +equipped to deal with idiots) may ask the user to convey that +there seems to be an I-D-ten-T error. Users never twig. + + +Node:idempotent, Next:IDP, Previous:ID10T error, Up:= I = + +idempotent adj. + +[from mathematical techspeak] Acting as if used only once, +even if used multiple times. This term is often used with respect +to C header files, which contain common +definitions and declarations to be included by several source +files. If a header file is ever included twice during the same +compilation (perhaps due to nested #include files), compilation +errors can result unless the header file has protected itself +against multiple inclusion; a header file so protected is said to +be idempotent. The term can also be used to describe an +initialization subroutine that is arranged to perform some +critical action exactly once, even if the routine is called +several times. + + +Node:IDP, Next:If +you want X you know where to find it., Previous:idempotent, Up:= I = + +IDP /I-D-P/ v.,n. + +[Usenet] Abbreviation for Internet Death Penalty. +Common (probably now more so than the full form), and frequently +verbed. Compare UDP. + + +Node:If +you want X you know where to find it., Next:ifdef out, Previous:IDP, Up:= I += + +If you want X, you know where to find it. + +There is a legend that Dennis Ritchie, inventor of C, once responded to demands for features resembling +those of what at the time was a much more popular language by +observing "If you want PL/I, you know where to find it." Ever +since, this has been hackish standard form for fending off +requests to alter a new design to mimic some older (and, by +implication, inferior and baroque) +one. The case X = Pascal manifests +semi-regularly on Usenet's _comp.lang.c_ newsgroup. Indeed, +the case X = X has been reported in discussions of graphics +software (see X). + + +Node:ifdef out, Next:IIRC, Previous:If +you want X you know where to find it., Up:= I = + +ifdef out /if'def owt/ v. + +Syn. for condition out, +specific to C. + + +Node:IIRC, Next:ill-behaved, Previous:ifdef out, Up:= I = + +IIRC // + +Common abbreviation for "If I Recall Correctly". + + +Node:ill-behaved, Next:IMHO, Previous:IIRC, Up:= I = + + +ill-behaved adj. + +1. [numerical analysis] Said of an algorithm or computational +method that tends to blow up because of accumulated roundoff +error or poor convergence properties. 2. Software that bypasses +the defined OS interfaces to do things +(like screen, keyboard, and disk I/O) itself, often in a way that +depends on the hardware of the machine it is running on or which +is nonportable or incompatible with other pieces of software. In +the IBM PC/MS-DOS world, there is a folk theorem (nearly true) to +the effect that (owing to gross inadequacies and performance +penalties in the OS interface) all interesting applications are +ill-behaved. See also bare +metal. Oppose well-behaved, compare PC-ism. See mess-dos. + + +Node:IMHO, Next:Imminent Death +Of The Net Predicted!, Previous:ill-behaved, Up:= I = + +IMHO // abbrev. + +[from SF fandom via Usenet; abbreviation for `In My Humble +Opinion'] "IMHO, mixed-case C names should be avoided, as +mistyping something in the wrong case can cause hard-to-detect +errors -- and they look too Pascalish anyhow." Also seen in +variant forms such as IMNSHO (In My Not-So-Humble Opinion) and +IMAO (In My Arrogant Opinion). + + +Node:Imminent Death +Of The Net Predicted!, Next:in the extreme, Previous:IMHO, Up:= I = + +Imminent Death Of The Net Predicted! prov. + +[Usenet] Since Usenet first got +off the ground in 1980-81, it has grown exponentially, +approximately doubling in size every year. On the other hand, +most people feel the signal-to-noise ratio of +Usenet has dropped steadily. These trends led, as far back as +mid-1983, to predictions of the imminent collapse (or death) of +the net. Ten years and numerous doublings later, enough of these +gloomy prognostications have been confounded that the phrase +"Imminent Death Of The Net Predicted!" has become a running joke, +hauled out any time someone grumbles about the S/N ratio or the huge and steadily +increasing volume, or the possible loss of a key node or link, or +the potential for lawsuits when ignoramuses post copyrighted +material, etc., etc., etc. + + +Node:in the extreme, Next:inc, Previous:Imminent Death +Of The Net Predicted!, Up:= +I = + +in the extreme adj. + +A preferred superlative suffix for many hackish terms. See, +for example, `obscure in the extreme' under obscure, and compare highly. + + +Node:inc, Next:incantation, Previous:in the extreme, Up:= I = + +inc /ink/ v. + +Verbal (and only rarely written) shorthand for +_increment_, i.e. `increase by one'. Especially used by +assembly programmers, as many assembly languages have an +inc mnemonic. Antonym: dec (see DEC). + + +Node:incantation, Next:include, Previous:inc, Up:= I = + + +incantation n. + +Any particularly arbitrary or obscure command that one must +mutter at a system to attain a desired result. Not used of +passwords or other explicit security features. Especially used of +tricks that are so poorly documented that they must be learned +from a wizard. "This compiler +normally locates initialized data in the data segment, but if you +mutter the right incantation they +will be forced into text space." + + +Node:include, Next:include war, Previous:incantation, Up:= I = + +include vt. + +[Usenet] 1. To duplicate a portion (or whole) of another's +message (typically with attribution to the source) in a reply or +followup, for clarifying the context of one's response. See the +discussion of inclusion styles under "Hacker Writing Style". 2. +[from C] #include +<disclaimer.h> has appeared in sig blocks to refer to a notional +`standard disclaimer file'. + + +Node:include war, Next:indent style, Previous:include, Up:= I = + +include war n. + +Excessive multi-leveled inclusion within a discussion thread, a practice that tends to annoy +readers. In a forum with high-traffic newsgroups, such as Usenet, +this can lead to flames and the urge +to start a kill file. + + +Node:indent style, Next:index of X, Previous:include war, Up:= I = + +indent style n. + +[C, C++, and Java programmers] The rules one uses to indent +code in a readable fashion. There are four major C indent styles, +described below; all have the aim of making it easier for the +reader to visually track the scope of control constructs. They +have been inherited by C++ and Java, which have C-like syntaxes. +The significant variable is the placement of { and +} with respect to the statement(s) they enclose and +to the guard or controlling statement (if, +else, for, while, or +do) on the block, if any. + +`K&R style' -- Named after Kernighan & Ritchie, +because the examples in K&R are +formatted this way. Also called `kernel style' because the Unix +kernel is written in it, and the `One True Brace Style' (abbrev. +1TBS) by its partisans. In C code, the body is typically indented +by eight spaces (or one tab) per level, as shown here. Four +spaces are occasionally seen in C, but in C++ and Java four tends +to be the rule rather than the exception. + +if (<cond>) { + <body> +} + + +`Allman style' -- Named for Eric Allman, a Berkeley hacker who +wrote a lot of the BSD utilities in it (it is sometimes called +`BSD style'). Resembles normal indent style in Pascal and Algol. +It is the only style other than K&R in widespread use among +Java programmers. Basic indent per level shown here is eight +spaces, but four (or sometimes three) spaces are generally +preferred by C++ and Java programmers. + +if (<cond>) +{ + <body> +} + + +`Whitesmiths style' -- popularized by the examples that came +with Whitesmiths C, an early commercial C compiler. Basic indent +per level shown here is eight spaces, but four spaces are +occasionally seen. + +if (<cond>) + { + <body> + } + + +`GNU style' -- Used throughout GNU EMACS and the Free Software +Foundation code, and just about nowhere else. Indents are always +four spaces per level, with { and } +halfway between the outer and inner indent levels. + +if (<cond>) + { + <body> + } + + +Surveys have shown the Allman and Whitesmiths styles to be the +most common, with about equal mind shares. K&R/1TBS used to +be nearly universal, but is now much less common in C (the +opening brace tends to get lost against the right paren of the +guard part in an if or while, which is +a Bad Thing). Defenders of 1TBS +argue that any putative gain in readability is less important +than their style's relative economy with vertical space, which +enables one to see more code on one's screen at once. + +The Java Language Specification legislates not only the +capitalization of identifiers, but where nouns, adjectives, and +verbs should be in method, class, interface, and variable names +(section 6.8). While the specification stops short of also +standardizing on a bracing style, all source code originating +from Sun Laboratories uses the K&R style. This has set a +precedent for Java programmers, which most follow. + +Doubtless these issues will continue to be the subject of +holy wars. + + +Node:index of X, Next:infant mortality, Previous:indent style, Up:= I = + +index of X n. + +See coefficient of +X. + + +Node:infant mortality, Next:infinite, Previous:index of X, Up:= I = + +infant mortality n. + +It is common lore among hackers (and in the electronics +industry at large; this term is possibly techspeak by now) that +the chances of sudden hardware failure drop off exponentially +with a machine's time since first use (that is, until the +relatively distant time at which enough mechanical wear in I/O +devices and thermal-cycling stress in components has accumulated +for the machine to start going senile). Up to half of all chip +and wire failures happen within a new system's first few weeks; +such failures are often referred to as `infant mortality' +problems (or, occasionally, as `sudden infant death syndrome'). +See bathtub curve, burn-in period. + + +Node:infinite, Next:infinite loop, Previous:infant mortality, Up:= I = + +infinite adj. + +[common] Consisting of a large number of objects; extreme. +Used very loosely as in: "This program produces infinite +garbage." "He is an infinite loser." The word most likely to +follow `infinite', though, is hair. +(It has been pointed out that fractals are an excellent example +of infinite hair.) These uses are abuses of the word's +mathematical meaning. The term `semi-infinite', denoting an +immoderately large amount of some resource, is also heard. "This +compiler is taking a semi-infinite amount of time to optimize my +program." See also semi. + + +Node:infinite loop, Next:Infinite-Monkey +Theorem, Previous:infinite, Up:= +I = + +infinite loop n. + +One that never terminates (that is, the machine spins or buzzes +forever and goes catatonic). +There is a standard joke that has been made about each +generation's exemplar of the ultra-fast machine: "The Cray-3 is +so fast it can execute an infinite loop in under 2 seconds!" + + +Node:Infinite-Monkey +Theorem, Next:infinity, +Previous:infinite +loop, Up:= I = + +Infinite-Monkey Theorem n. + +"If you put an infinite number +of monkeys at typewriters, eventually one will bash out the +script for Hamlet." (One may also hypothesize a small number of +monkeys and a very long period of time.) This theorem asserts +nothing about the intelligence of the one random monkey that eventually comes up with the +script (and note that the mob will also type out all the possible +incorrect versions of Hamlet). It may be referred to +semi-seriously when justifying a brute force method; the implication is +that, with enough resources thrown at it, any technical challenge +becomes a one-banana +problem. This argument gets more respect since Linux justified the bazaar mode of development. + + +This theorem was first popularized by the astronomer Sir Arthur Eddington. It +became part of the idiom of techies via the classic SF short story "Inflexible +Logic" by Russell Maloney, and many younger hackers know it through a reference +in Douglas Adams's "Hitchhiker's Guide to the Galaxy". On 1 April 2000 the +usage acquired its own Internet standard, (Infinite Monkey Protocol Suite). + + +Node:infinity, Next:inflate, Previous:Infinite-Monkey Theorem, Up:= I = + +infinity n. + +1. The largest value that can be represented in a particular +type of variable (register, memory location, data type, +whatever). 2. `minus infinity': The smallest such value, not +necessarily or even usually the simple negation of plus infinity. +In N-bit twos-complement arithmetic, infinity is 2^(N-1) - 1 but +minus infinity is - (2^(N-1)), not -(2^(N-1) - 1). Note also that +this is different from time T equals minus infinity, +which is closer to a mathematician's usage of infinity. + + +Node:inflate, Next:Infocom, Previous:infinity, Up:= +I = + +inflate vt. + +To decompress or puff a file. Rare +among Internet hackers, used primarily by MS-DOS/Windows +types. + + +Node:Infocom, Next:initgame, Previous:inflate, Up:= I += + +Infocom n. + +A now-legendary games company, active from 1979 to 1989, that +commercialized the MDL parser technology used for Zork to produce a line of text adventure games +that remain favorites among hackers. Infocom's games were +intelligent, funny, witty, erudite, irreverent, challenging, +satirical, and most thoroughly hackish in spirit. The physical +game packages from Infocom are now prized collector's items. +After being acquired by Activision in 1989 they did a few more +"modern" (e.g. graphics-intensive) games which were less +successful than reissues of their classics. + +The software, thankfully, is still extant; Infocom games were +written in a kind of P-code and distributed with a P-code +interpreter core, and not only freeware emulators for that +interpreter but an actual compiler as well have been written to +permit the P-code to be run on platforms the games never +originally graced. In fact, new games written in this P-code are +still bering written. (Emulators that can run Infocom game ZIPs, +and new games, are available at ftp://wuarchive.wustl.edu:/doc/misc/if-archive/infocom.) + + +Node:initgame, Next:insanely great, Previous:Infocom, Up:= I = + +initgame /in-it'gaym/ n. + +[IRC] An IRC version of the trivia +game "Botticelli", in which one user changes his nick to the initials of a famous person or other +named entity, and the others on the channel ask yes or no +questions, with the one to guess the person getting to be "it" +next. As a courtesy, the one picking the initials starts by +providing a 4-letter hint of the form sex, nationality, +life-status, reality-status. For example, MAAR means "Male, +American, Alive, Real" (as opposed to "fictional"). Initgame can +be surprisingly addictive. See also hing. + +[1996 update: a recognizable version of the initgame has +become a staple of some radio talk shows in the U.S. We had it +first! - ESR] + + +Node:insanely great, Next:installfest, Previous:initgame, Up:= I = + +insanely great adj. + +[Mac community, from Steve Jobs; also BSD Unix people via Bill +Joy] Something so incredibly elegant that it is imaginable only to someone +possessing the most puissant of hacker-natures. + + +Node:installfest, Next:INTERCAL, Previous:insanely great, Up:= I = + +installfest + +[Linux community since c.1998] Common portmanteau word for +"installation festival"; Linux user groups frequently run these. +Computer users are invited to bring their machines to have Linux +installed on their machines. The idea is to get them painlessly +over the biggest hump in migrating to Linux, which is initially +installing and configuring it for the user's machine. + + +Node:INTERCAL, Next:interesting, Previous:installfest, Up:= I = + +INTERCAL /in't*r-kal/ n. + +[said by the authors to stand for `Compiler Language With No +Pronounceable Acronym'] A computer language designed by Don Woods +and James Lyons in 1972. INTERCAL is purposely different from all +other computer languages in all ways but one; it is purely a +written language, being totally unspeakable. An excerpt from the +INTERCAL Reference Manual will make the style of the language +clear: + +It is a well-known and oft-demonstrated fact that a +person whose work is incomprehensible is held in high esteem. For +example, if one were to state that the simplest way to store a +value of 65536 in a 32-bit INTERCAL variable is: + +DO :1 <- #0$#256 + + +any sensible programmer would say that that was absurd. Since +this is indeed the simplest method, the programmer would be made +to look foolish in front of his boss, who would of course have +happened to turn up, as bosses are wont to do. The effect would +be no less devastating for the programmer having been +correct. + + +INTERCAL has many other peculiar features designed to make it +even more unspeakable. The Woods-Lyons implementation was +actually used by many (well, at least several) people at +Princeton. The language has been recently reimplemented as +C-INTERCAL and is consequently enjoying an unprecedented level of +unpopularity; there is even an _alt.lang.intercal_ newsgroup +devoted to the study and ... appreciation of the +language on Usenet. + +Inevitably, INTERCAL has a home page on the Web: http://www.tuxedo.org/~esr/intercal/. +An extended version, implemented in (what else?) Perl and adding object-oriented features, is +available at http://dd-sh.assurdo.com/INTERCAL. +See also Befunge. + + +Node:interesting, Next:Internet, Previous:INTERCAL, Up:= +I = + +interesting adj. + +In hacker parlance, this word has strong connotations of +`annoying', or `difficult', or both. Hackers relish a challenge, +and enjoy wringing all the irony possible out of the ancient +Chinese curse "May you live in interesting times". Oppose trivial, uninteresting. + + +Node:Internet, Next:Internet address, Previous:interesting, Up:= I = + +Internet n. + +The mother of all networks. First incarnated beginning in 1969 +as the ARPANET, a U.S. Department of Defense research testbed. +Though it has been widely believed that the goal was to develop a +network architecture for military command-and-control that could +survive disruptions up to and including nuclear war, this is a +myth; in fact, ARPANET was conceived from the start as a way to +get most economical use out of then-scarce large-computer +resources. + +As originally imagined, ARPANET's major use would have been to +support what is now called remote login and more sophisticated +forms of distributed computing, but the infant technology of +electronic mail quickly grew to dominate actual usage. +Universities, research labs and defense contractors early +discovered the Internet's potential as a medium of communication +between humans and linked up in steadily increasing +numbers, connecting together a quirky mix of academics, techies, +hippies, SF fans, hackers, and anarchists. The roots of this +lexicon lie in those early years. + +Over the next quarter-century the Internet evolved in many +ways. The typical machine/OS combination moved from DEC PDP-10s and PDP-20s, running TOPS-10 and TOPS-20, to PDP-11s and VAXes and Suns running +Unix, and in the 1990s to Unix on +Intel microcomputers. The Internet's protocols grew more capable, +most notably in the move from NCP/IP to TCP/IP in 1982 and the implementation of +Domain Name Service in 1983. It was around this time that people +began referring to the collection of interconnected networks with +ARPANET at its core as "the Internet". + +The ARPANET had a fairly strict set of participation +guidelines - connected institutions had to be involved with a +DOD-related research project. By the mid-80s, many of the +organizations clamoring to join didn't fit this profile. In 1986, +the National Science Foundation built NSFnet to open up access to +its five regional supercomputing centers; NSFnet became the +backbone of the Internet, replacing the original ARPANET pipes +(which were formally shut down in 1990). Between 1990 and late +1994 the pieces of NSFnet were sold to major telecommunications +companies until the Internet backbone had gone completely +commercial. + +That year, 1994, was also the year the mainstream culture +discovered the Internet. Once again, the killer app was not the anticipated one - +rather, what caught the public imagination was the hypertext and +multimedia features of the World Wide Web. Subsequently the +Internet has seen off its only serious challenger (the OSI +protocol stack favored by European telecom monopolies) and is in +the process of absorbing into itself many of the proprietary +networks built during the second wave of wide-area networking +after 1980. It is now (1996) a commonplace even in mainstream +media to predict that a globally-extended Internet will become +the key unifying communications technology of the next century. +See also the network and +Internet address. + + +Node:Internet address, Next:Internet Death +Penalty, Previous:Internet, Up:= +I = + +Internet address n. + +1. [techspeak] An absolute network address of the form +_foo@bar.baz_, where foo is a user name, bar is a sitename, and baz is a `domain' name, +possibly including periods itself. Contrast with bang path; see also the network and network address. All Internet +machines and most UUCP sites can now resolve these addresses, +thanks to a large amount of behind-the-scenes magic and PD software written since 1980 or so. See also +bang path, domainist. 2. More loosely, any network +address reachable through Internet; this includes bang path addresses and some internal +corporate and government networks. + +Reading Internet addresses is something of an art. Here are +the four most important top-level functional Internet domains +followed by a selection of geographical domains: + + + +_com_ + + +commercial organizations + + +_edu_ + + +educational institutions + + +_gov_ + + +U.S. government civilian sites + + +_mil_ + + +U.S. military sites + + + + +Note that most of the sites in the _com_ and _edu_ +domains are in the U.S. or Canada. + + + + +_us_ + + +sites in the U.S. outside the functional domains + + +_su_ + + +sites in the ex-Soviet Union (see kremvax). + + +_uk_ + + +sites in the United Kingdom + + +Within the _us_ domain, there are subdomains for the +fifty states, each generally with a name identical to the state's +postal abbreviation. Within the _uk_ domain, there is an +_ac_ subdomain for academic sites and a _co_ domain for +commercial ones. Other top-level domains may be divided up in +similar ways. + + +Node:Internet Death +Penalty, Next:Internet Exploder, Previous:Internet address, Up:= I = + +Internet Death Penalty + +[Usenet] (often abbreviated IDP) The ultimate sanction against +spam-emitting sites - complete +shunning at the router level of all mail and packets, as well as +Usenet messages, from the offending domain(s). Compare Usenet Death Penalty, +with which it is sometimes confused. + + +Node:Internet Exploder, Next:Internet Exploiter, +Previous:Internet Death Penalty, Up:= I = + +Internet Exploder + +[very common] Pejorative hackerism for Microsoft's "Internet +Explorer" web browser (also "Internet Exploiter"). Compare HP-SUX, AIDX, +buglix, Macintrash, Telerat, ScumOS, +sun-stools, Slowlaris. + + +Node:Internet Exploiter, +Next:interrupt, Previous:Internet Exploder, +Up:= I = + +Internet Exploiter n. + +Another common name-of-insult for Internet Explorer, +Microsoft's overweight Web Browser; more hostile than Internet Exploder. Reflects +widespread hostility to Microsoft and a sense that it is seeking +to hijack, monopolize, and corrupt the Internet. Compare Exploder and the less pejorative Netscrape. + + +Node:interrupt, Next:interrupt list, Previous:Internet Exploiter, +Up:= I = + +interrupt + +1. [techspeak] n. On a computer, an event that interrupts +normal processing and temporarily diverts flow-of-control through +an "interrupt handler" routine. See also trap. 2. interj. A request for attention from a +hacker. Often explicitly spoken. "Interrupt -- have you seen Joe +recently?" See priority +interrupt. 3. Under MS-DOS, nearly synonymous with +`system call', because the OS and BIOS routines are both called +using the INT instruction (see interrupt list) and because +programmers so often have to bypass the OS (going directly to a +BIOS interrupt) to get reasonable performance. + + +Node:interrupt list, Next:interrupts locked +out, Previous:interrupt, Up:= I = + +interrupt list n. + +[MS-DOS] The list of all known software interrupt calls (both +documented and undocumented) for IBM PCs and compatibles, maintained +and made available for free redistribution by Ralf Brown. As of late +1992, it had grown to approximately two megabytes in length. + + +Node:interrupts locked +out, Next:intro, Previous:interrupt list, Up:= I = + +interrupts locked out adj. + +When someone is ignoring you. In a restaurant, after several +fruitless attempts to get the waitress's attention, a hacker +might well observe "She must have interrupts locked out". The +synonym `interrupts disabled' is also common. Variations abound; +"to have one's interrupt mask bit set" and "interrupts masked +out" are also heard. See also spl. + + +Node:intro, Next:IRC, Previous:interrupts locked out, Up:= I = + +intro n. + +[demoscene] Introductory screen of some production. 2. A short +demo, usually showing just one or two +screens. 3. Small, usually 64k, 40k +or 4k demo. Sizes are generally +dictated by compo rules. See also +dentro, demo. + + +Node:IRC, Next:iron, Previous:intro, Up:= I += + +IRC /I-R-C/ n. + +[Internet Relay Chat] A worldwide "party line" network that +allows one to converse with others in real time. IRC is +structured as a network of Internet servers, each of which +accepts connections from client programs, one per user. The IRC +community and the Usenet and MUD communities overlap to some extent, +including both hackers and regular folks who have discovered the +wonders of computer networks. Some Usenet jargon has been adopted +on IRC, as have some conventions such as emoticons. There is also a vigorous native +jargon, represented in this lexicon by entries marked `[IRC]'. +See also talk mode. + + +Node:iron, Next:Iron Age, Previous:IRC, Up:= I = + + +iron n. + +Hardware, especially older and larger hardware of mainframe class with big metal cabinets +housing relatively low-density electronics (but the term is also +used of modern supercomputers). Often in the phrase big iron. Oppose silicon. See also dinosaur. + + +Node:Iron Age, Next:iron box, Previous:iron, Up:= I = + + +Iron Age n. + +In the history of computing, 1961-1971 -- the formative era of +commercial mainframe technology, +when ferrite-core dinosaurs ruled +the earth. The Iron Age began, ironically enough, with the +delivery of the first minicomputer (the PDP-1) and ended with the +introduction of the first commercial microprocessor (the Intel +4004) in 1971. See also Stone +Age; compare elder +days. + + +Node:iron box, Next:ironmonger, Previous:Iron Age, Up:= I = + +iron box n. + +[Unix/Internet] A special environment set up to trap a cracker logging in over remote +connections long enough to be traced. May include a modified +shell restricting the cracker's +movements in unobvious ways, and `bait' files designed to keep +him interested and logged on. See also back door, firewall machine, Venus flytrap, and Clifford Stoll's +account in "The Cuckoo's +Egg" of how he made and used one (see the Bibliography in Appendix C). Compare +padded cell, honey pot. + + +Node:ironmonger, Next:ISO standard cup of +tea, Previous:iron +box, Up:= I = + +ironmonger n. + +[IBM] A hardware specialist (derogatory). Compare sandbender, polygon pusher. + + +Node:ISO standard cup +of tea, Next:ISP, Previous:ironmonger, Up:= I = + +ISO standard cup of tea n. + +[South Africa] A cup of tea with milk and one teaspoon of +sugar, where the milk is poured into the cup before the tea. +Variations are ISO 0, with no sugar; ISO 2, with two spoons of +sugar; and so on. This may derive from the "NATO standard" cup of +coffee and tea (milk and two sugars), military slang going back +to the late 1950s and parodying NATO's relentless bureacratic +drive to standardize parts across European and U.S. +militaries. + +Like many ISO standards, this one has a faintly alien ring in +North America, where hackers generally shun the decadent British +practice of adulterating perfectly good tea with dairy products +and prefer instead to add a wedge of lemon, if anything. If one +were feeling extremely silly, one might hypothesize an analogous +`ANSI standard cup of tea' and wind up with a political situation +distressingly similar to several that arise in much more serious +technical contexts. (Milk and lemon don't mix very well.) + +[2000 update: There is now, in fact, a `British Standard +BS6008: How to make a standard cup of tea.' - ESR] + + +Node:ISP, Next:ITS, Previous:ISO standard cup of tea, +Up:= I = + +ISP /I-S-P/ + +Common abbreviation for Internet Service Provider, a kind of +company that barely existed before 1993. ISPs sell Internet +access to the mass market. While the big nationwide commercial +BBSs with Internet access (like America Online, CompuServe, +GEnie, Netcom, etc.) are technically ISPs, the term is usually +reserved for local or regional small providers (often run by +hackers turned entrepreneurs) who resell Internet access cheaply +without themselves being information providers or selling +advertising. Compare NSP. + + +Node:ITS, Next:IWBNI, Previous:ISP, Up:= I = + + +ITS /I-T-S/ n. + +1. Incompatible Time-sharing System, an influential though +highly idiosyncratic operating system written for PDP-6s and +PDP-10s at MIT and long used at the MIT AI Lab. Much AI-hacker +jargon derives from ITS folklore, and to have been `an ITS +hacker' qualifies one instantly as an old-timer of the most +venerable sort. ITS pioneered many important innovations, +including transparent file sharing between machines and +terminal-independent I/O. After about 1982, most actual work was +shifted to newer machines, with the remaining ITS boxes run +essentially as a hobby and service to the hacker community. The +shutdown of the lab's last ITS machine in May 1990 marked the end +of an era and sent old-time hackers into mourning nationwide (see +high moby). 2. A mythical image +of operating-system perfection worshiped by a bizarre, fervent +retro-cult of old-time hackers and ex-users (see troglodyte, sense 2). ITS worshipers manage +somehow to continue believing that an OS maintained by +assembly-language hand-hacking that supported only monocase +6-character filenames in one directory per account remains +superior to today's state of commercial art (their venom against +Unix is particularly intense). See +also holy wars, Weenix. + + +Node:IWBNI, Next:IYFEG, Previous:ITS, Up:= I = + + +IWBNI // + +Abbreviation for `It Would Be Nice If'. Compare WIBNI. + + +Node:IYFEG, Next:J. Random, Previous:IWBNI, Up:= I += + +IYFEG // + +[Usenet] Abbreviation for `Insert Your Favorite Ethnic Group'. +Used as a meta-name when telling ethnic jokes on the net to avoid +offending anyone. See JEDR. + + +Node:= J =, Next:= K =, Previous:= I =, Up:The Jargon Lexicon + += J = + + +J. Random: + + +J. Random Hacker: + + +jack in: + + +jaggies: + + +Java: + + +JCL: + + +JEDR: + + +Jeff K.: + + +jello: + + +jiffy: + + +job security: + + +jock: + + +joe code: + + +jolix: + + +juggling eggs: + + +jump off +into never-never land: + + +jupiter: + + +Node:J. Random, Next:J. Random Hacker, Previous:IYFEG, Up:= J = + +J. Random /J rand'm/ n. + +[common; generalized from J. Random Hacker] Arbitrary; +ordinary; any one; any old. `J. Random' is often prefixed to a +noun to make a name out of it. It means roughly `some particular' +or `any specific one'. "Would you let J. Random Loser marry your +daughter?" The most common uses are `J. Random Hacker', `J. +Random Loser', and `J. Random Nerd' ("Should J. Random Loser be +allowed to gun down other people?"), +but it can be used simply as an elaborate version of random in any sense. + + +Node:J. Random Hacker, Next:jack in, Previous:J. Random, Up:= J = + +J. Random Hacker /J rand'm hak'r/ n. + +[very common] A mythical figure like the Unknown Soldier; the +archetypal hacker nerd. This term is one of the oldest in the +jargon, apparently going back to MIT in the 1960s. See random, Suzie +COBOL. This may originally have been inspired by `J. Fred +Muggs', a show-biz chimpanzee whose name was a household word +back in the early days of TMRC, and +was probably influenced by `J. Presper Eckert' (one of the +co-inventors of the electronic computer). See also Fred Foobar. + + +Node:jack in, Next:jaggies, Previous:J. Random Hacker, Up:= J = + +jack in v. + +To log on to a machine or connect to a network or BBS, esp. for purposes of entering a virtual reality simulation such as a +MUD or IRC +(leaving is "jacking out"). This term derives from cyberpunk SF, in which it was used for the +act of plugging an electrode set into neural sockets in order to +interface the brain directly to a virtual reality. It is +primarily used by MUD and IRC fans and younger hackers on BBS +systems. + + +Node:jaggies, Next:Java, Previous:jack in, Up:= +J = + +jaggies /jag'eez/ n. + +The `stairstep' effect observable when an edge (esp. a linear +edge of very shallow or steep slope) is rendered on a pixel +device (as opposed to a vector display). + + +Node:Java, Next:JCL, Previous:jaggies, Up:= J += + +Java + +An object-oriented language originally developed at Sun by +James Gosling (and known by the name "Oak") with the intention of +being the successor to C++ (the project +was however originally sold to Sun as an embedded language for +use in set-top boxes). After the great Internet explosion of +1993-1994, Java was hacked into a byte-interpreted language and +became the focus of a relentless hype campaign by Sun, which +touted it as the new language of choice for distributed +applications. + +Java is indeed a stronger and cleaner design than C++ and has +been embraced by many in the hacker community - but it has been a +considerable source of frustration to many others, for reasons +ranging from uneven support on different Web browser platforms, +performance issues, and some notorious deficiencies of some of +the standard toolkits (AWT in particular). Microsoft's determined attempts to corrupt +the language (which it rightly sees as a threat to its OS +monopoly) have not helped. As of 1999, these issues are still in +the process of being resolved. + +Despite many attractive features and a good design, it is +difficult to find people willing to praise Java who have tried to +implement a complex, real-world system with it (but to be fair it +is early days yet, and no other language has ever been forced to +spend its childhood under the limelight the way Java has). On the +other hand, Java has already been a big win in academic circles, where it has taken the +place of Pascal as the preferred +tool for teaching the basics of good programming to the next +generation of hackers. + + +Node:JCL, Next:JEDR, Previous:Java, Up:= J = + + +JCL /J-C-L/ n. + +1. IBM's supremely rude Job Control +Language. JCL is the script language used to control the +execution of programs in IBM's batch systems. JCL has a very +fascist syntax, and some versions +will, for example, barf if two spaces +appear where it expects one. Most programmers confronted with JCL +simply copy a working file (or card deck), changing the file +names. Someone who actually understands and generates unique JCL +is regarded with the mixed respect one gives to someone who +memorizes the phone book. It is reported that hackers at IBM +itself sometimes sing "Who's the breeder of the crud that mangles +you and me? I-B-M, J-C-L, M-o-u-s-e" to the tune of the "Mickey +Mouse Club" theme to express their opinion of the beast. 2. A +comparative for any very rude software +that a hacker is expected to use. "That's as bad as JCL." As with +COBOL, JCL is often used as an +archetype of ugliness even by those who haven't experienced it. +See also IBM, fear and loathing. + +A (poorly documented, naturally) shell simulating JCL syntax +is available at the Retrocomputing Museum http://www.ccil.org/retro. + + +Node:JEDR, Next:Jeff K., Previous:JCL, Up:= J = + + +JEDR // n. + +Synonymous with IYFEG. At one +time, people in the Usenet newsgroup _rec.humor.funny_ +tended to use `JEDR' instead of IYFEG +or `<ethnic>'; this stemmed from a public attempt to +suppress the group once made by a loser with initials JEDR after +he was offended by an ethnic joke posted there. (The practice was +retconned by the expanding these +initials as `Joke Ethnic/Denomination/Race'.) After much sound +and fury JEDR faded away; this term appears to be doing likewise. +JEDR's only permanent effect on the net.culture was to discredit +`sensitivity' arguments for censorship so thoroughly that more +recent attempts to raise them have met with immediate and +near-universal rejection. + + +Node:Jeff K., Next:jello, Previous:JEDR, Up:= J = + + +Jeff K. + +The spiritual successor to B1FF and +the archetype of script +kiddies. Jeff K. is a sixteen-year-old suburbanite who +fancies himself a "l33t haX0r", although his knowledge of +computers seems to be limited to the procedure for getting Quake +up and running. His Web page http://www.somethingawful.com/jeffk +features a number of hopelessly naive articles, essays, and +rants, all filled with the kind of misspellings, studlycaps, and number-for-letter +substitutions endemic to the script kiddie and warez d00dz communities. Jeff's +offerings, among other things, include hardware advice (such as +"AMD VERSIS PENTIUM" and "HOW TO OVARCLOAK YOUR COMPUTAR"), his +own Quake clan (Clan 40 OUNSCE), and his own comic strip (Wacky +Fun Computar Comic Jokes). + +Like B1FF, Jeff K. is (fortunately) a hoax. Jeff K. was +created by internet game journalist Richard "Lowtax" Kyanka, +whose web site Something Awful (http://www.somethingawful.com) +highlights unintentionally humorous news items and Web sites, as +a parody of the kind of teenage luser +who infests Quake servers, chat rooms, and other places where +computer enthusiasts congregate. He is well-recognized in the PC +game community and his influence has spread to hacker fora like Slashdot as well. + + +Node:jello, Next:jiffy, Previous:Jeff K., Up:= +J = + +jello n. + +[Usenet: by analogy with spam] A +message that is both excessively cross-posted and too frequently +posted, as opposed to spam (which is +merely too frequently posted) or velveeta (which is merely excessively +cross-posted). This term is widely recognized but not commonly +used; most people refer to both kinds of abuse or their +combination as spam. + + +Node:jiffy, Next:job security, Previous:jello, Up:= J += + +jiffy n. + +1. The duration of one tick of the system clock on your +computer (see tick). Often one AC +cycle time (1/60 second in the U.S. and Canada, 1/50 most other +places), but more recently 1/100 sec has become common. "The +swapper runs every 6 jiffies" means that the virtual memory +management routine is executed once for every 6 ticks of the +clock, or about ten times a second. 2. Confusingly, the term is +sometimes also used for a 1-millisecond wall time interval. 3. Even more +confusingly, physicists semi-jokingly use `jiffy' to mean the +time required for light to travel one foot in a vacuum, which +turns out to be close to one nanosecond. 4. +Indeterminate time from a few seconds to forever. "I'll do it in +a jiffy" means certainly not now and possibly never. This is a +bit contrary to the more widespread use of the word. Oppose nano. See also Real Soon Now. + + +Node:job security, Next:jock, Previous:jiffy, Up:= J += + +job security n. + +When some piece of code is written in a particularly obscure fashion, and no good reason (such +as time or space optimization) can be discovered, it is often +said that the programmer was attempting to increase his job +security (i.e., by making himself indispensable for maintenance). +This sour joke seldom has to be said in full; if two hackers are +looking over some code together and one points at a section and +says "job security", the other one may just nod. + + +Node:jock, Next:joe code, Previous:job security, Up:= J = + +jock n. + +1. A programmer who is characterized by large and somewhat +brute-force programs. See brute +force. 2. When modified by another noun, describes a +specialist in some particular computing area. The compounds +`compiler jock' and `systems jock' seem to be the +best-established examples. + + +Node:joe code, Next:jolix, Previous:jock, Up:= J = + + +joe code /joh' kohd`/ n. + +1. Code that is overly tense and +unmaintainable. "Perl may be a handy +program, but if you look at the source, it's complete joe code." +2. Badly written, possibly buggy code. + +Correspondents wishing to remain anonymous have fingered a +particular Joe at the Lawrence Berkeley Laboratory and observed +that usage has drifted slightly; the original sobriquet `Joe +code' was intended in sense 1. + +1994 update: This term has now generalized to `<name> +code', used to designate code with distinct characteristics +traceable to its author. "This section doesn't check for a NULL +return from malloc()! Oh. No wonder! It's Ed code!". Used most +often with a programmer who has left the shop and thus is a +convenient scapegoat for anything that is wrong with the +project. + + +Node:jolix, Next:juggling eggs, Previous:joe code, Up:= J = + +jolix /joh'liks/ n.,adj. + +386BSD, the freeware port of the BSD Net/2 release to the +Intel i386 architecture by Bill Jolitz, Lynne Greer Jolitz, and +friends. Used to differentiate from BSDI's port based on the same +source tape, which used to be called BSD/386 and is now BSD/OS. +See BSD. + + +Node:juggling eggs, Next:jump off +into never-never land, Previous:jolix, Up:= J += + +juggling eggs vi. + +Keeping a lot of state in your +head while modifying a program. "Don't bother me now, I'm +juggling eggs", means that an interrupt is likely to result in +the program's being scrambled. In the classic 1975 first-contact +SF novel "The Mote in God's Eye", by Larry Niven and Jerry +Pournelle, an alien describes a very difficult task by saying "We +juggle priceless eggs in variable gravity." See also hack mode and on the gripping hand. + + +Node:jump off +into never-never land, Next:jupiter, Previous:juggling eggs, Up:= J = + +jump off into never-never land v. + +[from J. M. Barrie's "Peter Pan"] Same as branch to Fishkill, but more +common in technical cultures associated with non-IBM computers +that use the term `jump' rather than `branch'. Compare hyperspace. + + +Node:jupiter, Next:K, Previous:jump off into +never-never land, Up:= J += + +jupiter vt. + +[IRC] To kill an IRC bot or user and then take its place by adopting +its nick so that it cannot reconnect. +Named after a particular IRC user who did this to NickServ, the +robot in charge of preventing people from inadvertently using a +nick claimed by another user. Now commonly shortened to +`jupe'. + + +Node:= K =, Next:= L =, Previous:= J =, Up:The Jargon Lexicon + += K = + + +K: + + +K&R: + + +k-: + + +kahuna: + + +kamikaze packet: + + +kangaroo code: + + +ken: + + +kernel-of-the-week +club: + + +kgbvax: + + +KIBO: + + +kiboze: + + +kibozo: + + +kick: + + +kill file: + + +killer app: + + +killer micro: + + +killer poke: + + +kilo-: + + +KIPS: + + +KISS Principle: + + +kit: + + +klone: + + +kludge: + + +kluge: + + +kluge around: + + +kluge up: + + +Knights of +the Lambda Calculus: + + +knobs: + + +Knuth: + + +koan: + + +kremvax: + + +kyrka: + + +Node:K, Next:K&R, Previous:jupiter, Up:= K += + +K /K/ n. + +[from kilo-] A kilobyte. Used both +as a spoken word and a written suffix (like meg and gig for megabyte +and gigabyte). See quantifiers. + + +Node:K&R, Next:k-, Previous:K, Up:= K = + +K&R [Kernighan and Ritchie] n. + +Brian Kernighan and Dennis Ritchie's book "The C Programming +Language", esp. the classic and influential first edition +(Prentice-Hall 1978; ISBN 0-13-110163-3). Syn. White Book, Old Testament. See also New Testament. + + +Node:k-, Next:kahuna, Previous:K&R, Up:= K += + +k- pref. + +[rare; poss fr. `kilo-' prefix] Extremely. Rare among hackers, +but quite common among crackers and warez d00dz in compounds such as +`k-kool' /K'kool'/, `k-rad' /K'rad'/, and `k-awesome' /K'aw`sm/. +Also used to intensify negatives; thus, `k-evil', `k-lame', +`k-screwed', and `k-annoying'. Overuse of this prefix, or use in +more formal or technical contexts, is considered an indicator of +lamer status. + + +Node:kahuna, Next:kamikaze packet, Previous:k-, Up:= K = + +kahuna /k*-hoo'n*/ n. + +[IBM: from the Hawaiian title for a shaman] Synonym for wizard, guru. + + +Node:kamikaze packet, Next:kangaroo code, Previous:kahuna, Up:= K = + +kamikaze packet n. + +The `official' jargon for what is more commonly called a Christmas tree packet. +RFC-1025, "TCP and IP Bake Off" +says: + +10 points for correctly being able to process a +"Kamikaze" packet (AKA nastygram, christmas tree packet, lamp +test segment, et al.). That is, correctly handle a segment with +the maximum combination of features at once (e.g., a SYN URG PUSH +FIN segment with options and data). + + +See also Chernobyl +packet. + + +Node:kangaroo code, Next:ken, Previous:kamikaze packet, Up:= K = + +kangaroo code n. + +Syn. spaghetti +code. + + +Node:ken, Next:kernel-of-the-week club, +Previous:kangaroo +code, Up:= K = + +ken /ken/ n. + +1. [Unix] Ken Thompson, principal inventor of Unix. In the +early days he used to hand-cut distribution tapes, often with a +note that read "Love, ken". Old-timers still use his first name +(sometimes uncapitalized, because it's a login name and mail +address) in third-person reference; it is widely understood (on +Usenet, in particular) that without a last name `Ken' refers only +to Ken Thompson. Similarly, Dennis without last name means Dennis +Ritchie (and he is often known as _dmr_). See also demigod, Unix. +2. A flaming user. This was originated by the Software Support +group at Symbolics because the two greatest flamers in the user +community were both named Ken. + + +Node:kernel-of-the-week +club, Next:kgbvax, +Previous:ken, Up:= K = + +kernel-of-the-week club + +The fictional society that BSD bigots claim [Linux] users belong to, +alluding to the release-early-release-often style preferred by +the kernel maintainers. See bazaar. +This was almost certainly inspired by the earlier bug-of-the-month club. + + +Node:kgbvax, Next:KIBO, Previous:kernel-of-the-week club, Up:= K = + +kgbvax /K-G-B'vaks/ n. + +See kremvax. + + +Node:KIBO, Next:kiboze, Previous:kgbvax, Up:= K += + +KIBO /ki:'boh/ + +1. [acronym] Knowledge In, Bullshit Out. A summary of what +happens whenever valid data is passed through an organization (or +person) that deliberately or accidentally disregards or ignores +its significance. Consider, for example, what an advertising +campaign can do with a product's actual specifications. Compare +GIGO; see also SNAFU principle. 2. James Parry +<kibo@world.std.com>, a Usenetter infamous for various +surrealist net.pranks and an uncanny, machine-assisted knack for +joining any thread in which his nom de guerre is mentioned. He +has a website at http://www.kibo.com/. + + +Node:kiboze, Next:kibozo, Previous:KIBO, Up:= K = + + +kiboze v. + +[Usenet] To grep the Usenet news +for a string, especially with the intention of posting a +follow-up. This activity was popularised by Kibo (see KIBO, sense 2). + + +Node:kibozo, Next:kick, Previous:kiboze, Up:= K += + +kibozo /ki:-boh'zoh/ n. + +[Usenet] One who kibozes but is +not Kibo (see KIBO, sense 2). + + +Node:kick, Next:kill file, Previous:kibozo, Up:= K += + +kick v. + +1. [IRC] To cause somebody to be removed from a IRC channel, an option only available to channel +ops. This is an extreme measure, often used to combat extreme +flamage or flooding, but sometimes used at the CHOP's whim. Compare gun. 2. To reboot a machine or kill a running +process. "The server's down, let me go kick it." + + +Node:kill file, Next:killer app, Previous:kick, Up:= K += + +kill file n. + +[Usenet; very common] (alt. `KILL file') Per-user file(s) used +by some Usenet reading programs +(originally Larry Wall's rn(1)) to discard summarily +(without presenting for reading) articles matching some +particularly uninteresting (or unwanted) patterns of subject, +author, or other header lines. Thus to add a person (or subject) +to one's kill file is to arrange for that person to be ignored by +one's newsreader in future. By extension, it may be used for a +decision to ignore the person or subject in other media. See also +plonk. + + +Node:killer app, Next:killer micro, Previous:kill file, Up:= K = + +killer app + +The application that actually makes a sustaining market for a +promising but under-utilized technology. First used in the +mid-1980s to describe Lotus 1-2-3 once it became evident that +demand for that product had been the major driver of the early +business market for IBM PCs. The term was then restrospectively +applied to VisiCalc, which had played a similar role in the +success of the Apple II. After 1994 it became commonplace to +describe the World Wide Web as the Internet's killer app. One of +the standard questions asked about each new personal-computer +technology as it emerges has become "what's the killer app?" + + +Node:killer micro, Next:killer poke, Previous:killer app, Up:= K = + +killer micro n. + +[popularized by Eugene Brooks] A microprocessor-based machine +that infringes on mini, mainframe, or supercomputer performance +turf. Often heard in "No one will survive the attack of the +killer micros!", the battle cry of the downsizers. Used esp. of +RISC architectures. + +The popularity of the phrase `attack of the killer micros' is +doubtless reinforced by the title of the movie "Attack Of The +Killer Tomatoes" (one of the canonical examples of so-bad-it's-wonderful +among hackers). This has even more flavor now that killer micros have gone on the +offensive not just individually (in workstations) but in hordes +(within massively parallel computers). + +[1996 update: Eugene Brooks was right. Since this term first +entered the Jargon File in 1990, the minicomputer has effectively +vanished, the mainframe sector is +in deep and apparently terminal decline (with IBM but a shadow of +its former self), and even the supercomputer business has +contracted into a smaller niche. It's networked killer micros as +far as the eye can see. --ESR] + + +Node:killer poke, Next:kilo-, Previous:killer micro, Up:= K = + +killer poke n. + +A recipe for inducing hardware damage on a machine via +insertion of invalid values (see poke) +into a memory-mapped control register; used esp. of various +fairly well-known tricks on bitty +boxes without hardware memory management (such as the IBM +PC and Commodore PET) that can overload and trash analog +electronics in the monitor. See also HCF. + + +Node:kilo-, Next:KIPS, Previous:killer poke, Up:= K = + +kilo- pref. + +[SI] See quantifiers. + + +Node:KIPS, Next:KISS Principle, Previous:kilo-, Up:= K = + +KIPS /kips/ n. + +[abbreviation, by analogy with MIPS +using K] Thousands (not 1024s) +of Instructions Per Second. Usage: rare. + + +Node:KISS Principle, Next:kit, Previous:KIPS, Up:= K = + + +KISS Principle /kis' prin'si-pl/ n. + +"Keep It Simple, Stupid". A maxim often invoked when +discussing design to fend off creeping featurism and control +development complexity. Possibly related to the marketroid maxim on sales presentations, +"Keep It Short and Simple". + + +Node:kit, Next:klone, Previous:KISS Principle, Up:= K = + +kit n. + +[Usenet; poss. fr. DEC slang for a +full software distribution, as opposed to a patch or upgrade] A +source software distribution that has been packaged in such a way +that it can (theoretically) be unpacked and installed according +to a series of steps using only standard Unix tools, and entirely +documented by some reasonable chain of references from the +top-level README file. The +more general term distribution +may imply that special tools or more stringent conditions on the +host environment are required. + + +Node:klone, Next:kludge, Previous:kit, Up:= K = + + +klone /klohn/ n. + +See clone, sense 4. + + +Node:kludge, Next:kluge, Previous:klone, Up:= K += + +kludge 1. /klooj/ n. + +Incorrect (though regrettably common) spelling of kluge (US). These two words have been confused +in American usage since the early 1960s, and widely confounded in +Great Britain since the end of World War II. 2. [TMRC] A crock that works. (A long-ago "Datamation" +article by Jackson Granholme similarly said: "An ill-assorted +collection of poorly matching parts, forming a distressing +whole.") 3. v. To use a kludge to get around a problem. "I've +kludged around it for now, but I'll fix it up properly +later." + +This word appears to have derived from Scots `kludge' or +`kludgie' for a common toilet, via British military slang. It +apparently became confused with U.S. kluge during or after World War II; some Britons +from that era use both words in definably different ways, but +kluge is now uncommon in Great +Britain. `Kludge' in Commonwealth hackish differs in meaning from +`kluge' in that it lacks the positive senses; a kludge is +something no Commonwealth hacker wants to be associated too +closely with. Also, `kludge' is more widely known in British +mainstream slang than `kluge' is in the U.S. + + +Node:kluge, Next:kluge around, Previous:kludge, Up:= +K = + +kluge /klooj/ + +[from the German `klug', clever; poss. related to Polish +`klucz' (a key, a hint, a main point)] 1. n. A Rube Goldberg (or +Heath Robinson) device, whether in hardware or software. 2. n. A +clever programming trick intended to solve a particular nasty +case in an expedient, if not clear, manner. Often used to repair +bugs. Often involves ad-hockery +and verges on being a crock. 3. n. +Something that works for the wrong reason. 4. vt. To insert a +kluge into a program. "I've kluged this routine to get around +that weird bug, but there's probably a better way." 5. [WPI] n. A +feature that is implemented in a rude +manner. + +Nowadays this term is often encountered in the variant +spelling `kludge'. Reports from old +farts are consistent that `kluge' was the original +spelling, reported around computers as far back as the mid-1950s +and, at that time, used exclusively of hardware kluges. +In 1947, the "New York Folklore Quarterly" reported a classic +shaggy-dog story `Murgatroyd the Kluge Maker' then current in the +Armed Forces, in which a `kluge' was a complex and puzzling +artifact with a trivial function. Other sources report that +`kluge' was common Navy slang in the WWII era for any piece of +electronics that worked well on shore but consistently failed at +sea. + +However, there is reason to believe this slang use may be a +decade older. Several respondents have connected it to the brand +name of a device called a "Kluge paper feeder", an adjunct to +mechanical printing presses. Legend has it that the Kluge feeder +was designed before small, cheap electric motors and control +electronics; it relied on a fiendishly complex assortment of +cams, belts, and linkages to both power and synchronize all its +operations from one motive driveshaft. It was accordingly +temperamental, subject to frequent breakdowns, and devilishly +difficult to repair -- but oh, so clever! People who tell this +story also aver that `Kluge' was the name of a design +engineer. + +There is in fact a Brandtjen & Kluge Inc., an old family +business that manufactures printing equipment - interestingly, +their name is pronounced /kloo'gee/! Henry Brandtjen, president +of the firm, told me (ESR, 1994) that his company was co-founded +by his father and an engineer named Kluge /kloo'gee/, who built +and co-designed the original Kluge automatic feeder in 1919. Mr. +Brandtjen claims, however, that this was a simple device +(with only four cams); he says he has no idea how the myth of its +complexity took hold. + +TMRC and the MIT hacker culture of +the early '60s seems to have developed in a milieu that +remembered and still used some WWII military slang (see also +foobar). It seems likely that +`kluge' came to MIT via alumni of the many military electronics +projects that had been located in Cambridge (many in MIT's +venerable Building 20, in which TMRC +is also located) during the war. + +The variant `kludge' was apparently popularized by the Datamation article mentioned above; it +was titled "How to Design a Kludge" (February 1962, pp. 30, 31). +This spelling was probably imported from Great Britain, where +kludge has an independent history +(though this fact was largely unknown to hackers on either side +of the Atlantic before a mid-1993 debate in the Usenet group +_alt.folklore.computers_ over the First and Second Edition +versions of this entry; everybody used to think kludge was just a mutation of kluge). It now appears that the British, having +forgotten the etymology of their own `kludge' when `kluge' +crossed the Atlantic, repaid the U.S. by lobbing the `kludge' +orthography in the other direction and confusing their American +cousins' spelling! + +The result of this history is a tangle. Many younger U.S. +hackers pronounce the word as /klooj/ but spell it, incorrectly +for its meaning and pronunciation, as `kludge'. (Phonetically, +consider huge, refuge, centrifuge, and deluge as opposed to +sludge, judge, budge, and fudge. Whatever its failings in other +areas, English spelling is perfectly consistent about this +distinction.) British hackers mostly learned /kluhj/ orally, use +it in a restricted negative sense and are at least consistent. +European hackers have mostly learned the word from written +American sources and tend to pronounce it /kluhj/ but use the +wider American meaning! + +Some observers consider this mess appropriate in view of the +word's meaning. + + +Node:kluge around, Next:kluge up, Previous:kluge, Up:= K = + +kluge around vt. + +To avoid a bug or difficult condition by inserting a kluge. Compare workaround. + + +Node:kluge up, Next:Knights of the Lambda +Calculus, Previous:kluge around, Up:= K = + +kluge up vt. + +To lash together a quick hack to perform a task; this is +milder than cruft together +and has some of the connotations of hack +up (note, however, that the construction `kluge on' +corresponding to hack on is never +used). "I've kluged up this routine to dump the buffer contents +to a safe place." + + +Node:Knights of +the Lambda Calculus, Next:knobs, Previous:kluge up, Up:= K = + +Knights of the Lambda Calculus n. + +A semi-mythical organization of wizardly LISP and Scheme +hackers. The name refers to a mathematical formalism invented by +Alonzo Church, with which LISP is intimately connected. There is +no enrollment list and the criteria for induction are unclear, +but one well-known LISPer has been known to give out buttons and, +in general, the members know who they +are.... + + +Node:knobs, Next:Knuth, Previous:Knights of the Lambda +Calculus, Up:= K = + +knobs pl.n. + +Configurable options, even in software and even those you +can't adjust in real time. Anything you can twiddle is a knob. "Has this PNG viewer got an +alpha knob?" Software may be described as having "knobs and +switches" or occasionally "knobs and lights". + + +Node:Knuth, Next:koan, Previous:knobs, Up:= K += + +Knuth /ka-nooth'/ n. + +[Donald E. Knuth's "The Art of Computer Programming"] +Mythically, the reference that answers all questions about data +structures or algorithms. A safe answer when you do not know: "I +think you can find that in Knuth." Contrast the literature. See also bible. There is a Donald Knuth home page at http://www-cs-faculty.Stanford.EDU/~knuth. + + +Node:koan, Next:kremvax, Previous:Knuth, Up:= K += + +koan /koh'an/ n. + +A Zen teaching riddle. Classically, koans are attractive +paradoxes to be meditated on; their purpose is to help one to +enlightenment by temporarily jamming normal cognitive processing +so that something more interesting can happen (this practice is +associated with Rinzei Zen Buddhism). Hackers are very fond of +the koan form and compose their own koans for humororous and/or +enlightening effect. See Some AI +Koans, has the X +nature, hacker +humor. + + +Node:kremvax, Next:kyrka, Previous:koan, Up:= K = + + +kremvax /krem-vaks/ n. + +[from the then large number of Usenet VAXen with +names of the form _foovax_] Originally, a fictitious Usenet +site at the Kremlin, announced on April 1, 1984 in a posting +ostensibly originated there by Soviet leader Konstantin +Chernenko. The posting was actually forged by Piet Beertema as an +April Fool's joke. Other fictitious sites mentioned in the hoax +were _moskvax_ and kgbvax. This +was probably the funniest of the many April Fool's forgeries +perpetrated on Usenet (which has negligible security against +them), because the notion that Usenet might ever penetrate the +Iron Curtain seemed so totally absurd at the time. + +In fact, it was only six years later that the first genuine +site in Moscow, _demos.su_, joined Usenet. Some readers +needed convincing that the postings from it weren't just another +prank. Vadim Antonov, senior programmer at Demos and the major +poster from there up to mid-1991, was quite aware of all this, +referred to it frequently in his own postings, and at one point +twitted some credulous readers by blandly asserting that he +was a hoax! + +Eventually he even arranged to have the domain's gateway site +named _kremvax_, thus neatly turning fiction into fact and +demonstrating that the hackish sense of humor transcends cultural +barriers. [Mr. Antonov also contributed the Russian-language +material for this lexicon. --ESR] + +In an even more ironic historical footnote, _kremvax_ +became an electronic center of the anti-communist resistance +during the bungled hard-line coup of August 1991. During those +three days the Soviet UUCP network centered on _kremvax_ +became the only trustworthy news source for many places within +the USSR. Though the sysops were concentrating on internal +communications, cross-border postings included immediate +transliterations of Boris Yeltsin's decrees condemning the coup +and eyewitness reports of the demonstrations in Moscow's streets. +In those hours, years of speculation that totalitarianism would +prove unable to maintain its grip on politically-loaded +information in the age of computer networking were proved +devastatingly accurate -- and the original _kremvax_ joke +became a reality as Yeltsin and the new Russian revolutionaries +of `glasnost' and `perestroika' made _kremvax_ one of the +timeliest means of their outreach to the West. + + +Node:kyrka, Next:lace card, Previous:kremvax, Up:= K += + +kyrka /chur'ka/ n. + +[Swedish] See feature +key. + + +Node:= L =, Next:= M =, Previous:= K =, Up:The Jargon Lexicon + += L = + + +lace card: + + +lag: + + +lamer: + + +language lawyer: + + +languages of +choice: + + +LART: + + +larval stage: + + +lase: + + +laser chicken: + + +lasherism: + + +laundromat: + + +LDB: + + +leaf site: + + +leak: + + +leaky heap: + + +leapfrog attack: + + +leech: + + +leech mode: + + +legal: + + +legalese: + + +LER: + + +LERP: + + +let the smoke +out: + + +letterbomb: + + +lexer: + + +lexiphage: + + +life: + + +Life is hard: + + +light pipe: + + +lightweight: + + +like +kicking dead whales down the beach: + + +like +nailing jelly to a tree: + + +line 666: + + +line eater the: + + +line noise: + + +line starve: + + +linearithmic: + + +link farm: + + +link rot: + + +link-dead: + + +lint: + + +Lintel: + + +Linus: + + +Linux: + + +lion food: + + +Lions Book: + + +LISP: + + +list-bomb: + + +lithium lick: + + +little-endian: + + +live: + + +live data: + + +Live Free Or +Die!: + + +livelock: + + +liveware: + + +lobotomy: + + +locals the: + + +locked and loaded: + + +locked up: + + +logic bomb: + + +logical: + + +loop through: + + +loose bytes: + + +lord high fixer: + + +lose: + + +lose lose: + + +loser: + + +losing: + + +loss: + + +lossage: + + +lost in the +noise: + + +lost in the +underflow: + + +lots of MIPS +but no I/O: + + +low-bandwidth: + + +LPT: + + +Lubarsky's Law +of Cybernetic Entomology: + + +Lumber Cartel: + + +lunatic fringe: + + +lurker: + + +luser: + + +Node:lace card, Next:lag, Previous:kyrka, Up:= L += + +lace card n. obs. + +A punched card with all +holes punched (also called a `whoopee card' or `ventilator +card'). Card readers tended to jam when they got to one of these, +as the resulting card had too little structural strength to avoid +buckling inside the mechanism. Card punches could also jam trying +to produce these things owing to power-supply problems. When some +practical joker fed a lace card through the reader, you needed to +clear the jam with a `card knife' -- which you used on the joker +first. + + +Node:lag, Next:lamer, Previous:lace card, Up:= L = + +lag n. + +[MUD, IRC; very common] When used without qualification this +is synomous with netlag. Curiously, +people will often complain "I'm really lagged" when in fact it is +their server or network connection that is lagging. + + +Node:lamer, Next:language lawyer, Previous:lag, Up:= L = + +lamer n. + +[prob. originated in skateboarder slang] 1. Synonym for luser, not used much by hackers but common +among warez d00dz, crackers, +and phreakers. A person who +downloads much, but who never uploads. (Also known as `leecher'). +Oppose elite. Has the same +connotations of self-conscious elitism that use of luser does among hackers. 2. Someone who tries +to crack a BBS. 3. Someone who annoys the sysop or other BBS +users - for instance, by posting lots of silly messages, +uploading virus-ridden software, frequently dropping carrier, +etc. + +Crackers also use it to refer to cracker wannabees. In phreak culture, a lamer is one +who scams codes off others rather than doing cracks or really +understanding the fundamental concepts. In warez d00dz culture, where the ability +to wave around cracked commercial software within days of (or +before) release to the commercial market is much esteemed, the +lamer might try to upload garbage or shareware or something +incredibly old (old in this context is read as a few years to +anything older than 3 days). + +`Lamer' is also much used in the IRC world in a similar sense +to the above. + + +Node:language lawyer, Next:languages of +choice, Previous:lamer, +Up:= L = + +language lawyer n. + +A person, usually an experienced or senior software engineer, +who is intimately familiar with many or most of the numerous +restrictions and features (both useful and esoteric) applicable +to one or more computer programming languages. A language lawyer +is distinguished by the ability to show you the five sentences +scattered through a 200-plus-page manual that together imply the +answer to your question "if only you had thought to look there". +Compare wizard, legal, legalese. + + +Node:languages of choice, +Next:LART, Previous:language lawyer, Up:= L = + +languages of choice n. + +C, C++, +LISP, and Perl. Nearly every hacker knows one of C or LISP, +and most good ones are fluent in both. C++, despite some serious +drawbacks, is generally preferred to other object-oriented +languages (though in 1999 it looks as though Java has displaced it in the affections of +hackers, if not everywhere). Since around 1990 Perl has rapidly +been gaining favor, especially as a tool for +systems-administration utilities and rapid prototyping. Python, Smalltalk and Prolog are also +popular in small but influential communities. + +There is also a rapidly dwindling category of older hackers +with FORTRAN, or even assembler, as their language of choice. +They often prefer to be known as Real Programmers, and other hackers +consider them a bit odd (see "The Story of Mel" in Appendix +A). Assembler is generally no longer considered interesting or +appropriate for anything but HLL +implementation, glue, and a few +time-critical and hardware-specific uses in systems programs. +FORTRAN occupies a shrinking niche in scientific programming. + +Most hackers tend to frown on languages like Pascal and Ada, which +don't give them the near-total freedom considered necessary for +hacking (see bondage-and-discipline +language), and to regard everything even remotely +connected with COBOL or other +traditional card walloper +languages as a total and unmitigated loss. + + +Node:LART, Next:larval stage, Previous:languages of choice, Up:= L = + +LART // + +Luser Attitude Readjustment Tool. 1. n. In the collective +mythos of scary devil +monastery, this is an essential item in the toolkit of +every BOFH. The LART classic is a 2x4 +or other large billet of wood usable as a club, to be applied +upside the head of spammers and other people who cause sysadmins +more grief than just naturally goes with the job. Perennial +debates rage on _alt.sysadmin.recovery_ over what +constitutes the truly effective LART; knobkerries, semiautomatic +weapons, flamethrowers, and tactical nukes all have their +partisans. Compare clue-by-four. 2. v. To use a LART. Some +would add "in malice", but some sysadmins do prefer to gently +lart their users as a first (and sometimes final) warning. 3. +interj. Calling for one's LART, much as a surgeon might call +"Scalpel!". 4. interj. [rare] Used in flames as a rebuke. "LART! LART! LART!" + + +Node:larval stage, Next:lase, Previous:LART, Up:= L = + + +larval stage n. + +Describes a period of monomaniacal concentration on coding +apparently passed through by all fledgling hackers. Common +symptoms include the perpetration of more than one 36-hour hacking run in a given week; +neglect of all other activities including usual basics like food, +sleep, and personal hygiene; and a chronic case of advanced +bleary-eye. Can last from 6 months to 2 years, the apparent +median being around 18 months. A few so afflicted never resume a +more `normal' life, but the ordeal seems to be necessary to +produce really wizardly (as opposed to merely competent) +programmers. See also wannabee. A +less protracted and intense version of larval stage (typically +lasting about a month) may recur when one is learning a new OS or programming language. + + +Node:lase, Next:laser chicken, Previous:larval stage, Up:= L = + +lase /layz/ vt. + +To print a given document via a laser printer. "OK, let's lase +that sucker and see if all those graphics-macro calls did the +right things." + + +Node:laser chicken, Next:lasherism, Previous:lase, Up:= L = + +laser chicken n. + +Kung Pao Chicken, a standard Chinese dish containing chicken, +peanuts, and hot red peppers in a spicy pepper-oil sauce. Many +hackers call it `laser chicken' for two reasons: It can zap you just like a laser, and the sauce has +a red color reminiscent of some laser beams. The dish has also +been called `gunpowder chicken'. + +In a variation on this theme, it is reported that some +Australian hackers have redesignated the common dish `lemon +chicken' as `Chernobyl Chicken'. The name is derived from the +color of the sauce, which is considered bright enough to glow in +the dark (as, mythically, do some of the inhabitants of +Chernobyl). + + +Node:lasherism, Next:laundromat, Previous:laser chicken, Up:= L = + +lasherism n. + +[Harvard] A program that solves a standard problem (such as +the Eight Queens puzzle or implementing the life algorithm) in a deliberately nonstandard +way. Distinguished from a crock or +kluge by the fact that the programmer +did it on purpose as a mental exercise. Such constructions are +quite popular in exercises such as the Obfuscated C Contest, and +occasionally in retrocomputing. Lew Lasher was a +student at Harvard around 1980 who became notorious for such +behavior. + + +Node:laundromat, Next:LDB, Previous:lasherism, Up:= L = + +laundromat n. + +Syn. disk farm; see washing machine. + + +Node:LDB, Next:leaf site, Previous:laundromat, Up:= L = + +LDB /l*'d*b/ vt. + +[from the PDP-10 instruction set] To extract from the middle. +"LDB me a slice of cake, please." This usage has been kept alive +by Common LISP's function of the same name. Considered silly. See +also DPB. + + +Node:leaf site, Next:leak, Previous:LDB, Up:= L = + + +leaf site n.,obs. + +Before pervasive TCP/IP, this term was used of a machine that +merely originated and read Usenet news or mail, and did not relay +any third-party traffic. It was often uttered in a critical tone; +when the ratio of leaf sites to backbone, rib, and other relay +sites got too high, the network tended to develop bottlenecks. +Compare backbone site, +rib site. Now that traffic +patterns depend more on the distribution of routers than of host +machines this term has largely fallen out of use. + + +Node:leak, Next:leaky heap, Previous:leaf site, Up:= L = + +leak n. + +With qualifier, one of a class of resource-management bugs +that occur when resources are not freed properly after operations +on them are finished, so they effectively disappear (leak out). +This leads to eventual exhaustion as new allocation requests come +in. memory leak and fd leak have their own entries; one +might also refer, to, say, a `window handle leak' in a window +system. + + +Node:leaky heap, Next:leapfrog attack, Previous:leak, Up:= L = + +leaky heap n. + +[Cambridge] An arena with a memory leak. + + +Node:leapfrog attack, Next:leech, Previous:leaky heap, Up:= L = + +leapfrog attack n. + +Use of userid and password information obtained illicitly from +one host (e.g., downloading a file of account IDs and passwords, +tapping TELNET, etc.) to compromise another host. Also, the act +of TELNETting through one or more hosts in order to confuse a +trace (a standard cracker procedure). + + +Node:leech, Next:leech mode, Previous:leapfrog attack, Up:= L = + +leech + +1. n. (Also `leecher'.) Among BBS types, crackers and warez d00dz, one who consumes +knowledge without generating new software, cracks, or techniques. +BBS culture specifically defines a leech as someone who downloads +files with few or no uploads in return, and who does not +contribute to the message section. Cracker culture extends this +definition to someone (a lamer, +usually) who constantly presses informed sources for information +and/or assistance, but has nothing to contribute. 2. v. [common, +Toronto area] To instantly fetch a file (other than a mail +attachment) whether by FTP or IRC file req or any other method. +Seems to be a holdover from the early 1990s when Toronto had a +very active BBS and warez scene. + + +Node:leech mode, Next:legal, Previous:leech, Up:= L += + +leech mode n. + +[warez d00dz] "Leech mode" or "leech access" or (simply +"leech" as in "You get leech") is the access mode on a FTP site +where one can download as many files as one wants, without having +to upload. Leech mode is often promised on banner sites, but +rarely obtained. See ratio +site, banner +site. + + +Node:legal, Next:legalese, Previous:leech mode, Up:= L = + +legal adj. + +Loosely used to mean `in accordance with all the relevant +rules', esp. in connection with some set of constraints defined +by software. "The older =+ alternate for += is no longer legal +syntax in ANSI C." "This parser processes each line of legal +input the moment it sees the trailing linefeed." Hackers often +model their work as a sort of game played with the environment in +which the objective is to maneuver through the thicket of +`natural laws' to achieve a desired objective. Their use of +`legal' is flavored as much by this game-playing sense as by the +more conventional one having to do with courts and lawyers. +Compare language lawyer, +legalese. + + +Node:legalese, Next:LER, Previous:legal, Up:= L += + +legalese n. + +Dense, pedantic verbiage in a language description, product +specification, or interface standard; text that seems designed to +obfuscate and requires a language +lawyer to parse it. Though +hackers are not afraid of high information density and complexity +in language (indeed, they rather enjoy both), they share a deep +and abiding loathing for legalese; they associate it with +deception, suits, and situations in +which hackers generally get the short end of the stick. + + +Node:LER, Next:LERP, Previous:legalese, Up:= +L = + +LER /L-E-R/ + +n. 1. [TMRC, from `Light-Emitting Diode'] A light-emitting +resistor (that is, one in the process of burning up). Ohm's law +was broken. See also SED. 2. An +incandescent light bulb (the filament emits light because it's +resistively heated). + + +Node:LERP, Next:let the smoke out, Previous:LER, Up:= L = + +LERP /lerp/ vi.,n. + +Quasi-acronym for Linear Interpolation, used as a verb or noun +for the operation. "Bresenham's algorithm lerps incrementally +between the two endpoints of the line." + + +Node:let the smoke out, +Next:letterbomb, Previous:LERP, Up:= L = + +let the smoke out v. + +To fry hardware (see fried). See +magic smoke for a discussion +of the underlying mythology. + + +Node:letterbomb, Next:lexer, Previous:let the smoke out, Up:= L = + +letterbomb + +1. n. A piece of email containing +live data intended to do +nefarious things to the recipient's machine or terminal. It used +to be possible, for example, to send letterbombs that would lock +up some specific kinds of terminals when they are viewed, so +thoroughly that the user must cycle power (see cycle, sense 3) to unwedge them. Under Unix, a +letterbomb can also try to get part of its contents interpreted +as a shell command to the mailer. The results of this could range +from silly to tragic; fortunately it has been some years since +any of the standard Unix/Internet mail software was vulnerable to +such an attack (though, as the Melissa virus attack demonstrated +in early 1999, Microsoft systems can have serious problems). See +also Trojan horse; compare +nastygram. 2. Loosely, a mailbomb. + + +Node:lexer, Next:lexiphage, Previous:letterbomb, Up:= L = + +lexer /lek'sr/ n. + +Common hacker shorthand for `lexical analyzer', the +input-tokenizing stage in the parser for a language (the part +that breaks it into word-like pieces). "Some C lexers get +confused by the old-style compound ops like =-." + + +Node:lexiphage, Next:life, Previous:lexer, Up:= L += + +lexiphage /lek'si-fayj`/ n. + +A notorious word chomper on ITS. +See bagbiter. This program would +draw on a selected victim's bitmapped terminal the words "THE +BAG" in ornate letters, followed a pair of jaws biting pieces of +it off. + + +Node:life, Next:Life is hard, Previous:lexiphage, Up:= L = + +life n. + +1. A cellular-automata game invented by John Horton Conway and +first introduced publicly by Martin Gardner ("Scientific +American", October 1970); the game's popularity had to wait a few +years for computers on which it could reasonably be played, as +it's no fun to simulate the cells by hand. Many hackers pass +through a stage of fascination with it, and hackers at various +places contributed heavily to the mathematical analysis of this +game (most notably Bill Gosper at MIT, who even implemented life +in TECO!; see Gosperism). When a hacker mentions `life', +he is much more likely to mean this game than the magazine, the +breakfast cereal, or the human state of existence. 2. The +opposite of Usenet. As in "Get a life!" + + +Node:Life is hard, Next:light pipe, Previous:life, Up:= L = + +Life is hard prov. + +[XEROX PARC] This phrase has two possible interpretations: (1) +"While your suggestion may have some merit, I will behave as +though I hadn't heard it." (2) "While your suggestion has obvious +merit, equally obvious circumstances prevent it from being +seriously considered." The charm of the phrase lies precisely in +this subtle but important ambiguity. + + +Node:light pipe, Next:lightweight, Previous:Life is hard, Up:= L = + +light pipe n. + +Fiber optic cable. Oppose copper. + + +Node:lightweight, Next:like +kicking dead whales down the beach, Previous:light pipe, Up:= L = + +lightweight adj. + +Opposite of heavyweight; +usually found in combining forms such as `lightweight +process'. + + +Node:like +kicking dead whales down the beach, Next:like nailing jelly to a +tree, Previous:lightweight, Up:= L = + +like kicking dead whales down the beach adj. + +Describes a slow, difficult, and disgusting process. First +popularized by a famous quote about the difficulty of getting +work done under one of IBM's mainframe OSes. "Well, you +could write a C compiler in COBOL, but it would be like +kicking dead whales down the beach." See also fear and loathing. + + +Node:like +nailing jelly to a tree, Next:line 666, Previous:like +kicking dead whales down the beach, Up:= L = + +like nailing jelly to a tree adj. + +Used to describe a task thought to be impossible, esp. one in +which the difficulty arises from poor specification or inherent +slipperiness in the problem domain. "Trying to display the +`prettiest' arrangement of nodes and arcs that diagrams a given +graph is like nailing jelly to a tree, because nobody's sure what +`prettiest' means algorithmically." + +Hacker use of this term may recall mainstream slang originated +early in the 20th century by President Theodore Roosevelt. There +is a legend that, weary of inconclusive talks with Colombia over +the right to dig a canal through its then-province Panama, he +remarked, "Negotiating with those pirates is like trying to nail +currant jelly to the wall." Roosevelt's government subsequently +encouraged the anti-Colombian insurgency that created the nation +of Panama. + + +Node:line 666, Next:line eater the, Previous:like +nailing jelly to a tree, Up:= L = + +line 666 [from Christian eschatological myth] n. + +The notional line of source at which a program fails for +obscure reasons, implying either that somebody is out to +get it (when you are the programmer), or that it richly deserves +to be so gotten (when you are not). "It works when I trace +through it, but seems to crash on line 666 when I run it." "What +happens is that whenever a large batch comes through, mmdf dies +on the Line of the Beast. Probably some twit hardcoded a buffer +size." + + +Node:line eater the, Next:line noise, Previous:line 666, Up:= L = + +line eater, the n. obs. + +[Usenet] 1. A bug in some now-obsolete versions of the netnews +software that used to eat up to BUFSIZ bytes of the article text. +The bug was triggered by having the text of the article start +with a space or tab. This bug was quickly personified as a +mythical creature called the `line eater', and postings often +included a dummy line of `line eater food'. Ironically, line +eater `food' not beginning with a space or tab wasn't actually +eaten, since the bug was avoided; but if there was a +space or tab before it, then the line eater would eat the food +and the beginning of the text it was supposed to be +protecting. The practice of `sacrificing to the line eater' +continued for some time after the bug had been nailed to the wall, and is +still humorously referred to. The bug itself was still +occasionally reported to be lurking in some mail-to-netnews +gateways as late as 1991. 2. See NSA line eater. + + +Node:line noise, Next:line starve, Previous:line eater the, Up:= L = + +line noise n. + +1. [techspeak] Spurious characters due to electrical noise in +a communications link, especially an RS-232 serial connection. +Line noise may be induced by poor connections, interference or +crosstalk from other circuits, electrical storms, cosmic rays, or (notionally) birds +crapping on the phone wires. 2. Any chunk of data in a file or +elsewhere that looks like the results of line noise in sense 1. +3. Text that is theoretically a readable text or program source +but employs syntax so bizarre that it looks like line noise in +senses 1 or 2. Yes, there are languages this ugly. The canonical +example is TECO; it is often claimed +that "TECO's input syntax is indistinguishable from line noise." +Other non-WYSIWYG editors, such as +Multics qed and Unix ed, in the hands +of a real hacker, also qualify easily, as do deliberately +obfuscated languages such as INTERCAL. + + +Node:line starve, Next:linearithmic, Previous:line noise, Up:= L = + +line starve + +[MIT] 1. vi. To feed paper through a printer the wrong way by +one line (most printers can't do this). On a display terminal, to +move the cursor up to the previous line of the screen. "To print +`X squared', you just output `X', line starve, `2', line feed." +(The line starve causes the `2' to appear on the line above the +`X', and the line feed gets back to the original line.) 2. n. A +character (or character sequence) that causes a terminal to +perform this action. ASCII 0011010, also called SUB or control-Z, +was one common line-starve character in the days before +microcomputers and the X3.64 terminal standard. Today, the term +might be used for the ISO reverse line feed character 0x8D. +Unlike `line feed', `line starve' is not standard ASCII terminology. Even among hackers it is +considered a bit silly. 3. [proposed] A sequence such as \c (used +in System V echo, as well as nroff +and troff) that suppresses a newline or other character(s) that would +normally be emitted. + + +Node:linearithmic, Next:link farm, Previous:line starve, Up:= L = + +linearithmic adj. + +Of an algorithm, having running time that is O(N log N). +Coined as a portmanteau of `linear' and `logarithmic' in +"Algorithms In C" by Robert Sedgewick (Addison-Wesley 1990, ISBN +0-201-51425-7). + + +Node:link farm, Next:link rot, Previous:linearithmic, Up:= L = + +link farm n. + +[Unix] A directory tree that contains many links to files in a +master directory tree of files. Link farms save space when one is +maintaining several nearly identical copies of the same source +tree -- for example, when the only difference is +architecture-dependent object files. "Let's freeze the source and +then rebuild the FROBOZZ-3 and FROBOZZ-4 link farms." Link farms +may also be used to get around restrictions on the number of +-I (include-file directory) arguments on older C +preprocessors. However, they can also get completely out of hand, +becoming the filesystem equivalent of spaghetti code. + + +Node:link rot, Next:link-dead, Previous:link farm, Up:= L = + +link rot n. + +The natural decay of web links as the sites they're connected +to change or die. Compare bit +rot. + + +Node:link-dead, Next:lint, Previous:link rot, Up:= L = + +link-dead adj. + +[MUD] The state a player is in when they kill their connection +to a MUD without leaving it properly. +The player is then commonly left as a statue in the game, and is +only removed after a certain period of time (an hour on most +MUDs). Used on IRC as well, although it +is inappropriate in that context. Compare netdead. + + +Node:lint, Next:Lintel, Previous:link-dead, Up:= L = + +lint + +[from Unix's lint(1), named for the bits of fluff +it supposedly picks from programs] 1. vt. To examine a program +closely for style, language usage, and portability problems, esp. +if in C, esp. if via use of automated analysis tools, most esp. +if the Unix utility lint(1) is used. This term used +to be restricted to use of lint(1) itself, but +(judging by references on Usenet) it has become a shorthand for +desk check at some non-Unix +shops, even in languages other than C. Also as v. delint. 2. n. Excess verbiage in a document, as +in "This draft has too much lint". + + +Node:Lintel, Next:Linus, Previous:lint, Up:= L = + + +Lintel n. + +The emerging Linux/Intel alliance. +This term began to be used in early 1999 after it became clear +that the Wintel alliance was under +increasing strain and Intel started taking stakes in Linux +companies. + + +Node:Linus, Next:Linux, Previous:Lintel, Up:= L += + +Linus /leen'us'/ or /lin'us'/, not /li:'nus/ + +Linus Torvalds, the author of Linux. Nobody in the hacker culture has been as +readily recognized by first name alone since Ken (Thompson). + + +Node:Linux, Next:lion food, Previous:Linus, Up:= L += + +Linux /lee'nuhks/ or /li'nuks/, not +/li:'nuhks/ n. + +The free Unix workalike created by Linus Torvalds and friends +starting about 1991. The pronunciation /lee'nuhks/ is preferred +because the name `Linus' has an /ee/ sound in Swedish (Linus's +family is part of Finland's 6% ethnic-Swedish minority). This may +be the most remarkable hacker project in history -- an entire +clone of Unix for 386, 486 and Pentium micros, distributed for +free with sources over the net (ports to Alpha and Sparc and many +other machines are also in use). + +Linux is what GNU aimed to be, and +it relies on the GNU toolset. But the Free Software Foundation +didn't produce the kernel to go with that toolset until 1999, +which was too late. Other, similar efforts like FreeBSD and +NetBSD have been technically successful but never caught fire the +way Linux has; as this is written in 2000, Linux is seriously +challenging Microsoft's OS dominance. It has already captured 31% +of the Internet-server market and 25% of general business +servers. + +An earlier version of this entry opined "The secret of Linux's +success seems to be that Linus worked much harder early on to +keep the development process open and recruit other hackers, +creating a snowball effect." Truer than we knew. See bazaar. + +(Some people object that the name `Linux' should be used to +refer only to the kernel, not the entire operating system. This +claim is a proxy for an underlying territorial dispute; people +who insist on the term `GNU/Linux' want the the FSF to get most of the credit for Linux because +RMS and friends wrote many of its user-level tools. Neither this +theory nor the term `GNU/Linux' has gained more than minority +acceptance). + + +Node:lion food, Next:Lions Book, Previous:Linux, Up:= L += + +lion food n. + +[IBM] Middle management or HQ staff (or, by extension, +administrative drones in general). From an old joke about two +lions who, escaping from the zoo, split up to increase their +chances but agree to meet after 2 months. When they finally meet, +one is skinny and the other overweight. The thin one says: "How +did you manage? I ate a human just once and they turned out a +small army to chase me -- guns, nets, it was terrible. Since then +I've been reduced to eating mice, insects, even grass." The fat +one replies: "Well, I hid near an IBM office and ate a +manager a day. And nobody even noticed!" + + +Node:Lions Book, Next:LISP, Previous:lion food, Up:= L = + +Lions Book n. + +"Source Code and Commentary on Unix level 6", by John Lions. +The two parts of this book contained (1) the entire source +listing of the Unix Version 6 kernel, and (2) a commentary on the +source discussing the algorithms. These were circulated +internally at the University of New South Wales beginning +1976-77, and were, for years after, the only detailed +kernel documentation available to anyone outside Bell Labs. +Because Western Electric wished to maintain trade secret status +on the kernel, the Lions Book was only supposed to be distributed +to affiliates of source licensees. In spite of this, it soon +spread by samizdat to a good many +of the early Unix hackers. + +[1996 update: The Lions book lives again! It was put back in +print as ISBN 1-57398-013-7 from Peer-To-Peer Communications, +with forewords by Dennis Ritchie and Ken Thompson. In a neat bit +of reflexivity, the page before the contents quotes this +entry.] + + +Node:LISP, Next:list-bomb, Previous:Lions Book, Up:= L = + +LISP n. + +[from `LISt Processing language', but mythically from `Lots of +Irritating Superfluous Parentheses'] AI's mother tongue, a +language based on the ideas of (a) variable-length lists and +trees as fundamental data types, and (b) the interpretation of +code as data and vice-versa. Invented by John McCarthy at MIT in +the late 1950s, it is actually older than any other HLL still in use except FORTRAN. Accordingly, it +has undergone considerable adaptive radiation over the years; +modern variants are quite different in detail from the original +LISP 1.5. The dominant HLL among hackers until the early 1980s, +LISP now shares the throne with C. Its +partisans claim it is the only language that is truly beautiful. +See languages of +choice. + +All LISP functions and programs are expressions that return +values; this, together with the high memory utilization of LISPs, +gave rise to Alan Perlis's famous quip (itself a take on an Oscar +Wilde quote) that "LISP programmers know the value of everything +and the cost of nothing". + +One significant application for LISP has been as a proof by +example that most newer languages, such as COBOL and Ada, are +full of unnecessary crocks. When the +Right Thing has already been +done once, there is no justification for bogosity in newer languages. + + +Node:list-bomb, Next:lithium lick, Previous:LISP, Up:= L += + +list-bomb v. + +To mailbomb someone by forging +messages causing the victim to become a subscriber to many +mailing lists. This is a self-defeating tactic; it merely forces +mailing list servers to require confirmation by return message +for every subscription. + + +Node:lithium lick, Next:little-endian, Previous:list-bomb, Up:= L = + +lithium lick n. + +[NeXT] Steve Jobs. Employees who have gotten too much +attention from their esteemed founder are said to have `lithium +lick' when they begin to show signs of Jobsian fervor and repeat +the most recent catch phrases in normal conversation -- for +example, "It just works, right out of the box!" + + +Node:little-endian, Next:live, Previous:lithium lick, Up:= L = + +little-endian adj. + +Describes a computer architecture in which, within a given 16- +or 32-bit word, bytes at lower addresses have lower significance +(the word is stored `little-end-first'). The PDP-11 and VAX +families of computers and Intel microprocessors and a lot of +communications and networking hardware are little-endian. See +big-endian, middle-endian, NUXI problem. The term is sometimes +used to describe the ordering of units other than bytes; most +often, bits within a byte. + + +Node:live, Next:live data, Previous:little-endian, Up:= L = + +live /li:v/ adj.,adv. + +[common] Opposite of `test'. Refers to actual real-world data +or a program working with it. For example, the response to "I +think the record deleter is finished" might be "Is it live yet?" +or "Have you tried it out on live data?" This usage usually +carries the connotation that live data is more fragile and must +not be corrupted, or bad things will happen. So a more +appropriate response might be: "Well, make sure it works +perfectly before we throw live data at it." The implication here +is that record deletion is something pretty significant, and a +haywire record-deleter running amok live would probably cause +great harm. + + +Node:live data, Next:Live Free Or Die!, +Previous:live, Up:= L = + +live data n. + +1. Data that is written to be interpreted and takes over +program flow when triggered by some un-obvious operation, such as +viewing it. One use of such hacks is to break security. For +example, some smart terminals have commands that allow one to +download strings to program keys; this can be used to write live +data that, when listed to the terminal, infects it with a +security-breaking virus that is +triggered the next time a hapless user strikes that key. For +another, there are some well-known bugs in vi that allow certain texts to send arbitrary +commands back to the machine when they are simply viewed. 2. In C +code, data that includes pointers to function hooks (executable code). 3. An object, such as a +trampoline, that is constructed +on the fly by a program and intended to be executed as code. + + +Node:Live Free Or Die!, +Next:livelock, Previous:live data, Up:= L = + +Live Free Or Die! imp. + +1. The state motto of New Hampshire, which appears on that +state's automobile license plates. 2. A slogan associated with +Unix in the romantic days when Unix aficionados saw themselves as +a tiny, beleaguered underground tilting against the windmills of +industry. The "free" referred specifically to freedom from the +fascist design philosophies and +crufty misfeatures common on competing operating systems. Armando +Stettner, one of the early Unix developers, used to give out fake +license plates bearing this motto under a large Unix, all in New +Hampshire colors of green and white. These are now valued +collector's items. In 1994 DEC put an +inferior imitation of these in circulation with a red corporate +logo added. Compaq (half of which was once DEC) has continued the +practice. + + +Node:livelock, Next:liveware, Previous:Live Free Or Die!, Up:= L = + +livelock /li:v'lok/ n. + +A situation in which some critical stage of a task is unable +to finish because its clients perpetually create more work for it +to do after they have been serviced but before it can clear its +queue. Differs from deadlock in +that the process is not blocked or waiting for anything, but has +a virtually infinite amount of work to do and can never catch +up. + + +Node:liveware, Next:lobotomy, Previous:livelock, Up:= +L = + +liveware /li:v'weir/ n. + +1. Synonym for wetware. Less +common. 2. [Cambridge] Vermin. "Waiter, there's some liveware in +my salad..." + + +Node:lobotomy, Next:locals the, Previous:liveware, Up:= +L = + +lobotomy n. + +1. What a hacker subjected to formal management training is +said to have undergone. At IBM and elsewhere this term is used by +both hackers and low-level management; the latter doubtless +intend it as a joke. 2. The act of removing the processor from a +microcomputer in order to replace or upgrade it. Some very cheap +clone systems are sold in +`lobotomized' form -- everything but the brain. + + +Node:locals the, Next:locked and loaded, Previous:lobotomy, Up:= L = + +locals, the pl.n. + +The users on one's local network (as opposed, say, to people +one reaches via public Internet or UUCP connects). The marked +thing about this usage is how little it has to do with real-space +distance. "I have to do some tweaking on this mail utility before +releasing it to the locals." + + +Node:locked and loaded, +Next:locked up, Previous:locals the, Up:= L = + +locked and loaded adj.,obs. + +[from military slang for an M-16 rifle with magazine inserted +and prepared for firing] Said of a removable disk volume properly +prepared for use -- that is, locked into the drive and with the +heads loaded. Ironically, because their heads are `loaded' +whenever the power is up, this description is never used of Winchester drives (which are named +after a rifle). + + +Node:locked up, Next:logic bomb, Previous:locked and loaded, Up:= L = + +locked up adj. + +Syn. for hung, wedged. + + +Node:logic bomb, Next:logical, Previous:locked up, Up:= L = + +logic bomb n. + +Code surreptitiously inserted into an application or OS that +causes it to perform some destructive or security-compromising +activity whenever specified conditions are met. Compare back door. + + +Node:logical, Next:loop through, Previous:logic bomb, Up:= L = + +logical adj. + +[from the technical term `logical device', wherein a physical +device is referred to by an arbitrary `logical' name] Having the +role of. If a person (say, Les Earnest at SAIL) who had long held +a certain post left and were replaced, the replacement would for +a while be known as the `logical' Les Earnest. (This does not +imply any judgment on the replacement.) Compare virtual. + +At Stanford, `logical' compass directions denote a coordinate +system in which `logical north' is toward San Francisco, `logical +west' is toward the ocean, etc., even though logical north varies +between physical (true) north near San Francisco and physical +west near San Jose. (The best rule of thumb here is that, by +definition, El Camino Real always runs logical north-and-south.) +In giving directions, one might say: "To get to Rincon Tarasco +restaurant, get onto El Camino +Bignum going logical north." Using the word `logical' +helps to prevent the recipient from worrying about that the fact +that the sun is setting almost directly in front of him. The +concept is reinforced by North American highways which are +almost, but not quite, consistently labeled with logical rather +than physical directions. A similar situation exists at MIT: +Route 128 (famous for the electronics industry that has grown up +along it) is a 3-quarters circle surrounding Boston at a radius +of 10 miles, terminating near the coastline at each end. It would +be most precise to describe the two directions along this highway +as `clockwise' and `counterclockwise', but the road signs all say +"north" and "south", respectively. A hacker might describe these +directions as `logical north' and `logical south', to indicate +that they are conventional directions not corresponding to the +usual denotation for those words. (If you went logical south +along the entire length of route 128, you would start out going +northwest, curve around to the south, and finish headed due east, +passing along one infamous stretch of pavement that is +simultaneously route 128 south and Interstate 93 north, and is +signed as such!) + + +Node:loop through, Next:loose bytes, Previous:logical, Up:= L = + +loop through vt. + +To process each element of a list of things. "Hold on, I've +got to loop through my paper mail." Derives from the +computer-language notion of an iterative loop; compare `cdr down' +(under cdr), which is less common among +C and Unix programmers. ITS hackers used to say `IRP over' after +an obscure pseudo-op in the MIDAS PDP-10 assembler (the same IRP +op can nowadays be found in Microsoft's assembler). + + +Node:loose bytes, Next:lord high fixer, Previous:loop through, Up:= L = + +loose bytes n. + +Commonwealth hackish term for the padding bytes or shims many compilers insert between members of a +record or structure to cope with alignment requirements imposed +by the machine architecture. + + +Node:lord high fixer, Next:lose, Previous:loose bytes, Up:= L = + +lord high fixer n. + +[primarily British, from Gilbert & Sullivan's `lord high +executioner'] The person in an organization who knows the most +about some aspect of a system. See wizard. + + +Node:lose, Next:lose lose, Previous:lord high fixer, Up:= L = + +lose vi. + +1. [very common] To fail. A program loses when it encounters +an exceptional condition or fails to work in the expected manner. +2. To be exceptionally unesthetic or crocky. 3. Of people, to be +obnoxious or unusually stupid (as opposed to ignorant). See also +deserves to lose. 4. +n. Refers to something that is losing, especially in the phrases "That's a +lose!" and "What a lose!" + + +Node:lose lose, Next:loser, Previous:lose, Up:= L = + + +lose lose interj. + +A reply to or comment on an undesirable situation. "I +accidentally deleted all my files!" "Lose, lose." + + +Node:loser, Next:losing, Previous:lose lose, Up:= L = + +loser n. + +An unexpectedly bad situation, program, programmer, or person. +Someone who habitually loses. (Even winners can lose +occasionally.) Someone who knows not and knows not that he knows +not. Emphatic forms are `real loser', `total loser', and +`complete loser' (but not **`moby loser', which would be a +contradiction in terms). See luser. + + +Node:losing, Next:loss, Previous:loser, Up:= L += + +losing adj. + +Said of anything that is or causes a lose or lossage. +"The compiler is losing badly when I try to use templates." + + +Node:loss, Next:lossage, Previous:losing, Up:= L += + +loss n. + +Something (not a person) that loses; a situation in which +something is losing. Emphatic forms include `moby loss', and +`total loss', `complete loss'. Common interjections are "What a +loss!" and "What a moby loss!" Note that `moby loss' is OK even +though **`moby loser' is not used; applied to an abstract noun, +moby is simply a magnifier, whereas when applied to a person it +implies substance and has positive connotations. Compare lossage. + + +Node:lossage, Next:lost in the noise, Previous:loss, Up:= L = + +lossage /los'*j/ n. + +[very common] The result of a bug or malfunction. This is a +mass or collective noun. "What a loss!" and "What lossage!" are +nearly synonymous. The former is slightly more particular to the +speaker's present circumstances; the latter implies a continuing +lose of which the speaker is currently +a victim. Thus (for example) a temporary hardware failure is a +loss, but bugs in an important tool (like a compiler) are serious +lossage. + + +Node:lost in the noise, +Next:lost in +the underflow, Previous:lossage, Up:= L += + +lost in the noise adj. + +Syn. lost in the +underflow. This term is from signal processing, where +signals of very small amplitude cannot be separated from +low-intensity noise in the system. Though popular among hackers, +it is not confined to hackerdom; physicists, engineers, +astronomers, and statisticians all use it. + + +Node:lost in the +underflow, Next:lots of MIPS but no +I/O, Previous:lost in the noise, Up:= L = + +lost in the underflow adj. + +Too small to be worth considering; more specifically, small +beyond the limits of accuracy or measurement. This is a reference +to `floating underflow', a condition that can occur when a +floating-point arithmetic processor tries to handle quantities +smaller than its limit of magnitude. It is also a pun on +`undertow' (a kind of fast, cold current that sometimes runs just +offshore and can be dangerous to swimmers). "Well, sure, photon +pressure from the stadium lights alters the path of a thrown +baseball, but that effect gets lost in the underflow." Compare +epsilon, epsilon squared; see also overflow bit. + + +Node:lots of MIPS +but no I/O, Next:low-bandwidth, Previous:lost in the underflow, +Up:= L = + +lots of MIPS but no I/O adj. + +Used to describe a person who is technically brilliant but +can't seem to communicate with human beings effectively. +Technically it describes a machine that has lots of processing +power but is bottlenecked on input-output (in 1991, the IBM Rios, +a.k.a. RS/6000, was a notorious example). + + +Node:low-bandwidth, Next:LPT, Previous:lots of MIPS but no +I/O, Up:= L = + +low-bandwidth adj. + +[from communication theory] Used to indicate a talk that, +although not content-free, was +not terribly informative. "That was a low-bandwidth talk, but +what can you expect for an audience of suits!" Compare zero-content, bandwidth, math-out. + + +Node:LPT, Next:Lubarsky's Law +of Cybernetic Entomology, Previous:low-bandwidth, Up:= L = + +LPT /L-P-T/ or /lip'it/ or /lip-it'/ n. + +1. Line printer (originally Line Printing Terminal). Rare +under Unix, more common among hackers who grew up with ITS, +MS-DOS, CP/M and other operating systems that were strongly +influenced by early DEC conventions. 2. +Local PorT. Used among MS-DOS programmers (and so expanded in the +MS-DOS 5 manual). It seems likely this is a backronym. + + +Node:Lubarsky's Law +of Cybernetic Entomology, Next:Lumber Cartel, Previous:LPT, Up:= L += + +Lubarsky's Law of Cybernetic Entomology prov. + +"There is always one more bug." + + +Node:Lumber Cartel, Next:lunatic fringe, Previous:Lubarsky's Law +of Cybernetic Entomology, Up:= L = + +Lumber Cartel n. + +A mythical conspiracy accused by spam-spewers of funding anti-spam activism in +order to force the direct-mail promotions industry back onto +paper. Hackers, predictably, responded by forming a "Lumber +Cartel" spoofing this paranoid theory; the web page is http://come.to/the.lumber.cartel. +Members often include the tag TINLC ("There Is No Lumber Cartel") +in their postings; see TINC, backbone cabal and NANA for explanation. + + +Node:lunatic fringe, Next:lurker, Previous:Lumber Cartel, Up:= L = + +lunatic fringe n. + +[IBM] Customers who can be relied upon to accept release 1 +versions of software. Compare heatseeker. + + +Node:lurker, Next:luser, Previous:lunatic fringe, Up:= L = + +lurker n. + +One of the `silent majority' in a electronic forum; one who +posts occasionally or not at all but is known to read the group's +postings regularly. This term is not pejorative and indeed is +casually used reflexively: "Oh, I'm just lurking." Often used in +`the lurkers', the hypothetical audience for the group's flamage-emitting regulars. When a lurker +speaks up for the first time, this is called `delurking'. + +The creator of the popular science-fiction TV series "Babylon +5" has ties to SF fandom and the hacker culture. In that series, +the use of the term `lurker' for a homeless or displaced person +is a conscious reference to the jargon term. + + +Node:luser, Next:M, Previous:lurker, +Up:= L = + +luser /loo'zr/ n. + +[common] A user; esp. one who is +also a loser. (luser and loser are +pronounced identically.) This word was coined around 1975 at MIT. +Under ITS, when you first walked up to a terminal at MIT and +typed Control-Z to get the computer's attention, it printed out +some status information, including how many people were already +using the computer; it might print "14 users", for example. +Someone thought it would be a great joke to patch the system to +print "14 losers" instead. There ensued a great controversy, as +some of the users didn't particularly want to be called losers to +their faces every time they used the computer. For a while +several hackers struggled covertly, each changing the message +behind the back of the others; any time you logged into the +computer it was even money whether it would say "users" or +"losers". Finally, someone tried the compromise "lusers", and it +stuck. Later one of the ITS machines supported luser +as a request-for-help command. ITS died the death in mid-1990, +except as a museum piece; the usage lives on, however, and the +term `luser' is often seen in program comments and on Usenet. +Compare mundane, muggle. + + +Node:= M =, Next:= N =, Previous:= L =, Up:The Jargon Lexicon + += M = + + +M: + + +M$: + + +macdink: + + +machinable: + + +machoflops: + + +Macintoy: + + +Macintrash: + + +macro: + + +macro-: + + +macrology: + + +macrotape: + + +maggotbox: + + +magic: + + +magic cookie: + + +magic number: + + +magic smoke: + + +mail storm: + + +mailbomb: + + +mailing list: + + +main loop: + + +mainframe: + + +management: + + +mandelbug: + + +manged: + + +mangle: + + +mangled name: + + +mangler: + + +manularity: + + +marbles: + + +marginal: + + +Marginal Hacks: + + +marginally: + + +marketroid: + + +Mars: + + +martian: + + +massage: + + +math-out: + + +Matrix: + + +maximum Maytag +mode: + + +meatspace: + + +meatware: + + +meeces: + + +meg: + + +mega-: + + +megapenny: + + +MEGO: + + +meltdown network: + + +meme: + + +meme plague: + + +memetics: + + +memory farts: + + +memory leak: + + +memory smash: + + +menuitis: + + +mess-dos: + + +meta: + + +meta bit: + + +metasyntactic +variable: + + +MFTL: + + +mickey: + + +mickey mouse +program: + + +micro-: + + +MicroDroid: + + +microfloppies: + + +microfortnight: + + +microLenat: + + +microReid: + + +microserf: + + +Microsloth Windows: + + +Microsoft: + + +micros~1: + + +middle-endian: + + +middle-out +implementation: + + +milliLampson: + + +minifloppies: + + +MIPS: + + +misbug: + + +misfeature: + + +Missed'em-five: + + +missile address: + + +miswart: + + +MMF: + + +mobo: + + +moby: + + +mockingbird: + + +mod: + + +mode: + + +mode bit: + + +modulo: + + +molly-guard: + + +Mongolian Hordes +technique: + + +monkey up: + + +monkey scratch: + + +monstrosity: + + +monty: + + +Moof: + + +Moore's Law: + + +moose call: + + +moria: + + +MOTAS: + + +MOTOS: + + +MOTSS: + + +mouse ahead: + + +mouse around: + + +mouse belt: + + +mouse droppings: + + +mouse elbow: + + +mouso: + + +MS-DOS: + + +mu: + + +MUD: + + +muddie: + + +mudhead: + + +muggle: + + +multician: + + +Multics: + + +multitask: + + +mumblage: + + +mumble: + + +munch: + + +munching: + + +munching squares: + + +munchkin: + + +mundane: + + +mung: + + +munge: + + +Murphy's Law: + + +music: + + +mutter: + + +Node:M, Next:M$, +Previous:luser, Up:= M = + +M pref. (on units) suff. (on numbers) + +[SI] See quantifiers. + + +Node:M$, Next:macdink, Previous:M, Up:= M = + +M$ + +Common net abbreviation for Microsoft, everybody's least +favorite monopoly. + + +Node:macdink, Next:machinable, Previous:M$, Up:= M = + +macdink /mak'dink/ vt. + +[from the Apple Macintosh, which is said to encourage such +behavior] To make many incremental and unnecessary cosmetic +changes to a program or file. Often the subject of the macdinking +would be better off without them. "When I left at 11 +P.M. last night, he was still macdinking the +slides for his presentation." See also fritterware, window shopping. + + +Node:machinable, Next:machoflops, Previous:macdink, Up:= M = + +machinable adj. + +Machine-readable. Having the softcopy nature. + + +Node:machoflops, Next:Macintoy, Previous:machinable, Up:= M = + +machoflops /mach'oh-flops/ n. + +[pun on `megaflops', a coinage for `millions of FLoating-point +Operations Per Second'] Refers to artificially inflated +performance figures often quoted by computer manufacturers. Real +applications are lucky to get half the quoted speed. See Your mileage may +vary, benchmark. + + +Node:Macintoy, Next:Macintrash, Previous:machoflops, Up:= M = + +Macintoy /mak'in-toy/ n. + +The Apple Macintosh, considered as a toy. Less pejorative than Macintrash. + + +Node:Macintrash, Next:macro, Previous:Macintoy, Up:= +M = + +Macintrash /mak'in-trash`/ n. + +The Apple Macintosh, as described by a hacker who doesn't +appreciate being kept away from the real computer by the +interface. The term maggotbox has +been reported in regular use in the Research Triangle area of +North Carolina. Compare Macintoy. +See also beige toaster, +WIMP environment, point-and-drool +interface, drool-proof +paper, user-friendly. + + +Node:macro, Next:macro-, Previous:Macintrash, Up:= M = + +macro /mak'roh/ n. + +[techspeak] A name (possibly followed by a formal arg list) that is equated to a text or symbolic +expression to which it is to be expanded (possibly with the +substitution of actual arguments) by a macro expander. This +definition can be found in any technical dictionary; what those +won't tell you is how the hackish connotations of the term have +changed over time. + +The term `macro' originated in early assemblers, which +encouraged the use of macros as a structuring and +information-hiding device. During the early 1970s, macro +assemblers became ubiquitous, and sometimes quite as powerful and +expensive as HLLs, only to fall from +favor as improving compiler technology marginalized assembler +programming (see languages +of choice). Nowadays the term is most often used in +connection with the C preprocessor, LISP, or one of several +special-purpose languages built around a macro-expansion facility +(such as TeX or Unix's [nt]roff suite). + +Indeed, the meaning has drifted enough that the collective +`macros' is now sometimes used for code in any special-purpose +application control language (whether or not the language is +actually translated by text expansion), and for macro-like +entities such as the `keyboard macros' supported in some text +editors (and PC TSR or Macintosh INIT/CDEV keyboard +enhancers). + + +Node:macro-, Next:macrology, Previous:macro, Up:= M += + +macro- pref. + +Large. Opposite of micro-. In the +mainstream and among other technical cultures (for example, +medical people) this competes with the prefix mega-, but hackers tend to restrict the latter +to quantification. + + +Node:macrology, Next:macrotape, Previous:macro-, Up:= M += + +macrology /mak-rol'*-jee/ n. + +1. Set of usually complex or crufty macros, e.g., as part of a +large system written in LISP, TECO, or (less commonly) assembler. 2. The +art and science involved in comprehending a macrology in sense 1. +Sometimes studying the macrology of a system is not unlike +archeology, ecology, or theology, +hence the sound-alike construction. See also boxology. + + +Node:macrotape, Next:maggotbox, Previous:macrology, Up:= M = + +macrotape /mak'roh-tayp/ n. + +An industry-standard reel of tape. Originally, as opposed to a +DEC microtape; nowadays, as opposed to modern QIC and DDS tapes. +Syn. round tape. + + +Node:maggotbox, Next:magic, Previous:macrotape, Up:= M = + +maggotbox /mag'*t-boks/ n. + +See Macintrash. This is even +more derogatory. + + +Node:magic, Next:magic cookie, Previous:maggotbox, Up:= M = + +magic + +1. adj. As yet unexplained, or too complicated to explain; +compare automagically and +(Arthur C.) Clarke's Third Law: "Any sufficiently advanced +technology is indistinguishable from magic." "TTY echoing is +controlled by a large number of magic bits." "This routine +magically computes the parity of an 8-bit byte in three +instructions." 2. adj. Characteristic of something that works +although no one really understands why (this is especially called +black magic). 3. n. +[Stanford] A feature not generally publicized that allows +something otherwise impossible, or a feature formerly in that +category but now unveiled. 4. n. The ultimate goal of all +engineering & development, elegance in the extreme; from the +first corollary to Clarke's Third Law: "Any technology +distinguishable from magic is insufficiently advanced". + +Parodies playing on these senses of the term abound; some have +made their way into serious documentation, as when a MAGIC +directive was described in the Control Card Reference for GCOS +c.1978. For more about hackish `magic', see Appendix A. Compare black magic, wizardly, deep +magic, heavy +wizardry. + + +Node:magic cookie, Next:magic number, Previous:magic, Up:= M = + +magic cookie n. + +[Unix; common] 1. Something passed between routines or +programs that enables the receiver to perform some operation; a +capability ticket or opaque identifier. Especially used of small +data objects that contain data encoded in a strange or +intrinsically machine-dependent way. E.g., on non-Unix OSes with +a non-byte-stream model of files, the result of +ftell(3) may be a magic cookie rather than a byte +offset; it can be passed to fseek(3), but not +operated on in any meaningful way. The phrase `it hands you a +magic cookie' means it returns a result whose contents are not +defined but which can be passed back to the same or some other +program later. 2. An in-band code for changing graphic rendition +(e.g., inverse video or underlining) or performing other control +functions (see also cookie). Some +older terminals would leave a blank on the screen corresponding +to mode-change magic cookies; this was also called a glitch (or occasionally a `turd'; compare mouse droppings). See also +cookie. + + +Node:magic number, Next:magic smoke, Previous:magic cookie, Up:= M = + +magic number n. + +[Unix/C; common] 1. In source code, some non-obvious constant +whose value is significant to the operation of a program and that +is inserted inconspicuously in-line (hardcoded), rather than expanded in by a +symbol set by a commented #define. Magic numbers in +this sense are bad style. 2. A number that encodes critical +information used in an algorithm in some opaque way. The classic +examples of these are the numbers used in hash or CRC functions, +or the coefficients in a linear congruential generator for +pseudo-random numbers. This sense actually predates and was +ancestral to the more commonsense 1. 3. Special data located at +the beginning of a binary data file to indicate its type to a +utility. Under Unix, the system and various applications programs +(especially the linker) distinguish between types of executable +file by looking for a magic number. Once upon a time, these magic +numbers were PDP-11 branch instructions that skipped over header +data to the start of executable code; 0407, for example, was +octal for `branch 16 bytes relative'. Many other kinds of files +now have magic numbers somewhere; some magic numbers are, in +fact, strings, like the !<arch> at the +beginning of a Unix archive file or the %! leading +PostScript files. Nowadays only a wizard knows the spells to create magic +numbers. How do you choose a fresh magic number of your own? +Simple -- you pick one at random. See? It's magic! + +The magic number, on the other hand, is 7+/-2. See +"The magical number seven, plus or minus two: some limits on our +capacity for processing information" by George Miller, in the +"Psychological Review" 63:81-97 (1956). This classic paper +established the number of distinct items (such as numeric digits) +that humans can hold in short-term memory. Among other things, +this strongly influenced the interface design of the phone +system. + + +Node:magic smoke, Next:mail storm, Previous:magic number, Up:= M = + +magic smoke n. + +A substance trapped inside IC packages that enables them to +function (also called `blue smoke'; this is similar to the +archaic `phlogiston' hypothesis about combustion). Its existence +is demonstrated by what happens when a chip burns up -- the magic +smoke gets let out, so it doesn't work any more. See smoke test, let the smoke out. + +Usenetter Jay Maynard tells the following story: "Once, while +hacking on a dedicated Z80 system, I was testing code by blowing +EPROMs and plugging them in the system, then seeing what +happened. One time, I plugged one in backwards. I only discovered +that after I realized that Intel didn't put power-on +lights under the quartz windows on the tops of their EPROMs -- +the die was glowing white-hot. Amazingly, the EPROM worked fine +after I erased it, filled it full of zeros, then erased it again. +For all I know, it's still in service. Of course, this is because +the magic smoke didn't get let out." Compare the original +phrasing of Murphy's +Law. + + +Node:mail storm, Next:mailbomb, Previous:magic smoke, Up:= M = + +mail storm n. + +[from broadcast storm, +influenced by `maelstrom'] What often happens when a machine with +an Internet connection and active users re-connects after +extended downtime -- a flood of incoming mail that brings the +machine to its knees. See also hairball. + + +Node:mailbomb, Next:mailing list, Previous:mail storm, Up:= M = + +mailbomb + +(also _mail bomb_) [Usenet] 1. v. To send, or urge others +to send, massive amounts of email to +a single system or person, esp. with intent to crash or spam the recipient's system. Sometimes done +in retaliation for a perceived serious offense. Mailbombing is +itself widely regarded as a serious offense -- it can disrupt +email traffic or other facilities for innocent users on the +victim's system, and in extreme cases, even at upstream sites. 2. +n. An automatic procedure with a similar effect. 3. n. The mail +sent. Compare letterbomb, nastygram, BLOB (sense 2), list-bomb. + + +Node:mailing list, Next:main loop, Previous:mailbomb, Up:= M = + +mailing list n. + +(often shortened in context to `list') 1. An email address that is an alias (or macro, though that word is never used in this +connection) for many other email addresses. Some mailing lists +are simple `reflectors', redirecting mail sent to them to the +list of recipients. Others are filtered by humans or programs of +varying degrees of sophistication; lists filtered by humans are +said to be `moderated'. 2. The people who receive your email when +you send it to such an address. + +Mailing lists are one of the primary forms of hacker +interaction, along with Usenet. They +predate Usenet, having originated with the first UUCP and ARPANET +connections. They are often used for private information-sharing +on topics that would be too specialized for or inappropriate to +public Usenet groups. Though some of these maintain almost purely +technical content (such as the Internet Engineering Task Force +mailing list), others (like the `sf-lovers' list maintained for +many years by Saul Jaffe) are recreational, and many are purely +social. Perhaps the most infamous of the social lists was the +eccentric _bandykin_ distribution; its latter-day progeny, +_lectroids_ and _tanstaafl_, still include a number of +the oddest and most interesting people in hackerdom. + +Mailing lists are easy to create and (unlike Usenet) don't tie +up a significant amount of machine resources (until they get very +large, at which point they can become interesting torture tests +for mail software). Thus, they are often created temporarily by +working groups, the members of which can then collaborate on a +project without ever needing to meet face-to-face. Much of the +material in this lexicon was criticized and polished on just such +a mailing list (called `jargon-friends'), which included all the +co-authors of Steele-1983. + + +Node:main loop, Next:mainframe, Previous:mailing list, Up:= M = + +main loop n. + +The top-level control flow construct in an input- or +event-driven program, the one which receives and acts or +dispatches on the program's input. See also driver. + + +Node:mainframe, Next:management, Previous:main loop, Up:= M = + +mainframe n. + +Term originally referring to the cabinet containing the +central processor unit or `main frame' of a room-filling Stone Age batch machine. After the +emergence of smaller `minicomputer' designs in the early 1970s, +the traditional big iron +machines were described as `mainframe computers' and eventually +just as mainframes. The term carries the connotation of a machine +designed for batch rather than interactive use, though possibly +with an interactive timesharing operating system retrofitted onto +it; it is especially used of machines built by IBM, Unisys, and +the other great dinosaurs +surviving from computing's Stone +Age. + +It has been common wisdom among hackers since the late 1980s +that the mainframe architectural tradition is essentially dead +(outside of the tiny market for number-crunching supercomputers (see +cray)), having been swamped by the +recent huge advances in IC technology and low-cost personal +computing. The wave of failures, takeovers, and mergers among +traditional mainframe makers in the early 1990s bore this out. +The biggest mainframer of all, IBM, was compelled to re-invent +itself as a huge systems-consulting house. (See dinosaurs mating and killer micro). + + +Node:management, Next:mandelbug, Previous:mainframe, Up:= M = + +management n. + +1. Corporate power elites distinguished primarily by their +distance from actual productive work and their chronic failure to +manage (see also suit). Spoken +derisively, as in "Management decided that +...". 2. Mythically, a vast bureaucracy +responsible for all the world's minor irritations. Hackers' +satirical public notices are often signed `The Mgt'; this derives +from the "Illuminatus" novels (see the Bibliography in Appendix C). + + +Node:mandelbug, Next:manged, Previous:management, Up:= M = + +mandelbug /man'del-buhg/ n. + +[from the Mandelbrot set] A bug whose underlying causes are so +complex and obscure as to make its behavior appear chaotic or +even non-deterministic. This term implies that the speaker thinks +it is a Bohr bug, rather than a +heisenbug. See also schroedinbug. + + +Node:manged, Next:mangle, Previous:mandelbug, Up:= M = + +manged /mahnjd/ n. + +[probably from the French `manger' or Italian `mangiare', to +eat; perhaps influenced by English `mange', `mangy'] adj. Refers +to anything that is mangled or damaged, usually beyond repair. +"The disk was manged after the electrical storm." Compare mung. + + +Node:mangle, Next:mangled name, Previous:manged, Up:= +M = + +mangle vt. + +1. Used similarly to mung or scribble, but more violent in its +connotations; something that is mangled has been irreversibly and +totally trashed. 2. To produce the mangled name corresponding to a C++ +declaration. + + +Node:mangled name, Next:mangler, Previous:mangle, Up:= +M = + +mangled name n. + +A name, appearing in a C++ object file, that is a coded +representation of the object declaration as it appears in the +source. Mangled names are used because C++ allows multiple +objects to have the same name, as long as they are +distinguishable in some other way, such as by having different +parameter types. Thus, the internal name must have that +additional information embedded in it, using the limited +character set allowed by most linkers. For instance, one popular +compiler encodes the standard library function declaration +"memchr(const void*,int,unsigned int)" as "@memchr$qpxviui". + + +Node:mangler, Next:manularity, Previous:mangled name, Up:= M = + +mangler n. + +[DEC] A manager. Compare management. Note that system mangler is somewhat different +in connotation. + + +Node:manularity, Next:marbles, Previous:mangler, Up:= M += + +manularity /man`yoo-la'ri-tee/ n. + +[prob. fr. techspeak `manual' + `granularity'] A notional +measure of the manual labor required for some task, particularly +one of the sort that automation is supposed to eliminate. +"Composing English on paper has much higher manularity than using +a text editor, especially in the revising stage." Hackers tend to +consider manularity a symptom of primitive methods; in fact, a +true hacker confronted with an apparent requirement to do a +computing task by hand will +inevitably seize the opportunity to build another tool (see toolsmith). + + +Node:marbles, Next:marginal, Previous:manularity, Up:= M = + +marbles pl.n. + +[from mainstream "lost all his/her marbles"] The minimum +needed to build your way further up some hierarchy of tools or +abstractions. After a bad system crash, you need to determine if +the machine has enough marbles to come up on its own, or enough +marbles to allow a rebuild from backups, or if you need to +rebuild from scratch. "This compiler doesn't even have enough +marbles to compile hello +world." + + +Node:marginal, Next:Marginal Hacks, Previous:marbles, Up:= M = + +marginal adj. + +[common] 1. [techspeak] An extremely small change. "A marginal +increase in core can decrease GC time drastically." In everyday terms, this +means that it is a lot easier to clean off your desk if you have +a spare place to put some of the junk while you sort through it. +2. Of little merit. "This proposed new feature seems rather +marginal to me." 3. Of extremely small probability of winning. "The power supply was rather marginal +anyway; no wonder it fried." + + +Node:Marginal Hacks, Next:marginally, Previous:marginal, Up:= M = + +Marginal Hacks n. + +Margaret Jacks Hall, a building into which the Stanford AI Lab +was moved near the beginning of the 1980s (from the D. C. Power Lab). + + +Node:marginally, Next:marketroid, Previous:Marginal Hacks, Up:= M = + +marginally adv. + +Slightly. "The ravs here are only marginally better than at +Small Eating Place." See epsilon. + + +Node:marketroid, Next:Mars, Previous:marginally, Up:= M = + +marketroid /mar'k*-troyd/ n. + +alt. `marketing slime', `marketeer', `marketing droid', +`marketdroid'. A member of a company's marketing department, esp. +one who promises users that the next version of a product will +have features that are not actually scheduled for inclusion, are +extremely difficult to implement, and/or are in violation of the +laws of physics; and/or one who describes existing features (and +misfeatures) in ebullient, buzzword-laden adspeak. Derogatory. +Compare droid. + + +Node:Mars, Next:martian, Previous:marketroid, Up:= M = + +Mars n. + +A legendary tragic failure, the archetypal Hacker Dream Gone +Wrong. Mars was the code name for a family of PDP-10 compatible +computers built by Systems Concepts (now, The SC Group): the +multi-processor SC-30M, the small uniprocessor SC-25M, and the +never-built superprocessor SC-40M. These machines were marvels of +engineering design; although not much slower than the unique +Foonly F-1, they were physically +smaller and consumed less power than the much slower DEC KS10 or Foonly F-2, F-3, or F-4 machines. They +were also completely compatible with the DEC KL10, and ran all +KL10 binaries (including the operating system) with no +modifications at about 2-3 times faster than a KL10. + +When DEC cancelled the Jupiter project in 1983, Systems +Concepts should have made a bundle selling their machine into +shops with a lot of software investment in PDP-10s, and in fact +their spring 1984 announcement generated a great deal of +excitement in the PDP-10 world. TOPS-10 was running on the Mars +by the summer of 1984, and TOPS-20 by early fall. Unfortunately, +the hackers running Systems Concepts were much better at +designing machines than at mass producing or selling them; the +company allowed itself to be sidetracked by a bout of +perfectionism into continually improving the design, and lost +credibility as delivery dates continued to slip. They also +overpriced the product ridiculously; they believed they were +competing with the KL10 and VAX 8600 and failed to reckon with +the likes of Sun Microsystems and other hungry startups building +workstations with power comparable to the KL10 at a fraction of +the price. By the time SC shipped the first SC-30M to Stanford in +late 1985, most customers had already made the traumatic decision +to abandon the PDP-10, usually for VMS or Unix boxes. Most of the +Mars computers built ended up being purchased by CompuServe. + +This tale and the related saga of Foonly hold a lesson for hackers: if you want +to play in the Real World, you +need to learn Real World moves. + + +Node:martian, Next:massage, Previous:Mars, Up:= M = + + +martian n. + +A packet sent on a TCP/IP network with a source address of the +test loopback interface [127.0.0.1]. This means that it will come +back labeled with a source address that is clearly not of this +earth. "The domain server is getting lots of packets from Mars. +Does that gateway have a martian filter?" Compare Christmas tree packet, Godzillagram. + + +Node:massage, Next:math-out, Previous:martian, Up:= M += + +massage vt. + +[common] Vague term used to describe `smooth' transformations +of a data set into a different form, esp. transformations that do +not lose information. Connotes less pain than munch or crunch. +"He wrote a program that massages X bitmap files into GIF +format." Compare slurp. + + +Node:math-out, Next:Matrix, Previous:massage, Up:= M += + +math-out n. + +[poss. from `white-out' (the blizzard variety)] A paper or +presentation so encrusted with mathematical or other formal +notation as to be incomprehensible. This may be a device for +concealing the fact that it is actually content-free. See also numbers, social science number. + + +Node:Matrix, Next:maximum Maytag mode, Previous:math-out, Up:= M = + +Matrix n. + +[FidoNet] 1. What the Opus BBS software and sysops call FidoNet. 2. Fanciful term for a cyberspace expected to emerge from +current networking experiments (see the network). The name of the rather +good 1999 cypherpunk movie "The +Matrix" played on this sense, which however had been established +for years before. 3. The totality of present-day computer +networks (popularized in this sense by John Quarterman; rare +outside academic literature). + + +Node:maximum Maytag mode, +Next:meatspace, Previous:Matrix, Up:= M = + +maximum Maytag mode n. + +What a washing machine +or, by extension, any disk drive is in when it's being used so +heavily that it's shaking like an old Maytag with an unbalanced +load. If prolonged for any length of time, can lead to disks +becoming walking drives. +In 1999 it's been some years since hard disks were large enough +to do this, but the same phenomenon has recently been reported +with 24X CD-ROM drives. + + +Node:meatspace, Next:meatware, Previous:maximum Maytag mode, Up:= M = + +meatspace /meet'spays/ n. + +The physical world, where the meat lives - as opposed to cyberspace. Hackers are actually more +willing to use this term than `cyberspace', because it's not +speculative - we already have a running meatspace implementation +(the universe). Compare RL. + + +Node:meatware, Next:meeces, Previous:meatspace, Up:= M = + +meatware n. + +Synonym for wetware. Less +common. + + +Node:meeces, Next:meg, Previous:meatware, Up:= +M = + +meeces /mees'*z/ n. + +[TMRC] Occasional furry visitors who are not urchins. [That is, mice. This may no longer be +in live use; it clearly derives from the refrain of the +early-1960s cartoon character Mr. Jinx: "I hate meeces to +pieces!" -- ESR] + + +Node:meg, Next:mega-, Previous:meeces, Up:= M += + +meg /meg/ n. + +See quantifiers. + + +Node:mega-, Next:megapenny, Previous:meg, Up:= M = + + +mega- /me'g*/ pref. + +[SI] See quantifiers. + + +Node:megapenny, Next:MEGO, Previous:mega-, Up:= M += + +megapenny /meg'*-pen`ee/ n. + +$10,000 (1 cent * 10^6). Used semi-humorously as a unit in +comparing computer cost and performance figures. + + +Node:MEGO, Next:meltdown network, Previous:megapenny, Up:= M = + +MEGO /me'goh/ or /mee'goh/ + +[`My Eyes Glaze Over', often `Mine Eyes Glazeth (sic) Over', +attributed to the futurologist Herman Kahn] Also `MEGO factor'. +1. n. A handwave intended to +confuse the listener and hopefully induce agreement because the +listener does not want to admit to not understanding what is +going on. MEGO is usually directed at senior management by +engineers and contains a high proportion of TLAs. 2. excl. An appropriate response to MEGO +tactics. 3. Among non-hackers, often refers not to behavior that +causes the eyes to glaze, but to the eye-glazing reaction itself, +which may be triggered by the mere threat of technical detail as +effectively as by an actual excess of it. + + +Node:meltdown network, Next:meme, Previous:MEGO, Up:= M += + +meltdown, network n. + +See network +meltdown. + + +Node:meme, Next:meme plague, Previous:meltdown network, Up:= M = + +meme /meem/ n. + +[coined by analogy with `gene', by Richard Dawkins] An idea +considered as a replicator, esp. +with the connotation that memes parasitize people into +propagating them much as viruses do. Used esp. in the phrase +`meme complex' denoting a group of mutually supporting memes that +form an organized belief system, such as a religion. This lexicon +is an (epidemiological) vector of the `hacker subculture' meme +complex; each entry might be considered a meme. However, `meme' +is often misused to mean `meme complex'. Use of the term connotes +acceptance of the idea that in humans (and presumably other tool- +and language-using sophonts) cultural evolution by selection of +adaptive ideas has superseded biological evolution by selection +of hereditary traits. Hackers find this idea congenial for +tolerably obvious reasons. + + +Node:meme plague, Next:memetics, Previous:meme, Up:= M = + + +meme plague n. + +The spread of a successful but pernicious meme, esp. one that parasitizes the victims into +giving their all to propagate it. Astrology, BASIC, and the other +guy's religion are often considered to be examples. This usage is +given point by the historical fact that `joiner' ideologies like +Naziism or various forms of millennarian Christianity have +exhibited plague-like cycles of exponential growth followed by +collapses to small reservoir populations. + + +Node:memetics, Next:memory farts, Previous:meme plague, Up:= M = + +memetics /me-met'iks/ n. + +[from meme] The study of memes. As +of early 1999, this is still an extremely informal and +speculative endeavor, though the first steps towards at least +statistical rigor have been made by H. Keith Henson and others. +Memetics is a popular topic for speculation among hackers, who +like to see themselves as the architects of the new information +ecologies in which memes live and replicate. + + +Node:memory farts, Next:memory leak, Previous:memetics, Up:= M = + +memory farts n. + +The flatulent sounds that some DOS box BIOSes (most notably +AMI's) make when checking memory on bootup. + + +Node:memory leak, Next:memory smash, Previous:memory farts, Up:= M = + +memory leak n. + +An error in a program's dynamic-store allocation logic that +causes it to fail to reclaim discarded memory, leading to +eventual collapse due to memory exhaustion. Also (esp. at CMU) +called core leak. These +problems were severe on older machines with small, fixed-size +address spaces, and special "leak detection" tools were commonly +written to root them out. With the advent of virtual memory, it +is unfortunately easier to be sloppy about wasting a bit of +memory (although when you run out of memory on a VM machine, it +means you've got a real leak!). See aliasing bug, fandango on core, smash the stack, precedence lossage, overrun screw, leaky heap, leak. + + +Node:memory smash, Next:menuitis, Previous:memory leak, Up:= M = + +memory smash n. + +[XEROX PARC] Writing through a pointer that doesn't point to +what you think it does. This occasionally reduces your machine to +a rubble of bits. Note that this is subtly different from (and +more general than) related terms such as a memory leak or fandango on core because it +doesn't imply an allocation error or overrun condition. + + +Node:menuitis, Next:mess-dos, Previous:memory smash, Up:= M = + +menuitis /men`yoo-i:'tis/ n. + +Notional disease suffered by software with an obsessively +simple-minded menu interface and no escape. Hackers find this +intensely irritating and much prefer the flexibility of +command-line or language-style interfaces, especially those +customizable via macros or a special-purpose language in which +one can encode useful hacks. See user-obsequious, drool-proof paper, WIMP environment, for the rest of us. + + +Node:mess-dos, Next:meta, Previous:menuitis, Up:= +M = + +mess-dos /mes-dos/ n. + +[semi-obsolescent now that DOS is] Derisory term for MS-DOS. +Often followed by the ritual banishing "Just say No!" See MS-DOS. Most hackers (even many MS-DOS +hackers) loathed MS-DOS for its single-tasking nature, its limits +on application size, its nasty primitive interface, and its ties +to IBMness and Microsoftness (see fear and loathing). Also +`mess-loss', `messy-dos', `mess-dog', `mess-dross', `mush-dos', +and various combinations thereof. In Ireland and the U.K. it is +even sometimes called `Domestos' after a brand of toilet +cleanser. + + +Node:meta, Next:meta bit, Previous:mess-dos, Up:= +M = + +meta /me't*/ or /may't*/ or (Commonwealth) /mee't*/ +adj.,pref. + +[from analytic philosophy] One level of description up. A +metasyntactic variable is a variable in notation used to describe +syntax, and meta-language is language used to describe language. +This is difficult to explain briefly, but much hacker humor turns +on deliberate confusion between meta-levels. See hacker humor. + + +Node:meta bit, Next:metasyntactic variable, +Previous:meta, Up:= M = + +meta bit n. + +The top bit of an 8-bit character, which is on in character +values 128-255. Also called high +bit, alt bit, or (rarely) +hobbit. Some terminals and consoles +(see space-cadet +keyboard) have a META shift key. Others (including, +mirabile dictu, keyboards on IBM PC-class machines) have +an ALT key. See also bucky +bits. + +Historical note: although in modern usage shaped by a universe +of 8-bit bytes the meta bit is invariably hex 80 (octal 0200), +things were different on earlier machines with 36-bit words and +9-bit bytes. The MIT and Stanford keyboards (see space-cadet keyboard) generated +hex 100 (octal 400) from their meta keys. + + +Node:metasyntactic +variable, Next:MFTL, +Previous:meta bit, Up:= M = + +metasyntactic variable n. + +A name used in examples and understood to stand for whatever +thing is under discussion, or any random member of a class of +things under discussion. The word foo +is the canonical example. To +avoid confusion, hackers never (well, hardly ever) use `foo' or +other words like it as permanent names for anything. In +filenames, a common convention is that any filename beginning +with a metasyntactic-variable name is a scratch file that may be deleted at any +time. + +Metasyntactic variables are so called because (1) they are +variables in the metalanguage used to talk about programs etc; +(2) they are variables whose values are often variables (as in +usages usages like "the value of f(foo,bar) is the sum of foo and +bar"). However, it has been plausibly suggested that the real +reason for the term "metasyntactic variable" is that it sounds +good. + +To some extent, the list of one's preferred metasyntactic +variables is a cultural signature. They occur both in series +(used for related groups of variables or objects) and as +singletons. Here are a few common signatures: + + + +foo, bar, +baz, quux, +quuux, quuuux...: + + +MIT/Stanford usage, now found everywhere (thanks largely to +early versions of this lexicon!). At MIT (but not at Stanford), +baz dropped out of use for a while in +the 1970s and '80s. A common recent mutation of this sequence +inserts qux before quux. + + +bazola, ztesch: + + +Stanford (from mid-'70s on). + + +foo, bar, +thud, grunt: + + +This series was popular at CMU. Other CMU-associated +variables include gorp. + + +foo, bar, +fum: + + +This series is reported to be common at XEROX PARC. + + +fred, jim, sheila, barney: + + +See the entry for fred. These tend +to be Britishisms. + + +corge, grault, flarp: + + +Popular at Rutgers University and among GOSMACS hackers. + + +zxc, spqr, wombat: + + +Cambridge University (England). + + +shme + + +Berkeley, GeoWorks, Ingres. Pronounced /shme/ with a short +/e/. + + +foo, bar, baz, bongo + + +Yale, late 1970s. + + +spam + + +Python programmers. + + +snork + + +Brown University, early 1970s. + + +foo, bar, +zot + + +Helsinki University of Technology, Finland. + + +blarg, wibble + + +New Zealand. + + +toto, titi, tata, tutu + + +France. + + +pippo, pluto, paperino + + +Italy. Pippo /pee'po/ and Paperino /pa-per-ee'-no/ are the +Italian names for Goofy and Donald Duck. + + +aap, noot, mies + + +The Netherlands. These are the first words a child used to +learn to spell on a Dutch spelling board. + + +oogle, foogle, boogle; zork, gork, bork + + +These two series (which may be continued with other initial +consonents) are reportedly common in England, and said to go back +to Lewis Carroll. + + +Of all these, only `foo' and `bar' are universal (and baz nearly so). The compounds foobar and `foobaz' also enjoy very wide +currency. + +Some jargon terms are also used as metasyntactic names; barf and mumble, for example. See also Commonwealth Hackish for +discussion of numerous metasyntactic variables found in Great +Britain and the Commonwealth. + + +Node:MFTL, Next:mickey, Previous:metasyntactic variable, Up:= M = + +MFTL /M-F-T-L/ + +[abbreviation: `My Favorite Toy Language'] 1. adj. Describes a +talk on a programming language design that is heavy on the syntax +(with lots of BNF), sometimes even talks about semantics (e.g., +type systems), but rarely, if ever, has any content (see content-free). More broadly applied +to talks -- even when the topic is not a programming language -- +in which the subject matter is gone into in unnecessary and +meticulous detail at the sacrifice of any conceptual content. +"Well, it was a typical MFTL talk". 2. n. Describes a language +about which the developers are passionate (often to the point of +proselytic zeal) but no one else cares about. Applied to the +language by those outside the originating group. "He cornered me +about type resolution in his MFTL." + +The first great goal in the mind of the designer of an MFTL is +usually to write a compiler for it, then bootstrap the design +away from contamination by lesser languages by writing a compiler +for it in itself. Thus, the standard put-down question at an MFTL +talk is "Has it been used for anything besides its own compiler?" +On the other hand, a (compiled) language that cannot even be used +to write its own compiler is beneath contempt. (The qualification +has become necessary because of the increasing popularity of +interpreted languages like Perl and +Python. See break-even point. + +(On a related note, Doug McIlroy once proposed a test of the +generality and utility of a language and the operating system +under which it is compiled: "Is the output of a FORTRAN program +acceptable as input to the FORTRAN compiler?" In other words, can +you write programs that write programs? (See toolsmith.) Alarming numbers of (language, +OS) pairs fail this test, particularly when the language is +FORTRAN; aficionados are quick to point out that Unix (even using FORTRAN) passes it handily. That +the test could ever be failed is only surprising to those who +have had the good fortune to have worked only under modern +systems which lack OS-supported and -imposed "file types".) + + +Node:mickey, Next:mickey mouse program, Previous:MFTL, Up:= M = + +mickey n. + +The resolution unit of mouse movement. It has been suggested +that the `disney' will become a benchmark unit for animation +graphics performance. + + +Node:mickey mouse program, +Next:micro-, Previous:mickey, Up:= M = + +mickey mouse program n. + +North American equivalent of a noddy (that is, trivial) program. Doesn't +necessarily have the belittling connotations of mainstream slang +"Oh, that's just mickey mouse stuff!"; sometimes trivial programs +can be very useful. + + +Node:micro-, Next:MicroDroid, Previous:mickey mouse program, Up:= M = + +micro- pref. + +1. Very small; this is the root of its use as a quantifier +prefix. 2. A quantifier prefix, calling for multiplication by +10^(-6) (see quantifiers). +Neither of these uses is peculiar to hackers, but hackers tend to +fling them both around rather more freely than is countenanced in +standard English. It is recorded, for example, that one CS +professor used to characterize the standard length of his +lectures as a microcentury -- that is, about 52.6 minutes (see +also attoparsec, nanoacre, and especially microfortnight). 3. Personal or +human-scale -- that is, capable of being maintained or +comprehended or manipulated by one human being. This sense is +generalized from `microcomputer', and is esp. used in contrast +with `macro-' (the corresponding Greek prefix meaning `large'). +4. Local as opposed to global (or macro-). Thus a hacker might say that buying a +smaller car to reduce pollution only solves a microproblem; the +macroproblem of getting to work might be better solved by using +mass transit, moving to within walking distance, or (best of all) +telecommuting. + + +Node:MicroDroid, Next:microfloppies, Previous:micro-, Up:= M = + +MicroDroid n. + +[Usenet] A Microsoft employee, esp. one who posts to various +operating-system advocacy newsgroups. MicroDroids post follow-ups +to any messages critical of Microsoft's operating systems, and +often end up sounding like visiting fundamentalist missionaries. +See also astroturfing; compare +microserf. + + +Node:microfloppies, Next:microfortnight, Previous:MicroDroid, Up:= M = + +microfloppies n. + +3.5-inch floppies, as opposed to 5.25-inch vanilla or mini-floppies and the now-obsolete +8-inch variety. This term may be headed for obsolescence as +5.25-inchers pass out of use, only to be revived if anybody +floats a sub-3-inch floppy standard. See stiffy, minifloppies. + + +Node:microfortnight, Next:microLenat, Previous:microfloppies, Up:= M = + +microfortnight n. + +1/1000000 of the fundamental unit of time in the +Furlong/Firkin/Fortnight system of measurement; 1.2096 sec. (A +furlong is 1/8th of a mile; a firkin is 1/4th of a barrel; the +mass unit of the system is taken to be a firkin of water). The +VMS operating system has a lot of tuning parameters that you can +set with the SYSGEN utility, and one of these is TIMEPROMPTWAIT, +the time the system will wait for an operator to set the correct +date and time at boot if it realizes that the current value is +bogus. This time is specified in microfortnights! + +Multiple uses of the millifortnight (about 20 minutes) and +nanofortnight have also been +reported. + + +Node:microLenat, Next:microReid, Previous:microfortnight, Up:= M = + +microLenat /mi:`-kroh-len'-*t/ n. + +The unit of bogosity. consensus +is that this is the largest unit practical for everyday use. The +microLenat, originally invented by David Jefferson, was +promulgated as an attack against noted computer scientist Doug +Lenat by a tenured +graduate student at CMU. Doug had failed the student on +an important exam because the student gave only "AI is bogus" as +his answer to the questions. The slur is generally considered +unmerited, but it has become a running gag nevertheless. Some of +Doug's friends argue that of course a microLenat is +bogus, since it is only one millionth of a Lenat. Others have +suggested that the unit should be redesignated after the grad +student, as the microReid. + + +Node:microReid, Next:microserf, Previous:microLenat, Up:= M = + +microReid /mi:'kroh-reed/ n. + +See microLenat. + + +Node:microserf, Next:Microsloth Windows, Previous:microReid, Up:= M = + +microserf /mi:'kro-s*rf/ + +[popularized, though not originated, by Douglas Copeland's +book "Microserfs"] A programmer at Microsoft, especially a low-level coder with +little chance of fame or fortune. Compare MicroDroid. + + +Node:Microsloth Windows, +Next:Microsoft, Previous:microserf, Up:= M = + +Microsloth Windows /mi:'kroh-sloth` win'dohz/ n. + +(Variants combine {Microshift, Macroshaft, Microsuck} with +{Windoze, WinDOS}. Hackerism(s) for `Microsoft Windows'. A +thirty-two bit extension and graphical shell to a sixteen bit +patch to an eight bit operating system originally coded for a +four bit microprocessor which was written by a two-bit company +that can't stand one bit of competition. Also just called +`Windoze', with the implication that you can fall asleep waiting +for it to do anything; the latter term is extremely common on +Usenet. See Black +Screen of Death and Blue Screen of Death; +compare X, sun-stools. + + +Node:Microsoft, Next:micros~1, Previous:Microsloth Windows, Up:= M = + +Microsoft + +The new Evil Empire (the +old one was IBM). The basic complaints +are, as formerly with IBM, that (a) their system designs are +horrible botches, (b) we can't get source to fix them, and (c) they throw their +weight around a lot. See also Halloween Documents. + + +Node:micros~1, Next:middle-endian, Previous:Microsoft, Up:= M = + +micros~1 + +An abbreviation of the full name Microsoft resembling the rather bogus way Windows 9x's VFAT filesystem truncates +long file names to fit in the MS-DOS 8+3 scheme (the real +filename is stored elsewhere). If other files start with the same +prefix, they'll be called micros~2 and so on, causing lots of +problems with backups and other routine system-administration +problems. During the US Antitrust trial against Microsoft the +names Micros~1 ans Micros~2 were suggested for the two companies +that would exist after a break-up. + + +Node:middle-endian, Next:middle-out +implementation, Previous:micros~1, Up:= M = + +middle-endian adj. + +Not big-endian or little-endian. Used of perverse byte +orders such as 3-4-1-2 or 2-1-4-3, occasionally found in the +packed-decimal formats of minicomputer manufacturers who shall +remain nameless. See NUXI +problem. Non-US hackers use this term to describe the +American mm/dd/yy style of writing dates (Europeans write +little-endian dd/mm/yy, and Japanese use big-endian yy/mm/dd for +Western dates). + + +Node:middle-out +implementation, Next:milliLampson, Previous:middle-endian, Up:= M = + +middle-out implementation + +See bottom-up +implementation. + + +Node:milliLampson, Next:minifloppies, Previous:middle-out +implementation, Up:= M += + +milliLampson /mil'*-lamp`sn/ n. + +A unit of talking speed, abbreviated mL. Most people run about +200 milliLampsons. The eponymous Butler Lampson (a CS theorist +and systems implementor highly regarded among hackers) goes at +1000. A few people speak faster. This unit is sometimes used to +compare the (sometimes widely disparate) rates at which people +can generate ideas and actually emit them in speech. For example, +noted computer architect C. Gordon Bell (designer of the PDP-11) +is said, with some awe, to think at about 1200 mL but only talk +at about 300; he is frequently reduced to fragments of sentences +as his mouth tries to keep up with his speeding brain. + + +Node:minifloppies, Next:MIPS, Previous:milliLampson, Up:= M = + +minifloppies n.,obs. + +5.25-inch floppy disks, as opposed to 3.5-inch or microfloppies and the long-obsolescent +8-inch variety (if there is ever a smaller size, they will +undoubtedly be tagged `nanofloppies'). At one time, this term was +a trademark of Shugart Associates for their SA-400 minifloppy +drive. Nobody paid any attention. See stiffy. + + +Node:MIPS, Next:misbug, Previous:minifloppies, Up:= M = + +MIPS /mips/ n. + +[abbreviation] 1. A measure of computing speed; formally, +`Million Instructions Per Second' (that's 10^6 per second, not +2^(20)!); often rendered by hackers as `Meaningless Indication of +Processor Speed' or in other unflattering ways, such as +`Meaningless Information Provided by Salesmen'. This joke +expresses an attitude nearly universal among hackers about the +value of most benchmark claims, +said attitude being one of the great cultural divides between +hackers and marketroids (see +also BogoMIPS). The singular is +sometimes `1 MIP' even though this is clearly etymologically +wrong. See also KIPS and GIPS. 2. Computers, especially large computers, +considered abstractly as sources of computrons. "This is just a workstation; the +heavy MIPS are hidden in the basement." 3. The corporate name of +a particular RISC-chip company; among other things, they designed +the processor chips used in DEC's 3100 +workstation series. 4. Acronym for `Meaningless Information per +Second' (a joke, prob. from sense 1). + + +Node:misbug, Next:misfeature, Previous:MIPS, Up:= M = + + +misbug /mis-buhg/ n. + +[MIT; rare (like its referent)] An unintended property of a +program that turns out to be useful; something that should have +been a bug but turns out to be a feature. Compare green lightning. See miswart. + + +Node:misfeature, Next:Missed'em-five, Previous:misbug, Up:= M = + +misfeature /mis-fee'chr/ or /mis'fee`chr/ n. + +[common] A feature that eventually causes lossage, possibly +because it is not adequate for a new situation that has evolved. +Since it results from a deliberate and properly implemented +feature, a misfeature is not a bug. Nor is it a simple unforeseen +side effect; the term implies that the feature in question was +carefully planned, but its long-term consequences were not +accurately or adequately predicted (which is quite different from +not having thought ahead at all). A misfeature can be a +particularly stubborn problem to resolve, because fixing it +usually involves a substantial philosophical change to the +structure of the system involved. + +Many misfeatures (especially in user-interface design) arise +because the designers/implementors mistake their personal tastes +for laws of nature. Often a former feature becomes a misfeature +because trade-offs were made whose parameters subsequently change +(possibly only in the judgment of the implementors). "Well, yeah, +it is kind of a misfeature that file names are limited to six +characters, but the original implementors wanted to save +directory space and we're stuck with it for now." + + +Node:Missed'em-five, Next:missile address, Previous:misfeature, Up:= M = + +Missed'em-five n. + +Pejorative hackerism for AT&T System V Unix, generally +used by BSD partisans in a bigoted +mood. (The synonym `SysVile' is also encountered.) See software bloat, Berzerkeley. + + +Node:missile address, Next:miswart, Previous:Missed'em-five, Up:= M = + +missile address n. + +See ICBM address. + + +Node:miswart, Next:MMF, Previous:missile address, Up:= M = + +miswart /mis-wort/ n. + +[from wart by analogy with misbug] A feature that superficially appears to be a +wart but has been determined to be the +Right Thing. For example, in +some versions of the EMACS text +editor, the `transpose characters' command exchanges the +character under the cursor with the one before it on the screen, +except when the cursor is at the end of a line, in which +case the two characters before the cursor are exchanged. While +this behavior is perhaps surprising, and certainly inconsistent, +it has been found through extensive experimentation to be what +most users want. This feature is a miswart. + + +Node:MMF, Next:mobo, Previous:miswart, Up:= M += + +MMF // + +[Usenet; common] Abbreviation: "Make Money Fast". Refers to +any kind of scheme which promises participants large profits with +little or no risk or effort. Typically, it is a some kind of +multi-level marketing operation which involves recruiting more +members, or an illegal pyramid scam. The term is also used to +refer to any kind of spam which promotes this. For more +information, see the Make Money Fast Myth +Page. + + +Node:mobo, Next:moby, Previous:MMF, +Up:= M = + +mobo /moh'bo/ + +Written and (rarely) spoken contraction of "motherboard" + + +Node:moby, Next:mockingbird, Previous:mobo, Up:= M = + + +moby /moh'bee/ + +[MIT: seems to have been in use among model railroad fans +years ago. Derived from Melville's "Moby Dick" (some say from +`Moby Pickle'). Now common.] 1. adj. Large, immense, complex, +impressive. "A Saturn V rocket is a truly moby frob." "Some MIT +undergrads pulled off a moby hack at the Harvard-Yale game." (See +Appendix A for discussion.) 2. +n. obs. The maximum address space of a machine (see below). For a +680[234]0 or VAX or most modern 32-bit architectures, it is +4,294,967,296 8-bit bytes (4 gigabytes). 3. A title of address +(never of third-person reference), usually used to show +admiration, respect, and/or friendliness to a competent hacker. +"Greetings, moby Dave. How's that address-book thing for the Mac +going?" 4. adj. In backgammon, doubles on the dice, as in `moby +sixes', `moby ones', etc. Compare this with bignum (sense 3): double sixes are both bignums +and moby sixes, but moby ones are not bignums (the use of `moby' +to describe double ones is sarcastic). Standard emphatic forms: +`Moby foo', `moby win', `moby loss'. `Foby moo': a spoonerism due +to Richard Greenblatt. 5. The largest available unit of something +which is available in discrete increments. Thus, ordering a "moby +Coke" at the local fast-food joint is not just a request for a +large Coke, it's an explicit request for the largest size they +sell. + +This term entered hackerdom with the Fabritek 256K memory +added to the MIT AI PDP-6 machine, which was considered +unimaginably huge when it was installed in the 1960s (at a time +when a more typical memory size for a timesharing system was 72 +kilobytes). Thus, a moby is classically 256K 36-bit words, the +size of a PDP-6 or PDP-10 moby. Back when address registers were +narrow the term was more generally useful, because when a +computer had virtual memory mapping, it might actually have more +physical memory attached to it than any one program could access +directly. One could then say "This computer has 6 mobies" meaning +that the ratio of physical memory to address space is 6, without +having to say specifically how much memory there actually is. +That in turn implied that the computer could timeshare six +`full-sized' programs without having to swap programs between +memory and disk. + +Nowadays the low cost of processor logic means that address +spaces are usually larger than the most physical memory you can +cram onto a machine, so most systems have much less than +one theoretical `native' moby of core. +Also, more modern memory-management techniques (esp. paging) make +the `moby count' less significant. However, there is one series +of widely-used chips for which the term could stand to be revived +-- the Intel 8088 and 80286 with their incredibly brain-damaged segmented-memory designs. +On these, a `moby' would be the 1-megabyte address span of a +segment/offset pair (by coincidence, a PDP-10 moby was exactly 1 +megabyte of 9-bit bytes). + + +Node:mockingbird, Next:mod, Previous:moby, Up:= M = + + +mockingbird n. + +Software that intercepts communications (especially login +transactions) between users and hosts and provides system-like +responses to the users while saving their responses (especially +account IDs and passwords). A special case of Trojan horse. + + +Node:mod, Next:mode, Previous:mockingbird, Up:= M = + +mod vt.,n. + +[very common] 1. Short for `modify' or `modification'. Very +commonly used -- in fact the full terms are considered markers +that one is being formal. The plural `mods' is used esp. with +reference to bug fixes or minor design changes in hardware or +software, most esp. with respect to patch sets or a diff. +2. Short for modulo but used +only for its techspeak sense. + + +Node:mode, Next:mode bit, Previous:mod, Up:= M = + + +mode n. + +[common] A general state, usually used with an adjective +describing the state. Use of the word `mode' rather than `state' +implies that the state is extended over time, and probably also +that some activity characteristic of that state is being carried +out. "No time to hack; I'm in thesis mode." In its jargon sense, +`mode' is most often attributed to people, though it is sometimes +applied to programs and inanimate objects. In particular, see +hack mode, day mode, night +mode, demo mode, fireworks mode, and yoyo mode; also talk mode. + +One also often hears the verbs `enable' and `disable' used in +connection with jargon modes. Thus, for example, a sillier way of +saying "I'm going to crash" is "I'm going to enable crash mode +now". One might also hear a request to "disable flame mode, +please". + +In a usage much closer to techspeak, a mode is a special state +that certain user interfaces must pass into in order to perform +certain functions. For example, in order to insert characters +into a document in the Unix editor vi, one must type +the "i" key, which invokes the "Insert" command. The effect of +this command is to put vi into "insert mode", in which typing the +"i" key has a quite different effect (to wit, it inserts an "i" +into the document). One must then hit another special key, "ESC", +in order to leave "insert mode". Nowadays, modeful interfaces are +generally considered losing but +survive in quite a few widely used tools built in less +enlightened times. + + +Node:mode bit, Next:modulo, Previous:mode, Up:= M = + + +mode bit n. + +[common] A flag, usually in +hardware, that selects between two (usually quite different) +modes of operation. The connotations are different from flag bit in that mode bits are mainly +written during a boot or set-up phase, are seldom explicitly +read, and seldom change over the lifetime of an ordinary program. +The classic example was the EBCDIC-vs.-ASCII bit (#12) of the +Program Status Word of the IBM 360. + + +Node:modulo, Next:molly-guard, Previous:mode bit, Up:= M = + +modulo /mod'yu-loh/ prep. + +Except for. An overgeneralization of mathematical terminology; +one can consider saying that 4 equals 22 except for the 9s (4 = +22 mod 9). "Well, LISP seems to work okay now, modulo that GC bug." "I feel fine today modulo a slight +headache." + + +Node:molly-guard, Next:Mongolian Hordes +technique, Previous:modulo, Up:= M += + +molly-guard /mol'ee-gard/ n. + +[University of Illinois] A shield to prevent tripping of some +Big Red Switch by clumsy +or ignorant hands. Originally used of the plexiglass covers +improvised for the BRS on an IBM 4341 after a programmer's +toddler daughter (named Molly) frobbed it twice in one day. Later +generalized to covers over stop/reset switches on disk drives and +networking equipment. In hardware catalogues, you'll see the much +less interesting description "guarded button". + + +Node:Mongolian Hordes +technique, Next:monkey +up, Previous:molly-guard, Up:= M = + +Mongolian Hordes technique n. + +[poss. from the Sixties counterculture expression `Mongolian +clusterfuck' for a public orgy] Development by gang bang. Implies that large numbers of +inexperienced programmers are being put on a job better performed +by a few skilled ones (but see bazaar). Also called `Chinese Army technique'; +see also Brooks's Law. + + +Node:monkey up, Next:monkey scratch, Previous:Mongolian +Hordes technique, Up:= M += + +monkey up vt. + +To hack together hardware for a particular task, especially a +one-shot job. Connotes an extremely crufty and consciously temporary solution. +Compare hack up, kluge up, cruft together. + + +Node:monkey scratch, Next:monstrosity, Previous:monkey up, Up:= M = + +monkey, scratch n. + +See scratch monkey. + + +Node:monstrosity, Next:monty, Previous:monkey scratch, Up:= M = + +monstrosity + +1. n. A ridiculously elephantine program or system, esp. one +that is buggy or only marginally functional. 2. adj. The quality +of being monstrous (see `Overgeneralization' in the discussion of +jargonification). See also baroque. + + +Node:monty, Next:Moof, Previous:monstrosity, Up:= M = + +monty /mon'tee/ n. + +1. [US Geological Survey] A program with a ludicrously complex +user interface written to perform extremely trivial tasks. An +example would be a menu-driven, button clicking, pulldown, pop-up +windows program for listing directories. The original monty was +an infamous weather-reporting program, Monty the Amazing Weather +Man, written at the USGS. Monty had a widget-packed X-window +interface with over 200 buttons; and all monty actually +did was FTP files off the +network. 2. [Great Britain; commonly capitalized as `Monty' or as +`the Full Monty'] 16 megabytes of memory, when fitted to an +IBM-PC or compatible. A standard PC-compatible using the AT- or +ISA-bus with a normal BIOS cannot access more than 16 megabytes +of RAM. Generally used of a PC, Unix workstation, etc. to mean +`fully populated with' memory, disk-space or some other desirable +resource. This usage may be related to a TV commercial for Del +Monte fruit juice, in which one of the characters insisted on +"the full Del Monte"; but see the World Wide Words article "The +Full Monty" for discussion of the rather complex etymology +that may lie behind this. Compare American moby. + + +Node:Moof, Next:Moore's Law, Previous:monty, Up:= M += + +Moof /moof/ + +[Macintosh users] 1. n. The call of a semi-legendary creature, +properly called the dogcow. (Some +previous versions of this entry claimed, incorrectly, that Moof +was the name of the creature.) 2. adj. Used to flag +software that's a hack, something untested and on the edge. On +one Apple CD-ROM, certain folders such as "Tools & Apps +(Moof!)" and "Development Platforms (Moof!)", are so marked to +indicate that they contain software not fully tested or +sanctioned by the powers that be. When you open these folders you +cross the boundary into hackerland. 3. v. On the Microsoft +Network, the term `moof' has gained popularity as a verb meaning +`to be suddenly disconnected by the system'. One might say "I got +moofed". + + +Node:Moore's Law, Next:moose call, Previous:Moof, Up:= M += + +Moore's Law /morz law/ prov. + +The observation that the logic density of silicon integrated +circuits has closely followed the curve (bits per square inch) = +2^(t - 1962) where t is time in years; that is, the amount of +information storable on a given amount of silicon has roughly +doubled every year since the technology was invented. This +relation, first uttered in 1964 by semiconductor engineer Gordon +Moore (who co-founded Intel four years later) held until the late +1970s, at which point the doubling period slowed to 18 months. +The doubling period remained at that value through time of +writing (late 1999). Moore's Law is apparently self-fulfilling. +The implication is that somebody, somewhere is going to be able +to build a better chip than you if you rest on your laurels, so +you'd better start pushing hard on the problem. See also Parkinson's Law of +Data and Gates's +Law. + + +Node:moose call, Next:moria, Previous:Moore's Law, Up:= M = + +moose call n. + +See whalesong. + + +Node:moria, Next:MOTAS, Previous:moose call, Up:= M = + +moria /mor'ee-*/ n. + +Like nethack and rogue, one of the large PD +Dungeons-and-Dragons-like simulation games, available for a wide +range of machines and operating systems. The name is from +Tolkien's Mines of Moria; compare elder days, elvish. The game is extremely addictive and a +major consumer of time better used for hacking. See also nethack, rogue, Angband. + + +Node:MOTAS, Next:MOTOS, Previous:moria, Up:= M += + +MOTAS /moh-tahz/ n. + +[Usenet: Member Of The Appropriate Sex, after MOTOS and MOTSS] A +potential or (less often) actual sex partner. See also SO. + + +Node:MOTOS, Next:MOTSS, Previous:MOTAS, Up:= M += + +MOTOS /moh-tohs/ n. + +[acronym from the 1970 U.S. census forms via Usenet: Member Of +The Opposite Sex] A potential or (less often) actual sex partner. +See MOTAS, MOTSS, SO. Less common +than MOTSS or MOTAS, which has +largely displaced it. + + +Node:MOTSS, Next:mouse ahead, Previous:MOTOS, Up:= M += + +MOTSS /mots/ or /M-O-T-S-S/ n. + +[from the 1970 U.S. census forms via Usenet] Member Of The +Same Sex, esp. one considered as a possible sexual partner. The +gay-issues newsgroup on Usenet is called _soc.motss_. See +MOTOS and MOTAS, which derive from it. See also SO. + + +Node:mouse ahead, Next:mouse around, Previous:MOTSS, Up:= M = + +mouse ahead vi. + +Point-and-click analog of `type ahead'. To manipulate a +computer's pointing device (almost always a mouse in this usage, +but not necessarily) and its selection or command buttons before +a computer program is ready to accept such input, in anticipation +of the program accepting the input. Handling this properly is +rare, but it can help make a WIMP environment much more usable, +assuming the users are familiar with the behavior of the user +interface. + + +Node:mouse around, Next:mouse belt, Previous:mouse ahead, Up:= M = + +mouse around vi. + +To explore public portions of a large system, esp. a network +such as Internet via FTP or TELNET, looking for interesting stuff to snarf. + + +Node:mouse belt, Next:mouse droppings, Previous:mouse around, Up:= M = + +mouse belt n. + +See rat belt. + + +Node:mouse droppings, Next:mouse elbow, Previous:mouse belt, Up:= M = + +mouse droppings n. + +[MS-DOS] Pixels (usually single) that are not properly +restored when the mouse pointer moves away from a particular +location on the screen, producing the appearance that the mouse +pointer has left droppings behind. The major causes for this +problem are programs that write to the screen memory +corresponding to the mouse pointer's current location without +hiding the mouse pointer first, and mouse drivers that do not +quite support the graphics mode in use. + + +Node:mouse elbow, Next:mouso, Previous:mouse droppings, Up:= M = + +mouse elbow n. + +A tennis-elbow-like fatigue syndrome resulting from excessive +use of a WIMP +environment. Similarly, `mouse shoulder'; GLS reports +that he used to get this a lot before he taught himself to be +ambimoustrous. + + +Node:mouso, Next:MS-DOS, Previous:mouse elbow, Up:= M = + +mouso /mow'soh/ n. + +[by analogy with `typo'] An error in mouse usage resulting in +an inappropriate selection or graphic garbage on the screen. +Compare thinko, braino. + + +Node:MS-DOS, Next:mu, Previous:mouso, +Up:= M = + +MS-DOS /M-S-dos/ n. + +[MicroSoft Disk Operating System] A clone of CP/M for +the 8088 crufted together in 6 weeks by hacker Tim Paterson at +Seattle Computer Products, who called the original QDOS (Quick +and Dirty Operating System) and is said to have regretted it ever +since. Microsoft licensed QDOS order to have something to demo +for IBM on time, and the rest is history. Numerous features, +including vaguely Unix-like but rather broken support for +subdirectories, I/O redirection, and pipelines, were hacked into +Microsoft's 2.0 and subsequent versions; as a result, there are +two or more incompatible versions of many system calls, and +MS-DOS programmers can never agree on basic things like what +character to use as an option switch or whether to be +case-sensitive. The resulting appalling mess is now the +highest-unit-volume OS in history. Often known simply as DOS, +which annoys people familiar with other similarly abbreviated +operating systems (the name goes back to the mid-1960s, when it +was attached to IBM's first disk operating system for the 360). +The name further annoys those who know what the term operating system does (or ought to) +connote; DOS is more properly a set of relatively simple +interrupt services. Some people like to pronounce DOS like +"dose", as in "I don't work on dose, man!", or to compare it to a +dose of brain-damaging drugs (a slogan button in wide circulation +among hackers exhorts: "MS-DOS: Just say No!"). See mess-dos, ill-behaved. + + +Node:mu, Next:MUD, +Previous:MS-DOS, Up:= M = + +mu /moo/ + +The correct answer to the classic trick question "Have you +stopped beating your wife yet?". Assuming that you have no wife +or you have never beaten your wife, the answer "yes" is wrong +because it implies that you used to beat your wife and then +stopped, but "no" is worse because it suggests that you have one +and are still beating her. According to various Discordians and +Douglas Hofstadter the correct answer is usually "mu", a Japanese +word alleged to mean "Your question cannot be answered because it +depends on incorrect assumptions". Hackers tend to be sensitive +to logical inadequacies in language, and many have adopted this +suggestion with enthusiasm. The word `mu' is actually from +Chinese, meaning `nothing'; it is used in mainstream Japanese in +that sense. Native speakers do not recognize the Discordian +question-denying use, which almost certainly derives from +overgeneralization of the answer in the following well-known +Rinzai Zen koan: + +A monk asked Joshu, "Does a dog have the Buddha +nature?" Joshu retorted, "Mu!" + + +See also has the X +nature, Some AI +Koans, and Douglas Hofstadter's "Gödel, Escher, +Bach: An Eternal Golden Braid" (pointer in the Bibliography in Appendix C. + + +Node:MUD, Next:muddie, Previous:mu, Up:= M = + +MUD /muhd/ n. + +[acronym, Multi-User Dungeon; alt. Multi-User Dimension] 1. A +class of virtual reality +experiments accessible via the Internet. These are real-time chat +forums with structure; they have multiple `locations' like an +adventure game, and may include combat, traps, puzzles, magic, a +simple economic system, and the capability for characters to +build more structure onto the database that represents the +existing world. 2. vi. To play a MUD. The acronym MUD is often +lowercased and/or verbed; thus, one may speak of `going mudding', +etc. + +Historically, MUDs (and their more recent progeny with names +of MU- form) derive from a hack by Richard Bartle and Roy +Trubshaw on the University of Essex's DEC-10 in the early 1980s; +descendants of that game still exist today and are sometimes +generically called _BartleMUD_s. There is a widespread myth +(repeated, unfortunately, by earlier versions of this lexicon) +that the name MUD was trademarked to the commercial MUD run by +Bartle on British Telecom (the motto: "You haven't lived +'til you've died on MUD!"); however, this is false -- +Richard Bartle explicitly placed `MUD' in the public domain in +1985. BT was upset at this, as they had already printed trademark +claims on some maps and posters, which were released and created +the myth. + +Students on the European academic networks quickly improved on +the MUD concept, spawning several new MUDs (VAXMUD, AberMUD, +LPMUD). Many of these had associated bulletin-board systems for +social interaction. Because these had an image as `research' they +often survived administrative hostility to BBSs in general. This, +together with the fact that Usenet feeds were often spotty and +difficult to get in the U.K., made the MUDs major foci of hackish +social interaction there. + +AberMUD and other variants crossed the Atlantic around 1988 +and quickly gained popularity in the U.S.; they became nuclei for +large hacker communities with only loose ties to traditional +hackerdom (some observers see parallels with the growth of Usenet +in the early 1980s). The second wave of MUDs (TinyMUD and +variants) tended to emphasize social interaction, puzzles, and +cooperative world-building as opposed to combat and competition +(in writing, these social MUDs are sometimes referred to as +`MU*', with `MUD' implicitly reserved for the more game-oriented +ones). By 1991, over 50% of MUD sites were of a third major +variety, LPMUD, which synthesizes the combat/puzzle aspects of +AberMUD and older systems with the extensibility of TinyMud. In +1996 the cutting edge of the technology is Pavel Curtis's MOO, +even more extensible using a built-in object-oriented language. +The trend toward greater programmability and flexibility will +doubtless continue. + +The state of the art in MUD design is still moving very +rapidly, with new simulation designs appearing (seemingly) every +month. Around 1991 there was an unsuccessful movement to +deprecate the term MUD itself, as newer +designs exhibit an exploding variety of names corresponding to +the different simulation styles being explored. It survived. See +also bonk/oif, FOD, link-dead, +mudhead, talk mode. + + +Node:muddie, Next:mudhead, Previous:MUD, Up:= M = + + +muddie n. + +Syn. mudhead. More common in +Great Britain, possibly because system administrators there like +to mutter "bloody muddies" when annoyed at the species. + + +Node:mudhead, Next:muggle, Previous:muddie, Up:= M += + +mudhead n. + +Commonly used to refer to a MUD +player who eats, sleeps, and breathes MUD. Mudheads have been +known to fail their degrees, drop out, etc., with the +consolation, however, that they made wizard level. When +encountered in person, on a MUD, or in a chat system, all a +mudhead will talk about is three topics: the tactic, character, +or wizard that is supposedly always unfairly stopping him/her +from becoming a wizard or beating a favorite MUD; why the +specific game he/she has experience with is so much better than +any other; and the MUD he or she is writing or going to write +because his/her design ideas are so much better than in any +existing MUD. See also wannabee. + +To the anthropologically literate, this term may recall the +Zuni/Hopi legend of the mudheads or `koyemshi', mythical +half-formed children of an unnatural union. Figures representing +them act as clowns in Zuni sacred ceremonies. Others may recall +the `High School Madness' sequence from the Firesign Theatre +album "Don't Crush That Dwarf, Hand Me the Pliers", in which +there is a character named "Mudhead". + + +Node:muggle, Next:multician, Previous:mudhead, Up:= M += + +muggle + +[from J.K. Rowling's `Harry Potter' books, 1998] A non-wizard. Not as disparaging as luser; implies vague pity rather than contempt. +In the universe of Rowling's enormously (and deservedly) popular +children's series, muggles and wizards inhabit the same modern +world, but each group is ignorant of the commonplaces of the +others' existence - most muggles are unaware that wizards exist, +and wizards (used to magical ways of doing everything) are +perplexed and fascinated by muggle artifacts. + +In retrospect it seems completely inevitable that hackers +would adopt this metaphor, and in hacker usage it readily forms +compounds such as `muggle-friendly'. Compare luser, mundane. + + +Node:multician, Next:Multics, Previous:muggle, Up:= M += + +multician /muhl-ti'shn/ n. + +[coined at Honeywell, ca. 1970] Competent user of Multics. Perhaps oddly, no one has ever +promoted the analogous `Unician'. + + +Node:Multics, Next:multitask, Previous:multician, Up:= M = + +Multics /muhl'tiks/ n. + +[from "MULTiplexed Information and Computing Service"] An +early time-sharing operating +system co-designed by a consortium including MIT, GE, and +Bell Laboratories as a successor to CTSS. The design was first presented in 1965, +planned for operation in 1967, first operational in 1969, and +took several more years to achieve respectable performance and +stability. + +Multics was very innovative for its time -- among other +things, it provided a hierarchical file system with access +control on individual files and introduced the idea of treating +all devices uniformly as special files. It was also the first OS +to run on a symmetric multiprocessor, and the only +general-purpose system to be awarded a B2 security rating by the +NSA (see Orange Book). + +Bell Labs left the development effort in 1969 after judging +that second-system +effect had bloated Multics to the point of practical +unusability. Honeywell commercialized Multics in 1972 after +buying out GE's computer group, but it was never very successful: +at its peak in the 1980s, there were between 75 and 100 Multics +sites, each a multi-million dollar mainframe. + +One of the former Multics developers from Bell Labs was Ken +Thompson, and Unix deliberately +carried through and extended many of Multics' design ideas; +indeed, Thompson described the very name `Unix' as `a weak pun on +Multics'. For this and other reasons, aspects of the Multics +design remain a topic of occasional debate among hackers. See +also brain-damaged and GCOS. + +MIT ended its development association with Multics in 1977. +Honeywell sold its computer business to Bull in the mid 80s, and +development on Multics was stopped in 1988. Four Multics sites +were known to be still in use as late as 1998. There is a Multics +page at http://www.stratus.com/pub/vos/multics/tvv/multics.html. + + +Node:multitask, Next:mumblage, Previous:Multics, Up:= M += + +multitask n. + +Often used of humans in the same meaning it has for computers, +to describe a person doing several things at once (but see thrash). The term `multiplex', from +communications technology (meaning to handle more than one +channel at the same time), is used similarly. + + +Node:mumblage, Next:mumble, Previous:multitask, Up:= M = + +mumblage /muhm'bl*j/ n. + +The topic of one's mumbling (see mumble). "All that mumblage" is used like "all +that stuff" when it is not quite clear how the subject of +discussion works, or like "all that crap" when `mumble' is being +used as an implicit replacement for pejoratives. + + +Node:mumble, Next:munch, Previous:mumblage, Up:= +M = + +mumble interj. + +1. Said when the correct response is too complicated to +enunciate, or the speaker has not thought it out. Often prefaces +a longer answer, or indicates a general reluctance to get into a +long discussion. "Don't you think that we could improve LISP +performance by using a hybrid reference-count transaction garbage +collector, if the cache is big enough and there are some extra +cache bits for the microcode to use?" "Well, mumble +... I'll have to think about it." 2. [MIT] +Expression of not-quite-articulated agreement, often used as an +informal vote of consensus in a meeting: "So, shall we dike out +the COBOL emulation?" "Mumble!" 3. Sometimes used as an +expression of disagreement (distinguished from sense 2 by tone of +voice and other cues). "I think we should buy a VAX." "Mumble!" Common variant: `mumble frotz' +(see frotz; interestingly, one does +not say `mumble frobnitz' even though `frotz' is short for +`frobnitz'). 4. Yet another metasyntactic variable, like +foo. 5. When used as a question +("Mumble?") means "I didn't understand you". 6. Sometimes used in +`public' contexts on-line as a placefiller for things one is +barred from giving details about. For example, a poster with +pre-released hardware in his machine might say "Yup, my machine +now has an extra 16M of memory, thanks to the card I'm testing +for Mumbleco." 7. A conversational wild card used to designate +something one doesn't want to bother spelling out, but which can +be glarked from context. Compare +blurgle. 8. [XEROX PARC] A +colloquialism used to suggest that further discussion would be +fruitless. + + +Node:munch, Next:munching, Previous:mumble, Up:= M += + +munch vt. + +[often confused with mung, q.v.] To +transform information in a serial fashion, often requiring large +amounts of computation. To trace down a data structure. Related +to crunch and nearly synonymous with +grovel, but connotes less pain. + + +Node:munching, Next:munching squares, Previous:munch, Up:= M = + +munching n. + +Exploration of security holes of someone else's computer for +thrills, notoriety, or to annoy the system manager. Compare cracker. See also hacked off. + + +Node:munching squares, Next:munchkin, Previous:munching, Up:= M = + +munching squares n. + +A display hack dating +back to the PDP-1 (ca. 1962, reportedly discovered by Jackson +Wright), which employs a trivial computation (repeatedly plotting +the graph Y = X XOR T for successive values of T -- see HAKMEM items 146-148) to produce an +impressive display of moving and growing squares that devour the +screen. The initial value of T is treated as a parameter, which, +when well-chosen, can produce amazing effects. Some of these, +later (re)discovered on the LISP machine, have been christened +`munching triangles' (try AND for XOR and toggling points instead +of plotting them), `munching w's', and `munching mazes'. More +generally, suppose a graphics program produces an impressive and +ever-changing display of some basic form, foo, on a display +terminal, and does it using a relatively simple program; then the +program (or the resulting display) is likely to be referred to as +`munching foos'. [This is a good example of the use of the word +foo as a metasyntactic variable.] + + +Node:munchkin, Next:mundane, Previous:munching squares, Up:= M = + +munchkin /muhnch'kin/ n. + +[from the squeaky-voiced little people in L. Frank Baum's "The +Wizard of Oz"] A teenage-or-younger micro enthusiast hacking +BASIC or something else equally constricted. A term of mild +derision -- munchkins are annoying but some grow up to be hackers +after passing through a larval +stage. The term urchin is +also used. See also wannabee, +bitty box. + + +Node:mundane, Next:mung, Previous:munchkin, Up:= +M = + +mundane n. + +[from SF fandom] 1. A person who is not in science fiction +fandom. 2. A person who is not in the computer industry. In this +sense, most often an adjectival modifier as in "in my mundane +life...." See also Real +World, muggle. + + +Node:mung, Next:munge, Previous:mundane, Up:= M += + +mung /muhng/ vt. + +[in 1960 at MIT, `Mash Until No Good'; sometime after that the +derivation from the recursive +acronym `Mung Until No Good' became standard; but see +munge] 1. To make changes to a file, +esp. large-scale and irrevocable changes. See BLT. 2. To destroy, usually accidentally, +occasionally maliciously. The system only mungs things +maliciously; this is a consequence of Finagle's Law. See scribble, mangle, trash, +nuke. Reports from Usenet suggest that the pronunciation /muhnj/ +is now usual in speech, but the spelling `mung' is still common +in program comments (compare the widespread confusion over the +proper spelling of kluge). 3. The +kind of beans the sprouts of which are used in Chinese food. +(That's their real name! Mung beans! Really!) + +Like many early hacker terms, this one seems to have +originated at TMRC; it was already in +use there in 1958. Peter Samson (compiler of the original TMRC +lexicon) thinks it may originally have been onomatopoeic for the +sound of a relay spring (contact) being twanged. However, it is +known that during the World Wars, `mung' was U.S. army slang for +the ersatz creamed chipped beef better known as `SOS', and it +seems quite likely that the word in fact goes back to +Scots-dialect munge. + + +Node:munge, Next:Murphy's Law, Previous:mung, Up:= M += + +munge /muhnj/ vt. + +1. [derogatory] To imperfectly transform information. 2. A +comprehensive rewrite of a routine, data structure or the whole +program. 3. To modify data in some way the speaker doesn't need +to go into right now or cannot describe succinctly (compare mumble). 4. To add spamblock to an email address. + +This term is often confused with mung, which probably was derived from it. +However, it also appears the word `munge' was in common use in +Scotland in the 1940s, and in Yorkshire in the 1950s, as a verb, +meaning to munch up into a masticated mess, and as a noun, +meaning the result of munging something up (the parallel with the +kluge/kludge pair is amusing). The OED reports +`munge' as an archaic verb nmeaning "to wipe (a person's +nose)". + + +Node:Murphy's Law, Next:music, Previous:munge, Up:= M += + +Murphy's Law prov. + +The correct, original Murphy's Law reads: "If there +are two or more ways to do something, and one of those ways can +result in a catastrophe, then someone will do it." This is a +principle of defensive design, cited here because it is usually +given in mutant forms less descriptive of the challenges of +design for lusers. For example, you +don't make a two-pin plug symmetrical and then label it `THIS WAY +UP'; if it matters which way it is plugged in, then you make the +design asymmetrical (see also the anecdote under magic smoke). + +Edward A. Murphy, Jr. was one of the engineers on the +rocket-sled experiments that were done by the U.S. Air Force in +1949 to test human acceleration tolerances (USAF project MX981). +One experiment involved a set of 16 accelerometers mounted to +different parts of the subject's body. There were two ways each +sensor could be glued to its mount, and somebody methodically +installed all 16 the wrong way around. Murphy then made the +original form of his pronouncement, which the test subject (Major +John Paul Stapp) quoted at a news conference a few days +later. + +Within months `Murphy's Law' had spread to various technical +cultures connected to aerospace engineering. Before too many +years had gone by variants had passed into the popular +imagination, changing as they went. Most of these are variants on +"Anything that can go wrong, will"; this is correctly referred to +as Finagle's Law. The +memetic drift apparent in these mutants clearly demonstrates +Murphy's Law acting on itself! + + +Node:music, Next:mutter, Previous:Murphy's Law, Up:= M = + +music n. + +A common extracurricular interest of hackers (compare science-fiction fandom, +oriental food; see also +filk). Hackish folklore has long +claimed that musical and programming abilities are closely +related, and there has been at least one large-scale statistical +study that supports this. Hackers, as a rule, like music and +often develop musical appreciation in unusual and interesting +directions. Folk music is very big in hacker circles; so is +electronic music, and the sort of elaborate instrumental +jazz/rock that used to be called `progressive' and isn't recorded +much any more. The hacker's musical range tends to be wide; many +can listen with equal appreciation to (say) Talking Heads, Yes, +Gentle Giant, Pat Metheny, Scott Joplin, Tangerine Dream, Dream +Theater, King Sunny Ade, The Pretenders, Screaming Trees, or the +Brandenburg Concerti. It is also apparently true that hackerdom +includes a much higher concentration of talented amateur +musicians than one would expect from a similar-sized control +group of mundane types. + + +Node:mutter, Next:N, Previous:music, +Up:= M = + +mutter vt. + +To quietly enter a command not meant for the ears, eyes, or +fingers of ordinary mortals. Often used in `mutter an incantation'. See also wizard. + + +Node:= N =, Next:= O =, Previous:= M =, Up:The Jargon Lexicon + += N = + + +N: + + +nadger: + + +nagware: + + +nailed to the +wall: + + +nailing jelly: + + +naive: + + +naive user: + + +NAK: + + +NANA: + + +nano: + + +nano-: + + +nanoacre: + + +nanobot: + + +nanocomputer: + + +nanofortnight: + + +nanotechnology: + + +nasal demons: + + +nastygram: + + +Nathan Hale: + + +nature: + + +neat hack: + + +neats vs. +scruffies: + + +neep-neep: + + +neophilia: + + +nerd: + + +nerd knob: + + +net.-: + + +net.god: + + +net.personality: + + +net.police: + + +NetBOLLIX: + + +netburp: + + +netdead: + + +nethack: + + +netiquette: + + +netlag: + + +netnews: + + +netrock: + + +Netscrape: + + +netsplit: + + +netter: + + +network address: + + +network meltdown: + + +New Jersey: + + +New Testament: + + +newbie: + + +newgroup wars: + + +newline: + + +NeWS: + + +newsfroup: + + +newsgroup: + + +nick: + + +nickle: + + +night mode: + + +Nightmare File +System: + + +NIL: + + +Ninety-Ninety Rule: + + +nipple mouse: + + +NMI: + + +no-op: + + +noddy: + + +node: + + +Nominal +Semidestructor: + + +non-optimal +solution: + + +nonlinear: + + +nontrivial: + + +not ready for +prime time: + + +notwork: + + +NP-: + + +nroff: + + +NSA line eater: + + +NSP: + + +nude: + + +nugry: + + +nuke: + + +number-crunching: + + +numbers: + + +NUXI problem: + + +nybble: + + +nyetwork: + + +Node:N, Next:nadger, Previous:mutter, Up:= N += + +N /N/ quant. + +1. A large and indeterminate number of objects: "There were N +bugs in that crock!" Also used in its original sense of a +variable name: "This crock has N bugs, as N goes to infinity." +(The true number of bugs is always at least N + 1; see Lubarsky's Law +of Cybernetic Entomology.) 2. A variable whose value is +inherited from the current context. For example, when a meal is +being ordered at a restaurant, N may be understood to mean +however many people there are at the table. From the remark "We'd +like to order N wonton soups and a family dinner for N - 1" you +can deduce that one person at the table wants to eat only soup, +even though you don't know how many people there are (see great-wall). 3. `Nth': adj. The +ordinal counterpart of N, senses 1 and 2. "Now for the Nth and +last time..." In the specific context "Nth-year +grad student", N is generally assumed to be at least 4, and is +usually 5 or more (see tenured graduate +student). See also random +numbers, two-to-the-N. + + +Node:nadger, Next:nagware, Previous:N, Up:= N = + +nadger /nad'jr/ v. + +[UK, from rude slang noun `nadgers' for testicles; compare +American & British `bollixed'] Of software or hardware (not +people), to twiddle some object in a hidden manner, generally so +that it conforms better to some format. For instance, string +printing routines on 8-bit processors often take the string text +from the instruction stream, thus a print call looks like +jsr print:"Hello world". The print routine has to +`nadger' the saved instruction pointer so that the processor +doesn't try to execute the text as instructions when the +subroutine returns. See adger. + + +Node:nagware, Next:nailed to the wall, Previous:nadger, Up:= N = + +nagware /nag'weir/ n. + +[Usenet] The variety of shareware that displays a large screen at +the beginning or end reminding you to register, typically +requiring some sort of keystroke to continue so that you can't +use the software in batch mode. Compare annoyware, crippleware. + + +Node:nailed to the wall, +Next:nailing jelly, +Previous:nagware, Up:= N = + +nailed to the wall adj. + +[like a trophy] Said of a bug finally eliminated after +protracted, and even heroic, effort. + + +Node:nailing jelly, Next:naive, Previous:nailed to the wall, Up:= N = + +nailing jelly vi. + +See like +nailing jelly to a tree. + + +Node:naive, Next:naive user, Previous:nailing jelly, Up:= N = + +naive adj. + +1. Untutored in the perversities of some particular program or +system; one who still tries to do things in an intuitive way, +rather than the right way (in really good designs these coincide, +but most designs aren't `really good' in the appropriate sense). +This trait is completely unrelated to general maturity or +competence, or even competence at any other specific program. It +is a sad commentary on the primitive state of computing that the +natural opposite of this term is often claimed to be `experienced +user' but is really more like `cynical user'. 2. Said of an +algorithm that doesn't take advantage of some superior but +advanced technique, e.g., the bubble +sort. It may imply naivete on the part of the programmer, +although there are situations where a naive algorithm is +preferred, because it is more important to keep the code +comprehensible than to go for maximum performance. "I know the +linear search is naive, but in this case the list typically only +has half a dozen items." + + +Node:naive user, Next:NAK, Previous:naive, Up:= N += + +naive user n. + +A luser. Tends to imply someone +who is ignorant mainly owing to inexperience. When this is +applied to someone who has experience, there is a +definite implication of stupidity. + + +Node:NAK, Next:NANA, Previous:naive user, Up:= N = + +NAK /nak/ interj. + +[from the ASCII mnemonic for 0010101] 1. On-line joke answer +to ACK?: "I'm not here." 2. On-line +answer to a request for chat: "I'm not available." 3. Used to +politely interrupt someone to tell them you don't understand +their point or that they have suddenly stopped making sense. See +ACK, sense 3. "And then, after we +recode the project in COBOL...." "Nak, Nak, Nak! I +thought I heard you say COBOL!" 4. A negative answer. "OK if I +boot the server?" "NAK!" + + +Node:NANA, Next:nano, Previous:NAK, +Up:= N = + +NANA // + +[Usenet] The newsgroups news.admin.net-abuse.*, devoted to +fighting spam and network abuse. Each +individual newsgroup is often referred to by adding a letter to +NANA. For example, NANAU would refer to +news.admin.net-abuse.usenet. + +When spam began to be a serious problem around 1995, and a +loose network of anti-spammers formed to combat it, spammers +immediately accused them of being the backbone cabal, or the Cabal reborn. +Though this was not true, spam-fighters ironically accepted the +label and the tag line "There is No Cabal" reappeared (later, and +now commonly, abbreviated to "TINC"). Nowadays "the Cabal" is +generally understood to refer to the NANA regulars. + + +Node:nano, Next:nano-, Previous:NANA, Up:= N = + + +nano /nan'oh/ n. + +[CMU: from `nanosecond'] A brief period of time. "Be with you +in a nano" means you really will be free shortly, i.e., implies +what mainstream people mean by "in a jiffy" (whereas the hackish +use of `jiffy' is quite different -- see jiffy). + + +Node:nano-, Next:nanoacre, Previous:nano, Up:= N = + + +nano- pref. + +[SI: the next quantifier below micro-; meaning * 10^(-9)] Smaller than micro-, and used in the same rather loose +and connotative way. Thus, one has nanotechnology (coined by hacker K. +Eric Drexler) by analogy with `microtechnology'; and a few +machine architectures have a `nanocode' level below `microcode'. +Tom Duff at Bell Labs has also pointed out that "Pi seconds is a +nanocentury". See also quantifiers, pico-, nanoacre, +nanobot, nanocomputer, nanofortnight. + + +Node:nanoacre, Next:nanobot, Previous:nano-, Up:= N += + +nanoacre /nan'oh-ay`kr/ n. + +A unit (about 2 mm square) of real estate on a VLSI chip. The +term gets its giggle value from the fact that VLSI nanoacres have +costs in the same range as real acres once one figures in design +and fabrication-setup costs. + + +Node:nanobot, Next:nanocomputer, Previous:nanoacre, Up:= N = + +nanobot /nan'oh-bot/ n. + +A robot of microscopic proportions, presumably built by means +of nanotechnology. As yet, +only used informally (and speculatively!). Also called a +`nanoagent'. + + +Node:nanocomputer, Next:nanofortnight, Previous:nanobot, Up:= N = + +nanocomputer /nan'oh-k*m-pyoo'tr/ n. + +A computer with molecular-sized switching elements. Designs +for mechanical nanocomputers which use single-molecule sliding +rods for their logic have been proposed. The controller for a +nanobot would be a +nanocomputer. + + +Node:nanofortnight, Next:nanotechnology, Previous:nanocomputer, Up:= N = + +nanofortnight n. + +[Adelaide University] 1 fortnight * 10^(-9), or about 1.2 +msec. This unit was used largely by students doing undergraduate +practicals. See microfortnight, attoparsec, and micro-. + + +Node:nanotechnology, Next:nasal demons, Previous:nanofortnight, Up:= N = + +nanotechnology /nan'-oh-tek-no`l*-jee/ n. + +A hypothetical fabrication technology in which objects are +designed and built with the individual specification and +placement of each separate atom. The first unequivocal +nanofabrication experiments took place in 1990, for example with +the deposition of individual xenon atoms on a nickel substrate to +spell the logo of a certain very large computer company. +Nanotechnology has been a hot topic in the hacker subculture ever +since the term was coined by K. Eric Drexler in his book "Engines +of Creation" (Anchor/Doubleday, ISBN 0-385-19973-2), where he +predicted that nanotechnology could give rise to replicating +assemblers, permitting an exponential growth of productivity and +personal wealth (there's an authorized transcription at http://www.foresight.org/EOC/index.html.). +See also blue goo, gray goo, nanobot. + + +Node:nasal demons, Next:nastygram, Previous:nanotechnology, Up:= N = + +nasal demons n. + +Recognized shorthand on the Usenet group _comp.std.c_ for +any unexpected behavior of a C compiler on encountering an +undefined construct. During a discussion on that group in early +1992, a regular remarked "When the compiler encounters [a given +undefined construct] it is legal for it to make demons fly out of +your nose" (the implication is that the compiler may choose any +arbitrarily bizarre way to interpret the code without violating +the ANSI C standard). Someone else followed up with a reference +to "nasal demons", which quickly became established. + + +Node:nastygram, Next:Nathan Hale, Previous:nasal demons, Up:= N = + +nastygram /nas'tee-gram/ n. + +1. A protocol packet or item of email (the latter is also +called a letterbomb) that takes +advantage of misfeatures or security holes on the target system +to do untoward things. 2. Disapproving mail, esp. from a net.god, pursuant to a violation of netiquette or a complaint about +failure to correct some mail- or news-transmission problem. +Compare shitogram, mailbomb. 3. A status report from an unhappy, +and probably picky, customer. "What'd Corporate say in today's +nastygram?" 4. [deprecated] An error reply by mail from a daemon; in particular, a bounce message. + + +Node:Nathan Hale, Next:nature, Previous:nastygram, Up:= N = + +Nathan Hale n. + +An asterisk (see also splat, ASCII). Oh, you want an etymology? +Notionally, from "I regret that I have only one asterisk for my +country!", a misquote of the famous remark uttered by Nathan Hale +just before he was hanged. Hale was a (failed) spy for the rebels +in the American War of Independence. + + +Node:nature, Next:neat hack, Previous:Nathan Hale, Up:= N = + +nature n. + +See has the X +nature. + + +Node:neat hack, Next:neats vs. scruffies, +Previous:nature, Up:= N = + +neat hack n. + +[very common] 1. A clever technique. 2. A brilliant practical +joke, where neatness is correlated with cleverness, harmlessness, +and surprise value. Example: the Caltech Rose Bowl card display +switch (see Appendix A for +discussion). See also hack. + + +Node:neats vs. scruffies, +Next:neep-neep, Previous:neat hack, Up:= N = + +neats vs. scruffies n. + +The label used to refer to one of the continuing holy wars in AI research. This conflict +tangles together two separate issues. One is the relationship +between human reasoning and AI; `neats' tend to try to build +systems that `reason' in some way identifiably similar to the way +humans report themselves as doing, while `scruffies' profess not +to care whether an algorithm resembles human reasoning in the +least as long as it works. More importantly, neats tend to +believe that logic is king, while scruffies favor looser, more +ad-hoc methods driven by empirical knowledge. To a neat, scruffy +methods appear promiscuous, successful only by accident, and not +productive of insights about how intelligence actually works; to +a scruffy, neat methods appear to be hung up on formalism and +irrelevant to the hard-to-capture `common sense' of living +intelligences. + + +Node:neep-neep, Next:neophilia, Previous:neats vs. scruffies, Up:= N = + +neep-neep /neep neep/ n. + +[onomatopoeic, widely spread through SF fandom but reported to +have originated at Caltech in the 1970s] One who is fascinated by +computers. Less specific than hacker, as it need not imply more skill than is +required to boot games on a PC. The derived noun `neeping' +applies specifically to the long conversations about computers +that tend to develop in the corners at most SF-convention parties +(the term `neepery' is also in wide use). Fandom has a related +proverb to the effect that "Hacking is a conversational black +hole!". + + +Node:neophilia, Next:nerd, Previous:neep-neep, Up:= N = + +neophilia /nee`oh-fil'-ee-*/ n. + +The trait of being excited and pleased by novelty. Common +among most hackers, SF fans, and members of several other +connected leading-edge subcultures, including the pro-technology +`Whole Earth' wing of the ecology movement, space activists, many +members of Mensa, and the Discordian/neo-pagan underground. All +these groups overlap heavily and (where evidence is available) +seem to share characteristic hacker tropisms for science fiction, +music, and oriental food. The opposite tendency +is `neophobia'. + + +Node:nerd, Next:nerd knob, Previous:neophilia, Up:= N = + +nerd n. + +1. [mainstream slang] Pejorative applied to anyone with an +above-average IQ and few gifts at small talk and ordinary social +rituals. 2. [jargon] Term of praise applied (in conscious ironic +reference to sense 1) to someone who knows what's really +important and interesting and doesn't care to be distracted by +trivial chatter and silly status games. Compare the two senses of +computer geek. + +The word itself appears to derive from the lines "And then, +just to show them, I'll sail to Ka-Troo / And Bring Back an +It-Kutch, a Preep and a Proo, / A Nerkle, a Nerd, and a +Seersucker, too!" in the Dr. Seuss book "If I Ran the Zoo" +(1950). (The spellings `nurd' and `gnurd' also used to be current +at MIT, where `nurd' is reported from as far back as 1957.) How +it developed its mainstream meaning is unclear, but sense 1 seems +to have entered mass culture in the early 1970s (there are +reports that in the mid-1960s it meant roughly "annoying misfit" +without the connotation of intelligence). + +An IEEE Spectrum article (4/95, page 16) once derived `nerd' +in its variant form `knurd' from the word `drunk' backwards, but +this bears all the hallmarks of a bogus folk etymology. + +Hackers developed sense 2 in self-defense perhaps ten years +later, and some actually wear "Nerd Pride" buttons, only half as +a joke. At MIT one can find not only buttons but (what else?) +pocket protectors bearing the slogan and the MIT seal. + + +Node:nerd knob, Next:net.-, Previous:nerd, Up:= N = + + +nerd knob n. + +[Cisco] a command in a complex piece of software which is more +likely to be used by an extremely experienced user to tweak a +setting of one sort or another - a setting which the average user +may not even know exists. Nerd knobs tend to be toggles, turning +on or off a particular, specific, narrowly defined behavior. + + +Node:net.-, Next:net.god, Previous:nerd knob, Up:= N = + +net.- /net dot/ pref. + +[Usenet] Prefix used to describe people and events related to +Usenet. From the time before the Great Renaming, when most non-local +newsgroups had names beginning `net.'. Includes net.gods, `net.goddesses' (various charismatic +net.women with circles of on-line admirers), `net.lurkers' (see +lurker), `net.person', `net.parties' +(a synonym for boink, sense 2), and +many similar constructs. See also net.police. + + +Node:net.god, Next:net.personality, Previous:net.-, Up:= N = + +net.god /net god/ n. + +Accolade referring to anyone who satisfies some combination of +the following conditions: has been visible on Usenet for more +than 5 years, ran one of the original backbone sites, moderated +an important newsgroup, wrote news software, or knows Gene, Mark, +Rick, Mel, Henry, Chuq, and Greg personally. See demigod. Net.goddesses such as Rissa or the +Slime Sisters have (so far) been distinguished more by +personality than by authority. + + +Node:net.personality, Next:net.police, Previous:net.god, Up:= N = + +net.personality /net per`sn-al'-*-tee/ n. + +Someone who has made a name for him or herself on Usenet, through either longevity or +attention-getting posts, but doesn't meet the other requirements +of net.godhood. + + +Node:net.police, Next:NetBOLLIX, Previous:net.personality, Up:= N = + +net.police /net-p*-lees'/ n. + +(var. `net.cops') Those Usenet readers who feel it is their +responsibility to pounce on and flame +any posting which they regard as offensive or in violation of +their understanding of netiquette. Generally used sarcastically or +pejoratively. Also spelled `net police'. See also net.-, code +police. + + +Node:NetBOLLIX, Next:netburp, Previous:net.police, Up:= N = + +NetBOLLIX n. + +[from bollix: to bungle, or British `bollocks'] IBM's NetBIOS, an extremely brain-damaged network protocol that, +like Blue Glue, is used at +commercial shops that don't know any better. + + +Node:netburp, Next:netdead, Previous:NetBOLLIX, Up:= N = + +netburp n. + +[IRC] When netlag gets really +bad, and delays between servers exceed a certain threshhold, the +IRC network effectively becomes +partitioned for a period of time, and large numbers of people +seem to be signing off at the same time and then signing back on +again when things get better. An instance of this is called a +`netburp' (or, sometimes, netsplit). + + +Node:netdead, Next:nethack, Previous:netburp, Up:= N += + +netdead n. + +[IRC] The state of someone who signs off IRC, perhaps during a netburp, and doesn't sign back on until later. +In the interim, he is "dead to the net". Compare link-dead. + + +Node:nethack, Next:netiquette, Previous:netdead, Up:= N += + +nethack /net'hak/ n. + +[Unix] A dungeon game similar to rogue but more elaborate, distributed in C +source over Usenet and very popular +at Unix sites and on PC-class machines (nethack is probably the +most widely distributed of the freeware dungeon games). The +earliest versions, written by Jay Fenlason and later considerably +enhanced by Andries Brouwer, were simply called `hack'. The name +changed when maintenance was taken over by a group of hackers +originally organized by Mike Stephenson. There is now an official +site one at http://www.nethack.org/. See also +moria, rogue, Angband. + + +Node:netiquette, Next:netlag, Previous:nethack, Up:= N += + +netiquette /net'ee-ket/ or /net'i-ket/ n. + +[portmanteau, network + etiquette] The conventions of +politeness recognized on Usenet, +such as avoidance of cross-posting to inappropriate groups and +refraining from commercial pluggery outside the _biz_ +groups. + + +Node:netlag, Next:netnews, Previous:netiquette, Up:= N = + +netlag n. + +[IRC, MUD] A condition that occurs when the delays in the +IRC network or on a MUD become severe enough that servers briefly lose +and then reestablish contact, causing messages to be delivered in +bursts, often with delays of up to a minute. (Note that this term +has nothing to do with mainstream "jet lag", a condition which +hackers tend not to be much bothered by.) Often shortened to just +`lag'. + + +Node:netnews, Next:netrock, Previous:netlag, Up:= N += + +netnews /net'n[y]ooz/ n. + +1. The software that makes Usenet +run. 2. The content of Usenet. "I read netnews right after my +mail most mornings." + + +Node:netrock, Next:Netscrape, Previous:netnews, Up:= N += + +netrock /net'rok/ n. + +[IBM] A flame; used esp. on VNET, +IBM's internal corporate network. + + +Node:Netscrape, Next:netsplit, Previous:netrock, Up:= N += + +Netscrape n. + +[sometimes elaborated to `Netscrape Fornicator', also +`Nutscrape'] Standard name-of-insult for Netscape +Navigator/Communicator, Netscape's overweight Web browser. +Compare Internet +Exploiter. + + +Node:netsplit, Next:netter, Previous:Netscrape, Up:= N = + +netsplit n. + +Syn. netburp. + + +Node:netter, Next:network address, Previous:netsplit, Up:= N = + +netter n. + +1. Loosely, anyone with a network address. 2. More +specifically, a Usenet regular. Most +often found in the plural. "If you post that in a +technical group, you're going to be flamed by angry netters for +the rest of time!" + + +Node:network address, Next:network meltdown, +Previous:netter, Up:= N = + +network address n. + +(also `net address') As used by hackers, means an address on +`the' network (see the +network; this used to include bang path addresses but now almost always +implies an Internet +address). Net addresses are often used in email text as a +more concise substitute for personal names; indeed, hackers may +come to know each other quite well by network names without ever +learning each others' `legal' monikers. Indeed, display of a +network address (e.g on business cards) used to function as an +important hacker identification signal, like lodge pins among +Masons or tie-dyed T-shirts among Grateful Dead fans. In the day +of pervasive Internet this is less true, but you can still be +fairly sure that anyone with a network address handwritten on his +or her convention badge is a hacker. + + +Node:network meltdown, Next:New Jersey, Previous:network address, Up:= N = + +network meltdown n. + +A state of complete network overload; the network equivalent +of thrashing. This may be induced by +a Chernobyl packet. See +also broadcast storm, +kamikaze packet. + +Network meltdown is often a result of network designs that are +optimized for a steady state of moderate load and don't cope well +with the very jagged, bursty usage patterns of the real world. +One amusing instance of this is triggered by the popular and very +bloody shoot-'em-up game _Doom_ on the PC. When used in +multiplayer mode over a network, the game uses broadcast packets +to inform other machines when bullets are fired. This causes +problems with weapons like the chain gun which fire rapidly -- it +can blast the network into a meltdown state just as easily as it +shreds opposing monsters. + + +Node:New Jersey, Next:New Testament, Previous:network meltdown, Up:= N = + +New Jersey adj. + +[primarily Stanford/Silicon Valley] Brain-damaged or of poor +design. This refers to the allegedly wretched quality of such +software as C, C++, and Unix (which originated at Bell Labs in +Murray Hill, New Jersey). "This compiler bites the bag, but what +can you expect from a compiler designed in New Jersey?" Compare +Berkeley Quality +Software. See also Unix +conspiracy. + + +Node:New Testament, Next:newbie, Previous:New Jersey, Up:= N = + +New Testament n. + +[C programmers] The second edition of K&R's "The C +Programming Language" (Prentice-Hall, 1988; ISBN 0-13-110362-8), +describing ANSI Standard C. See K&R; this version is also called +`K&R2'. + + +Node:newbie, Next:newgroup wars, Previous:New Testament, Up:= N = + +newbie /n[y]oo'bee/ n. + +[verry common; orig. from British public-school and military +slang variant of `new boy'] A Usenet neophyte. This term surfaced +in the newsgroup +_talk.bizarre_ but is now in wide use (the combination +"clueless newbie" is especially common). Criteria for being +considered a newbie vary wildly; a person can be called a newbie +in one newsgroup while remaining a respected regular in another. +The label `newbie' is sometimes applied as a serious insult to a +person who has been around Usenet for a long time but who +carefully hides all evidence of having a clue. See B1FF; see also gnubie. + + +Node:newgroup wars, Next:newline, Previous:newbie, Up:= +N = + +newgroup wars /n[y]oo'groop worz/ n. + +[Usenet] The salvos of dueling newgroup and +rmgroup messages sometimes exchanged by persons on +opposite sides of a dispute over whether a newsgroup should be created net-wide, or +(even more frequently) whether an obsolete one should be removed. +These usually settle out within a week or two as it becomes clear +whether the group has a natural constituency (usually, it +doesn't). At times, especially in the completely anarchic +_alt_ hierarchy, the names of newsgroups themselves become a +form of comment or humor; e.g., the group +_alt.swedish.chef.bork.bork.bork_ which originated as a +birthday joke for a Muppets fan, or any number of specialized +abuse groups named after particularly notorious flamers, e.g., _alt.weemba_. + + +Node:newline, Next:NeWS, Previous:newgroup wars, Up:= N = + +newline /n[y]oo'li:n/ n. + +1. [techspeak, primarily Unix] The ASCII LF character +(0001010), used under Unix as a text +line terminator. Though the term `newline' appears in ASCII +standards, it never caught on in the general computing world +before Unix. 2. More generally, any magic character, character +sequence, or operation (like Pascal's writeln procedure) required +to terminate a text record or separate lines. See crlf, terpri. + + +Node:NeWS, Next:newsfroup, Previous:newline, Up:= N += + +NeWS /nee'wis/, /n[y]oo'is/ or /n[y]ooz/ n. + +[acronym; the `Network Window System'] The road not taken in +window systems, an elegant PostScript-based environment that would +almost certainly have won the standards war with X if it hadn't been proprietary to Sun Microsystems. There is +a lesson here that too many software vendors haven't yet heeded. +Many hackers insist on the two-syllable pronunciations above as a +way of distinguishing NeWS from Usenet news (the netnews software). + + +Node:newsfroup, Next:newsgroup, Previous:NeWS, Up:= N = + + +newsfroup // n. + +[Usenet] Silly synonym for newsgroup, originally a typo but now in +regular use on Usenet's talk.bizarre, and other lunatic-fringe +groups. Compare hing, grilf, pr0n and filk. + + +Node:newsgroup, Next:nick, Previous:newsfroup, Up:= N = + +newsgroup n. + +[Usenet] One of Usenet's huge +collection of topic groups or fora. +Usenet groups can be `unmoderated' (anyone can post) or +`moderated' (submissions are automatically directed to a +moderator, who edits or filters and then posts the results). Some +newsgroups have parallel mailing +lists for Internet people with no netnews access, with +postings to the group automatically propagated to the list and +vice versa. Some moderated groups (especially those which are +actually gatewayed Internet mailing lists) are distributed as +`digests', with groups of postings periodically collected into a +single large posting with an index. + +Among the best-known are _comp.lang.c_ (the C-language +forum), _comp.arch_ (on computer architectures), +_comp.unix.wizards_ (for Unix wizards), +_rec.arts.sf.written_ and siblings (for science-fiction +fans), and _talk.politics.misc_ (miscellaneous political +discussions and flamage). + + +Node:nick, Next:nickle, Previous:newsgroup, Up:= N = + +nick n. + +[IRC; very common] Short for nickname. On IRC, every user must pick a nick, which is +sometimes the same as the user's real name or login name, but is +often more fanciful. Compare handle, +screen name. + + +Node:nickle, Next:night mode, Previous:nick, Up:= N = + + +nickle /ni'kl/ n. + +[from `nickel', common name for the U.S. 5-cent coin] A nybble + 1; 5 bits. Reported among +developers for Mattel's GI 1600 (the Intellivision games +processor), a chip with 16-bit-wide RAM but 10-bit-wide ROM. See +also deckle, and nybble for names of other bit units. + + +Node:night mode, Next:Nightmare File System, +Previous:nickle, Up:= N = + +night mode n. + +See phase (of people). + + +Node:Nightmare File +System, Next:NIL, Previous:night mode, Up:= N = + +Nightmare File System n. + +Pejorative hackerism for Sun's Network File System (NFS). In +any nontrivial network of Suns where there is a lot of NFS +cross-mounting, when one Sun goes down, the others often freeze +up. Some machine tries to access the down one, and (getting no +response) repeats indefinitely. This causes it to appear dead to +some messages (what is actually happening is that it is locked up +in what should have been a brief excursion to a higher spl level). Then another machine tries to +reach either the down machine or the pseudo-down machine, and +itself becomes pseudo-down. The first machine to discover the +down one is now trying both to access the down one and to respond +to the pseudo-down one, so it is even harder to reach. This +situation snowballs very quickly, and soon the entire network of +machines is frozen -- worst of all, the user can't even abort the +file access that started the problem! Many of NFS's problems are +excused by partisans as being an inevitable result of its +statelessness, which is held to be a great feature (critics, of +course, call it a great misfeature). (ITS partisans are apt to cite +this as proof of Unix's alleged bogosity; ITS had a working +NFS-like shared file system with none of these problems in the +early 1970s.) See also broadcast +storm. + + +Node:NIL, Next:Ninety-Ninety Rule, Previous:Nightmare File +System, Up:= N = + +NIL /nil/ + +No. Used in reply to a question, particularly one asked using +the `-P' convention. Most hackers assume this derives simply from +LISP terminology for `false' (see also T), but NIL as a negative reply was well-established +among radio hams decades before the advent of LISP. The +historical connection between early hackerdom and the ham radio +world was strong enough that this may have been an influence. + + +Node:Ninety-Ninety Rule, +Next:nipple mouse, +Previous:NIL, Up:= N = + +Ninety-Ninety Rule n. + +"The first 90% of the code accounts for the first 90% of the +development time. The remaining 10% of the code accounts for the +other 90% of the development time." Attributed to Tom Cargill of +Bell Labs, and popularized by Jon Bentley's September 1985 +"Bumper-Sticker Computer Science" column in "Communications of +the ACM". It was there called the "Rule of Credibility", a name +which seems not to have stuck. Other maxims in the same vein +include the law attributed to the early British computer +scientist Douglas Hartree: "The time from now until the +completion of the project tends to become constant." + + +Node:nipple mouse, Next:NMI, Previous:Ninety-Ninety Rule, Up:= N = + +nipple mouse n. + +Var. `clit mouse, clitoris' Common term for the pointing +device used on IBM ThinkPads and a few other laptop computers. +The device, which sits between the `g' and `h' keys on the +keyboard, indeed resembles a rubber nipple intended to be tweaked +by a forefinger. Many hackers consider these superior to the +glide pads found on most laptops, which are harder to control +precisely. + + +Node:NMI, Next:no-op, Previous:nipple mouse, Up:= N = + +NMI /N-M-I/ n. + +Non-Maskable Interrupt. An IRQ 7 on the PDP-11 or 680[01234]0; +the NMI line on an 80[1234]86. In contrast with a priority interrupt (which might +be ignored, although that is unlikely), an NMI is never +ignored. Except, that is, on clone +boxes, where NMI is often ignored on the motherboard because +flaky hardware can generate many spurious ones. + + +Node:no-op, Next:noddy, Previous:NMI, Up:= N = + + +no-op /noh'op/ n.,v. + +alt. NOP /nop/ [no operation] 1. A machine instruction that +does nothing (sometimes used in assembler-level programming as +filler for data or patch areas, or to overwrite code to be +removed in binaries). 2. A person who contributes nothing to a +project, or has nothing going on upstairs, or both. As in "He's a +no-op." 3. Any operation or sequence of operations with no +effect, such as circling the block without finding a parking +space, or putting money into a vending machine and having it fall +immediately into the coin-return box, or asking someone for help +and being told to go away. "Oh, well, that was a no-op." +Hot-and-sour soup (see great-wall) that is insufficiently either +is `no-op soup'; so is wonton soup if everybody else is having +hot-and-sour. + + +Node:noddy, Next:node, Previous:no-op, Up:= N += + +noddy /nod'ee/ adj. + +[UK: from the children's books] 1. Small and un-useful, but +demonstrating a point. Noddy programs are often written by people +learning a new language or system. The archetypal noddy program +is hello world. Noddy code +may be used to demonstrate a feature or bug of a compiler. May be +used of real hardware or software to imply that it isn't worth +using. "This editor's a bit noddy." 2. A program that is more or +less instant to produce. In this use, the term does not +necessarily connote uselessness, but describes a hack sufficiently trivial that it can be written +and debugged while carrying on (and during the space of) a normal +conversation. "I'll just throw together a noddy awk script to dump all the first fields." In North +America this might be called a mickey mouse program. See +toy program. + + +Node:node, Next:Nominal Semidestructor, +Previous:noddy, Up:= N = + +node n. + +1. [Internet, UUCP] A host machine on the network. 2. [MS-DOS +BBSes] A dial-in line on a BBS. Thus an MS-DOS sysop might say that his BBS has 4 nodes even +though it has a single machine and no Internet link, confusing an +Internet hacker no end. + + +Node:Nominal +Semidestructor, Next:non-optimal solution, Previous:node, Up:= N = + +Nominal Semidestructor n. + +Soundalike slang for `National Semiconductor', found among +other places in the Networking/2 networking sources. During the +late 1970s to mid-1980s this company marketed a series of +microprocessors including the NS16000 and NS32000 and several +variants. At one point early in the great microprocessor race, +the specs on these chips made them look like serious competition +for the rising Intel 80x86 and Motorola 680x0 series. +Unfortunately, the actual parts were notoriously flaky and never +implemented the full instruction set promised in their +literature, apparently because the company couldn't get any of +the mask steppings to work as designed. They eventually sank +without trace, joining the Zilog Z8000 and a few even more +obscure also-rans in the graveyard of forgotten microprocessors. +Compare HP-SUX, AIDX, buglix, Macintrash, Telerat, ScumOS, +sun-stools, Slowlaris, Internet Exploder. + + +Node:non-optimal solution, +Next:nonlinear, Previous:Nominal +Semidestructor, Up:= N += + +non-optimal solution n. + +(also `sub-optimal solution') An astoundingly stupid way to do +something. This term is generally used in deadpan sarcasm, as its +impact is greatest when the person speaking looks completely +serious. Compare stunning. See +also Bad Thing. + + +Node:nonlinear, Next:nontrivial, Previous:non-optimal solution, Up:= N = + +nonlinear adj. + +[scientific computation] 1. Behaving in an erratic and +unpredictable fashion; unstable. When used to describe the +behavior of a machine or program, it suggests that said machine +or program is being forced to run far outside of design +specifications. This behavior may be induced by unreasonable +inputs, or may be triggered when a more mundane bug sends the +computation far off from its expected course. 2. When describing +the behavior of a person, suggests a tantrum or a flame. "When you talk to Bob, don't mention the +drug problem or he'll go nonlinear for hours." In this context, +`go nonlinear' connotes `blow up out of proportion' (proportion +connotes linearity). + + +Node:nontrivial, Next:not ready for prime +time, Previous:nonlinear, Up:= N = + +nontrivial adj. + +Requiring real thought or significant computing power. Often +used as an understated way of saying that a problem is quite +difficult or impractical, or even entirely unsolvable ("Proving +P=NP is nontrivial"). The preferred emphatic form is `decidedly +nontrivial'. See trivial, uninteresting, interesting. + + +Node:not ready for +prime time, Next:notwork, +Previous:nontrivial, +Up:= N = + +not ready for prime time adj. + +Usable, but only just so; not very robust; for internal use +only. Said of a program or device. Often connotes that the thing +will be made more solid Real Soon +Now. This term comes from the ensemble name of the +original cast of "Saturday Night Live", the "Not Ready for Prime +Time Players". It has extra flavor for hackers because of the +special (though now semi-obsolescent) meaning of prime time. Compare beta. + + +Node:notwork, Next:NP-, Previous:not ready for prime time, +Up:= N = + +notwork /not'werk/ n. + +A network, when it is acting flaky +or is down. Compare nyetwork. Said at IBM to have originally +referred to a particular period of flakiness on IBM's VNET +corporate network ca. 1988; but there are independent reports of +the term from elsewhere. + + +Node:NP-, Next:nroff, Previous:notwork, Up:= N += + +NP- /N-P/ pref. + +Extremely. Used to modify adjectives describing a level or +quality of difficulty; the connotation is often `more so than it +should be' This is generalized from the computer-science terms +`NP-hard' and `NP-complete'; NP-complete problems all seem to be +very hard, but so far no one has found a proof that they are. NP +is the set of Nondeterministic-Polynomial algorithms, those that +can be completed by a nondeterministic Turing machine in an +amount of time that is a polynomial function of the size of the +input; a solution for one NP-complete problem would solve all the +others. "Coding a BitBlt implementation to perform correctly in +every case is NP-annoying." + +Note, however, that strictly speaking this usage is +misleading; there are plenty of easy problems in class NP. +NP-complete problems are hard not because they are in class NP, +but because they are the hardest problems in class NP. + + +Node:nroff, Next:NSA line eater, Previous:NP-, Up:= N = + +nroff /N'rof/ + +n. [Unix, from "new roff" (see troff)] A companion program to the Unix +typesetter troff, accepting identical +input but preparing output for terminals and line printers. + + +Node:NSA line eater, Next:NSP, Previous:nroff, Up:= N += + +NSA line eater n. + +The National Security Agency trawling program sometimes +assumed to be reading the net for the U.S. Government's spooks. +Most hackers used to think it was mythical but believed in acting +as though existed just in case. since the mid-1990s it has +gradually become known that the NSA actually does this, quite +illegaly, through its Echelon program. + +The standard countermeasure is to put loaded phrases like +`KGB', `Uzi', `nuclear materials', `Palestine', `cocaine', and +`assassination' in their sig +blocks in a (probably futile) attempt to confuse and +overload the creature. The GNU version +of EMACS actually has a command that +randomly inserts a bunch of insidious anarcho-verbiage into your +edited text. + +As far back as the 1970s there was a mainstream variant of +this myth involving a `Trunk Line Monitor', which supposedly used +speech recognition to extract words from telephone trunks. This +is much harder than noticing keywords in email, and most of the +people who originally propagated it had no idea of then-current +technology or the storage, signal-processing, or speech +recognition needs of such a project. On the basis of mass-storage +costs alone it would have been cheaper to hire 50 high-school +students and just let them listen in. Twenty years and several +orders of technological magnitude later, however, there are clear +indications that the NSA has actually deployed such filtering +(again, very much against U.S. law). + + +Node:NSP, Next:nude, Previous:NSA line eater, Up:= N = + +NSP /N-S-P/ n. + +Common abbreviation for `Network Service Provider', one of the +big national or regional companies that maintains a portion of +the Internet backbone and resells connectivity to ISPs. In 1996, major NSPs include ANS, MCI, UUNET, +and Sprint. An Internet wholesaler. + + +Node:nude, Next:nugry, Previous:NSP, Up:= N = + + +nude adj. + +Said of machines delivered without an operating system +(compare bare metal). "We +ordered 50 systems, but they all arrived nude, so we had to spend +a an extra weekend with the installation disks." This usage is a +recent innovation reflecting the fact that most IBM-PC clones are +now delivered with an operating system pre-installed at the +factory. Other kinds of hardware are still normally delivered +without OS, so this term is particular to PC support groups. + + +Node:nugry, Next:nuke, Previous:nude, Up:= N = + + +nugry /n[y]oo'gree/ + +[Usenet, 'newbie' + '-gry'] `. n. A newbie who posts a FAQ in the rec.puzzles newsgroup, especially if it +is a variant of the notorious and unanswerable "What, besides +`angry' and `hungry', is the third common English word that ends +in -GRY?". In the newsgroup, the canonical answer is of course +`nugry' itself. Plural is `nusgry' /n[y]oos'gree/. 2. adj. Having +the qualities of a nugry. + + +Node:nuke, Next:number-crunching, Previous:nugry, Up:= N = + +nuke /n[y]ook/ vt. + +[common] 1. To intentionally delete the entire contents of a +given directory or storage volume. "On Unix, rm -r +/usr will nuke everything in the usr filesystem." Never +used for accidental deletion; contrast blow away. 2. Syn. for dike, applied to smaller things such as files, +features, or code sections. Often used to express a final +verdict. "What do you want me to do with that 80-meg wallpaper file?" "Nuke it." 3. Used of +processes as well as files; nuke is a frequent verbal alias for +kill -9 on Unix. 4. On IBM PCs, a bug that results +in fandango on core +can trash the operating system, including the FAT (the in-core +copy of the disk block chaining information). This can utterly +scramble attached disks, which are then said to have been +`nuked'. This term is also used of analogous lossages on +Macintoshes and other micros without memory protection. + + +Node:number-crunching, Next:numbers, Previous:nuke, Up:= N = + +number-crunching n. + +[common] Computations of a numerical nature, esp. those that +make extensive use of floating-point numbers. The only thing +Fortrash is good for. This term is +in widespread informal use outside hackerdom and even in +mainstream slang, but has additional hackish connotations: +namely, that the computations are mindless and involve massive +use of brute force. This is +not always evil, esp. if it involves +ray tracing or fractals or some other use that makes pretty pictures, esp. if such +pictures can be used as wallpaper. See also crunch. + + +Node:numbers, Next:NUXI problem, Previous:number-crunching, Up:= N = + +numbers n. + +[scientific computation] Output of a computation that may not +be significant results but at least indicate that the program is +running. May be used to placate management, grant sponsors, etc. +`Making numbers' means running a program because output -- any +output, not necessarily meaningful output -- is needed as a +demonstration of progress. See pretty pictures, math-out, social science number. + + +Node:NUXI problem, Next:nybble, Previous:numbers, Up:= N = + +NUXI problem /nuk'see pro'bl*m/ n. + +Refers to the problem of transferring data between machines +with differing byte-order. The string `UNIX' might look like +`NUXI' on a machine with a different `byte sex' (e.g., when +transferring data from a little-endian to a big-endian, or vice-versa). See also middle-endian, swab, and bytesexual. + + +Node:nybble, Next:nyetwork, Previous:NUXI problem, Up:= N = + +nybble /nib'l/ (alt. `nibble') n. + +[from v. `nibble' by analogy with `bite' => `byte'] Four +bits; one hex digit; a half-byte. +Though `byte' is now techspeak, this useful relative is still +jargon. Compare byte; see also bit. The more mundane spelling "nibble" is +also commonly used. Apparently the `nybble' spelling is uncommon +in Commonwealth Hackish, as British orthography would suggest the +pronunciation /ni:'bl/. + +Following `bit', `byte' and `nybble' there have been quite a +few analogical attempts to construct unambiguous terms for bit +blocks of other sizes. All of these are strictly jargon, not +techspeak, and not very common jargon at that (most hackers would +recognize them in context but not use them spontaneously). We +collect them here for reference together with the ambiguous +techspeak terms `word', `half-word' and `double word'; some +(indicated) have substantial information separate entries. + + + +2 bits: + + +crumb, quad, quarter, +tayste, tydbit + + +4 bits: + + +nybble + + +5 bits: + + +nickle + + +10 bits: + + +deckle + + +16 bits: + + +playte, chawmp (on a 32-bit +machine), word (on a 16-bit machine), half-word (on a 32-bit +machine). + + +18 bits: + + +chawmp (on a 36-bit machine), +half-word (on a 36-bit machine) + + +32 bits: + + +dynner, gawble (on a 32-bit +machine), word (on a 32-bit machine), longword (on a 16-bit +machine). + + +36: + + +word (on a 36-bit machine) + + +48 bits: + + +gawble (under circumstances that +remain obscure) + + +64 bits + + +double word (on a 32-bit machine) + + +The fundamental motivation for most of these jargon terms +(aside from the normal hackerly enjoyment of punning wordplay) is +the extreme ambiguity of the term `word' and its derivatives. + + +Node:nyetwork, Next:Ob-, Previous:nybble, Up:= N += + +nyetwork /nyet'werk/ n. + +[from Russian `nyet' = no] A network, when it is acting flaky or is down. Compare notwork. + + +Node:= O =, Next:= P =, Previous:= N =, Up:The Jargon Lexicon + += O = + + +Ob-: + + +Obfuscated C +Contest: + + +obi-wan error: + + +Objectionable-C: + + +obscure: + + +octal forty: + + +off the trolley: + + +off-by-one error: + + +offline: + + +ogg: + + +-oid: + + +old fart: + + +Old Testament: + + +on the gripping +hand: + + +one-banana problem: + + +one-line fix: + + +one-liner wars: + + +ooblick: + + +op: + + +open: + + +open source: + + +open switch: + + +operating system: + + +optical diff: + + +optical grep: + + +optimism: + + +Oracle the: + + +Orange Book: + + +oriental food: + + +orphan: + + +orphaned i-node: + + +orthogonal: + + +OS: + + +OS/2: + + +OSS: + + +OSU: + + +OTOH: + + +out-of-band: + + +overclock: + + +overflow bit: + + +overflow pdl: + + +overrun: + + +overrun screw: + + +Node:Ob-, Next:Obfuscated C Contest, Previous:nyetwork, Up:= O = + +Ob- /ob/ pref. + +Obligatory. A piece of netiquette acknowledging that the author +has been straying from the newsgroup's charter topic. For +example, if a posting in alt.sex is a response to a part of +someone else's posting that has nothing particularly to do with +sex, the author may append `ObSex' (or `Obsex') and toss off a +question or vignette about some unusual erotic act. It is +considered a sign of great winnitude when one's Obs are more +interesting than other people's whole postings. + + +Node:Obfuscated C Contest, +Next:obi-wan error, +Previous:Ob-, Up:= O = + +Obfuscated C Contest n. + +(in full, the `International Obfuscated C Code Contest', or +IOCCC) An annual contest run since 1984 over Usenet by Landon +Curt Noll and friends. The overall winner is whoever produces the +most unreadable, creative, and bizarre (but working) C program; +various other prizes are awarded at the judges' whim. C's terse +syntax and macro-preprocessor facilities give contestants a lot +of maneuvering room. The winning programs often manage to be +simultaneously (a) funny, (b) breathtaking works of art, and (c) +horrible examples of how not to code in C. + +This relatively short and sweet entry might help convey the +flavor of obfuscated C: + +/* + * HELLO WORLD program + * by Jack Applin and Robert Heckendorn, 1985 + * (Note: depends on being able to modify elements of argv[], + * which is not guaranteed by ANSI and often not possible.) + */ +main(v,c)char**c;{for(v[c++]="Hello, world!\n)"; +(!!c)[*c]&&(v--||--c&&execlp(*c,*c,c[!!c]+!!c,!c)); +**c=!c)write(!!*c,*c,!!**c);} + + +Here's another good one: + +/* + * Program to compute an approximation of pi + * by Brian Westley, 1988 + * (requires pcc macro concatenation; try gcc -traditional-cpp) + */ + +#define _ -F<00||--F-OO--; +int F=00,OO=00; +main(){F_OO();printf("%1.3f\n",4.*-F/OO/OO);}F_OO() +{ + _-_-_-_ + _-_-_-_-_-_-_-_-_ + _-_-_-_-_-_-_-_-_-_-_-_ + _-_-_-_-_-_-_-_-_-_-_-_-_-_ + _-_-_-_-_-_-_-_-_-_-_-_-_-_-_ + _-_-_-_-_-_-_-_-_-_-_-_-_-_-_ +_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_ +_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_ +_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_ +_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_ + _-_-_-_-_-_-_-_-_-_-_-_-_-_-_ + _-_-_-_-_-_-_-_-_-_-_-_-_-_-_ + _-_-_-_-_-_-_-_-_-_-_-_-_-_ + _-_-_-_-_-_-_-_-_-_-_-_ + _-_-_-_-_-_-_-_ + _-_-_-_ +} + + +Note that this program works by computing its own area. For +more digits, write a bigger program. See also hello world. + +The IOCCC has an official home page at http://www.ioccc.org. + + +Node:obi-wan error, Next:Objectionable-C, Previous:Obfuscated C +Contest, Up:= O = + +obi-wan error /oh'bee-won` er'*r/ n. + +[RPI, from `off-by-one' and the Obi-Wan Kenobi character in +"Star Wars"] A loop of some sort in which the index is off by 1. +Common when the index should have started from 0 but instead +started from 1. A kind of off-by-one error. See also zeroth. + + +Node:Objectionable-C, Next:obscure, Previous:obi-wan error, Up:= O = + +Objectionable-C n. + +Hackish take on "Objective-C", the name of an object-oriented +dialect of C in competition with the better-known C++ (it is used +to write native applications on the NeXT machine). +Objectionable-C uses a Smalltalk-like syntax, but lacks the +flexibility of Smalltalk method calls, and (like many such +efforts) comes frustratingly close to attaining the Right Thing without actually doing +so. + + +Node:obscure, Next:octal forty, Previous:Objectionable-C, Up:= O = + +obscure adj. + +Used in an exaggeration of its normal meaning, to imply total +incomprehensibility. "The reason for that last crash is obscure." +"The find(1) command's syntax is obscure!" The +phrase `moderately obscure' implies that something could be +figured out but probably isn't worth the trouble. The +construction `obscure in the extreme' is the preferred emphatic +form. + + +Node:octal forty, Next:off the trolley, Previous:obscure, Up:= O = + +octal forty /ok'tl for'tee/ n. + +Hackish way of saying "I'm drawing a blank." Octal 40 is the +ASCII space character, 0100000; by an +odd coincidence, hex 40 (01000000) is +the EBCDIC space character. See +wall. + + +Node:off the trolley, Next:off-by-one error, +Previous:octal forty, +Up:= O = + +off the trolley adj. + +Describes the behavior of a program that malfunctions and goes +catatonic, but doesn't actually crash +or abort. See glitch, bug, deep +space, wedged. + +This term is much older than computing, and is (uncommon) +slang elsewhere. A trolley is the small wheel that trolls, or +runs against, the heavy wire that carries the current to run a +streetcar. It's at the end of the long pole (the trolley pole) +that reaches from the roof of the streetcar to the overhead line. +When the trolley stops making contact with the wire (from passing +through a switch, going over bumpy track, or whatever), the +streetcar comes to a halt, (usually) without crashing. The +streetcar is then said to be off the trolley, or off the wire. +Later on, trolley came to mean the streetcar itself. Since +streetcars became common in the 1890s, the term is more than 100 +years old. Nowadays, trolleys are only seen on historic +streetcars, since modern streetcars use pantographs to contact +the wire. + + +Node:off-by-one error, Next:offline, Previous:off the trolley, Up:= O = + +off-by-one error n. + +[common] Exceedingly common error induced in many ways, such +as by starting at 0 when you should have started at 1 or +vice-versa, or by writing < N instead of +<= N or vice-versa. Also applied to giving +something to the person next to the one who should have gotten +it. Often confounded with fencepost error, which is properly a +particular subtype of it. + + +Node:offline, Next:ogg, Previous:off-by-one error, Up:= O = + +offline adv. + +Not now or not here. "Let's take this discussion offline." +Specifically used on Usenet to +suggest that a discussion be moved off a public newsgroup to +email. + + +Node:ogg, Next:-oid, Previous:offline, Up:= O += + +ogg /og/ v. + +[CMU] 1. In the multi-player space combat game Netrek, to +execute kamikaze attacks against enemy ships which are carrying +armies or occupying strategic positions. Named during a game in +which one of the players repeatedly used the tactic while playing +Orion ship G, showing up in the player list as "Og". This trick +has been roundly denounced by those who would return to the good +old days when the tactic of dogfighting was dominant, but as Sun +Tzu wrote, "What is of supreme importance in war is to attack the +enemy's strategy, not his tactics." However, the traditional +answer to the newbie question "What does ogg mean?" is just "Pick +up some armies and I'll show you." 2. In other games, to +forcefully attack an opponent with the expectation that the +resources expended will be renewed faster than the opponent will +be able to regain his previous advantage. Taken more seriously as +a tactic since it has gained a simple name. 3. To do anything +forcefully, possibly without consideration of the drain on future +resources. "I guess I'd better go ogg the problem set that's due +tomorrow." "Whoops! I looked down at the map for a sec and almost +ogged that oncoming car." + + +Node:-oid, Next:old fart, Previous:ogg, Up:= O = + + +-oid suff. + +[from Greek suffix -oid = `in the image of'] 1. Used as in +mainstream slang English to indicate a poor imitation, a +counterfeit, or some otherwise slightly bogus resemblance. +Hackers will happily use it with all sorts of non-Greco/Latin +stem words that wouldn't keep company with it in mainstream +English. For example, "He's a nerdoid" means that he +superficially resembles a nerd but can't make the grade; a +`modemoid' might be a 300-baud box (Real Modems run at 28.8 or +up); a `computeroid' might be any bitty +box. The word `keyboid' could be used to describe a chiclet keyboard, but would +have to be written; spoken, it would confuse the listener as to +the speaker's city of origin. 2. More specifically, an indicator +for `resembling an android' which in the past has been confined +to science-fiction fans and hackers. It too has recently (in +1991) started to go mainstream (most notably in the term +`trendoid' for victims of terminal hipness). This is probably +traceable to the popularization of the term droid in "Star Wars" and its sequels. (See also +windoid.) + +Coinages in both forms have been common in science fiction for +at least fifty years, and hackers (who are often SF fans) have +probably been making `-oid' jargon for almost that long [though +GLS and I can personally confirm only that they were already +common in the mid-1970s --ESR]. + + +Node:old fart, Next:Old Testament, Previous:-oid, Up:= O += + +old fart n. + +Tribal elder. A title self-assumed with remarkable frequency +by (esp.) Usenetters who have been programming for more than +about 25 years; often appears in sig +blocks attached to Jargon File contributions of great +archeological significance. This is a term of insult in the +second or third person but one of pride in first person. + + +Node:Old Testament, Next:on the gripping +hand, Previous:old +fart, Up:= O = + +Old Testament n. + +[C programmers] The first edition of K&R, the sacred text describing Classic C. + + +Node:on the gripping +hand, Next:one-banana problem, Previous:Old Testament, Up:= O = + +on the gripping hand + +In the progression that starts "On the one hand..." and +continues "On the other hand..." mainstream English may add "on +the third hand..." even though most people don't have three +hands. Among hackers, it is just as likely to be "on the gripping +hand". This metaphor supplied the title of Larry Niven & +Jerry Pournelle's 1993 SF novel "The Gripping Hand" which +involved a species of hostile aliens with three arms (the same +species, in fact, referenced in juggling eggs). As with TANSTAAFL and con, +this usage one of the naturalized imports from SF fandom +frequently observed among hackers. + + +Node:one-banana problem, +Next:one-line fix, +Previous:on +the gripping hand, Up:= O += + +one-banana problem n. + +At mainframe shops, where the computers have operators for +routine administrivia, the programmers and hardware people tend +to look down on the operators and claim that a trained monkey +could do their job. It is frequently observed that the incentives +that would be offered said monkeys can be used as a scale to +describe the difficulty of a task. A one-banana problem is +simple; hence, "It's only a one-banana job at the most; what's +taking them so long?" + +At IBM, folklore divides the world into one-, two-, and +three-banana problems. Other cultures have different hierarchies +and may divide them more finely; at ICL, for example, five grapes +(a bunch) equals a banana. Their upper limit for the in-house +sysapes is said to be two bananas +and three grapes (another source claims it's three bananas and +one grape, but observes "However, this is subject to local +variations, cosmic rays and ISO"). At a complication level any +higher than that, one asks the manufacturers to send someone +around to check things. + +See also Infinite-Monkey Theorem. + + +Node:one-line fix, Next:one-liner wars, Previous:one-banana +problem, Up:= O = + +one-line fix n. + +Used (often sarcastically) of a change to a program that is +thought to be trivial or insignificant right up to the moment it +crashes the system. Usually `cured' by another one-line fix. See +also I didn't +change anything! + + +Node:one-liner wars, Next:ooblick, Previous:one-line fix, Up:= O = + +one-liner wars n. + +A game popular among hackers who code in the language APL (see +write-only language +and line noise). The objective +is to see who can code the most interesting and/or useful routine +in one line of operators chosen from APL's exceedingly hairy primitive set. A similar amusement +was practiced among TECO hackers and +is now popular among Perl +aficionados. + +Ken Iverson, the inventor of APL, has been credited with a +one-liner that, given a number N, produces a list of the prime +numbers from 1 to N inclusive. It looks like this: + +(2 = 0 +.= T o.| T) / T <- iN + +where `o' is the APL null character, the assignment arrow is a +single character, and `i' represents the APL iota. + +Here's a Perl program that prints +primes: + + perl -wle '(1 x $_) !~ /^(11+)\1+$/ && print while ++ $_' + + +In the Perl world this game is sometimes called Perl Golf +because the player with the fewest (key)strokes wins. + + +Node:ooblick, Next:op, Previous:one-liner wars, Up:= O = + +ooblick /oo'blik/ n. + +[from the Dr. Seuss title "Bartholomew and the Oobleck"; the +spelling `oobleck' is still current in the mainstream] A bizarre +semi-liquid sludge made from cornstarch and water. Enjoyed among +hackers who make batches during playtime at parties for its +amusing and extremely non-Newtonian behavior; it pours and +splatters, but resists rapid motion like a solid and will even +crack when hit by a hammer. Often found near lasers. + +Here is a field-tested ooblick recipe contributed by GLS: + + +1 cup cornstarch + + +1 cup baking soda + + +3/4 cup water + + +N drops of food coloring + +This recipe isn't quite as non-Newtonian as a pure cornstarch +ooblick, but has an appropriately slimy feel. + +Some, however, insist that the notion of an ooblick +recipe is far too mechanical, and that it is best to add +the water in small increments so that the various mixed states +the cornstarch goes through as it becomes ooblick can be +grokked in fullness by many hands. For optional ingredients of +this experience, see the "Ceremonial Chemicals" section +of Appendix B. + + +Node:op, Next:open, Previous:ooblick, Up:= O += + +op /op/ n. + +1. In England and Ireland, common verbal abbreviation for +`operator', as in system operator. Less common in the U.S., where +sysop seems to be preferred. 2. [IRC] +Someone who is endowed with privileges on IRC, not limited to a particular channel. These +are generally people who are in charge of the IRC server at their +particular site. Sometimes used interchangeably with CHOP. Compare sysop. + + +Node:open, Next:open source, Previous:op, Up:= O = + + +open n. + +Abbreviation for `open (or left) parenthesis' -- used when +necessary to eliminate oral ambiguity. To read aloud the LISP +form (DEFUN FOO (X) (PLUS X 1)) one might say: "Open defun foo, +open eks close, open, plus eks one, close close." + + +Node:open source, Next:open switch, Previous:open, Up:= O += + +open source n. + +[common; also adj. `open-source'] Term coined in March 1998 +following the Mozilla release to describe software distributed in +source under licenses guaranteeing anybody rights to freely use, +modify, and redistribute, the code. The intent was to be able to +sell the hackers' ways of doing software to industry and the +mainstream by avoid the negative connotations (to suits) of the term "free software". For discussion of the +followon tactics and their consequences, see the Open Source Initiative site. + + +Node:open switch, Next:operating system, Previous:open source, Up:= O = + +open switch n. + +[IBM: prob. from railroading] An unresolved question, issue, +or problem. + + +Node:operating system, Next:optical diff, Previous:open switch, Up:= O = + +operating system n. + +[techspeak] (Often abbreviated `OS') The foundation software +of a machine; that which schedules tasks, allocates storage, and +presents a default interface to the user between applications. +The facilities an operating system provides and its general +design philosophy exert an extremely strong influence on +programming style and on the technical cultures that grow up +around its host machines. Hacker folklore has been shaped +primarily by the Unix, ITS, TOPS-10, TOPS-20/TWENEX, WAITS, +CP/M, MS-DOS, and Multics operating systems (most importantly by +ITS and Unix). + + +Node:optical diff, Next:optical grep, Previous:operating system, Up:= O = + +optical diff n. + +See vdiff. + + +Node:optical grep, Next:optimism, Previous:optical diff, Up:= O = + +optical grep n. + +See vgrep. + + +Node:optimism, Next:Oracle the, Previous:optical grep, Up:= O = + +optimism n. + +What a programmer is full of after fixing the last bug and +before discovering the next last bug. Fred Brooks's book +"The Mythical Man-Month" (See "Brooks's Law") contains the +following paragraph that describes this extremely well: + +All programmers are optimists. Perhaps this modern +sorcery especially attracts those who believe in happy endings +and fairy godmothers. Perhaps the hundreds of nitty frustrations +drive away all but those who habitually focus on the end goal. +Perhaps it is merely that computers are young, programmers are +younger, and the young are always optimists. But however the +selection process works, the result is indisputable: "This time +it will surely run," or "I just found the last +bug.". + + +See also Lubarsky's Law +of Cybernetic Entomology. + + +Node:Oracle the, Next:Orange Book, Previous:optimism, Up:= O = + +Oracle, the + +The all-knowing, all-wise Internet Oracle +_rec.humor.oracle_), or one of the foreign language +derivatives of same. Newbies frequently confuse the Oracle with +Oracle, a database vendor. As a result, the unmoderated +_rec.humor.oracle.d_ is frequently crossposted to by the +clueless, looking for advice on SQL. As more than one person has +said in similar situations, "Don't people bother to look at the +newsgroup description line anymore?" (To which the standard +response is, "Did people ever read it in the first place?") + + +Node:Orange Book, Next:oriental food, Previous:Oracle the, Up:= O = + +Orange Book n. + +The U.S. Government's standards document "Trusted Computer +System Evaluation Criteria, DOD standard 5200.28-STD, December, +1985" which characterize secure computing architectures and +defines levels A1 (most secure) through D (least). Modern Unixes +are roughly C2. See also crayola +books, book +titles. + + +Node:oriental food, Next:orphan, Previous:Orange Book, Up:= O = + +oriental food n. + +Hackers display an intense tropism towards oriental cuisine, +especially Chinese, and especially of the spicier varieties such +as Szechuan and Hunan. This phenomenon (which has also been +observed in subcultures that overlap heavily with hackerdom, most +notably science-fiction fandom) has never been satisfactorily +explained, but is sufficiently intense that one can assume the +target of a hackish dinner expedition to be the best local +Chinese place and be right at least three times out of four. See +also ravs, great-wall, stir-fried random, laser chicken, Yu-Shiang Whole Fish. Thai, +Indian, Korean, and Vietnamese cuisines are also quite +popular. + + +Node:orphan, Next:orphaned i-node, Previous:oriental food, Up:= O = + +orphan n. + +[Unix] A process whose parent has died; one inherited by +init(1). Compare zombie. + + +Node:orphaned i-node, Next:orthogonal, Previous:orphan, Up:= O = + +orphaned i-node /or'f*nd i:'nohd/ n. + +[Unix] 1. [techspeak] A file that retains storage but no +longer appears in the directories of a filesystem. 2. By +extension, a pejorative for any person no longer serving a useful +function within some organization, esp. lion food without subordinates. + + +Node:orthogonal, Next:OS, Previous:orphaned i-node, Up:= O = + +orthogonal adj. + +[from mathematics] Mutually independent; well separated; +sometimes, irrelevant to. Used in a generalization of its +mathematical meaning to describe sets of primitives or +capabilities that, like a vector basis in geometry, span the +entire `capability space' of the system and are in some sense +non-overlapping or mutually independent. For example, in +architectures such as the PDP-11 or VAX where all or nearly all +registers can be used interchangeably in any role with respect to +any instruction, the register set is said to be orthogonal. Or, +in logic, the set of operators `not' and `or' is orthogonal, but +the set `nand', `or', and `not' is not (because any one of these +can be expressed in terms of the others). Also used in comments +on human discourse: "This may be orthogonal to the discussion, +but...." + + +Node:OS, Next:OS/2, Previous:orthogonal, Up:= O = + +OS /O-S/ + +1. [Operating System] n. An abbreviation heavily used in +email, occasionally in speech. 2. n. obs. On ITS, an output spy. +See "OS and JEDGAR" in +Appendix A. + + +Node:OS/2, Next:OSS, Previous:OS, +Up:= O = + +OS/2 /O S too/ n. + +The anointed successor to MS-DOS for Intel 286- and 386-based +micros; proof that IBM/Microsoft couldn't get it right the second +time, either. Often called `Half-an-OS'. Mentioning it is usually +good for a cheap laugh among hackers -- the design was so baroque, and the implementation of 1.x so +bad, that 3 years after introduction you could still count the +major apps shipping for it on the +fingers of two hands -- in unary. The 2.x versions are said to +have improved somewhat, and informed hackers now rate them +superior to Microsoft Windows (an endorsement which, however, +could easily be construed as damning with faint praise). See +monstrosity, cretinous, second-system effect. + + +Node:OSS, Next:OSU, Previous:OS/2, Up:= O += + +OSS + +Written-only acronym for "Open Source Software" (see open source. This is a rather ugly +TLA, and the principals in the +open-source movement don't use it, but it has (perhaps +inevitably) spread through the trade press like kudzu. + + +Node:OSU, Next:OTOH, Previous:OSS, +Up:= O = + +OSU /O-S-U/ n. obs. + +[TMRC] Acronym for Officially Sanctioned User; a user who is +recognized as such by the computer authorities and allowed to use +the computer above the objections of the security monitor. + + +Node:OTOH, Next:out-of-band, Previous:OSU, Up:= O = + + +OTOH // + +[Usenet; very common] On The Other Hand. + + +Node:out-of-band, Next:overclock, Previous:OTOH, Up:= O = + + +out-of-band adj. + +[from telecommunications and network theory] 1. In software, +describes values of a function which are not in its `natural' +range of return values, but are rather signals that some kind of +exception has occurred. Many C functions, for example, return a +nonnegative integral value, but indicate failure with an +out-of-band return value of -1. Compare hidden flag, green bytes, fence. 2. Also sometimes used to describe what +communications people call `shift characters', such as the ESC +that leads control sequences for many terminals, or the level +shift indicators in the old 5-bit Baudot codes. 3. In personal +communication, using methods other than email, such as telephones +or snail-mail. + + +Node:overclock, Next:overflow bit, Previous:out-of-band, Up:= O = + +overclock /oh'vr-klok'/ vt. + +To operate a CPU or other digital logic device at a rate +higher than it was designed for, under the assumption that the +manufacturer put some slop into the +specification to account for manufacturing tolerances. +Overclocking something can result in intermittent crashes, and can even burn things out, since +power dissipation is directly proportional to clock frequency. People who make a hobby of this +are sometimes called "overclockers"; they are thrilled that they +can run their 450MHz CPU at 500MHz, even though they can only +tell the difference by running a benchmark program. + + +Node:overflow bit, Next:overflow pdl, Previous:overclock, Up:= O = + +overflow bit n. + +1. [techspeak] A flag on some +processors indicating an attempt to calculate a result too large +for a register to hold. 2. More generally, an indication of any +kind of capacity overload condition. "Well, the Ada description was baroque all right, but I could hack it OK +until they got to the exception handling ... that +set my overflow bit." 3. The hypothetical bit that will be set if +a hacker doesn't get to make a trip to the Room of Porcelain +Fixtures: "I'd better process an internal interrupt before the +overflow bit gets set." + + +Node:overflow pdl, Next:overrun, Previous:overflow bit, Up:= O = + +overflow pdl n. + +[MIT] The place where you put things when your PDL is full. If you don't have one and too many +things get pushed, you forget something. The overflow pdl for a +person's memory might be a memo pad. This usage inspired the +following doggerel: + +Hey, diddle, diddle + +The overflow pdl + + To get a little more stack; + +If that's not enough + +Then you lose it all, + + And have to pop all the way back. + + -The Great Quux + + +The term `pdl' (see PDL) seems to be +primarily an MITism; outside MIT this term is replaced by +`overflow stack' (but that wouldn't +rhyme with `diddle'). + + +Node:overrun, Next:overrun screw, Previous:overflow pdl, Up:= O = + +overrun n. + +1. [techspeak] Term for a frequent consequence of data +arriving faster than it can be consumed, esp. in serial line +communications. For example, at 9600 baud there is almost exactly +one character per millisecond, so if a silo can hold only two characters and the machine +takes longer than 2 msec to get to service the interrupt, at +least one character will be lost. 2. Also applied to +non-serial-I/O communications. "I forgot to pay my electric bill +due to mail overrun." "Sorry, I got four phone calls in 3 minutes +last night and lost your message to overrun." When thrashing at tasks, the next person to make a +request might be told "Overrun!" Compare firehose syndrome. 3. More +loosely, may refer to a buffer +overflow not necessarily related to processing time (as +in overrun screw). + + +Node:overrun screw, Next:P-mail, Previous:overrun, Up:= O = + +overrun screw n. + +[C programming] A variety of fandango on core produced by +scribbling past the end of an array (C implementations typically +have no checks for this error). This is relatively benign and +easy to spot if the array is static; if it is auto, the result +may be to smash the +stack -- often resulting in heisenbugs of the most diabolical subtlety. +The term `overrun screw' is used esp. of scribbles beyond the end +of arrays allocated with malloc(3); this typically +trashes the allocation header for the next block in the arena, producing massive lossage within +malloc and often a core dump on the next operation to use +stdio(3) or malloc(3) itself. See spam, overrun; +see also memory leak, memory smash, aliasing bug, precedence lossage, fandango on core, secondary damage. + + +Node:= P =, Next:= Q =, Previous:= O =, Up:The Jargon Lexicon + += P = + + +P-mail: + + +P.O.D.: + + +packet over air: + + +padded cell: + + +page in: + + +page out: + + +pain in the net: + + +Pangloss parity: + + +paper-net: + + +param: + + +PARC: + + +parent message: + + +parity errors: + + +Parkinson's Law of +Data: + + +parm: + + +parse: + + +Pascal: + + +pastie: + + +patch: + + +patch pumpkin: + + +patch space: + + +path: + + +pathological: + + +payware: + + +PBD: + + +PC-ism: + + +PD: + + +PDL: + + +PDP-10: + + +PDP-20: + + +PEBKAC: + + +peek: + + +pencil and paper: + + +Pentagram Pro: + + +Pentium: + + +peon: + + +percent-S: + + +perf: + + +perfect programmer +syndrome: + + +Perl: + + +person of no +account: + + +pessimal: + + +pessimizing +compiler: + + +peta-: + + +PETSCII: + + +PFY: + + +phage: + + +phase: + + +phase of the +moon: + + +phase-wrapping: + + +PHB: + + +phreaker: + + +phreaking: + + +pico-: + + +pig-tail: + + +pilot error: + + +ping: + + +Ping O' Death: + + +ping storm: + + +pink wire: + + +pipe: + + +pistol: + + +pixel sort: + + +pizza box: + + +plaid screen: + + +plain-ASCII: + + +plan file: + + +platinum-iridium: + + +playpen: + + +playte: + + +plingnet: + + +plokta: + + +plonk: + + +plug-and-pray: + + +plugh: + + +plumbing: + + +PM: + + +pnambic: + + +pod: + + +point-and-drool +interface: + + +pointy hat: + + +pointy-haired: + + +poke: + + +poll: + + +polygon pusher: + + +POM: + + +pop: + + +POPJ: + + +poser: + + +post: + + +postcardware: + + +posting: + + +postmaster: + + +PostScript: + + +pound on: + + +power cycle: + + +power hit: + + +PPN: + + +pr0n: + + +precedence lossage: + + +prepend: + + +prestidigitization: + + +pretty pictures: + + +prettyprint: + + +pretzel key: + + +priesthood: + + +prime time: + + +print: + + +printing +discussion: + + +priority interrupt: + + +profile: + + +progasm: + + +proggy: + + +proglet: + + +program: + + +Programmer's Cheer: + + +programming: + + +programming fluid: + + +propeller head: + + +propeller key: + + +proprietary: + + +protocol: + + +provocative +maintenance: + + +prowler: + + +pseudo: + + +pseudoprime: + + +pseudosuit: + + +psychedelicware: + + +psyton: + + +pubic directory: + + +puff: + + +pumpkin holder: + + +pumpking: + + +punched card: + + +punt: + + +Purple Book: + + +purple wire: + + +push: + + +Python: + + +Node:P-mail, Next:P.O.D., Previous:overrun screw, Up:= P = + +P-mail n. + +[rare] Physical mail, as opposed to email. Synonymous with snail-mail, but much less common. + + +Node:P.O.D., Next:packet over air, Previous:P-mail, Up:= P = + +P.O.D. /P-O-D/ + +[rare] Acronym for `Piece Of Data' (as opposed to a code +section). See also pod. + + +Node:packet over air, Next:padded cell, Previous:P.O.D., Up:= P = + +packet over air + +[common among backbone ISPs] The protocol notionally being +used by Internet data attempting to traverse a physical gap or +break in the network, such as might be caused by a fiber-seeking backhoe. "I see +why you're dropping packets. You seem to have a packet over air +problem. + + +Node:padded cell, Next:page in, Previous:packet over air, Up:= P = + +padded cell n. + +Where you put lusers so they can't +hurt anything. A program that limits a luser to a carefully +restricted subset of the capabilities of the host system (for +example, the rsh(1) utility on USG Unix). Note that +this is different from an iron +box because it is overt and not aimed at enforcing +security so much as protecting others (and the luser) from the +consequences of the luser's boundless naivete (see naive). Also `padded cell environment'. + + +Node:page in, Next:page out, Previous:padded cell, Up:= P = + +page in v. + +[MIT] 1. To become aware of one's surroundings again after +having paged out (see page out). +Usually confined to the sarcastic comment: "Eric pages in, film at 11!" 2. Syn. `swap in'; +see swap. + + +Node:page out, Next:pain in the net, Previous:page in, Up:= P = + +page out vi. + +[MIT] 1. To become unaware of one's surroundings temporarily, +due to daydreaming or preoccupation. "Can you repeat that? I +paged out for a minute." See page +in. Compare glitch, thinko. 2. Syn. `swap out'; see swap. + + +Node:pain in the net, Next:Pangloss parity, +Previous:page out, Up:= P = + +pain in the net n. + +A flamer. + + +Node:Pangloss parity, Next:paper-net, Previous:pain in the net, +Up:= P = + +Pangloss parity n. + +[from Dr. Pangloss, the eternal optimist in Voltaire's +"Candide"] In corporate DP shops, a common condition of severe +but equally shared lossage +resulting from the theory that as long as everyone in the +organization has the exactly the same model of obsolete +computer, everything will be fine. + + +Node:paper-net, Next:param, Previous:Pangloss parity, Up:= P = + +paper-net n. + +Hackish way of referring to the postal service, analogizing it +to a very slow, low-reliability network. Usenet sig blocks sometimes include a +"Paper-Net:" header just before the sender's postal address; +common variants of this are "Papernet" and "P-Net". Note that the +standard netiquette guidelines +discourage this practice as a waste of bandwidth, since netters +are quite unlikely to casually use postal addresses. Compare +voice-net, snail-mail, P-mail. + + +Node:param, Next:PARC, Previous:paper-net, Up:= P = + +param /p*-ram'/ n. + +[common] Shorthand for `parameter'. See also parm; compare arg, +var. + + +Node:PARC, Next:parent message, Previous:param, Up:= P = + +PARC n. + +See XEROX PARC. + + +Node:parent message, Next:parity errors, Previous:PARC, Up:= P = + +parent message n. + +What a followup follows up. + + +Node:parity errors, Next:Parkinson's Law of +Data, Previous:parent message, Up:= P = + +parity errors pl.n. + +Little lapses of attention or (in more severe cases) +consciousness, usually brought on by having spent all night and +most of the next day hacking. "I need to go home and crash; I'm +starting to get a lot of parity errors." Derives from a +relatively common but nearly always correctable transient error +in memory hardware. It predates RAM; in fact, this term is +reported to have already have been in use in its jargoin sense +back in the 1960s when magnetic cores ruled. Parity errors can +also afflict mass storage and serial communication lines; this is +more serious because not always correctable. + + +Node:Parkinson's Law of +Data, Next:parm, Previous:parity errors, Up:= P = + +Parkinson's Law of Data prov. + +"Data expands to fill the space available for storage"; buying +more memory encourages the use of more memory-intensive +techniques. It has been observed since the mid-1980s that the +memory usage of evolving systems tends to double roughly once +every 18 months. Fortunately, memory density available for +constant dollars also tends to about double once every 18 months +(see Moore's Law); +unfortunately, the laws of physics guarantee that the latter +cannot continue indefinitely. + + +Node:parm, Next:parse, Previous:Parkinson's Law of Data, +Up:= P = + +parm /parm/ n. + +Further-compressed form of param. +This term is an IBMism, and written use is almost unknown outside +IBM shops; spoken /parm/ is more widely distributed, but the +synonym arg is favored among hackers. +Compare arg, var. + + +Node:parse, Next:Pascal, Previous:parm, Up:= P = + + +parse [from linguistic terminology] vt. + +1. To determine the syntactic structure of a sentence or other +utterance (close to the standard English meaning). "That was the +one I saw you." "I can't parse that." 2. More generally, to +understand or comprehend. "It's very simple; you just kretch the +glims and then aos the zotz." "I can't parse that." 3. Of fish, +to have to remove the bones yourself. "I object to parsing fish", +means "I don't want to get a whole fish, but a sliced one is +okay". A `parsed fish' has been deboned. There is some +controversy over whether `unparsed' should mean `bony', or also +mean `deboned'. + + +Node:Pascal, Next:pastie, Previous:parse, Up:= P += + +Pascal n. + +An Algol-descended language designed by Niklaus Wirth on the +CDC 6600 around 1967-68 as an instructional tool for elementary +programming. This language, designed primarily to keep students +from shooting themselves in the foot and thus extremely +restrictive from a general-purpose-programming point of view, was +later promoted as a general-purpose tool and, in fact, became the +ancestor of a large family of languages including Modula-2 and +Ada (see also bondage-and-discipline +language). The hackish point of view on Pascal was +probably best summed up by a devastating (and, in its deadpan +way, screamingly funny) 1981 paper by Brian Kernighan (of K&R fame) entitled "Why Pascal is Not +My Favorite Programming Language", which was turned down by the +technical journals but circulated widely via photocopies. It was +eventually published in "Comparing and Assessing Programming +Languages", edited by Alan Feuer and Narain Gehani +(Prentice-Hall, 1984). Part of his discussion is worth repeating +here, because its criticisms are still apposite to Pascal itself +after ten years of improvement and could also stand as an +indictment of many other bondage-and-discipline languages. At the +end of a summary of the case against Pascal, Kernighan wrote: + +9. There is no escape + +This last point is perhaps the most important. The language is +inadequate but circumscribed, because there is no way to escape +its limitations. There are no casts to disable the type-checking +when necessary. There is no way to replace the defective run-time +environment with a sensible one, unless one controls the compiler +that defines the "standard procedures". The language is +closed. + +People who use Pascal for serious programming fall into a +fatal trap. Because the language is impotent, it must be +extended. But each group extends Pascal in its own direction, to +make it look like whatever language they really want. Extensions +for separate compilation, FORTRAN-like COMMON, string data types, +internal static variables, initialization, octal numbers, bit +operators, etc., all add to the utility of the language for one +group but destroy its portability to others. + +I feel that it is a mistake to use Pascal for anything much +beyond its original target. In its pure form, Pascal is a toy +language, suitable for teaching but not for real programming. + + +Pascal has since been almost entirely displaced (by C) from the niches it had acquired in serious +applications and systems programming, but retains some popularity +as a hobbyist language in the MS-DOS and Macintosh worlds. + + +Node:pastie, Next:patch, Previous:Pascal, Up:= P += + +pastie /pay'stee/ n. + +An adhesive-backed label designed to be attached to a key on a +keyboard to indicate some non-standard character which can be +accessed through that key. Pasties are likely to be used in APL +environments, where almost every key is associated with a special +character. A pastie on the R key, for example, might remind the +user that it is used to generate the rho character. The term +properly refers to nipple-concealing devices formerly worn by +strippers in concession to indecent-exposure laws; compare tits on a keyboard. + + +Node:patch, Next:patch pumpkin, Previous:pastie, Up:= +P = + +patch + +1. n. A temporary addition to a piece of code, usually as a +quick-and-dirty remedy to +an existing bug or misfeature. A patch may or may not work, and +may or may not eventually be incorporated permanently into the +program. Distinguished from a diff or +mod by the fact that a patch is +generated by more primitive means than the rest of the program; +the classical examples are instructions modified by using the +front panel switches, and changes made directly to the binary +executable of a program originally written in an HLL. Compare one-line +fix. 2. vt. To insert a patch into a piece of code. 3. +[in the Unix world] n. A diff (sense +2). 4. A set of modifications to binaries to be applied by a +patching program. IBM operating systems often receive updates to +the operating system in the form of absolute hexadecimal patches. +If you have modified your OS, you have to disassemble these back +to the source. The patches might later be corrected by other +patches on top of them (patches were said to "grow scar tissue"). +The result was often a convoluted patch space and headaches galore. 5. +[Unix] the patch(1) program, written by Larry Wall, +which automatically applies a patch (sense 3) to a set of source +code. + +There is a classic story of a tiger +team penetrating a secure military computer that +illustrates the danger inherent in binary patches (or, indeed, +any patches that you can't -- or don't -- inspect and examine +before installing). They couldn't find any trap doors or any way to penetrate +security of IBM's OS, so they made a site visit to an IBM office +(remember, these were official military types who were +purportedly on official business), swiped some IBM stationery, +and created a fake patch. The patch was actually the trapdoor +they needed. The patch was distributed at about the right time +for an IBM patch, had official stationery and all accompanying +documentation, and was dutifully installed. The installation +manager very shortly thereafter learned something about proper +procedures. + + +Node:patch pumpkin, Next:patch space, Previous:patch, Up:= P = + +patch pumpkin n. + +[Perl hackers] A notional token passed around among the +members of a project. Possession of the patch pumpkin means one +has the exclusive authority to make changes on the project's +master source tree. The implicit assumption is that `pumpkin +holder' status is temporary and rotates periodically among senior +project members. + +This term comes from the Perl development community, but has +been sighted elsewhere. It derives from a stuffed-toy pumpkin +that was passed around at a development shop years ago as the +access control for a shared backup-tape drive. + + +Node:patch space, Next:path, Previous:patch pumpkin, Up:= P = + +patch space n. + +An unused block of bits left in a binary so that it can later +be modified by insertion of machine-language instructions there +(typically, the patch space is modified to contain new code, and +the superseded code is patched to contain a jump or call to the +patch space). The near-universal use of compilers and +interpreters has made this term rare; it is now primarily +historical outside IBM shops. See patch (sense 4), zap +(sense 4), hook. + + +Node:path, Next:pathological, Previous:patch space, Up:= P = + +path n. + +1. A bang path or explicitly +routed Internet address; +a node-by-node specification of a link between two machines. +Though these are now obsolete as a form of addressing, they still +show up in diagnostics and trace headers ocvcasionally (e.g. in +NNTP headers). 2. [Unix] A filename, fully specified relative to +the root directory (as opposed to relative to the current +directory; the latter is sometimes called a `relative path'). +This is also called a `pathname'. 3. [Unix and MS-DOS] The +`search path', an environment variable specifying the directories +in which the shell (COMMAND.COM, +under MS-DOS) should look for commands. Other, similar constructs +abound under Unix (for example, the C preprocessor has a `search +path' it uses in looking for #include files). + + +Node:pathological, Next:payware, Previous:path, Up:= P = + + +pathological adj. + +1. [scientific computation] Used of a data set that is grossly +atypical of normal expected input, esp. one that exposes a +weakness or bug in whatever algorithm one is using. An algorithm +that can be broken by pathological inputs may still be useful if +such inputs are very unlikely to occur in practice. 2. When used +of test input, implies that it was purposefully engineered as a +worst case. The implication in both senses is that the data is +spectacularly ill-conditioned or that someone had to explicitly +set out to break the algorithm in order to come up with such a +crazy example. 3. Also said of an unlikely collection of +circumstances. "If the network is down and comes up halfway +through the execution of that command by root, the system may +just crash." "Yes, but that's a pathological case." Often used to +dismiss the case from discussion, with the implication that the +consequences are acceptable, since they will happen so +infrequently (if at all) that it doesn't seem worth going to the +extra trouble to handle that case (see sense 1). + + +Node:payware, Next:PBD, Previous:pathological, Up:= P = + +payware /pay'weir/ n. + +Commercial software. Oppose shareware or freeware. + + +Node:PBD, Next:PC-ism, Previous:payware, Up:= P += + +PBD /P-B-D/ n. + +[abbrev. of `Programmer Brain Damage'] Applied to bug reports +revealing places where the program was obviously broken by an +incompetent or short-sighted programmer. Compare UBD; see also brain-damaged. + + +Node:PC-ism, Next:PD, Previous:PBD, +Up:= P = + +PC-ism /P-C-izm/ n. + +A piece of code or coding technique that takes advantage of +the unprotected single-tasking environment in IBM PCs and the +like running DOS, e.g., by busy-waiting on a hardware register, +direct diddling of screen memory, or using hard timing loops. +Compare ill-behaved, vaxism, unixism. Also, `PC-ware' n., a program full of +PC-isms on a machine with a more capable operating system. +Pejorative. + + +Node:PD, Next:PDL, +Previous:PC-ism, Up:= P = + +PD /P-D/ adj. + +[common] Abbreviation for `public domain', applied to software +distributed over Usenet and from +Internet archive sites. Much of this software is not in fact +public domain in the legal sense but travels under various +copyrights granting reproduction and use rights to anyone who can +snarf a copy. See copyleft. + + +Node:PDL, Next:PDP-10, Previous:PD, Up:= P = + +PDL /P-D-L/, /pid'l/, /p*d'l/ or /puhd'l/ + +1. n. `Program Design Language'. Any of a large class of +formal and profoundly useless pseudo-languages in which management forces one to design +programs. Too often, management expects PDL descriptions to be +maintained in parallel with the code, imposing massive overhead +to little or no benefit. See also flowchart. 2. v. To design using a program +design language. "I've been pdling so long my eyes won't focus +beyond 2 feet." 3. n. `Page Description Language'. Refers to any +language which is used to control a graphics device, usually a +laserprinter. The most common example is, of course, Adobe's +PostScript language, but there +are many others, such as Xerox InterPress, etc. 4. In ITS days, +the preferred MITism for stack. See +overflow pdl. 5. Dave +Lebling, one of the co-authors of Zork; (his network address on the ITS machines +was at one time pdl@dms). + + +Node:PDP-10, Next:PDP-20, Previous:PDL, Up:= P = + + +PDP-10 n. + +[Programmed Data Processor model 10] The machine that made +timesharing real. It looms large in hacker folklore because of +its adoption in the mid-1970s by many university computing +facilities and research labs, including the MIT AI Lab, Stanford, +and CMU. Some aspects of the instruction set (most notably the +bit-field instructions) are still considered unsurpassed. The 10 +was eventually eclipsed by the VAX machines (descendants of the +PDP-11) when DEC recognized that the 10 +and VAX product lines were competing with each other and decided +to concentrate its software development effort on the more +profitable VAX. The machine was finally dropped from DEC's line +in 1983, following the failure of the Jupiter Project at DEC to +build a viable new model. (Some attempts by other companies to +market clones came to nothing; see Foonly and Mars.) +This event spelled the doom of ITS and +the technical cultures that had spawned the original Jargon File, +but by mid-1991 it had become something of a badge of honorable +old-timerhood among hackers to have cut one's teeth on a PDP-10. +See TOPS-10, ITS, BLT, DDT, DPB, EXCH, HAKMEM, LDB, pop, push. See also http://www.inwap.com/pdp10/. + + +Node:PDP-20, Next:PEBKAC, Previous:PDP-10, Up:= P += + +PDP-20 n. + +The most famous computer that never was. PDP-10 computers running the TOPS-10 operating system were labeled +`DECsystem-10' as a way of differentiating them from the PDP-11. +Later on, those systems running TOPS-20 were labeled `DECSYSTEM-20' (the block +capitals being the result of a lawsuit brought against DEC by +Singer, which once made a computer called `system-10'), but +contrary to popular lore there was never a `PDP-20'; the only +difference between a 10 and a 20 was the operating system and the +color of the paint. Most (but not all) machines sold to run +TOPS-10 were painted `Basil Blue', whereas most TOPS-20 machines +were painted `Chinese Red' (often mistakenly called orange). + + +Node:PEBKAC, Next:peek, Previous:PDP-20, Up:= P += + +PEBKAC /peb'kak/ + +[Abbrev., "Problem Exists Between Keyboard And Chair"] Used by +support people, particularly at call centers and help desks. Not +used with the public. Denotes pilot error as the cause of the +crash, especially stupid errors that even a luser could figure out. Very derogatory. Usage: +"Did you ever figure out why that guy couldn't print?" "Yeah, he +kept cancelling the operation before it could finish. +PEBKAC." + + +Node:peek, Next:pencil and paper, Previous:PEBKAC, Up:= P = + +peek n.,vt. + +(and poke) The commands in most +microcomputer BASICs for directly accessing memory contents at an +absolute address; often extended to mean the corresponding +constructs in any HLL (peek reads +memory, poke modifies it). Much hacking on small, non-MMU micros +used to consist of `peek'ing around memory, more or less at +random, to find the location where the system keeps interesting +stuff. Long (and variably accurate) lists of such addresses for +various computers circulated (see interrupt list). The results of +`poke's at these addresses may be highly useful, mildly amusing, +useless but neat, or (most likely) total lossage (see killer poke). + +Since a real operating +system provides useful, higher-level services for the +tasks commonly performed with peeks and pokes on micros, and real +languages tend not to encourage low-level memory groveling, a +question like "How do I do a peek in C?" is diagnostic of the +newbie. (Of course, OS kernels often +have to do exactly this; a real kernel hacker would +unhesitatingly, if unportably, assign an absolute address to a +pointer variable and indirect through it.) + + +Node:pencil and paper, Next:Pentagram Pro, Previous:peek, Up:= P = + +pencil and paper n. + +An archaic information storage and transmission device that +works by depositing smears of graphite on bleached wood pulp. +More recent developments in paper-based technology include +improved `write-once' update devices which use tiny rolling heads +similar to mouse balls to deposit colored pigment. All these +devices require an operator skilled at so-called `handwriting' +technique. These technologies are ubiquitous outside hackerdom, +but nearly forgotten inside it. Most hackers had terrible +handwriting to begin with, and years of keyboarding tend to have +encouraged it to degrade further. Perhaps for this reason, +hackers deprecate pencil-and-paper technology and often resist +using it in any but the most trivial contexts. + + +Node:Pentagram Pro, Next:Pentium, Previous:pencil and paper, Up:= P = + +Pentagram Pro n. + +A humorous corruption of "Pentium Pro", with a Satanic +reference, implying that the chip is inherently evil. Often used with "666 MHz"; there is a +T-shirt. See Pentium + + +Node:Pentium, Next:peon, Previous:Pentagram Pro, Up:= P = + +Pentium n. + +The name given to Intel's P5 chip, the successor to the 80486. +The name was chosen because of difficulties Intel had in +trademarking a number. It suggests the number five (implying 586) +while (according to Intel) conveying a meaning of strength "like +titanium". Among hackers, the plural is frequently `pentia'. See +also Pentagram Pro. + +Intel did not stick to this convention when naming its P6 +processor the Pentium Pro; many believe this is due to +difficulties in selling a chip with "sex" in its name. Successor +chips have been called `Pentium II' and `Pentium III'. + + +Node:peon, Next:percent-S, Previous:Pentium, Up:= P += + +peon n. + +A person with no special (root or +wheel) privileges on a computer +system. "I can't create an account on foovax for you; +I'm only a peon there." + + +Node:percent-S, Next:perf, Previous:peon, Up:= P = + + +percent-S /per-sent' es'/ n. + +[From the code in C's printf(3) library function +used to insert an arbitrary string argument] An unspecified +person or object. "I was just talking to some percent-s in +administration." Compare random. + + +Node:perf, Next:perfect programmer +syndrome, Previous:percent-S, Up:= P = + +perf /perf/ n. + +Syn. chad (sense 1). The term +`perfory' /per'f*-ree/ is also heard. The term perf may also refer to the perforations +themselves, rather than the chad they produce when torn +(philatelists use it this way). + + +Node:perfect programmer +syndrome, Next:Perl, +Previous:perf, Up:= P = + +perfect programmer syndrome n. + +Arrogance; the egotistical conviction that one is above normal +human error. Most frequently found among programmers of some +native ability but relatively little experience (especially new +graduates; their perceptions may be distorted by a history of +excellent performance at solving toy +problems). "Of course my program is correct, there is no +need to test it." "Yes, I can see there may be a problem here, +but I'll never type rm -r / while in root mode." + + +Node:Perl, Next:person of no account, +Previous:perfect programmer +syndrome, Up:= P = + +Perl /perl/ n. + +[Practical Extraction and Report Language, a.k.a. Pathologically +Eclectic Rubbish Lister] An interpreted language developed by Larry +Wall (author of patch(1) and rn(1)) and distributed over Usenet. +Superficially resembles awk, but is much hairier, including many +facilities reminiscent of sed(1) and shells and a comprehensive Unix +system-call interface. Unix sysadmins, who are almost always +incorrigible hackers, generally consider it one of the languages of +choice, and it is by far the most widely used tool for making `live' +web pages via CGI. Perl has been described, in a parody of a famous +remark about lex(1), as the "Swiss-Army chainsaw" of Unix programming. +Though Perl is very useful, it would be a stretch to describe it as +pretty or elegant; people who like clean, spare design generally prefer +Python. See also Camel Book, TMTOWTDI. + + +Node:person of no +account, Next:pessimal, +Previous:Perl, Up:= P = + +person of no account n. + +[University of California at Santa Cruz] Used when referring +to a person with no network +address, frequently to forestall confusion. Most often as +part of an introduction: "This is Bill, a person of no account, +but he used to be bill@random.com". Compare return from the dead. + + +Node:pessimal, Next:pessimizing compiler, Previous:person of no +account, Up:= P = + +pessimal /pes'im-l/ adj. + +[Latin-based antonym for `optimal'] Maximally bad. "This is a +pessimal situation." Also `pessimize' vt. To make as bad as +possible. These words are the obvious Latin-based antonyms for +`optimal' and `optimize', but for some reason they do not appear +in most English dictionaries, although `pessimize' is listed in +the OED. + + +Node:pessimizing compiler, +Next:peta-, Previous:pessimal, Up:= P = + +pessimizing compiler /pes'*-mi:z`ing k*m-pi:l'r/ n. + +A compiler that produces object [antonym of techspeak +`optimizing compiler'] code that is worse than the +straightforward or obvious hand translation. The implication is +that the compiler is actually trying to optimize the program, but +through excessive cleverness is doing the opposite. A few +pessimizing compilers have been written on purpose, however, as +pranks or burlesques. + + +Node:peta-, Next:PETSCII, Previous:pessimizing compiler, Up:= P = + +peta- /pe't*/ pref + +[SI] See quantifiers. + + +Node:PETSCII, Next:PFY, Previous:peta-, Up:= P += + +PETSCII /pet'skee/ n. obs. + +[abbreviation of PET ASCII] The variation (many would say +perversion) of the ASCII character +set used by the Commodore Business Machines PET series of +personal computers and the later Commodore C64, C16, C128, and +VIC20 machines. The PETSCII set used left-arrow and up-arrow (as +in old-style ASCII) instead of underscore and caret, placed the +unshifted alphabet at positions 65-90, put the shifted alphabet +at positions 193-218, and added graphics characters. + + +Node:PFY, Next:phage, Previous:PETSCII, Up:= P += + +PFY n. + +[Usenet; common] Abbreviation for `Pimply-Faced Youth'. A +BOFH in training, esp. one apprenticed +to an elder BOFH aged in evil. + + +Node:phage, Next:phase, Previous:PFY, Up:= P = + + +phage n. + +A program that modifies other programs or databases in +unauthorized ways; esp. one that propagates a virus or Trojan +horse. See also worm, mockingbird. The analogy, of course, +is with phage viruses in biology. + + +Node:phase, Next:phase of the moon, Previous:phage, Up:= P = + +phase + +1. n. The offset of one's waking-sleeping schedule with +respect to the standard 24-hour cycle; a useful concept among +people who often work at night and/or according to no fixed +schedule. It is not uncommon to change one's phase by as much as +6 hours per day on a regular basis. "What's your phase?" "I've +been getting in about 8 P.M. lately, but I'm going +to wrap around to the day +schedule by Friday." A person who is roughly 12 hours out of +phase is sometimes said to be in `night mode'. (The term `day +mode' is also (but less frequently) used, meaning you're working +9 to 5 (or, more likely, 10 to 6).) The act of altering one's +cycle is called `changing phase'; `phase shifting' has also been +recently reported from Caltech. 2. `change phase the hard way': +To stay awake for a very long time in order to get into a +different phase. 3. `change phase the easy way': To stay asleep, +etc. However, some claim that either staying awake longer or +sleeping longer is easy, and that it is shortening your +day or night that is really hard (see wrap around). The `jet lag' that +afflicts travelers who cross many time-zone boundaries may be +attributed to two distinct causes: the strain of travel per se, +and the strain of changing phase. Hackers who suddenly find that +they must change phase drastically in a short period of time, +particularly the hard way, experience something very like jet lag +without traveling. + + +Node:phase of the moon, +Next:phase-wrapping, +Previous:phase, Up:= P = + +phase of the moon n. + +Used humorously as a random parameter on which something is +said to depend. Sometimes implies unreliability of whatever is +dependent, or that reliability seems to be dependent on +conditions nobody has been able to determine. "This feature +depends on having the channel open in mumble mode, having the foo +switch set, and on the phase of the moon." See also heisenbug. + +True story: Once upon a time there was a program bug that +really did depend on the phase of the moon. There was a little +subroutine that had traditionally been used in various programs +at MIT to calculate an approximation to the moon's true phase. +GLS incorporated this routine into a LISP program that, when it +wrote out a file, would print a timestamp line almost 80 +characters long. Very occasionally the first line of the message +would be too long and would overflow onto the next line, and when +the file was later read back in the program would barf. The length of the first line depended on +both the precise date and time and the length of the phase +specification when the timestamp was printed, and so the bug +literally depended on the phase of the moon! + +The first paper edition of the Jargon File (Steele-1983) +included an example of one of the timestamp lines that exhibited +this bug, but the typesetter `corrected' it. This has since been +described as the phase-of-the-moon-bug bug. + +However, beware of assumptions. A few years ago, engineers of +CERN (European Center for Nuclear Research) were baffled by some +errors in experiments conducted with the LEP particle +accelerator. As the formidable amount of data generated by such +devices is heavily processed by computers before being seen by +humans, many people suggested the software was somehow sensitive +to the phase of the moon. A few desperate engineers discovered +the truth; the error turned out to be the result of a tiny change +in the geometry of the 27km circumference ring, physically caused +by the deformation of the Earth by the passage of the Moon! This +story has entered physics folklore as a Newtonian vengeance on +particle physics and as an example of the relevance of the +simplest and oldest physical laws to the most modern science. + + +Node:phase-wrapping, Next:PHB, Previous:phase of the moon, Up:= P = + +phase-wrapping n. + +[MIT] Syn. wrap around, +sense 2. + + +Node:PHB, Next:phreaker, Previous:phase-wrapping, Up:= P = + +PHB /P-H-B/ + +[Usenet; common; rarely spoken] Abbreviation, "Pointy-Haired +Boss". From the Dilbert character, +the archetypal halfwitted middle-management type. See also pointy-haired. + + +Node:phreaker, Next:phreaking, Previous:PHB, Up:= P = + + +phreaker /freek'r/ n. + +One who engages in phreaking. +See also blue box. + + +Node:phreaking, Next:pico-, Previous:phreaker, Up:= +P = + +phreaking /freek'ing/ n. + +[from `phone phreak'] 1. The art and science of cracking the phone network (so as, for +example, to make free long-distance calls). 2. By extension, +security-cracking in any other context (especially, but not +exclusively, on communications networks) (see cracking). + +At one time phreaking was a semi-respectable activity among +hackers; there was a gentleman's agreement that phreaking as an +intellectual game and a form of exploration was OK, but serious +theft of services was taboo. There was significant crossover +between the hacker community and the hard-core phone phreaks who +ran semi-underground networks of their own through such media as +the legendary "TAP Newsletter". This ethos began to break down in +the mid-1980s as wider dissemination of the techniques put them +in the hands of less responsible phreaks. Around the same time, +changes in the phone network made old-style technical ingenuity +less effective as a way of hacking it, so phreaking came to +depend more on overtly criminal acts such as stealing phone-card +numbers. The crimes and punishments of gangs like the `414 group' +turned that game very ugly. A few old-time hackers still phreak +casually just to keep their hand in, but most these days have +hardly even heard of `blue boxes' or any of the other +paraphernalia of the great phreaks of yore. + + +Node:pico-, Next:pig-tail, Previous:phreaking, Up:= P = + +pico- pref. + +[SI: a quantifier meaning * 10^-12] Smaller than nano-; used in the same rather loose connotative +way as nano- and micro-. This +usage is not yet common in the way nano- and micro- +are, but should be instantly recognizable to any hacker. See also +quantifiers, micro-. + + +Node:pig-tail, Next:pilot error, Previous:pico-, Up:= P += + +pig-tail + +[radio hams] A short piece of cable with two connectors on +each end for converting between one connector type and another. +Common pig-tails are 9-to-25-pin serial-port converters and +cables to connect PCMCIA network cards to an RJ-45 network +cable. + + +Node:pilot error, Next:ping, Previous:pig-tail, Up:= +P = + +pilot error n. + +[Sun: from aviation] A user's misconfiguration or misuse of a +piece of software, producing apparently buglike results (compare +UBD). "Joe Luser reported a bug in +sendmail that causes it to generate bogus headers." "That's not a +bug, that's pilot error. His sendmail.cf is +hosed." + + +Node:ping, Next:Ping O' Death, Previous:pilot error, Up:= P = + +ping + +[from the submariners' term for a sonar pulse] 1. n. Slang +term for a small network message (ICMP ECHO) sent by a computer +to check for the presence and alertness of another. The Unix +command ping(8) can be used to do this manually +(note that ping(8)'s author denies the widespread +folk etymology that the name was ever intended as acronym for +`Packet INternet Groper'). Occasionally used as a phone greeting. +See ACK, also ENQ. 2. vt. To verify the presence of. 3. vt. To +get the attention of. 4. vt. To send a message to all members of +a mailing list requesting an +ACK (in order to verify that +everybody's addresses are reachable). "We haven't heard much of +anything from Geoff, but he did respond with an ACK both times I +pinged jargon-friends." 5. n. A quantum packet of happiness. +People who are very happy tend to exude pings; furthermore, one +can intentionally create pings and aim them at a needy party +(e.g., a depressed person). This sense of ping may appear as an +exclamation; "Ping!" (I'm happy; I am emitting a quantum of +happiness; I have been struck by a quantum of happiness). The +form "pingfulness", which is used to describe people who exude +pings, also occurs. (In the standard abuse of language, +"pingfulness" can also be used as an exclamation, in which case +it's a much stronger exclamation than just "ping"!). Oppose blargh. + +The funniest use of `ping' to date was described in January +1991 by Steve Hayman on the Usenet group _comp.sys.next_. He +was trying to isolate a faulty cable segment on a TCP/IP Ethernet +hooked up to a NeXT machine, and got tired of having to run back +to his console after each cabling tweak to see if the ping +packets were getting through. So he used the sound-recording +feature on the NeXT, then wrote a script that repeatedly invoked +ping(8), listened for an echo, and played back the +recording on each returned packet. Result? A program that caused +the machine to repeat, over and over, "Ping ... +ping ... ping ..." as long as the +network was up. He turned the volume to maximum, ferreted through +the building with one ear cocked, and found a faulty tee +connector in no time. + + +Node:Ping O' Death, Next:ping storm, Previous:ping, Up:= P = + +Ping O' Death n. + +A notorious exploit that (when +first discovered) could be easily used to crash a wide variety of +machines by overunning size limits in their TCP/IP stacks. First +revealed in late 1996. The open-source Unix community patched its +systems to remove the vulnerability within days or weeks, the +closed-source OS vendors generally took months. While the +difference in response times repeated a pattern familiar from +other security incidents, the accompanying glare of Web-fueled +publicity proved unusually embarrassing to the OS vendors and so +passed into history and myth. The term is now used to refer to +any nudge delivered by network wizards over the network that +causes bad things to happen on the system being nudged. For the +full story on the original exploit, see http://www.insecure.org/sploits/ping-o-death.html. + +Compare with 'kamikaze packet,' 'Finger of Death' and +'Chernobyl packet.' + + +Node:ping storm, Next:pink wire, Previous:Ping O' Death, Up:= P = + +ping storm n. + +A form of DoS attack +consisting of a flood of ping requests +(normally used to check network conditions) designed to disrupt +the normal activity of a system. This act is sometimes called +`ping lashing' or `ping flood'. Compare mail storm, broadcast storm. + + +Node:pink wire, Next:pipe, Previous:ping storm, Up:= P = + +pink wire n. + +[from the pink PTFE wire used in military equipment] As blue wire, but used in military +applications. 2. vi. To add a pink wire to a board. + + +Node:pipe, Next:pistol, Previous:pink wire, Up:= P = + +pipe n. + +[common] Idiomatically, one's connection to the Internet; in +context, the expansion "bit pipe" is understood. A "fat pipe" is +a line with T1 or higher capacity. A person with a 28.8 modem +might be heard to complain "I need a bigger pipe". + + +Node:pistol, Next:pixel sort, Previous:pipe, Up:= P = + + +pistol n. + +[IBM] A tool that makes it all too easy for you to shoot +yourself in the foot. "Unix rm * makes such a nice +pistol!" + + +Node:pixel sort, Next:pizza box, Previous:pistol, Up:= +P = + +pixel sort n. + +[Commodore users] Any compression routine which irretrievably +loses valuable data in the process of crunching it. Disparagingly used for `lossy' +methods such as JPEG. The theory, of course, is that these +methods are only used on photographic images in which minor +loss-of-data is not visible to the human eye. The term `pixel +sort' implies distrust of this theory. Compare bogo-sort. + + +Node:pizza box, Next:plaid screen, Previous:pixel sort, Up:= P = + +pizza box n. + +[Sun] The largish thin box housing the electronics in +(especially Sun) desktop workstations, so named because of its +size and shape and the dimpled pattern that looks like air +holes. + +Two meg single-platter removable disk packs used to be called +pizzas, and the huge drive they were stuck into was referred to +as a pizza oven. It's an index of progress that in the old days +just the disk was pizza-sized, while now the entire computer +is. + + +Node:plaid screen, Next:plain-ASCII, Previous:pizza box, Up:= P = + +plaid screen n. + +[XEROX PARC] A `special effect' that occurs when certain kinds +of memory smashes overwrite +the control blocks or image memory of a bit-mapped display. The +term "salt and pepper" may refer to a different pattern of +similar origin. Though the term as coined at PARC refers to the +result of an error, some of the X demos +induce plaid-screen effects deliberately as a display hack. + + +Node:plain-ASCII, Next:plan file, Previous:plaid screen, Up:= P = + +plain-ASCII /playn-as'kee/ + +Syn. flat-ASCII. + + +Node:plan file, Next:platinum-iridium, Previous:plain-ASCII, Up:= P = + +plan file n. + +[Unix] On systems that support finger, the `.plan' file in a user's home +directory is displayed when the user is fingered. This feature +was originally intended to be used to keep potential fingerers +apprised of one's location and near-future plans, but has been +turned almost universally to humorous and self-expressive +purposes (like a sig block). +See also Hacking X for +Y. + +A recent innovation in plan files has been the introduction of +"scrolling plan files" which are one-dimensional animations made +using only the printable ASCII character set, carriage return and +line feed, avoiding terminal specific escape sequences, since the +finger command will (for security +reasons; see letterbomb) not +pass the escape character. + +Scrolling .plan files have become art forms in miniature, and +some sites have started competitions to find who can create the +longest running, funniest, and most original animations. Various +animation characters include: + + +Centipede: + + +mmmmme + +Lorry/Truck: + + +oo-oP + +Andalusian Video Snail: + + +_@/ + + + +and a compiler (ASP) is available on Usenet for producing +them. See also twirling +baton. + + +Node:platinum-iridium, Next:playpen, Previous:plan file, Up:= P = + +platinum-iridium adj. + +Standard, against which all others of the same category are +measured. Usage: silly. The notion is that one of whatever it is +has actually been cast in platinum-iridium alloy and placed in +the vault beside the Standard Kilogram at the International +Bureau of Weights and Measures near Paris. (From 1889 to 1960, +the meter was defined to be the distance between two scratches in +a platinum-iridium bar kept in that same vault -- this replaced +an earlier definition as 10^(-7) times the distance between the +North Pole and the Equator along a meridian through Paris; +unfortunately, this had been based on an inexact value of the +circumference of the Earth. From 1960 to 1984 it was defined to +be 1650763.73 wavelengths of the orange-red line of krypton-86 +propagating in a vacuum. It is now defined as the length of the +path traveled by light in a vacuum in the time interval of +1/299,792,458 of a second. The kilogram is now the only unit of +measure officially defined in terms of a unique artifact.) "This +garbage-collection algorithm has been tested against the +platinum-iridium cons cell in Paris." Compare golden. + + +Node:playpen, Next:playte, Previous:platinum-iridium, Up:= P = + +playpen n. + +[IBM] A room where programmers work. Compare salt mines. + + +Node:playte, Next:plingnet, Previous:playpen, Up:= P += + +playte /playt/ + +16 bits, by analogy with nybble +and byte. Usage: rare and extremely +silly. See also dynner and crumb. General discussion of such terms is +under nybble. + + +Node:plingnet, Next:plokta, Previous:playte, Up:= P += + +plingnet /pling'net/ n. + +Syn. UUCPNET. Also see Commonwealth Hackish, +which uses `pling' for bang (as in +bang path). + + +Node:plokta, Next:plonk, Previous:plingnet, Up:= +P = + +plokta /plok't*/ v. + +[acronym: Press Lots Of Keys To Abort] To press random keys in +an attempt to get some response from the system. One might plokta +when the abort procedure for a program is not known, or when +trying to figure out if the system is just sluggish or really +hung. Plokta can also be used while trying to figure out any +unknown key sequence for a particular operation. Someone going +into `plokta mode' usually places both hands flat on the keyboard +and mashes them down, hoping for some useful response. + +A slightly more directed form of plokta can often be seen in +mail messages or Usenet articles from new users -- the text might +end with + + ^X^C + q + quit + :q + ^C + end + x + exit + ZZ + ^D + ? + help + + +as the user vainly tries to find the right exit sequence, with +the incorrect tries piling up at the end of the +message.... + + +Node:plonk, Next:plug-and-pray, Previous:plokta, Up:= +P = + +plonk excl.,vt. + +[Usenet: possibly influenced by British slang `plonk' for +cheap booze, or `plonker' for someone behaving stupidly (latter +is lit. equivalent to Yiddish `schmuck')] The sound a newbie makes as he falls to the bottom of a +kill file. While it originated +in the newsgroup +_talk.bizarre_, this term (usually written "*plonk*") is now +(1994) widespread on Usenet as a form of public ridicule. + + +Node:plug-and-pray, Next:plugh, Previous:plonk, Up:= P += + +plug-and-pray adj.,vi. + +Parody of the techspeak term `plug-and-play', describing a PC +peripheral card which is claimed to have no need for hardware +configuration via DIP switches, and which should be work as soon +as it is inserted in the PC. Unfortunately, even the PCI bus is +not up to pulling this off reliably, and people who have to do +installation or troubleshoot PCs soon find themselves longing for +the DIP switches. + + +Node:plugh, Next:plumbing, Previous:plug-and-pray, Up:= P = + +plugh /ploogh/ v. + +[from the ADVENT game] See xyzzy. + + +Node:plumbing, Next:PM, Previous:plugh, +Up:= P = + +plumbing n. + +[Unix] Term used for shell code, +so called because of the prevalence of `pipelines' that feed the +output of one program to the input of another. Under Unix, user +utilities can often be implemented or at least prototyped by a +suitable collection of pipelines and temp-file grinding +encapsulated in a shell script; this is much less effort than +writing C every time, and the capability is considered one of +Unix's major winning features. A few other OSs such as IBM's +VM/CMS support similar facilities. Esp. used in the construction +`hairy plumbing' (see hairy). "You +can kluge together a basic spell-checker out of +sort(1), comm(1), and +tr(1) with a little plumbing." See also tee. + + +Node:PM, Next:pnambic, Previous:plumbing, Up:= +P = + +PM /P-M/ + +1. v. (from `preventive maintenance') To bring down a machine +for inspection or test purposes. See provocative maintenance; see +also scratch monkey. 2. n. +Abbrev. for `Presentation Manager', an elephantine OS/2 graphical user +interface. + + +Node:pnambic, Next:pod, Previous:PM, +Up:= P = + +pnambic /p*-nam'bik/ + +[Acronym from the scene in the film version of "The Wizard of +Oz" in which the true nature of the wizard is first discovered: +"Pay no attention to the man behind the curtain."] 1. A stage of +development of a process or function that, owing to incomplete +implementation or to the complexity of the system, requires human +interaction to simulate or replace some or all of the actions, +inputs, or outputs of the process or function. 2. Of or +pertaining to a process or function whose apparent operations are +wholly or partially falsified. 3. Requiring prestidigitization. + +The ultimate pnambic product was "Dan Bricklin's Demo", a +program which supported flashy user-interface design prototyping. +There is a related maxim among hackers: "Any sufficiently +advanced technology is indistinguishable from a rigged demo." See +magic, sense 1, for illumination of +this point. + + +Node:pod, Next:point-and-drool interface, +Previous:pnambic, Up:= P = + +pod n. + +[allegedly from abbreviation POD for `Prince Of Darkness'] A +Diablo 630 (or, latterly, any letter-quality impact printer). +From the DEC-10 PODTYPE program used to feed formatted text to +it. Not to be confused with P.O.D.. + + +Node:point-and-drool +interface, Next:pointy +hat, Previous:pod, Up:= P = + +point-and-drool interface n. + +Parody of the techspeak term `point-and-shoot interface', +describing a windows, icons, and mouse-based interface such as is +found on the Macintosh. The implication, of course, is that such +an interface is only suitable for idiots. See for the rest of us, WIMP environment, Macintrash, drool-proof paper. Also +`point-and-grunt interface'. + + +Node:pointy hat, Next:pointy-haired, Previous:point-and-drool +interface, Up:= P = + + +pointy hat n. + +See wizard hat. This +synonym specifically refers to the wizards of Unseen University +in Terry Pratchett's "Discworld" serious of humorous fantasies; +these books are extremely popular among hackers. + + +Node:pointy-haired, Next:poke, Previous:pointy hat, Up:= P = + +pointy-haired adj. + +[after the character in the Dilbert comic strip] Describes the extreme +form of the property that separates suits and marketroids from hackers. Compare brain-dead; demented; see PHB. +Always applied to people, never to ideas. The plural form is +often used as a noun. "The pointy-haireds ordered me to use +Windows NT, but I set up a Linux server with Samba instead." + + +Node:poke, Next:poll, Previous:pointy-haired, Up:= P = + +poke n.,vt. + +See peek. + + +Node:poll, Next:polygon pusher, Previous:poke, Up:= P = + +poll v.,n. + +1. [techspeak] The action of checking the status of an input +line, sensor, or memory location to see if a particular external +event has been registered. 2. To repeatedly call or check with +someone: "I keep polling him, but he's not answering his phone; +he must be swapped out." 3. To ask. "Lunch? I poll for a takeout +order daily." + + +Node:polygon pusher, Next:POM, Previous:poll, Up:= P = + + +polygon pusher n. + +A chip designer who spends most of his or her time at the +physical layout level (which requires drawing lots of +multi-colored polygons). Also `rectangle slinger'. + + +Node:POM, Next:pop, Previous:polygon pusher, Up:= P = + +POM /P-O-M/ n. + +Common abbreviation for phase of the moon. Usage: +usually in the phrase `POM-dependent', which means flaky. + + +Node:pop, Next:POPJ, Previous:POM, +Up:= P = + +pop /pop/ + +[from the operation that removes the top of a stack, and the +fact that procedure return addresses are usually saved on the +stack] (also capitalized `POP') 1. vt. To remove something from a +stack or PDL. If a person says he/she has popped something +from his stack, that means he/she has finally finished working on +it and can now remove it from the list of things hanging +overhead. 2. When a discussion gets to a level of detail so deep +that the main point of the discussion is being lost, someone will +shout "Pop!", meaning "Get back up to a higher level!" The shout +is frequently accompanied by an upthrust arm with a finger +pointing to the ceiling. 3. [all-caps, as `POP'] Point of +Presence, a bank of dial-in lines allowing customers to make +(local) calls into an ISP. This is borderline techspeak. + + +Node:POPJ, Next:poser, Previous:pop, Up:= P = + + +POPJ /pop'J/ n.,v. + +[from a PDP-10 +return-from-subroutine instruction] To return from a digression. +By verb doubling, "Popj, popj" means roughly "Now let's see, +where were we?" See RTI. + + +Node:poser, Next:post, Previous:POPJ, Up:= P = + + +poser n. + +A wannabee; not hacker slang, +but used among crackers, phreaks and warez d00dz. Not as negative as lamer or leech. +Probably derives from a similar usage among punk-rockers and +metalheads, putting down those who "talk the talk but don't walk +the walk". + + +Node:post, Next:postcardware, Previous:poser, Up:= P += + +post v. + +To send a message to a mailing +list or newsgroup. +Distinguished in context from `mail'; one might ask, for example: +"Are you going to post the patch or mail it to known users?" + + +Node:postcardware, Next:posting, Previous:post, Up:= P = + + +postcardware n. + +A kind of shareware that +borders on freeware, in that the +author requests only that satisfied users send a postcard of +their home town or something. (This practice, silly as it might +seem, serves to remind users that they are otherwise getting +something for nothing, and may also be psychologically related to +real estate `sales' in which $1 changes hands just to keep the +transaction from being a gift.) + + +Node:posting, Next:postmaster, Previous:postcardware, Up:= P = + +posting n. + +Noun corresp. to v. post (but note +that post can be nouned). +Distinguished from a `letter' or ordinary email message by the fact that it is broadcast +rather than point-to-point. It is not clear whether messages sent +to a small mailing list are postings or email; perhaps the best +dividing line is that if you don't know the names of all the +potential recipients, it is a posting. + + +Node:postmaster, Next:PostScript, Previous:posting, Up:= P = + +postmaster n. + +The email contact and maintenance person at a site connected +to the Internet or UUCPNET. Often, but not always, the same as +the admin. The Internet standard for +electronic mail (RFC-822) requires each +machine to have a `postmaster' address; usually it is aliased to +this person. + + +Node:PostScript, Next:pound on, Previous:postmaster, Up:= P = + +PostScript n. + +A Page Description Language (PDL), +based on work originally done by John Gaffney at Evans and +Sutherland in 1976, evolving through `JaM' (`John and Martin', +Martin Newell) at XEROX PARC, +and finally implemented in its current form by John Warnock et +al. after he and Chuck Geschke founded Adobe Systems Incorporated +in 1982. PostScript gets its leverage by using a full programming +language, rather than a series of low-level escape sequences, to +describe an image to be printed on a laser printer or other +output device (in this it parallels EMACS, which exploited a similar insight about +editing tasks). It is also noteworthy for implementing on-the fly +rasterization, from Bezier curve descriptions, of high-quality +fonts at low (e.g. 300 dpi) resolution (it was formerly believed +that hand-tuned bitmap fonts were required for this task). +Hackers consider PostScript to be among the most elegant hacks of +all time, and the combination of technical merits and widespread +availability has made PostScript the language of choice for +graphical output. + + +Node:pound on, Next:power cycle, Previous:PostScript, Up:= P = + +pound on vt. + +Syn. bang on. + + +Node:power cycle, Next:power hit, Previous:pound on, Up:= P = + +power cycle vt. + +(also, `cycle power' or just `cycle') To power off a machine +and then power it on immediately, with the intention of clearing +some kind of hung or gronked state. Syn. 120 reset; see also Big Red Switch. Compare Vulcan nerve pinch, bounce (sense 4), and boot, and see the "Some AI Koans" (in Appendix A) about +Tom Knight and the novice. + + +Node:power hit, Next:PPN, Previous:power cycle, Up:= P = + +power hit n. + +A spike or drop-out in the electricity supplying your machine; +a power glitch. These can cause +crashes and even permanent damage to your machine(s). + + +Node:PPN, Next:pr0n, Previous:power hit, Up:= P = + +PPN /P-P-N/, /pip'n/ n. obs. + +[from `Project-Programmer Number'] A user-ID under TOPS-10 and its various mutant progeny at +SAIL, BBN, CompuServe, and elsewhere. Old-time hackers from the +PDP-10 era sometimes use this to refer to user IDs on other +systems as well. + + +Node:pr0n, Next:precedence lossage, Previous:PPN, Up:= P = + +pr0n // + +[Usenet, IRC] Pornography. Originally this referred only to +Internet porn but since then it has expanded to refer to just +about anything. The term comes from the warez kiddies tendency to replace +letters with numbers. At some point on IRC someone mistyped, +swapped the middle two letters, and the name stuck, then +propagated over into mainstream hacker usage. Compare filk, grilf, hing and newsfroup. + + +Node:precedence lossage, +Next:prepend, Previous:pr0n, Up:= P = + +precedence lossage /pre's*-dens los'*j/ n. + +[C programmers] Coding error in an expression due to +unexpected grouping of arithmetic or logical operators by the +compiler. Used esp. of certain common coding errors in C due to +the nonintuitively low precedence levels of &, +|, ^, <<, and +>> (for this reason, experienced C programmers +deliberately forget the language's baroque precedence hierarchy and parenthesize +defensively). Can always be avoided by suitable use of +parentheses. LISP fans enjoy pointing +out that this can't happen in their favorite language, +which eschews precedence entirely, requiring one to use explicit +parentheses everywhere. See aliasing +bug, memory leak, +memory smash, smash the stack, fandango on core, overrun screw. + + +Node:prepend, Next:prestidigitization, Previous:precedence lossage, +Up:= P = + +prepend /pree`pend'/ vt. + +[by analogy with `append'] To prefix. As with `append' (but +not `prefix' or `suffix' as a verb), the direct object is always +the thing being added and not the original word (or character +string, or whatever). "If you prepend a semicolon to the line, +the translation routine will pass it through unaltered." + + +Node:prestidigitization, Next:pretty pictures, +Previous:prepend, Up:= P = + +prestidigitization /pres`t*-di`j*-ti:-zay'sh*n/ n. + +1. The act of putting something into digital notation via +sleight of hand. 2. Data entry through legerdemain. + + +Node:pretty pictures, Next:prettyprint, Previous:prestidigitization, +Up:= P = + +pretty pictures n. + +[scientific computation] The next step up from numbers. Interesting graphical output from a +program that may not have any sensible relationship to the system +the program is intended to model. Good for showing to management. + + +Node:prettyprint, Next:pretzel key, Previous:pretty pictures, Up:= P = + +prettyprint /prit'ee-print/ v. + +(alt. `pretty-print') 1. To generate `pretty' human-readable +output from a hairy internal +representation; esp. used for the process of grinding (sense 1) program code, and most esp. +for LISP code. 2. To format in some particularly slick and +nontrivial way. + + +Node:pretzel key, Next:priesthood, Previous:prettyprint, Up:= P = + +pretzel key n. + +[Mac users] See feature +key. + + +Node:priesthood, Next:prime time, Previous:pretzel key, Up:= P = + +priesthood n. obs. + +[TMRC] The select group of system managers responsible for the +operation and maintenance of a batch operated computer system. On +these computers, a user never had direct access to a computer, +but had to submit his/her data and programs to a priest for +execution. Results were returned days or even weeks later. See +acolyte. + + +Node:prime time, Next:print, Previous:priesthood, Up:= P = + +prime time n. + +[from TV programming] Normal high-usage hours on a system or +network. Back in the days of big timesharing machines `prime +time' was when lots of people were competing for limited cycles, +usually the day shift. Avoidance of prime time was traditionally +given as a major reason for night +mode hacking. The term fell into disuse during the early +PC era, but has been revived to refer to times of day or evening +at which the Internet tends to be heavily loaded, making Web +access slow. The hackish tendency to late-night hacking runs has changed not a bit. + + +Node:print, Next:printing discussion, Previous:prime time, Up:= P = + +print v. + +To output, even if to a screen. If a hacker says that a +program "printed a message", he means this; if he refers to +printing a file, he probably means it in the conventional sense +of writing to a hardcopy device (compounds like `print job' and +`printout', on the other hand, always refer to the latter). This +very common term is likely a holdover from the days when printing +terminals were the norm, perpetuated by programming language +constructs like C's printf(3). See senses +1 and 2 of tty. + + +Node:printing discussion, +Next:priority +interrupt, Previous:print, Up:= P += + +printing discussion n. + +[XEROX PARC] A protracted, low-level, time-consuming, +generally pointless discussion of something only peripherally +interesting to all. + + +Node:priority interrupt, +Next:profile, Previous:printing discussion, +Up:= P = + +priority interrupt n. + +[from the hardware term] Describes any stimulus compelling +enough to yank one right out of hack +mode. Classically used to describe being dragged away by +an SO for immediate sex, but may also +refer to more mundane interruptions such as a fire alarm going +off in the near vicinity. Also called an NMI (non-maskable interrupt), especially in +PC-land. + + +Node:profile, Next:progasm, Previous:priority interrupt, Up:= P = + +profile n. + +1. A control file for a program, esp. a text file +automatically read from each user's home directory and intended +to be easily modified by the user in order to customize the +program's behavior. Used to avoid hardcoded choices (see also dot file, rc +file). 2. [techspeak] A report on the amounts of time +spent in each routine of a program, used to find and tune away the hot +spots in it. This sense is often verbed. Some profiling +modes report units other than time (such as call counts) and/or +report at granularities other than per-routine, but the idea is +similar. 3.[techspeak] A subset of a standard used for a +particular purpose. This sense confuses hackers who wander into +the weird world of ISO standards no end! + + +Node:progasm, Next:proggy, Previous:profile, Up:= P += + +progasm /proh'gaz-m/ n. + +[University of Wisconsin] The euphoria experienced upon the +completion of a program or other computer-related project. + + +Node:proggy, Next:proglet, Previous:progasm, Up:= P += + +proggy n. + +1. Any computer program that is considered a full application. +2. Any computer program that is made up of or otherwise contains +proglets. 3. Any computer program +that is large enough to be normally distributed as an RPM or +tarball. + + +Node:proglet, Next:program, Previous:proggy, Up:= P += + +proglet /prog'let/ n. + +[UK] A short _extempore_ program written to meet an +immediate, transient need. Often written in BASIC, rarely more +than a dozen lines long, and containing no subroutines. The +largest amount of code that can be written off the top of one's +head, that does not need any editing, and that runs correctly the +first time (this amount varies significantly according to one's +skill and the language one is using). Compare toy program, noddy, one-liner +wars. + + +Node:program, Next:Programmer's Cheer, Previous:proglet, Up:= P = + +program n. + +1. A magic spell cast over a computer allowing it to turn +one's input into error messages. 2. An exercise in experimental +epistemology. 3. A form of art, ostensibly intended for the +instruction of computers, which is nevertheless almost inevitably +a failure if other programmers can't understand it. + + +Node:Programmer's Cheer, +Next:programming, +Previous:program, Up:= P = + +Programmer's Cheer + +"Shift to the left! Shift to the right! Pop up, push down! +Byte! Byte! Byte!" A joke so old it has hair on it. + + +Node:programming, Next:programming fluid, Previous:Programmer's +Cheer, Up:= P = + +programming n. + +1. The art of debugging a blank sheet of paper (or, in these +days of on-line editing, the art of debugging an empty file). +"Bloody instructions which, being taught, return to plague their +inventor" ("Macbeth", Act 1, Scene 7) 2. A pastime similar to +banging one's head against a wall, but with fewer opportunities +for reward. 3. The most fun you can have with your clothes on. 4. +The least fun you can have with your clothes off. + + +Node:programming fluid, Next:propeller head, +Previous:programming, +Up:= P = + +programming fluid n. + +1. Coffee. 2. Cola. 3. Any caffeinacious stimulant. Many +hackers consider these essential for those all-night hacking +runs. See wirewater. + + +Node:propeller head, Next:propeller key, Previous:programming fluid, +Up:= P = + +propeller head n. + +Used by hackers, this is syn. with computer geek. Non-hackers sometimes +use it to describe all techies. Prob. derives from SF fandom's +tradition (originally invented by old-time fan Ray Faraday +Nelson) of propeller beanies as fannish insignia (though nobody +actually wears them except as a joke). + + +Node:propeller key, Next:proprietary, Previous:propeller head, Up:= P = + +propeller key n. + +[Mac users] See feature +key. + + +Node:proprietary, Next:protocol, Previous:propeller key, Up:= P = + +proprietary adj. + +1. In marketroid-speak, +superior; implies a product imbued with exclusive magic by the +unmatched brilliance of the company's own hardware or software +designers. 2. In the language of hackers and users, inferior; +implies a product not conforming to open-systems standards, and +thus one that puts the customer at the mercy of a vendor able to +gouge freely on service and upgrade charges after the initial +sale has locked the customer in. Often in the phrase "proprietary +crap". 3. Synonym for closed-source, e.g. software issued in +binary without source and under a restructive license. + +Since the coining of the term open +source, many hackers have made a conscious effort to +distinguish between `proprietary' and `commercial' software. It +is possible for software to be commercial (that is, intended to +make a profit for the producers) without being proprietary. The +reverse is also possible, for example in binary-only +freeware. + + +Node:protocol, Next:provocative maintenance, +Previous:proprietary, +Up:= P = + +protocol n. + +As used by hackers, this never refers to niceties about the +proper form for addressing letters to the Papal Nuncio or the +order in which one should use the forks in a Russian-style place +setting; hackers don't care about such things. It is used instead +to describe any set of rules that allow different machines or +pieces of software to coordinate with each other without +ambiguity. So, for example, it does include niceties about the +proper form for addressing packets on a network or the order in +which one should use the forks in the Dining Philosophers +Problem. It implies that there is some common message format and +an accepted set of primitives or commands that all parties +involved understand, and that transactions among them follow +predictable logical sequences. See also handshaking, do protocol. + + +Node:provocative +maintenance, Next:prowler, +Previous:protocol, Up:= P = + +provocative maintenance n. + +[common ironic mutation of `preventive maintenance'] Actions +performed upon a machine at regularly scheduled intervals to +ensure that the system remains in a usable state. So called +because it is all too often performed by a field servoid who doesn't know what he +is doing; such `maintenance' often induces problems, or +otherwise results in the machine's remaining in an +unusable state for an indeterminate amount of time. See +also scratch monkey. + + +Node:prowler, Next:pseudo, Previous:provocative maintenance, Up:= P = + +prowler n. + +[Unix] A daemon that is run +periodically (typically once a week) to seek out and erase core files, truncate administrative +logfiles, nuke lost+found directories, and otherwise +clean up the cruft that tends to pile +up in the corners of a file system. See also GFR, reaper, skulker. + + +Node:pseudo, Next:pseudoprime, Previous:prowler, Up:= P += + +pseudo /soo'doh/ n. + +[Usenet: truncation of `pseudonym'] 1. An electronic-mail or +Usenet persona adopted by a human +for amusement value or as a means of avoiding negative +repercussions of one's net.behavior; a `nom de Usenet', often +associated with forged postings designed to conceal message +origins. Perhaps the best-known and funniest hoax of this type is +B1FF. See also tentacle. 2. Notionally, a flamage-generating AI program simulating a +Usenet user. Many flamers have been accused of actually being +such entities, despite the fact that no AI program of the +required sophistication yet exists. However, in 1989 there was a +famous series of forged postings that used a +phrase-frequency-based travesty generator to simulate the styles +of several well-known flamers; it was based on large samples of +their back postings (compare Dissociated Press). A significant +number of people were fooled by the forgeries, and the debate +over their authenticity was settled only when the perpetrator +came forward to publicly admit the hoax. + + +Node:pseudoprime, Next:pseudosuit, Previous:pseudo, Up:= +P = + +pseudoprime n. + +A backgammon prime (six consecutive occupied points) with one +point missing. This term is an esoteric pun derived from number +theory: a number that passes a certain kind of "primality test" +may be called a `pseudoprime' (all primes pass any such test, but +so do some composite numbers), and any number that passes several +is, in some sense, almost certainly prime. The hacker backgammon +usage stems from the idea that a pseudoprime is almost as good as +a prime: it will do the same job unless you are unlucky. + + +Node:pseudosuit, Next:psychedelicware, Previous:pseudoprime, Up:= P = + +pseudosuit /soo'doh-s[y]oot`/ n. + +A suit wannabee; a hacker who has +decided that he wants to be in management or administration and +begins wearing ties, sport coats, and (shudder!) suits +voluntarily. It's his funeral. See also lobotomy. + + +Node:psychedelicware, Next:psyton, Previous:pseudosuit, Up:= P = + +psychedelicware /si:`k*-del'-ik-weir/ n. + +[UK] Syn. display hack. +See also smoking +clover. + + +Node:psyton, Next:pubic directory, Previous:psychedelicware, Up:= P = + +psyton /si:'ton/ n. + +[TMRC] The elementary particle carrying the sinister force. +The probability of a process losing is proportional to the number +of psytons falling on it. Psytons are generated by observers, +which is why demos are more likely to fail when lots of people +are watching. [This term appears to have been largely superseded +by bogon; see also quantum bogodynamics. +--ESR] + + +Node:pubic directory, Next:puff, Previous:psyton, Up:= +P = + +pubic directory /pyoob'ik d*-rek't*-ree/) n. + +[NYU] (also `pube directory' /pyoob' d*-rek't*-ree/) The `pub' +(public) directory on a machine that allows FTP access. So called because it is the default +location for SEX (sense 1). "I'll have +the source in the pube directory by Friday." + + +Node:puff, Next:pumpkin holder, Previous:pubic directory, Up:= P = + +puff vt. + +To decompress data that has been crunched by Huffman coding. +At least one widely distributed Huffman decoder program was +actually named `PUFF', but these days it is usually +packaged with the encoder. Oppose huff, see inflate. + + +Node:pumpkin holder, Next:pumpking, Previous:puff, Up:= P += + +pumpkin holder n. + +See patch pumpkin. + + +Node:pumpking, Next:punched card, Previous:pumpkin holder, Up:= P = + +pumpking n. + +Syn. for pumpkin +holder; see patch +pumpkin. + + +Node:punched card, Next:punt, Previous:pumpking, Up:= +P = + +punched card n.obs. + +[techspeak] (alt. `punch card') The signature medium of +computing's Stone Age, now +obsolescent outside of some IBM shops. The punched card actually +predated computers considerably, originating in 1801 as a control +device for mechanical looms. The version patented by Hollerith +and used with mechanical tabulating machines in the 1890 U.S. +Census was a piece of cardboard about 90 mm by 215 mm. There is a +widespread myth that it was designed to fit in the currency trays +used for that era's larger dollar bills, but recent +investigations have falsified this. + +IBM (which originated as a tabulating-machine manufacturer) +married the punched card to computers, encoding binary +information as patterns of small rectangular holes; one character +per column, 80 columns per card. Other coding schemes, sizes of +card, and hole shapes were tried at various times. + +The 80-column width of most character terminals is a legacy of +the IBM punched card; so is the size of the quick-reference cards +distributed with many varieties of computers even today. See +chad, chad +box, eighty-column +mind, green card, +dusty deck, lace card, card walloper. + + +Node:punt, Next:Purple Book, Previous:punched card, Up:= P = + +punt v. + +[from the punch line of an old joke referring to American +football: "Drop back 15 yards and punt!"] 1. To give up, +typically without any intention of retrying. "Let's punt the +movie tonight." "I was going to hack all night to get this +feature in, but I decided to punt" may mean that you've decided +not to stay up all night, and may also mean you're not ever even +going to put in the feature. 2. More specifically, to give up on +figuring out what the Right +Thing is and resort to an inefficient hack. 3. A design +decision to defer solving a problem, typically because one cannot +define what is desirable sufficiently well to frame an +algorithmic solution. "No way to know what the right form to dump +the graph in is -- we'll punt that for now." 4. To hand a tricky +implementation problem off to some other section of the design. +"It's too hard to get the compiler to do that; let's punt to the +runtime system." 5. To knock someone off an Internet or chat +connection; a `punter' thus, is a person or program that does +this. + + +Node:Purple Book, Next:purple wire, Previous:punt, Up:= P += + +Purple Book n. + +1. The "System V Interface Definition". The covers of the +first editions were an amazingly nauseating shade of +off-lavender. 2. Syn. Wizard +Book. Donald Lewine's "POSIX Programmer's Guide" +(O'Reilly, 1991, ISBN 0-937175-73-0). See also book titles. + + +Node:purple wire, Next:push, Previous:Purple Book, Up:= P = + +purple wire n. + +[IBM] Wire installed by Field Engineers to work around +problems discovered during testing or debugging. These are called +`purple wires' even when (as is frequently the case) their actual +physical color is yellow.... Compare blue wire, yellow wire, and red wire. + + +Node:push, Next:Python, Previous:purple wire, Up:= P = + +push + +[from the operation that puts the current information on a +stack, and the fact that procedure return addresses are saved on +a stack] (Also PUSH /push/ or PUSHJ /push'J/, the latter based on +the PDP-10 procedure call instruction.) 1. To put something onto +a stack or PDL. If one says that something has been pushed +onto one's stack, it means that the Damoclean list of things +hanging over ones's head has grown longer and heavier yet. This +may also imply that one will deal with it before other +pending items; otherwise one might say that the thing was `added +to my queue'. 2. vi. To enter upon a digression, to save the +current discussion for later. Antonym of pop; see also stack, +PDL. + + +Node:Python, Next:quad, Previous:push, Up:= P = + + +Python /pi:'thon/ + +In the words of its author, "the other scripting language" (other than +Perl, that is). Python's design is notably clean, elegant, and well +thought through; it tends to attract the sort of programmers who find +Perl grubby and exiguous. Python's relationship with Perl is rather +like the BSD community's relationship to Linux - it's the smaller party +in a (usually friendly) rivalry, but the average quality of its +developers is generally conceded to be rather higher than in the larger +community it competes with. There's a Python resource page at +http://www.python.org. See also Guido. + + +Node:= Q =, Next:= R =, Previous:= P =, Up:The Jargon Lexicon + += Q = + + +quad: + + +quadruple bucky: + + +quantifiers: + + +quantum +bogodynamics: + + +quarter: + + +ques: + + +quick-and-dirty: + + +quine: + + +quote chapter and +verse: + + +quotient: + + +quux: + + +qux: + + +QWERTY: + + +Node:quad, Next:quadruple bucky, Previous:Python, Up:= Q = + +quad n. + +1. Two bits; syn. for quarter, +crumb, tayste. 2. A four-pack of anything (compare +hex, sense 2). 3. The rectangle or box +glyph used in the APL language for various arcane purposes mostly +related to I/O. Former Ivy-Leaguers and Oxford types are said to +associate it with nostalgic memories of dear old University. + + +Node:quadruple bucky, Next:quantifiers, Previous:quad, Up:= Q = + +quadruple bucky n. obs. + +1. On an MIT space-cadet +keyboard, use of all four of the shifting keys (control, +meta, hyper, and super) while typing a character key. 2. On a +Stanford or MIT keyboard in raw +mode, use of four shift keys while typing a fifth +character, where the four shift keys are the control and meta +keys on both sides of the keyboard. This was very +difficult to do! One accepted technique was to press the +left-control and left-meta keys with your left hand, the +right-control and right-meta keys with your right hand, and the +fifth key with your nose. + +Quadruple-bucky combinations were very seldom used in +practice, because when one invented a new command one usually +assigned it to some character that was easier to type. If you +want to imply that a program has ridiculously many commands or +features, you can say something like: "Oh, the command that makes +it spin the tapes while whistling Beethoven's Fifth Symphony is +quadruple-bucky-cokebottle." See double bucky, bucky bits, cokebottle. + + +Node:quantifiers, Next:quantum bogodynamics, +Previous:quadruple +bucky, Up:= Q = + +quantifiers + +In techspeak and jargon, the standard metric prefixes used in +the SI (Système International) conventions for scientific +measurement have dual uses. With units of time or things that +come in powers of 10, such as money, they retain their usual +meanings of multiplication by powers of 1000 = 10^3. But when +used with bytes or other things that naturally come in powers of +2, they usually denote multiplication by powers of 1024 = +2^(10). + +Here are the SI magnifying prefixes, along with the +corresponding binary interpretations in common use: + +prefix decimal binary +kilo- 1000^1 1024^1 = 2^10 = 1,024 + +mega- 1000^2 1024^2 = 2^20 = 1,048,576 + +giga- 1000^3 1024^3 = 2^30 = 1,073,741,824 + +tera- 1000^4 1024^4 = 2^40 = 1,099,511,627,776 + +peta- 1000^5 1024^5 = 2^50 = 1,125,899,906,842,624 + +exa- 1000^6 1024^6 = 2^60 = 1,152,921,504,606,846,976 + +zetta- 1000^7 1024^7 = 2^70 = 1,180,591,620,717,411,303,424 + +yotta- 1000^8 1024^8 = 2^80 = 1,208,925,819,614,629,174,706,176 + +Here are the SI fractional prefixes: + +prefix decimal jargon usage +milli- 1000^-1 (seldom used in jargon) +micro- 1000^-2 small or human-scale (see micro-) +nano- 1000^-3 even smaller (see nano-) +pico- 1000^-4 even smaller yet (see pico-) +femto- 1000^-5 (not used in jargon---yet) +atto- 1000^-6 (not used in jargon---yet) +zepto- 1000^-7 (not used in jargon---yet) +yocto- 1000^-8 (not used in jargon---yet) + + +The prefixes zetta-, yotta-, zepto-, and yocto- have been +included in these tables purely for completeness and giggle +value; they were adopted in 1990 by the `19th Conference Generale +des Poids et Mesures'. The binary peta- and exa- loadings, though +well established, are not in jargon use either -- yet. The prefix +milli-, denoting multiplication by 1/1000, has always been rare +in jargon (there is, however, a standard joke about the +`millihelen' -- notionally, the amount of beauty required to +launch one ship). See the entries on micro-, pico-, and +nano- for more information on +connotative jargon use of these terms. `Femto' and `atto' (which, +interestingly, derive not from Greek but from Danish) have not +yet acquired jargon loadings, though it is easy to predict what +those will be once computing technology enters the required +realms of magnitude (however, see attoparsec). + +There are, of course, some standard unit prefixes for powers +of 10. In the following table, the `prefix' column is the +international standard suffix for the appropriate power of ten; +the `binary' column lists jargon abbreviations and words for the +corresponding power of 2. The B-suffixed forms are commonly used +for byte quantities; the words `meg' and `gig' are nouns that may +(but do not always) pluralize with `s'. + +_prefix decimal binary pronunciation_ +kilo- k K, KB, /kay/ +mega- M M, MB, meg /meg/ +giga- G G, GB, gig /gig/,/jig/ + + +Confusingly, hackers often use K or M as though they were +suffix or numeric multipliers rather than a prefix; thus "2K +dollars", "2M of disk space". This is also true (though less +commonly) of G. + +Note that the formal SI metric prefix for 1000 is `k'; some +use this strictly, reserving `K' for multiplication by 1024 (KB +is thus `kilobytes'). + +K, M, and G used alone refer to quantities of bytes; thus, 64G +is 64 gigabytes and `a K' is a kilobyte (compare mainstream use +of `a G' as short for `a grand', that is, $1000). Whether one +pronounces `gig' with hard or soft `g' depends on what one thinks +the proper pronunciation of `giga-' is. + +Confusing 1000 and 1024 (or other powers of 2 and 10 close in +magnitude) -- for example, describing a memory in units of 500K +or 524K instead of 512K -- is a sure sign of the marketroid. One example of this: it is +common to refer to the capacity of 3.5" microfloppies as `1.44 MB' In fact, this +is a completely bogus number. The +correct size is 1440 KB, that is, 1440 * 1024 = 1474560 bytes. So +the `mega' in `1.44 MB' is compounded of two `kilos', one of +which is 1024 and the other of which is 1000. The correct number +of megabytes would of course be 1440 / 1024 = 1.40625. Alas, this +fine point is probably lost on the world forever. + +[1993 update: hacker Morgan Burke has proposed, to general +approval on Usenet, the following additional prefixes: + + +groucho + + +10^(-30) + + +harpo + + +10^(-27) + + +harpi + + +10^(27) + + +grouchi + + +10^(30) + +We observe that this would leave the prefixes zeppo-, gummo-, +and chico- available for future expansion. Sadly, there is little +immediate prospect that Mr. Burke's eminently sensible proposal +will be ratified.] + +[1999 upate: there is an +IEC proposal for binary multipliers, but no evidence that any +of its proposals are in live use.] + + +Node:quantum bogodynamics, +Next:quarter, Previous:quantifiers, Up:= Q = + +quantum bogodynamics /kwon'tm boh`goh-di:-nam'iks/ +n. + +A theory that characterizes the universe in terms of bogon +sources (such as politicians, used-car salesmen, TV evangelists, +and suits in general), bogon sinks +(such as taxpayers and computers), and bogosity potential fields. +Bogon absorption, of course, causes human beings to behave +mindlessly and machines to fail (and may also cause both to emit +secondary bogons); however, the precise mechanics of the +bogon-computron interaction are not yet understood and remain to +be elucidated. Quantum bogodynamics is most often invoked to +explain the sharp increase in hardware and software failures in +the presence of suits; the latter emit bogons, which the former +absorb. See bogon, computron, suit, +psyton. + + +Node:quarter, Next:ques, Previous:quantum bogodynamics, Up:= Q = + +quarter n. + +Two bits. This in turn comes from the `pieces of eight' famed +in pirate movies -- Spanish silver crowns that could be broken +into eight pie-slice-shaped `bits' to make change. Early in +American history the Spanish coin was considered equal to a +dollar, so each of these `bits' was considered worth 12.5 cents. +Syn. tayste, crumb, quad. Usage: +rare. General discussion of such terms is under nybble. + + +Node:ques, Next:quick-and-dirty, Previous:quarter, Up:= Q = + +ques /kwes/ + +1. n. The question mark character (?, ASCII +0111111). 2. interj. What? Also frequently verb-doubled as "Ques +ques?" See wall. + + +Node:quick-and-dirty, Next:quine, Previous:ques, Up:= Q = + + +quick-and-dirty adj. + +[common] Describes a crock put +together under time or user pressure. Used esp. when you want to +convey that you think the fast way might lead to trouble further +down the road. "I can have a quick-and-dirty fix in place +tonight, but I'll have to rewrite the whole module to solve the +underlying design problem." See also kluge. + + +Node:quine, Next:quote chapter and verse, +Previous:quick-and-dirty, Up:= Q = + +quine /kwi:n/ n. + +[from the name of the logician Willard van Orman Quine, via +Douglas Hofstadter] A program that generates a copy of its own +source text as its complete output. Devising the shortest +possible quine in some given programming language is a common +hackish amusement. (We ignore some variants of BASIC in which a +program consisting of a single empty string literal reproduces +itself trivially.) Here is one classic quine: + +((lambda (x) + (list x (list (quote quote) x))) + (quote + (lambda (x) + (list x (list (quote quote) x))))) + + +This one works in LISP or Scheme. It's relatively easy to +write quines in other languages such as Postscript which readily +handle programs as data; much harder (and thus more challenging!) +in languages like C which do not. Here is a classic C quine for +ASCII machines: + +char*f="char*f=%c%s%c;main() +{printf(f,34,f,34,10);}%c"; +main(){printf(f,34,f,34,10);} + + +For excruciatingly exact quinishness, remove the interior line +breaks. Here is another elegant quine in ANSI C: + +#define q(k)main(){return!puts(#k"\nq("#k")");} +q(#define q(k)main(){return!puts(#k"\nq("#k")");}) + + +Some infamous Obfuscated C Contest entries +have been quines that reproduced in exotic ways. There is an +amusing Quine +Home Page. + + +Node:quote chapter and +verse, Next:quotient, +Previous:quine, Up:= Q = + +quote chapter and verse v. + +[by analogy with the mainstream phrase] To cite a relevant +excerpt from an appropriate bible. "I +don't care if rn gets it wrong; `Followup-To: +poster' is explicitly permitted by RFC-1036. I'll quote chapter and verse if you +don't believe me." See also legalese, language lawyer, RTFS (sense 2). + + +Node:quotient, Next:quux, Previous:quote chapter and verse, +Up:= Q = + +quotient n. + +See coefficient of +X. + + +Node:quux, Next:qux, Previous:quotient, Up:= +Q = + +quux /kwuhks/ n. + +[Mythically, from the Latin semi-deponent verb quuxo, quuxare, +quuxandum iri; noun form variously `quux' (plural `quuces', +anglicized to `quuxes') and `quuxu' (genitive plural is +`quuxuum', for four u-letters out of seven in all, using up all +the `u' letters in Scrabble).] 1. Originally, a metasyntactic variable like +foo and foobar. Invented by Guy Steele for precisely +this purpose when he was young and naive and not yet interacting +with the real computing community. Many people invent such words; +this one seems simply to have been lucky enough to have spread a +little. In an eloquent display of poetic justice, it has returned +to the originator in the form of a nickname. 2. interj. See foo; however, denotes very little disgust, +and is uttered mostly for the sake of the sound of it. 3. Guy +Steele in his persona as `The Great Quux', which is somewhat +infamous for light verse and for the `Crunchly' cartoons. 4. In +some circles, used as a punning opposite of `crux'. "Ah, that's +the quux of the matter!" implies that the point is not +crucial (compare tip of +the ice-cube). 5. quuxy: adj. Of or pertaining to a +quux. + + +Node:qux, Next:QWERTY, Previous:quux, Up:= Q = + + +qux /kwuhks/ + +The fourth of the standard metasyntactic variable, after +baz and before the +quu(u...)x series. See foo, bar, baz, quux. This appears +to be a recent mutation from quux, and +many versions (especially older versions) of the standard series +just run foo, bar, baz, quux, .... + + +Node:QWERTY, Next:rabbit job, Previous:qux, Up:= Q = + + +QWERTY /kwer'tee/ adj. + +[from the keycaps at the upper left] Pertaining to a standard +English-language typewriter keyboard (sometimes called the Sholes +keyboard after its inventor), as opposed to Dvorak or +non-US-ASCII layouts or a space-cadet keyboard or APL +keyboard. + +Historical note: The QWERTY layout is a fine example of a +fossil. It is sometimes said that it +was designed to slow down the typist, but this is wrong; it was +designed to allow faster typing -- under a constraint +now long obsolete. In early typewriters, fast typing using nearby +type-bars jammed the mechanism. So Sholes fiddled the layout to +separate the letters of many common digraphs (he did a far from +perfect job, though; `th', `tr', `ed', and `er', for example, +each use two nearby keys). Also, putting the letters of +`typewriter' on one line allowed it to be typed with particular +speed and accuracy for demos. The +jamming problem was essentially solved soon afterward by a +suitable use of springs, but the keyboard layout lives on. + +The QWERTY keyboard has also spawned some unhelpful economic +myths about how technical standards get and stay established; see +http://www.reasonmag.com/9606/Fe.QWERTY.html. + + +Node:= R =, Next:= S =, Previous:= Q =, Up:The Jargon Lexicon + += R = + + +rabbit job: + + +rain dance: + + +rainbow series: + + +random: + + +Random Number God: + + +random numbers: + + +randomness: + + +rape: + + +rare mode: + + +raster blaster: + + +raster burn: + + +rasterbation: + + +rat belt: + + +rat dance: + + +ratio site: + + +rave: + + +rave on!: + + +ravs: + + +raw mode: + + +RBL: + + +rc file: + + +RE: + + +read-only user: + + +README file: + + +real: + + +real estate: + + +real hack: + + +real operating +system: + + +Real Programmer: + + +Real Soon Now: + + +real time: + + +real user: + + +Real World: + + +reality check: + + +reality-distortion +field: + + +reaper: + + +recompile the +world: + + +rectangle slinger: + + +recursion: + + +recursive acronym: + + +Red Book: + + +red wire: + + +regexp: + + +register dancing: + + +rehi: + + +reincarnation cycle +of: + + +reinvent the +wheel: + + +relay rape: + + +religion of CHI: + + +religious issues: + + +replicator: + + +reply: + + +restriction: + + +retcon: + + +RETI: + + +retrocomputing: + + +return from the +dead: + + +RFC: + + +RFE: + + +rib site: + + +rice box: + + +Right Thing: + + +rip: + + +ripoff: + + +RL: + + +roach: + + +robocanceller: + + +robot: + + +robust: + + +rococo: + + +rogue: + + +room-temperature +IQ: + + +root: + + +root mode: + + +rot13: + + +rotary debugger: + + +round tape: + + +RSN: + + +RTBM: + + +RTFAQ: + + +RTFB: + + +RTFM: + + +RTFS: + + +RTI: + + +RTM: + + +RTS: + + +rude: + + +runes: + + +runic: + + +rusty iron: + + +rusty memory: + + +rusty wire: + + +Node:rabbit job, Next:rain dance, Previous:QWERTY, Up:= +R = + +rabbit job n. + +[Cambridge] A batch job that does little, if any, real work, +but creates one or more copies of itself, breeding like rabbits. +Compare wabbit, fork bomb. + + +Node:rain dance, Next:rainbow series, Previous:rabbit job, Up:= R = + +rain dance n. + +1. Any ceremonial action taken to correct a hardware problem, +with the expectation that nothing will be accomplished. This +especially applies to reseating printed circuit boards, +reconnecting cables, etc. "I can't boot up the machine. We'll +have to wait for Greg to do his rain dance." 2. Any arcane +sequence of actions performed with computers or software in order +to achieve some goal; the term is usually restricted to rituals +that include both an incantation or two and physical activity +or motion. Compare magic, voodoo programming, black art, cargo cult programming, +wave a dead +chicken; see also casting the runes. + + +Node:rainbow series, Next:random, Previous:rain dance, Up:= R = + +rainbow series n. + +Any of several series of technical manuals distinguished by +cover color. The original rainbow series was the NCSC security +manuals (see Orange Book, +crayola books); the term +has also been commonly applied to the PostScript reference set +(see Red Book, Green Book, Blue Book, White Book). Which books are meant by +"`the' rainbow series" unqualified is thus dependent on one's +local technical culture. + + +Node:random, Next:Random Number God, Previous:rainbow series, Up:= R = + +random adj. + +1. Unpredictable (closest to mathematical definition); weird. +"The system's been behaving pretty randomly." 2. Assorted; +undistinguished. "Who was at the conference?" "Just a bunch of +random business types." 3. (pejorative) Frivolous; unproductive; +undirected. "He's just a random loser." 4. Incoherent or +inelegant; poorly chosen; not well organized. "The program has a +random set of misfeatures." "That's a random name for that +function." "Well, all the names were chosen pretty randomly." 5. +In no particular order, though deterministic. "The I/O channels +are in a pool, and when a file is opened one is chosen randomly." +6. Arbitrary. "It generates a random name for the scratch file." +7. Gratuitously wrong, i.e., poorly done and for no good apparent +reason. For example, a program that handles file name defaulting +in a particularly useless way, or an assembler routine that could +easily have been coded using only three registers, but +redundantly uses seven for values with non-overlapping lifetimes, +so that no one else can invoke it without first saving four extra +registers. What randomness! 8. +n. A random hacker; used particularly of high-school students who +soak up computer time and generally get in the way. 9. n. Anyone +who is not a hacker (or, sometimes, anyone not known to the +hacker speaking); the noun form of sense 2. "I went to the talk, +but the audience was full of randoms asking bogus questions". 10. +n. (occasional MIT usage) One who lives at Random Hall. See also +J. Random, some random X. 11. [UK] +Conversationally, a non sequitur or something similarly +out-of-the-blue. As in: "Stop being so random!" This sense +equates to `hatstand', taken from the Viz comic character "Roger +Irrelevant - He's completely Hatstand." + + +Node:Random Number God, +Next:random numbers, +Previous:random, Up:= R = + +Random Number God + +[rec.games.roguelike.angband; often abbreviated `RNG'] The +malign force which lurks behind the random number generator in +Angband (and by extension +elsewhere). A dark god that demands sacrifices and toys with its +victims. "I just found a really great item; I suppose the RNG is +about to punish me..." Apparently, Angband's random number +generator occasionally gets locked in a repetition, so you get +something with a 3% chance happening 8 times in a row. +Improbable, but far too common to be pure chance. Compare Shub-Internet. + + +Node:random numbers, Next:randomness, Previous:Random Number God, +Up:= R = + +random numbers n. + +When one wishes to specify a large but random number of +things, and the context is inappropriate for N, certain numbers are preferred by hacker tradition +(that is, easily recognized as placeholders). These include the +following: + + + +17 + + +Long described at MIT as `the least random number'; see +23. + +23 + + +Sacred number of Eris, Goddess of Discord (along with 17 and +5). + +42 + + +The Answer to the Ultimate Question of Life, the Universe, +and Everything. (Note that this answer is completely fortuitous. +:-)) + +69 + + +From the sexual act. This one was favored in MIT's ITS +culture. + +105 + + +69 hex = 105 decimal, and 69 decimal = 105 octal. + +666 + + +The Number of the Beast. + + +For further enlightenment, study the "Principia Discordia", +"The +Hitchhiker's Guide to the Galaxy", "The Joy of Sex", and +the Christian Bible (Revelation 13:18). See also Discordianism or consult your pineal +gland. See also for values +of. + + +Node:randomness, Next:rape, Previous:random numbers, Up:= R = + +randomness n. + +1. An inexplicable misfeature; gratuitous inelegance. 2. A +hack or crock that depends on a complex combination of +coincidences (or, possibly, the combination upon which the crock +depends for its accidental failure to malfunction). "This hack +can output characters 40-57 by putting the character in the +four-bit accumulator field of an XCT and then extracting six bits +-- the low 2 bits of the XCT opcode are the right thing." "What +randomness!" 3. Of people, synonymous with `flakiness'. The +connotation is that the person so described is behaving weirdly, +incompetently, or inappropriately for reasons which are (a) too +tiresome to bother inquiring into, (b) are probably as +inscrutable as quantum phenomena anyway, and (c) are likely to +pass with time. "Maybe he has a real complaint, or maybe it's +just randomness. See if he calls back." + +Despite the negative connotations jargon uses of this term +have, it is worth noting that randomness can actually be a +valuable resource, very useful for applications in cryptography +and elsewhere. Computers are so thoroughly deterministic that +they have a hard time generating high-quality randomess, so +hackers have sometimes felt the need to built special-purpose +contraptions for this purpose alone. One well-known website +offers random bits generated by radioactive +decay. Another derives random bits from images of Lava Lite lamps. +(Hackers invariably find the latter hilarious. If you have to ask +why, you'll never get it.) + + +Node:rape, Next:rare mode, Previous:randomness, Up:= R = + +rape vt. + +1. To screw someone or something, +violently; in particular, to destroy a program or information +irrecoverably. Often used in describing file-system damage. +"So-and-so was running a program that did absolute disk I/O and +ended up raping the master directory." 2. To strip a piece of +hardware for parts. 3. [CMU/Pitt] To mass-copy files from an +anonymous ftp site. "Last night I raped Simtel's dskutl +directory." + + +Node:rare mode, Next:raster blaster, Previous:rape, Up:= R = + +rare mode adj. + +[Unix] CBREAK mode (character-by-character with interrupts +enabled). Distinguished from raw +mode and cooked mode; +the phrase "a sort of half-cooked (rare?) mode" is used in the +V7/BSD manuals to describe the mode. Usage: rare. + + +Node:raster blaster, Next:raster burn, Previous:rare mode, Up:= R = + +raster blaster n. + +[Cambridge] Specialized hardware for bitblt operations (a blitter). Allegedly inspired by `Rasta +Blasta', British slang for the sort of portable stereo Americans +call a `boom box' or `ghetto blaster'. + + +Node:raster burn, Next:rasterbation, Previous:raster blaster, Up:= R = + +raster burn n. + +Eyestrain brought on by too many hours of looking at low-res, +poorly tuned, or glare-ridden monitors, esp. graphics monitors. +See terminal +illness. + + +Node:rasterbation, Next:rat belt, Previous:raster burn, Up:= R = + +rasterbation n. + +[portmanteau: raster + masturbation] The gratuituous use of +comuputer generated images and effects in movies and graphic art +which would have been better without them. Especially employed as +a term of abuse by Photoshop/GIMP users and graphic artists. + + +Node:rat belt, Next:rat dance, Previous:rasterbation, Up:= R = + +rat belt n. + +A cable tie, esp. the sawtoothed, self-locking plastic kind +that you can remove only by cutting (as opposed to a random twist +of wire or a twist tie or one of those humongous metal clip +frobs). Small cable ties are `mouse belts'. + + +Node:rat dance, Next:ratio site, Previous:rat belt, Up:= R = + +rat dance n. + +[From the Dilbert comic strip of +November 14, 1995] A hacking +run that produces results which, while superficially +coherent, have little or nothing to do with its original +objectives. There are strong connotations that the coding process +and the objectives themselves were pretty random. (In the original comic strip, the +Ratbert is invited to dance on Dilbert's keyboard in order to +produce bugs for him to fix, and authors a Web browser instead.) +Compare Infinite-Monkey +Theorem. + +This term seems to have become widely recognized quite rapidly +after the original strip, a fact which testifies to Dilbert's +huge popularity among hackers. All too many find the perverse +incentives and Kafkaesque atmosphere of Dilbert's mythical +workplace reflective of their own experiences. + + +Node:ratio site, Next:rave, Previous:rat dance, Up:= R = + +ratio site + +[warez d00dz] A FTP site storing pirated files where one must +first upload something before being able to download. There is a +ratio, based on bytes or files count, between the uploads and +download. For instance, on a 2:1 site, to download a 4 Mb file, +one must first upload at least 2 Mb of files. The hotter the +contents of the server are, the smaller the ratio is. More often +than not, the server refuses uploads because its disk is full, +making it useless for downloading - or the connection magically +breaks after one has uploaded a large amount of files, just +before the downloading phase begins. See also banner site, leech mode. + + +Node:rave, Next:rave on!, Previous:ratio site, Up:= R = + +rave vi. + +[WPI] 1. To persist in discussing a specific subject. 2. To +speak authoritatively on a subject about which one knows very +little. 3. To complain to a person who is not in a position to +correct the difficulty. 4. To purposely annoy another person +verbally. 5. To evangelize. See flame. 6. Also used to describe a less negative +form of blather, such as friendly bullshitting. `Rave' differs +slightly from flame in that `rave' +implies that it is the persistence or obliviousness of the person +speaking that is annoying, while flame implies somewhat more strongly that the +tone or content is offensive as well. + + +Node:rave on!, Next:ravs, Previous:rave, Up:= R = + + +rave on! imp. + +Sarcastic invitation to continue a rave, often by someone who wishes the raver would +get a clue but realizes this is unlikely. + + +Node:ravs, Next:raw mode, Previous:rave on!, Up:= R = + +ravs /ravz/, also `Chinese ravs' n. + +[primarily MIT/Boston usage] Jiao-zi (steamed or boiled) or +Guo-tie (pan-fried). A Chinese appetizer, known variously in the +plural as dumplings, pot stickers (the literal translation of +guo-tie), and (around Boston) `Peking Ravioli'. The term `rav' is +short for `ravioli', and among hackers always means the Chinese +kind rather than the Italian kind. Both consist of a filling in a +pasta shell, but the Chinese kind includes no cheese, uses a +thinner pasta, has a pork-vegetable filling (good ones include +Chinese chives), and is cooked differently, either by steaming or +frying. A rav or dumpling can be cooked any way, but a potsticker +is always the pan-fried kind (so called because it sticks to the +frying pot and has to be scraped off). "Let's get hot-and-sour +soup and three orders of ravs." See also oriental food. + + +Node:raw mode, Next:RBL, Previous:ravs, +Up:= R = + +raw mode n. + +A mode that allows a program to transfer bits directly to or +from an I/O device (or, under bogus +operating systems that make a distinction, a disk file) without +any processing, abstraction, or interpretation by the operating +system. Compare rare mode, +cooked mode. This is +techspeak under Unix, jargon elsewhere. + + +Node:RBL, Next:rc file, Previous:raw mode, Up:= R = + +RBL /R-B-L/ + +Abbreviation: "Realtime Blackhole List". A service that allows +people to blacklist sites for emitting spam, and makes the blacklist available in real +time to electronic-mail transport programs that know how to use +RBL so they can filter out mail from those sites. Drastic (and +controversial) but effective. There is an RBL home page. + + +Node:rc file, Next:RE, Previous:RBL, +Up:= R = + +rc file /R-C fi:l/ n. + +[Unix: from `runcom files' on the CTSS system 1962-63, via the startup script +/etc/rc] Script file containing startup instructions +for an application program (or an entire operating system), +usually a text file containing commands of the sort that might +have been invoked manually once the system was running but are to +be executed automatically each time the system starts up. See +also dot file, profile (sense 1). + + +Node:RE, Next:read-only user, Previous:rc file, Up:= R = + +RE /R-E/ n. + +Common spoken and written shorthand for regexp. + + +Node:read-only user, Next:README file, Previous:RE, Up:= R = + +read-only user n. + +Describes a luser who uses +computers almost exclusively for reading Usenet, bulletin boards, +and/or email, rather than writing code or purveying useful +information. See twink, terminal junkie, lurker. + + +Node:README file, Next:real, Previous:read-only user, Up:= R = + +README file n. + +Hacker's-eye introduction traditionally included in the +top-level directory of a Unix source distribution, containing a +pointer to more detailed documentation, credits, miscellaneous +revision history, notes, etc. (The file may be named README, or +READ.ME, or rarely ReadMe or readme.txt or some other variant.) +In the Mac and PC worlds, software is not usually distributed in +source form, and the README is more likely to contain +user-oriented material like last-minute documentation changes, +error workarounds, and restrictions. When asked, hackers +invariably relate the README convention to the famous scene in +Lewis Carroll's "Alice's Adventures In Wonderland" in which Alice +confronts magic munchies labeled "Eat Me" and "Drink Me". + + +Node:real, Next:real estate, Previous:README file, Up:= R = + +real adj. + +Not simulated. Often used as a specific antonym to virtual in any of its jargon senses. + + +Node:real estate, Next:real hack, Previous:real, Up:= R += + +real estate n. + +May be used for any critical resource measured in units of +area. Most frequently used of `chip real estate', the area +available for logic on the surface of an integrated circuit (see +also nanoacre). May also be used +of floor space in a dinosaur +pen, or even space on a crowded desktop (whether physical +or electronic). + + +Node:real hack, Next:real operating system, +Previous:real estate, +Up:= R = + +real hack n. + +A crock. This is sometimes used +affectionately; see hack. + + +Node:real operating +system, Next:Real +Programmer, Previous:real hack, Up:= R = + +real operating system n. + +The sort the speaker is used to. People from the BSDophilic +academic community are likely to issue comments like "System V? +Why don't you use a real operating system?", people from +the commercial/industrial Unix sector are known to complain "BSD? +Why don't you use a real operating system?", and people +from IBM object "Unix? Why don't you use a real +operating system?" Only MS-DOS is +universally considered unreal. See holy +wars, religious +issues, proprietary, +Get a real +computer! + + +Node:Real Programmer, Next:Real Soon Now, +Previous:real +operating system, Up:= R += + +Real Programmer n. + +[indirectly, from the book "Real Men Don't Eat Quiche"] A +particular sub-variety of hacker: one possessed of a flippant +attitude toward complexity that is arrogant even when justified +by experience. The archetypal `Real Programmer' likes to program +on the bare metal and is very +good at same, remembers the binary opcodes for every machine he +has ever programmed, thinks that HLLs are sissy, and uses a +debugger to edit his code because full-screen editors are for +wimps. Real Programmers aren't satisfied with code that hasn't +been bummed into a state of tenseness just short of rupture. Real +Programmers never use comments or write documentation: "If it was +hard to write", says the Real Programmer, "it should be hard to +understand." Real Programmers can make machines do things that +were never in their spec sheets; in fact, they are seldom really +happy unless doing so. A Real Programmer's code can awe with its +fiendish brilliance, even as its crockishness appalls. Real +Programmers live on junk food and coffee, hang line-printer art +on their walls, and terrify the crap out of other programmers -- +because someday, somebody else might have to try to understand +their code in order to change it. Their successors generally +consider it a Good Thing that +there aren't many Real Programmers around any more. For a famous +(and somewhat more positive) portrait of a Real Programmer, see +"The Story of Mel" +in Appendix A. The term itself was popularized by a 1983 +Datamation article "Real Programmers Don't Use Pascal" by Ed +Post, still circulating on Usenet and Internet in on-line form. +You can browse "Real Programmers Don't Use Pascal" from the +Datamation home page http://www.datamation.com. + + +Node:Real Soon Now, Next:real time, Previous:Real Programmer, Up:= R = + +Real Soon Now adv. + +[orig. from SF's fanzine community, popularized by Jerry +Pournelle's column in "BYTE"] 1. Supposed to be available (or +fixed, or cheap, or whatever) real soon now according to +somebody, but the speaker is quite skeptical. 2. When one's gods, +fates, or other time commitments permit one to get to it (in +other words, don't hold your breath). Often abbreviated RSN. +Compare copious free +time. + + +Node:real time, Next:real user, Previous:Real Soon Now, Up:= R = + +real time + +1. [techspeak] adj. Describes an application which requires a +program to respond to stimuli within some small upper limit of +response time (typically milli- or microseconds). Process control +at a chemical plant is the canonical example. Such applications often +require special operating systems (because everything else must +take a back seat to response time) and speed-tuned hardware. 2. +adv. In jargon, refers to doing something while people are +watching or waiting. "I asked her how to find the calling +procedure's program counter on the stack and she came up with an +algorithm in real time." + + +Node:real user, Next:Real World, Previous:real time, Up:= R = + +real user n. + +1. A commercial user. One who is paying real money +for his computer usage. 2. A non-hacker. Someone using the system +for an explicit purpose (a research project, a course, etc.) +other than pure exploration. See user. +Hackers who are also students may also be real users. "I need +this fixed so I can do a problem set. I'm not complaining out of +randomness, but as a real user." See also luser. + + +Node:Real World, Next:reality check, Previous:real user, Up:= R = + +Real World n. + +1. Those institutions at which `programming' may be used in +the same sentence as `FORTRAN', `COBOL', `RPG', `IBM', +`DBASE', etc. Places where programs do such commercially +necessary but intellectually uninspiring things as generating +payroll checks and invoices. 2. The location of non-programmers +and activities not related to programming. 3. A bizarre dimension +in which the standard dress is shirt and tie and in which a +person's working hours are defined as 9 to 5 (see code grinder). 4. Anywhere outside a +university. "Poor fellow, he's left MIT and gone into the Real +World." Used pejoratively by those not in residence there. In +conversation, talking of someone who has entered the Real World +is not unlike speaking of a deceased person. It is also +noteworthy that on the campus of Cambridge University in England, +there is a gaily-painted lamp-post which bears the label `REALITY +CHECKPOINT'. It marks the boundary between university and the +Real World; check your notions of reality before passing. This +joke is funnier because the Cambridge `campus' is actually +coextensive with the center of Cambridge town. See also fear and loathing, mundane, and uninteresting. + + +Node:reality check, Next:reality-distortion +field, Previous:Real +World, Up:= R = + +reality check n. + +1. The simplest kind of test of software or hardware; doing +the equivalent of asking it what 2 + 2 is and seeing if you get +4. The software equivalent of a smoke +test. 2. The act of letting a real user try out prototype software. +Compare sanity check. + + +Node:reality-distortion +field, Next:reaper, +Previous:reality +check, Up:= R = + +reality-distortion field n. + +An expression used to describe the persuasive ability of +managers like Steve Jobs (the term originated at Apple in the +1980s to describe his peculiar charisma). Those close to these +managers become passionately committed to possibly insane +projects, without regard to the practicality of their +implementation or competitive forces in the marketpace. + + +Node:reaper, Next:recompile the world, Previous:reality-distortion field, Up:= R = + +reaper n. + +A prowler that GFRs files. A file removed in this way is said to +have been `reaped'. + + +Node:recompile the world, +Next:rectangle +slinger, Previous:reaper, Up:= R += + +recompile the world + +The surprisingly large amount of work that needs to be done as +the result of any small but globally visible program change. "The +world" may mean the entirety of some huge program, or may in +theory refer to every program of a certain class in the entire +known universe. For instance, "Add one #define to stdio.h, and +you have to recompile the world." This means that any minor +change to the standard-I/O header file theoretically mandates +recompiling every C program in existence, even if only to verify +that the change didn't screw something else up. In practice, you +may not actually have to recompile the world, but the implication +is that some human cleverness is required to figure out what +parts can be safely left out. + + +Node:rectangle slinger, Next:recursion, Previous:recompile the +world, Up:= R = + +rectangle slinger n. + +See polygon pusher. + + +Node:recursion, Next:recursive acronym, Previous:rectangle slinger, +Up:= R = + +recursion n. + +See recursion. See also tail recursion. + + +Node:recursive acronym, Next:Red Book, Previous:recursion, Up:= R = + +recursive acronym n. + +A hackish (and especially MIT) tradition is to choose +acronyms/abbreviations that refer humorously to themselves or to +other acronyms/abbreviations. The classic examples were two MIT +editors called EINE ("EINE Is Not EMACS") and ZWEI ("ZWEI Was +EINE Initially"). More recently, there is a Scheme compiler +called LIAR (Liar Imitates Apply Recursively), and GNU (q.v., sense 1) stands for "GNU's Not Unix!" +-- and a company with the name Cygnus, which expands to "Cygnus, +Your GNU Support" (though Cygnus people say this is a backronym). See also mung, EMACS. + + +Node:Red Book, Next:red wire, Previous:recursive acronym, Up:= R = + +Red Book n. + +1. Informal name for one of the four standard references on +PostScript ("PostScript Language +Reference Manual", Adobe Systems (Addison-Wesley, 1985; +QA76.73.P67P67; ISBN 0-201-10174-2, or the 1990 second edition +ISBN 0-201-18127-4); the others are known as the Green Book, the Blue Book, and the White Book (sense 2). 2. Informal name +for one of the 3 standard references on Smalltalk ("Smalltalk-80: +The Interactive Programming Environment" by Adele Goldberg +(Addison-Wesley, 1984; QA76.8.S635G638; ISBN 0-201-11372-4); this +too is associated with blue and green books). 3. Any of the 1984 +standards issued by the CCITT eighth plenary assembly. These +include, among other things, the X.400 email spec and the Group 1 +through 4 fax standards. 4. The new version of the Green Book (sense 4) -- IEEE 1003.1-1990, +a.k.a ISO 9945-1 -- is (because of the color and the fact that it +is printed on A4 paper) known in the USA as "the Ugly Red Book +That Won't Fit On The Shelf" and in Europe as "the Ugly Red Book +That's A Sensible Size". 5. The NSA "Trusted Network +Interpretation" companion to the Orange Book. 6. Nemeth, Snyder, Seebass, +Hein; "Unix System Administration Handbook, Second Edition" +(Prentice Hall PTR, New Jersey; 1995; QA76.76.063N45; ISBN +0-13-151051-7). See also book +titles. + + +Node:red wire, Next:regexp, Previous:Red Book, Up:= R = + +red wire n. + +[IBM] Patch wires installed by programmers who have no +business mucking with the hardware. It is said that the only +thing more dangerous than a hardware guy with a code patch is a +softy with a soldering +iron.... Compare blue +wire, yellow wire, +purple wire. + + +Node:regexp, Next:register dancing, Previous:red wire, Up:= R = + +regexp /reg'eksp/ n. + +[Unix] (alt. `regex' or `reg-ex') 1. Common written and spoken +abbreviation for `regular expression', one of the wildcard patterns +used, e.g., by Unix utilities such as grep(1), sed(1), and awk(1). +These use conventions similar to but more elaborate than those +described under glob. For purposes of this lexicon, it is sufficient to +note that regexps also allow complemented character sets using ^; thus, +one can specify `any non-alphabetic character' with [^A-Za-z]. 2. Name +of a well-known PD regexp-handling package in portable C, written by +revered Usenetter Henry Spencer. + + +Node:register dancing, Next:rehi, Previous:regexp, Up:= +R = + +register dancing n. + +Many older processor architectures suffer from a serious +shortage of general-purpose registers. This is especially a +problem for compiler-writers, because their generated code needs +places to store temporaries for things like intermediate values +in expression evaluation. Some designs with this problem, like +the Intel 80x86, do have a handful of special-purpose registers +that can be pressed into service, providing suitable care is +taken to avoid unpleasant side effects on the state of the +processor: while the special-purpose register is being used to +hold an intermediate value, a delicate minuet is required in +which the previous value of the register is saved and then +restored just before the official function (and value) of the +special-purpose register is again needed. + + +Node:rehi, Next:reincarnation cycle of, +Previous:register +dancing, Up:= R = + +rehi + +[IRC, MUD] "Hello again." Very commonly used to greet people +upon returning to an IRC channel after channel hopping. + + +Node:reincarnation cycle +of, Next:reinvent the wheel, Previous:rehi, Up:= R = + +reincarnation, cycle of n. + +See cycle of +reincarnation. + + +Node:reinvent the wheel, +Next:relay rape, +Previous:reincarnation cycle of, Up:= R = + +reinvent the wheel v. + +To design or implement a tool equivalent to an existing one or +part of one, with the implication that doing so is silly or a +waste of time. This is often a valid criticism. On the other +hand, automobiles don't use wooden rollers, and some kinds of +wheel have to be reinvented many times before you get them right. +On the third hand, people reinventing the wheel do tend to come +up with the moral equivalent of a trapezoid with an offset +axle. + + +Node:relay rape, Next:religion of CHI, Previous:reinvent the wheel, +Up:= R = + +relay rape n. + +The hijacking of a third party's unsecured mail server to +deliver spam. + + +Node:religion of CHI, Next:religious issues, +Previous:relay rape, +Up:= R = + +religion of CHI /ki:/ n. + +[Case Western Reserve University] Yet another hackish parody +religion (see also Church of the SubGenius, +Discordianism). In the +mid-70s, the canonical "Introduction to Programming" courses at +CWRU were taught in Algol, and student exercises were punched on +cards and run on a Univac 1108 system using a homebrew operating +system named CHI. The religion had no doctrines and but one +ritual: whenever the worshipper noted that a digital clock read +11:08, he or she would recite the phrase "It is 11:08; ABS, +ALPHABETIC, ARCSIN, ARCCOS, ARCTAN." The last five words were the +first five functions in the appropriate chapter of the Algol +manual; note the special pronunciations /obz/ and /ark'sin/ +rather than the more common /ahbz/ and /ark'si:n/. Using an alarm +clock to warn of 11:08's arrival was considered harmful. + + +Node:religious issues, Next:replicator, Previous:religion of CHI, Up:= R = + +religious issues n. + +Questions which seemingly cannot be raised without touching +off holy wars, such as "What is +the best operating system (or editor, language, architecture, +shell, mail reader, news reader)?", "What about that Heinlein +guy, eh?", "What should we add to the new Jargon File?" See holy wars; see also theology, bigot. + +This term is a prime example of ha ha only serious. People +actually develop the most amazing and religiously intense +attachments to their tools, even when the tools are intangible. +The most constructive thing one can do when one stumbles into the +crossfire is mumble Get a +life! and leave -- unless, of course, one's own +unassailably rational and obviously correct choices are being +slammed. + + +Node:replicator, Next:reply, Previous:religious issues, Up:= R = + +replicator n. + +Any construct that acts to produce copies of itself; this +could be a living organism, an idea (see meme), a program (see quine, worm, wabbit, fork +bomb, and virus), a pattern +in a cellular automaton (see life, +sense 1), or (speculatively) a robot or nanobot. It is even claimed by some that Unix and C are the +symbiotic halves of an extremely successful replicator; see Unix conspiracy. + + +Node:reply, Next:restriction, Previous:replicator, Up:= R = + +reply n. + +See followup. + + +Node:restriction, Next:retcon, Previous:reply, Up:= R += + +restriction n. + +A bug or design error that limits a +program's capabilities, and which is sufficiently egregious that +nobody can quite work up enough nerve to describe it as a feature. Often used (esp. by marketroid types) to make it sound as +though some crippling bogosity had been intended by the designers +all along, or was forced upon them by arcane technical +constraints of a nature no mere user could possibly comprehend +(these claims are almost invariably false). + +Old-time hacker Joseph M. Newcomer advises that whenever +choosing a quantifiable but arbitrary restriction, you should +make it either a power of 2 or a power of 2 minus 1. If you +impose a limit of 107 items in a list, everyone will know it is a +random number -- on the other hand, a limit of 15 or 16 suggests +some deep reason (involving 0- or 1-based indexing in binary) and +you will get less flamage for it. +Limits which are round numbers in base 10 are always especially +suspect. + + +Node:retcon, Next:RETI, Previous:restriction, Up:= R = + +retcon /ret'kon/ + +[short for `retroactive continuity', from the Usenet newsgroup +_rec.arts.comics_] 1. n. The common situation in pulp +fiction (esp. comics or soap operas) where a new story `reveals' +things about events in previous stories, usually leaving the +`facts' the same (thus preserving continuity) while completely +changing their interpretation. For example, revealing that a +whole season of "Dallas" was a dream was a retcon. 2. vt. To +write such a story about a character or fictitious object. "Byrne +has retconned Superman's cape so that it is no longer +unbreakable." "Marvelman's old adventures were retconned into +synthetic dreams." "Swamp Thing was retconned from a transformed +person into a sentient vegetable." "Darth Vader was retconned +into Luke Skywalker's father in "The Empire Strikes Back". + +[This term is included because it is a good example of hackish +linguistic innovation in a field completely unrelated to +computers. The word `retcon' will probably spread through comics +fandom and lose its association with hackerdom within a couple of +years; for the record, it started here. --ESR] + +[1993 update: some comics fans on the net now claim that +retcon was independently in use in comics fandom before +_rec.arts.comics_. In lexicography, nothing is ever simple. +--ESR] + + +Node:RETI, Next:retrocomputing, Previous:retcon, Up:= +R = + +RETI v. + +Syn. RTI + + +Node:retrocomputing, Next:return from the +dead, Previous:RETI, Up:= R = + +retrocomputing /ret'-roh-k*m-pyoo'ting/ n. + +Refers to emulations of way-behind-the-state-of-the-art +hardware or software, or implementations of +never-was-state-of-the-art; esp. if such implementations are +elaborate practical jokes and/or parodies, written mostly for +hack value, of more `serious' +designs. Perhaps the most widely distributed retrocomputing +utility was the pnch(6) or bcd(6) +program on V7 and other early Unix versions, which would accept +up to 80 characters of text argument and display the +corresponding pattern in punched +card code. Other well-known retrocomputing hacks have +included the programming language INTERCAL, a JCL-emulating shell for Unix, the +card-punch-emulating editor named 029, and various elaborate +PDP-11 hardware emulators and RT-11 OS emulators written just to +keep an old, sourceless Zork binary +running. + +A tasty selection of retrocomputing programs are made +available at the Retrocomputing Museum, http://www.ccil.org/retro. + + +Node:return from the +dead, Next:RFC, Previous:retrocomputing, Up:= R = + +return from the dead v. + +To regain access to the net after a long absence. Compare +person of no +account. + + +Node:RFC, Next:RFE, Previous:return from the dead, Up:= R = + +RFC /R-F-C/ n. + +[Request For Comment] One of a long-established series of +numbered Internet informational documents and standards widely +followed by commercial software and freeware in the Internet and +Unix communities. Perhaps the single most influential one has +been RFC-822 (the Internet mail-format standard). The RFCs are +unusual in that they are floated by technical experts acting on +their own initiative and reviewed by the Internet at large, +rather than formally promulgated through an institution such as +ANSI. For this reason, they remain known as RFCs even once +adopted as standards. + +The RFC tradition of pragmatic, experience-driven, +after-the-fact standard writing done by individuals or small +working groups has important advantages over the more formal, +committee-driven process typical of ANSI or ISO. Emblematic of +some of these advantages is the existence of a flourishing +tradition of `joke' RFCs; usually at least one a year is +published, usually on April 1st. Well-known joke RFCs have +included 527 ("ARPAWOCKY", R. Merryman, UCSD; 22 June 1973), 748 +("Telnet Randomly-Lose Option", Mark R. Crispin; 1 April 1978), +and 1149 ("A Standard for the Transmission of IP Datagrams on +Avian Carriers", D. Waitzman, BBN STC; 1 April 1990). The first +was a Lewis Carroll pastiche; the second a parody of the TCP-IP +documentation style, and the third a deadpan skewering of +standards-document legalese, describing protocols for +transmitting Internet data packets by carrier pigeon. + +The RFCs are most remarkable for how well they work -- they +manage to have neither the ambiguities that are usually rife in +informal specifications, nor the committee-perpetrated +misfeatures that often haunt formal standards, and they define a +network that has grown to truly worldwide proportions. + + +Node:RFE, Next:rib site, Previous:RFC, Up:= R = + + +RFE /R-F-E/ n. + +1. [techspeak] Request For Enhancement (compare RFC). 2. [from `Radio Free Europe', Bellcore and +Sun] Radio Free Ethernet, a system (originated by Peter Langston) +for broadcasting audio among Sun SPARCstations over the +ethernet. + + +Node:rib site, Next:rice box, Previous:RFE, Up:= R = + + +rib site n. + +[by analogy with backbone +site] A machine that has an on-demand high-speed link to +a backbone site and serves +as a regional distribution point for lots of third-party traffic +in email and Usenet news. Compare leaf +site, backbone +site. + + +Node:rice box, Next:Right Thing, Previous:rib site, Up:= R = + +rice box n. + +[from ham radio slang] Any Asian-made commodity computer, esp. +an 80x86-based machine built to IBM PC-compatible ISA or EISA-bus +standards. + + +Node:Right Thing, Next:rip, Previous:rice box, Up:= R = + +Right Thing n. + +That which is compellingly the correct or appropriate +thing to use, do, say, etc. Often capitalized, always emphasized +in speech as though capitalized. Use of this term often implies +that in fact reasonable people may disagree. "What's the right +thing for LISP to do when it sees (mod a 0)? Should +it return a, or give a divide-by-0 error?" Oppose +Wrong Thing. + + +Node:rip, Next:ripoff, Previous:Right Thing, Up:= R = + +rip v. + +1. To extract the digital representation of a piece of music +from an audio CD. Software that does this is often called a "CD +ripper". 2. [Amiga hackers] To extract sound or graphics from a +program that they have been compiled/assembled into, or which +generates them at run-time. In the case of older Amiga games this +entails searching through memory shortly after a reboot. This +sense has been in use for many years and probably gave rise to +the (now more common) sense 1. + + +Node:ripoff, Next:RL, Previous:rip, +Up:= R = + +ripoff n. + +Synonym for chad, sense 1. + + +Node:RL, Next:roach, Previous:ripoff, Up:= R += + +RL // n. + +[MUD community] Real Life. "Firiss laughs in RL" means that +Firiss's player is laughing. Compare meatspace; oppose VR. + + +Node:roach, Next:robocanceller, Previous:RL, Up:= R = + + +roach vt. + +[Bell Labs] To destroy, esp. of a data structure. Hardware +gets toasted or fried, software gets roached. + + +Node:robocanceller, Next:robot, Previous:roach, Up:= R += + +robocanceller /roh-boh-kan'sel-*r/ + +A program that monitors Usenet feeds, attempting to detect and +eliminate spam by sending appropriate +cancel messages . Robocancellers may use the Breidbart Index as a trigger. +Programming them is not a game for amateurs; see ARMM. See also Dave the Resurrector. + + +Node:robot, Next:robust, Previous:robocanceller, Up:= R = + +robot n. + +See bot. + + +Node:robust, Next:rococo, Previous:robot, Up:= R += + +robust adj. + +Said of a system that has demonstrated an ability to recover +gracefully from the whole range of exceptional inputs and +situations in a given environment. One step below bulletproof. Carries the additional +connotation of elegance in addition to just careful attention to +detail. Compare smart, oppose brittle. + + +Node:rococo, Next:rogue, Previous:robust, Up:= R += + +rococo adj. + +Terminally baroque. Used to +imply that a program has become so encrusted with the software +equivalent of gold leaf and curlicues that they have completely +swamped the underlying design. Called after the later and more +extreme forms of Baroque architecture and decoration prevalent +during the mid-1700s in Europe. Alan Perlis said: "Every program +eventually becomes rococo, and then rubble." Compare critical mass. + + +Node:rogue, Next:room-temperature IQ, Previous:rococo, Up:= R = + +rogue + +1. [Unix] n. A Dungeons-and-Dragons-like game using character +graphics, written under BSD Unix and subsequently ported to other +Unix systems. The original BSD curses(3) +screen-handling package was hacked together by Ken Arnold +primarily to support games, and the development of +rogue(6) popularized its use; it has since become +one of Unix's most important and heavily used application +libraries. Nethack, Omega, Larn, Angband, and an entire subgenre +of computer dungeon games (all known as `roguelikes') all took +off from the inspiration provided by rogue(6); the +popular Windows game Diablo, though graphics-intensive, has very +similar play logic. See also nethack. 2. [Usenet] adj. An ISP which permits net abuse (usually in the form +of spamming) by its customers, or +which itself engages in such activities. Rogue ISPs are sometimes +subject to IDPs or UDPs. Sometimes deliberately mispelled as "rouge". +See also nethack, moria, Angband. + + +Node:room-temperature IQ, +Next:root, Previous:rogue, Up:= R = + +room-temperature IQ quant. + +[IBM] 80 or below (nominal room temperature is 72 degrees +Fahrenheit, 22 degrees Celsius). Used in describing the expected +intelligence range of the luser. +"Well, but how's this interface going to play with the +room-temperature IQ crowd?" See drool-proof paper. This is a much +more insulting phrase in countries that use Celsius +thermometers. + + +Node:root, Next:root mode, Previous:room-temperature IQ, Up:= R = + +root n. + +[Unix] 1. The superuser +account (with user name `root') that ignores permission bits, +user number 0 on a Unix system. The term avatar is also used. 2. The top node of the +system directory structure; historically the home directory of +the root user, but probably named after the root of an (inverted) +tree. 3. By extension, the privileged system-maintenance login on +any OS. See root mode, go root, see also wheel. + + +Node:root mode, Next:rot13, Previous:root, Up:= R = + + +root mode n. + +Syn. with wizard mode or +`wheel mode'. Like these, it is often generalized to describe +privileged states in systems other than OSes. + + +Node:rot13, Next:rotary debugger, Previous:root mode, Up:= R = + +rot13 /rot ther'teen/ n.,v. + +[Usenet: from `rotate alphabet 13 places'] The simple +Caesar-cypher encryption that replaces each English letter with +the one 13 places forward or back along the alphabet, so that +"The butler did it!" becomes "Gur ohgyre qvq vg!" Most Usenet +news reading and posting programs include a rot13 feature. It is +used to enclose the text in a sealed wrapper that the reader must +choose to open -- e.g., for posting things that might offend some +readers, or spoilers. A major +advantage of rot13 over rot(N) for other N is that it is +self-inverse, so the same code can be used for encoding and +decoding. See also spoiler +space, which has partly displaced rot13 since +non-Unix-based newsreaders became common. + + +Node:rotary debugger, Next:round tape, Previous:rot13, Up:= R = + +rotary debugger n. + +[Commodore] Essential equipment for those late-night or +early-morning debugging sessions. Mainly used as sustenance for +the hacker. Comes in many decorator colors, such as Sausage, +Pepperoni, and Garbage. See ANSI standard pizza. + + +Node:round tape, Next:RSN, Previous:rotary debugger, Up:= R = + +round tape n. + +Industry-standard 1/2-inch magnetic tape (7- or 9-track) on +traditional circular reels. See macrotape, oppose square tape. + + +Node:RSN, Next:RTBM, Previous:round tape, Up:= R = + +RSN /R-S-N/ adj. + +See Real Soon Now. + + +Node:RTBM, Next:RTFAQ, Previous:RSN, Up:= R = + + +RTBM /R-T-B-M/ imp. + +[Unix] Commonwealth Hackish variant of RTFM; expands to `Read The Bloody Manual'. RTBM +is often the entire text of the first reply to a question from a +newbie; the second would +escalate to "RTFM". + + +Node:RTFAQ, Next:RTFB, Previous:RTBM, Up:= R = + + +RTFAQ /R-T-F-A-Q/ imp. + +[Usenet: primarily written, by analogy with RTFM] Abbrev. for `Read the FAQ!', an exhortation +that the person addressed ought to read the newsgroup's FAQ list before posting questions. + + +Node:RTFB, Next:RTFM, Previous:RTFAQ, Up:= R += + +RTFB /R-T-F-B/ imp. + +[Unix] Abbreviation for `Read The Fucking Binary'. Used when +neither documentation nor source for the problem at hand exists, +and the only thing to do is use some debugger or monitor and +directly analyze the assembler or even the machine code. "No +source for the buggy port driver? Aaargh! I hate +proprietary operating systems. Time to RTFB." + +Of the various RTF? forms, `RTFB' is the least pejorative +against anyone asking a question for which RTFB is the answer; +the anger here is directed at the absence of both source +and adequate documentation. + + +Node:RTFM, Next:RTFS, Previous:RTFB, Up:= R = + + +RTFM /R-T-F-M/ imp. + +[Unix] Abbreviation for `Read The Fucking Manual'. 1. Used by +gurus to brush off questions they +consider trivial or annoying. Compare Don't do that then!. 2. Used +when reporting a problem to indicate that you aren't just asking +out of randomness. "No, I can't +figure out how to interface Unix to my toaster, and yes, I have +RTFM." Unlike sense 1, this use is considered polite. See also +FM, RTFAQ, +RTFB, RTFS, +STFW, RTM, +all of which mutated from RTFM, and compare UTSL. + + +Node:RTFS, Next:RTI, Previous:RTFM, +Up:= R = + +RTFS /R-T-F-S/ + +[Unix] 1. imp. Abbreviation for `Read The Fucking Source'. +Variant form of RTFM, used when the +problem at hand is not necessarily obvious and not answerable +from the manuals -- or the manuals are not yet written and maybe +never will be. For even trickier situations, see RTFB. Unlike RTFM, the anger inherent in RTFS is +not usually directed at the person asking the question, but +rather at the people who failed to provide adequate +documentation. 2. imp. `Read The Fucking Standard'; this oath can +only be used when the problem area (e.g., a language or operating +system interface) has actually been codified in a ratified +standards document. The existence of these standards documents +(and the technically inappropriate but politically mandated +compromises that they inevitably contain, and the impenetrable +legalese in which they are +invariably written, and the unbelievably tedious bureaucratic +process by which they are produced) can be unnerving to hackers, +who are used to a certain amount of ambiguity in the +specifications of the systems they use. (Hackers feel that such +ambiguities are acceptable as long as the Right Thing to do is obvious to any +thinking observer; sadly, this casual attitude towards +specifications becomes unworkable when a system becomes popular +in the Real World.) Since a +hacker is likely to feel that a standards document is both +unnecessary and technically deficient, the deprecation inherent +in this term may be directed as much against the standard as +against the person who ought to read it. + + +Node:RTI, Next:RTM, Previous:RTFS, +Up:= R = + +RTI /R-T-I/ interj. + +The mnemonic for the `return from interrupt' instruction on +many computers including the 6502 and 6800. The variant `RETI' is +found among former Z80 hackers (almost nobody programs these +things in assembler anymore). Equivalent to "Now, where was I?" +or used to end a conversational digression. See pop; see also POPJ. + + +Node:RTM, Next:RTS, Previous:RTI, +Up:= R = + +RTM /R-T-M/ + +[Usenet: abbreviation for `Read The Manual'] 1. Politer +variant of RTFM. 2. Robert Tappan +Morris, perpetrator of the great Internet worm of 1988 (see Great Worm); villain to many, naive +hacker gone wrong to a few. Morris claimed that the worm that +brought the Internet to its knees was a benign experiment that +got out of control as the result of a coding error. After the +storm of negative publicity that followed this blunder, Morris's +username on ITS was hacked from RTM to RTFM. + + +Node:RTS, Next:rude, Previous:RTM, +Up:= R = + +RTS /R-T-S/ imp. + +Abbreviation for `Read The Screen'. Mainly used by hackers in +the microcomputer world. Refers to what one would like to tell +the suit one is forced to explain an +extremely simple application to. Particularly appropriate when +the suit failed to notice the `Press any key to continue' prompt, +and wishes to know `why won't it do anything'. Also seen as +`RTFS' in especially deserving cases. + + +Node:rude, Next:runes, Previous:RTS, Up:= R = + + +rude [WPI] adj. + +1. (of a program) Badly written. 2. Functionally poor, e.g., a +program that is very difficult to use because of gratuitously +poor (random?) design decisions. Oppose cuspy. 3. Anything that manipulates a shared +resource without regard for its other users in such a way as to +cause a (non-fatal) problem. Examples: programs that change tty +modes without resetting them on exit, or windowing programs that +keep forcing themselves to the top of the window stack. Compare +all-elbows. + + +Node:runes, Next:runic, Previous:rude, Up:= R = + + +runes pl.n. + +1. Anything that requires heavy +wizardry or black art +to parse: core dumps, JCL commands, +APL, or code in a language you haven't a clue how to read. Not +quite as bad as line noise, +but close. Compare casting +the runes, Great +Runes. 2. Special display characters (for example, the +high-half graphics on an IBM PC). 3. [borderline techspeak] +16-bit characters from the Unicode multilingual character +set. + + +Node:runic, Next:rusty iron, Previous:runes, Up:= R += + +runic adj. + +Syn. obscure. VMS fans sometimes +refer to Unix as `Runix'; Unix fans return the compliment by +expanding VMS to `Very Messy Syntax' or `Vachement Mauvais +Système' (French idiom, "Hugely Bad System"). + + +Node:rusty iron, Next:rusty memory, Previous:runic, Up:= R = + +rusty iron n. + +Syn. tired iron. It has +been claimed that this is the inevitable fate of water MIPS. + + +Node:rusty memory, Next:rusty wire, Previous:rusty iron, Up:= R = + +rusty memory n. + +Mass-storage that uses iron-oxide-based magnetic media (esp. +tape and the pre-Winchester removable disk packs used in washing machines). Compare +donuts. + + +Node:rusty wire, Next:S/N ratio, Previous:rusty memory, Up:= R = + +rusty wire n. + +[Amateur Packet Radio] Any very noisy network medium, in which +the packets are subject to frequent corruption. Most prevalent in +reference to wireless links subject to all the vagaries of RF +noise and marginal propagation conditions. "Yes, but how good is +your whizbang new protocol on really rusty wire?". + + +Node:= S =, Next:= T =, Previous:= R =, Up:The Jargon Lexicon + += S = + + +S/N ratio: + + +sacred: + + +saga: + + +sagan: + + +SAIL: + + +salescritter: + + +salt: + + +salt mines: + + +salt substrate: + + +same-day service: + + +samizdat: + + +samurai: + + +sandbender: + + +sandbox: + + +sanity check: + + +Saturday-night +special: + + +say: + + +scag: + + +scanno: + + +scary devil +monastery: + + +schroedinbug: + + +science-fiction +fandom: + + +scram switch: + + +scratch: + + +scratch monkey: + + +scream and die: + + +screaming tty: + + +screen: + + +screen name: + + +screw: + + +screwage: + + +scribble: + + +script kiddies: + + +scrog: + + +scrool: + + +scrozzle: + + +scruffies: + + +SCSI: + + +ScumOS: + + +search-and-destroy +mode: + + +second-system +effect: + + +secondary damage: + + +security through +obscurity: + + +SED: + + +segfault: + + +seggie: + + +segment: + + +segmentation fault: + + +segv: + + +self-reference: + + +selvage: + + +semi: + + +semi-automated: + + +semi-infinite: + + +senior bit: + + +September that +never ended: + + +server: + + +SEX: + + +sex changer: + + +shambolic link: + + +shar file: + + +sharchive: + + +Share and enjoy!: + + +shareware: + + +sharing violation: + + +shebang: + + +shelfware: + + +shell: + + +shell out: + + +shift left +(or right) logical: + + +shim: + + +shitogram: + + +short card: + + +shotgun debugging: + + +shovelware: + + +showstopper: + + +shriek: + + +Shub-Internet: + + +sidecar: + + +SIG: + + +sig block: + + +sig quote: + + +sig virus: + + +signal-to-noise +ratio: + + +silicon: + + +silly walk: + + +silo: + + +Silver Book: + + +since +time T equals minus infinity: + + +sitename: + + +skrog: + + +skulker: + + +slab: + + +slack: + + +slap on the side: + + +slash: + + +slashdot effect: + + +sleep: + + +slim: + + +slop: + + +slopsucker: + + +Slowlaris: + + +slurp: + + +smart: + + +smart terminal: + + +smash case: + + +smash the stack: + + +smiley: + + +smoke: + + +smoke and mirrors: + + +smoke test: + + +smoking clover: + + +smoot: + + +SMOP: + + +smurf: + + +SNAFU principle: + + +snail: + + +snail-mail: + + +snap: + + +snarf: + + +snarf & barf: + + +snarf down: + + +snark: + + +sneaker: + + +sneakernet: + + +sniff: + + +snivitz: + + +'Snooze: + + +SO: + + +social engineering: + + +social science +number: + + +sock puppet: + + +sodium substrate: + + +soft boot: + + +softcopy: + + +software bloat: + + +software hoarding: + + +software laser: + + +software rot: + + +softwarily: + + +softy: + + +some random X: + + +sorcerer's +apprentice mode: + + +SOS: + + +source: + + +source of all good +bits: + + +space-cadet +keyboard: + + +spaceship operator: + + +SPACEWAR: + + +spaghetti code: + + +spaghetti +inheritance: + + +spam: + + +spam bait: + + +spamblock: + + +spamhaus: + + +spamvertize: + + +spangle: + + +spawn: + + +special-case: + + +speedometer: + + +spell: + + +spelling flame: + + +spider: + + +spider food: + + +spiffy: + + +spike: + + +spin: + + +spl: + + +splash screen: + + +splat: + + +splat out: + + +spod: + + +spoiler: + + +spoiler space: + + +sponge: + + +spoof: + + +spool: + + +spool file: + + +spungle: + + +square tape: + + +squirrelcide: + + +stack: + + +stack puke: + + +stale pointer bug: + + +star out: + + +state: + + +stealth manager: + + +steam-powered: + + +STFW: + + +stiffy: + + +stir-fried random: + + +stomp on: + + +Stone Age: + + +stone knives and +bearskins: + + +stoppage: + + +store: + + +strided: + + +stroke: + + +strudel: + + +stubroutine: + + +studly: + + +studlycaps: + + +stunning: + + +stupid-sort: + + +Stupids: + + +Sturgeon's Law: + + +sucking mud: + + +sufficiently small: + + +suit: + + +suitable win: + + +suitably small: + + +Sun: + + +sun lounge: + + +sun-stools: + + +sunspots: + + +super source +quench: + + +superloser: + + +superprogrammer: + + +superuser: + + +support: + + +surf: + + +Suzie COBOL: + + +swab: + + +swap: + + +swap space: + + +swapped in: + + +swapped out: + + +swizzle: + + +sync: + + +syntactic salt: + + +syntactic sugar: + + +sys-frog: + + +sysadmin: + + +sysape: + + +sysop: + + +system: + + +systems jock: + + +system mangler: + + +SysVile: + + +Node:S/N ratio, Next:sacred, Previous:rusty wire, Up:= S = + +S/N ratio // n. + +(also `s/n ratio', `s:n ratio'). Syn. signal-to-noise ratio. Often +abbreviated `SNR'. + + +Node:sacred, Next:saga, Previous:S/N ratio, Up:= S = + +sacred adj. + +Reserved for the exclusive use of something (an extension of +the standard meaning). Often means that anyone may look at the +sacred object, but clobbering it will screw whatever it is sacred +to. The comment "Register 7 is sacred to the interrupt handler" +appearing in a program would be interpreted by a hacker to mean +that if any other part of the program changes the +contents of register 7, dire consequences are likely to +ensue. + + +Node:saga, Next:sagan, Previous:sacred, Up:= S += + +saga n. + +[WPI] A cuspy but bogus raving story about N random broken +people. + +Here is a classic example of the saga form, as told by Guy L. +Steele: + +Jon L. White (login name JONL) and I (GLS) were +office mates at MIT for many years. One April, we both flew from +Boston to California for a week on research business, to consult +face-to-face with some people at Stanford, particularly our +mutual friend Richard P. Gabriel (RPG; see gabriel). + +RPG picked us up at the San Francisco airport and drove us +back to Palo Alto (going logical +south on route 101, parallel to El Camino Bignum). Palo Alto is +adjacent to Stanford University and about 40 miles south of San +Francisco. We ate at The Good Earth, a `health food' restaurant, +very popular, the sort whose milkshakes all contain honey and +protein powder. JONL ordered such a shake -- the waitress claimed +the flavor of the day was "lalaberry". I still have no idea what +that might be, but it became a running joke. It was the color of +raspberry, and JONL said it tasted rather bitter. I ate a better +tostada there than I have ever had in a Mexican restaurant. + +After this we went to the local Uncle Gaylord's Old Fashioned +Ice Cream Parlor. They make ice cream fresh daily, in a variety +of intriguing flavors. It's a chain, and they have a slogan: "If +you don't live near an Uncle Gaylord's -- MOVE!" Also, Uncle +Gaylord (a real person) wages a constant battle to force big-name +ice cream makers to print their ingredients on the package (like +air and plastic and other non-natural garbage). JONL and I had +first discovered Uncle Gaylord's the previous August, when we had +flown to a computer-science conference in Berkeley, California, +the first time either of us had been on the West Coast. When not +in the conference sessions, we had spent our time wandering the +length of Telegraph Avenue, which (like Harvard Square in +Cambridge) was lined with picturesque street vendors and +interesting little shops. On that street we discovered Uncle +Gaylord's Berkeley store. The ice cream there was very good. +During that August visit JONL went absolutely bananas (so to +speak) over one particular flavor, ginger honey. + +Therefore, after eating at The Good Earth -- indeed, after +every lunch and dinner and before bed during our April visit -- a +trip to Uncle Gaylord's (the one in Palo Alto) was mandatory. We +had arrived on a Wednesday, and by Thursday evening we had been +there at least four times. Each time, JONL would get ginger honey +ice cream, and proclaim to all bystanders that "Ginger was the +spice that drove the Europeans mad! That's why they sought a +route to the East! They used it to preserve their otherwise +off-taste meat." After the third or fourth repetition RPG and I +were getting a little tired of this spiel, and began to +paraphrase him: "Wow! Ginger! The spice that makes rotten meat +taste good!" "Say! Why don't we find some dog that's been run +over and sat in the sun for a week and put some ginger +on it for dinner?!" "Right! With a lalaberry shake!" And so on. +This failed to faze JONL; he took it in good humor, as long as we +kept returning to Uncle Gaylord's. He loves ginger honey ice +cream. + +Now RPG and his then-wife KBT (Kathy Tracy) were putting us up +(putting up with us?) in their home for our visit, so to thank +them JONL and I took them out to a nice French restaurant of +their choosing. I unadventurously chose the filet mignon, and KBT +had _je ne sais quoi du jour_, but RPG and JONL had +_lapin_ (rabbit). (Waitress: "_Oui_, we have fresh +rabbit, fresh today." RPG: "Well, JONL, I guess we won't need any +ginger!") + +We finished the meal late, about 11 P.M., which +is 2 A.M Boston time, so JONL and I were rather +droopy. But it wasn't yet midnight. Off to Uncle Gaylord's! + +Now the French restaurant was in Redwood City, north of Palo +Alto. In leaving Redwood City, we somehow got onto route 101 +going north instead of south. JONL and I wouldn't have known the +difference had RPG not mentioned it. We still knew very little of +the local geography. I did figure out, however, that we were +headed in the direction of Berkeley, and half-jokingly suggested +that we continue north and go to Uncle Gaylord's in Berkeley. + +RPG said "Fine!" and we drove on for a while and talked. I was +drowsy, and JONL actually dropped off to sleep for 5 minutes. +When he awoke, RPG said, "Gee, JONL, you must have slept all the +way over the bridge!", referring to the one spanning San +Francisco Bay. Just then we came to a sign that said "University +Avenue". I mumbled something about working our way over to +Telegraph Avenue; RPG said "Right!" and maneuvered some more. +Eventually we pulled up in front of an Uncle Gaylord's. + +Now, I hadn't really been paying attention because I was so +sleepy, and I didn't really understand what was happening until +RPG let me in on it a few moments later, but I was just alert +enough to notice that we had somehow come to the Palo Alto Uncle +Gaylord's after all. + +JONL noticed the resemblance to the Palo Alto store, but +hadn't caught on. (The place is lit with red and yellow lights at +night, and looks much different from the way it does in +daylight.) He said, "This isn't the Uncle Gaylord's I went to in +Berkeley! It looked like a barn! But this place looks just +like the one back in Palo Alto!" + +RPG deadpanned, "Well, this is the one I always come +to when I'm in Berkeley. They've got two in San Francisco, too. +Remember, they're a chain." + +JONL accepted this bit of wisdom. And he was not totally +ignorant -- he knew perfectly well that University Avenue was in +Berkeley, not far from Telegraph Avenue. What he didn't know was +that there is a completely different University Avenue in Palo +Alto. + +JONL went up to the counter and asked for ginger honey. The +guy at the counter asked whether JONL would like to taste it +first, evidently their standard procedure with that flavor, as +not too many people like it. + +JONL said, "I'm sure I like it. Just give me a cone." The guy +behind the counter insisted that JONL try just a taste first. +"Some people think it tastes like soap." JONL insisted, "Look, I +love ginger. I eat Chinese food. I eat raw ginger roots. +I already went through this hassle with the guy back in Palo +Alto. I know I like that flavor!" + +At the words "back in Palo Alto" the guy behind the counter +got a very strange look on his face, but said nothing. KBT caught +his eye and winked. Through my stupor I still hadn't quite +grasped what was going on, and thought RPG was rolling on the +floor laughing and clutching his stomach just because JONL had +launched into his spiel ("makes rotten meat a dish for princes") +for the forty-third time. At this point, RPG clued me in +fully. + +RPG, KBT, and I retreated to a table, trying to stifle our +chuckles. JONL remained at the counter, talking about ice cream +with the guy b.t.c., comparing Uncle Gaylord's to other ice cream +shops and generally having a good old time. + +At length the g.b.t.c. said, "How's the ginger honey?" JONL +said, "Fine! I wonder what exactly is in it?" Now Uncle Gaylord +publishes all his recipes and even teaches classes on how to make +his ice cream at home. So the g.b.t.c. got out the recipe, and he +and JONL pored over it for a while. But the g.b.t.c. could +contain his curiosity no longer, and asked again, "You really +like that stuff, huh?" JONL said, "Yeah, I've been eating it +constantly back in Palo Alto for the past two days. In fact, I +think this batch is about as good as the cones I got back in Palo +Alto!" + +G.b.t.c. looked him straight in the eye and said, "You're +in Palo Alto!" + +JONL turned slowly around, and saw the three of us collapse in +a fit of giggles. He clapped a hand to his forehead and +exclaimed, "I've been hacked!" + + +[My spies on the West Coast inform me that there is a close +relative of the raspberry found out there called an +`ollalieberry' --ESR] + +[Ironic footnote: the meme about +ginger vs. rotting meat is an urban legend. It's not borne out by +an examination of medieval recipes or period purchase records for +spices, and appears full-blown in the works of Samuel Pegge, a +gourmand and notorious flake case who originated numerous food +myths. The truth seems to be that ginger was used to cover not +rot but the extreme salt taste of meat packed in brine, which was +the best method available before refrigeration. --ESR] + + +Node:sagan, Next:SAIL, Previous:saga, Up:= S = + + +sagan /say'gn/ n. + +[from Carl Sagan's TV series "Cosmos"; think "billions and +billions"] A large quantity of anything. "There's a sagan +different ways to tweak EMACS." "The U.S. Government spends +sagans on bombs and welfare -- hard to say which is more +destructive." + + +Node:SAIL, Next:salescritter, Previous:sagan, Up:= S += + +SAIL /sayl/, not /S-A-I-L/ n. + +1. The Stanford Artificial Intelligence Lab. An important site +in the early development of LISP; with the MIT AI Lab, BBN, CMU, +XEROX PARC, and the Unix community, one of the major wellsprings +of technical innovation and hacker-culture traditions (see the +WAITS entry for details). The SAIL +machines were shut down in late May 1990, scant weeks after the +MIT AI Lab's ITS cluster was officially decommissioned. 2. The +Stanford Artificial Intelligence Language used at SAIL (sense 1). +It was an Algol-60 derivative with a coroutining facility and +some new data types intended for building search trees and +association lists. + + +Node:salescritter, Next:salt, Previous:SAIL, Up:= S = + + +salescritter /sayls'kri`tr/ n. + +Pejorative hackerism for a computer salesperson. Hackers tell +the following joke: + +Q. What's the difference between a used-car dealer and a + computer salesman? +A. The used-car dealer knows he's lying. [Some versions add: + ...and probably knows how to drive.] + + +This reflects the widespread hacker belief that salescritters +are self-selected for stupidity (after all, if they had brains +and the inclination to use them, they'd be in programming). The +terms `salesthing' and `salesdroid' are also common. Compare +marketroid, suit, droid. + + +Node:salt, Next:salt mines, Previous:salescritter, Up:= S = + +salt n. + +A tiny bit of near-random data inserted where too much +regularity would be undesirable; a data frob (sense 1). For example, the Unix crypt(3) +man page mentions that "the salt string is used to perturb the +DES algorithm in one of 4096 different ways." + + +Node:salt mines, Next:salt substrate, Previous:salt, Up:= S = + +salt mines n. + +Dense quarters housing large numbers of programmers working +long hours on grungy projects, with some hope of seeing the end +of the tunnel in N years. Noted for their absence of sunshine. +Compare playpen, sandbox. + + +Node:salt substrate, Next:same-day service, +Previous:salt mines, +Up:= S = + +salt substrate n. + +[MIT] Collective noun used to refer to potato chips, pretzels, +saltines, or any other form of snack food designed primarily as a +carrier for sodium chloride. Also `sodium substrate'. From the +technical term `chip substrate', used to refer to the silicon on +the top of which the active parts of integrated circuits are +deposited. + + +Node:same-day service, Next:samizdat, Previous:salt substrate, Up:= S = + +same-day service n. + +Ironic term used to describe long response time, particularly +with respect to MS-DOS system calls +(which ought to require only a tiny fraction of a second to +execute). Such response time is a major incentive for programmers +to write programs that are not well-behaved. See also PC-ism. + + +Node:samizdat, Next:samurai, Previous:same-day service, Up:= S = + +samizdat /sahm-iz-daht/ n. + +[Russian, literally "self publishing"] The process of +disseminating documentation via underground channels. Originally +referred to underground duplication and distribution of banned +books in the Soviet Union; now refers by obvious extension to any +less-than-official promulgation of textual material, esp. rare, +obsolete, or never-formally-published computer documentation. +Samizdat is obviously much easier when one has access to +high-bandwidth networks and high-quality laser printers. Note +that samizdat is properly used only with respect to documents +which contain needed information (see also hacker ethic) but which are for some +reason otherwise unavailable, but not in the context of +documents which are available through normal channels, for which +unauthorized duplication would be unethical copyright violation. +See Lions Book for a +historical example. + + +Node:samurai, Next:sandbender, Previous:samizdat, Up:= +S = + +samurai n. + +A hacker who hires out for legal cracking jobs, snooping for +factions in corporate political fights, lawyers pursuing +privacy-rights and First Amendment cases, and other parties with +legitimate reasons to need an electronic locksmith. In 1991, +mainstream media reported the existence of a loose-knit culture +of samurai that meets electronically on BBS systems, mostly +bright teenagers with personal micros; they have modeled +themselves explicitly on the historical samurai of Japan and on +the "net cowboys" of William Gibson's cyberpunk novels. Those interviewed claim to +adhere to a rigid ethic of loyalty to their employers and to +disdain the vandalism and theft practiced by criminal crackers as +beneath them and contrary to the hacker ethic; some quote +Miyamoto Musashi's "Book of Five Rings", a classic of historical +samurai doctrine, in support of these principles. See also sneaker, Stupids, social engineering, cracker, hacker +ethic, and dark-side +hacker. + + +Node:sandbender, Next:sandbox, Previous:samurai, Up:= S += + +sandbender n. + +[IBM] A person involved with silicon lithography and the +physical design of chips. Compare ironmonger, polygon pusher. + + +Node:sandbox, Next:sanity check, Previous:sandbender, Up:= S = + +sandbox n. + +1. (also `sandbox, the') Common term for the R&D +department at many software and computer companies (where hackers +in commercial environments are likely to be found). +Half-derisive, but reflects the truth that research is a form of +creative play. Compare playpen. 2. +Syn. link farm. 3. A controlled +environment within which potentially dangerous programs are run. +Used esp. in reference to Java implementations. + + +Node:sanity check, Next:Saturday-night +special, Previous:sandbox, Up:= S += + +sanity check n. + +[very common] 1. The act of checking a piece of code (or +anything else, e.g., a Usenet posting) for completely stupid +mistakes. Implies that the check is to make sure the author was +sane when it was written; e.g., if a piece of scientific software +relied on a particular formula and was giving unexpected results, +one might first look at the nesting of parentheses or the coding +of the formula, as a `sanity check', before looking at the more +complex I/O or data structure manipulation routines, much less +the algorithm itself. Compare reality check. 2. A run-time test, +either validating input or ensuring that the program hasn't +screwed up internally (producing an inconsistent value or +state). + + +Node:Saturday-night +special, Next:say, Previous:sanity check, Up:= S = + +Saturday-night special n. + +[from police slang for a cheap handgun] A quick-and-dirty program or feature +kluged together during off hours, under a deadline, and in +response to pressure from a salescritter. Such hacks are dangerously +unreliable, but all too often sneak into a production release +after insufficient review. + + +Node:say, Next:scag, Previous:Saturday-night special, Up:= S = + +say vt. + +1. To type to a terminal. "To list a directory verbosely, you +have to say ls -l." Tends to imply a newline-terminated command (a `sentence'). 2. +A computer may also be said to `say' things to you, even if it +doesn't have a speech synthesizer, by displaying them on a +terminal in response to your commands. Hackers find it odd that +this usage confuses mundanes. + + +Node:scag, Next:scanno, Previous:say, Up:= S = + + +scag vt. + +To destroy the data on a disk, either by corrupting the +filesystem or by causing media damage. "That last power hit +scagged the system disk." Compare scrog, roach. + + +Node:scanno, Next:scary devil monastery, +Previous:scag, Up:= S = + +scanno /skan'oh/ n. + +An error in a document caused by a scanner glitch, analogous +to a typo or thinko. + + +Node:scary devil +monastery, Next:schroedinbug, Previous:scanno, Up:= +S = + +scary devil monastery n. + +Anagram frequently used to refer to the newsgroup +_alt.sysadmin.recovery_, which is populated with characters +that rather justify the reference. + + +Node:schroedinbug, Next:science-fiction fandom, +Previous:scary devil monastery, Up:= S = + +schroedinbug /shroh'din-buhg/ n. + +[MIT: from the Schroedinger's Cat thought-experiment in +quantum physics] A design or implementation bug in a program that +doesn't manifest until someone reading source or using the +program in an unusual way notices that it never should have +worked, at which point the program promptly stops working for +everybody until fixed. Though (like bit +rot) this sounds impossible, it happens; some programs +have harbored latent schroedinbugs for years. Compare heisenbug, Bohr +bug, mandelbug. + + +Node:science-fiction +fandom, Next:scram +switch, Previous:schroedinbug, Up:= S = + +science-fiction fandom n. + +Another voluntary subculture having a very heavy overlap with +hackerdom; most hackers read SF and/or fantasy fiction avidly, +and many go to `cons' (SF conventions) or are involved in +fandom-connected activities such as the Society for Creative +Anachronism. Some hacker jargon originated in SF fandom; see +defenestration, great-wall, cyberpunk, h, ha ha only serious, +IMHO, mundane, neep-neep, Real Soon Now. Additionally, the +jargon terms cowboy, cyberspace, de-rezz, go +flatline, ice, phage, virus, wetware, wirehead, and worm +originated in SF stories. + + +Node:scram switch, Next:scratch, Previous:science-fiction fandom, +Up:= S = + +scram switch n. + +[from the nuclear power industry] An emergency-power-off +switch (see Big Red +Switch), esp. one positioned to be easily hit by +evacuating personnel. In general, this is not something +you frob lightly; these often initiate +expensive events (such as Halon dumps) and are installed in a +dinosaur pen for use in case +of electrical fire or in case some luckless field servoid should put 120 volts +across himself while Easter +egging. (See also molly-guard, TMRC.) + +A correspondent reports a legend that "Scram" is an acronym +for "Start Cutting Right Away, Man" (another less plausible +variant of this legend refers to "Safety Control Rod Axe Man"; +these are almost certainly both backronyms). The story goes that in the +earliest nuclear power experiments the engineers recognized the +possibility that the reactor wouldn't behave exactly as predicted +by their mathematical models. Accordingly, they made sure that +they had mechanisms in place that would rapidly drop the control +rods back into the reactor. One mechanism took the form of `scram +technicians'. These individuals stood next to the ropes or cables +that raised and lowered the control rods. Equipped with axes or +cable-cutters, these technicians stood ready for the (literal) +`scram' command. If necessary, they would cut the cables, and +gravity would expeditiously return the control rods to the +reactor, thereby averting yet another kind of core dump. + +Modern reactor control rods are held in place with claw-like +devices, held closed by current. SCRAM switches are circuit +breakers that immediately open the circuit to the rod arms, +resulting in the rapid insertion and subsequent bottoming of the +control rods. + + +Node:scratch, Next:scratch monkey, Previous:scram switch, Up:= S = + +scratch + +1. [from `scratchpad'] adj. Describes a data structure or +recording medium attached to a machine for testing or +temporary-use purposes; one that can be scribbled on without loss. Usually in the +combining forms `scratch memory', `scratch register', `scratch +disk', `scratch tape', `scratch volume'. See also scratch monkey. 2. [primarily IBM] +vt. To delete (as in a file). + + +Node:scratch monkey, Next:scream and die, Previous:scratch, Up:= S = + +scratch monkey n. + +As in "Before testing or reconfiguring, always mount a scratch monkey", a proverb used +to advise caution when dealing with irreplaceable data or +devices. Used to refer to any scratch volume hooked to a computer +during any risky operation as a replacement for some precious +resource or data that might otherwise get trashed. + +This term preserves the memory of Mabel, the Swimming Wonder +Monkey, star of a biological research program at the University +of Toronto. Mabel was not (so the legend goes) your ordinary +monkey; the university had spent years teaching her how to swim, +breathing through a regulator, in order to study the effects of +different gas mixtures on her physiology. Mabel suffered an +untimely demise one day when a DEC +field circus engineer +troubleshooting a crash on the program's VAX inadvertently +interfered with some custom hardware that was wired to Mabel. + +It is reported that, after calming down an understandably +irate customer sufficiently to ascertain the facts of the matter, +a DEC troubleshooter called up the field circus manager responsible and +asked him sweetly, "Can you swim?" + +Not all the consequences to humans were so amusing; the sysop +of the machine in question was nearly thrown in jail at the +behest of certain clueless droids at +the local `humane' society. The moral is clear: When in doubt, +always mount a scratch monkey. + +[The actual incident occured in 1979 or 1980. There is a +version of this story, complete with reported dialogue between +one of the project people and DEC field service, that has been +circulating on Internet since 1986. It is hilarious and mythic, +but gets some facts wrong. For example, it reports the machine as +a PDP-11 and alleges that Mabel's demise occurred when DEC PMed the machine. Earlier versions of this +entry were based on that story; this one has been corrected from +an interview with the hapless sysop. --ESR] + + +Node:scream and die, Next:screaming tty, Previous:scratch monkey, Up:= S = + +scream and die v. + +Syn. cough and die, +but connotes that an error message was printed or displayed +before the program crashed. + + +Node:screaming tty, Next:screen, Previous:scream and die, Up:= S = + +screaming tty n. + +[Unix] A terminal line which spews an infinite number of +random characters at the operating system. This can happen if the +terminal is either disconnected or connected to a powered-off +terminal but still enabled for login; misconfiguration, +misimplementation, or simple bad luck can start such a terminal +screaming. A screaming tty or two can seriously degrade the +performance of a vanilla Unix system; the arriving "characters" +are treated as userid/password pairs and tested as such. The Unix +password encryption algorithm is designed to be computationally +intensive in order to foil brute-force crack attacks, so although +none of the logins succeeds; the overhead of rejecting them all +can be substantial. + + +Node:screen, Next:screen name, Previous:screaming tty, Up:= S = + +screen n. + +[Atari ST demoscene] One demoeffect or one screenful of them. +Probably comes from old Sierra-style adventures or shoot-em-ups +where one travels from one place to another one screenful at a +time. + + +Node:screen name, Next:screw, Previous:screen, Up:= S += + +screen name n. + +A handle sense 1. This term has +been common among users of IRC, MUDs, and commercial on-line +services since the mid-1990s. Hackers recognize the term but +don't generally use it. + + +Node:screw, Next:screwage, Previous:screen name, Up:= S = + +screw n. + +[MIT] A lose, usually in software. +Especially used for user-visible misbehavior caused by a bug or +misfeature. This use has become quite widespread outside MIT. + + +Node:screwage, Next:scribble, Previous:screw, Up:= S += + +screwage /skroo'*j/ n. + +Like lossage but connotes that +the failure is due to a designed-in misfeature rather than a +simple inadequacy or a mere bug. + + +Node:scribble, Next:script kiddies, Previous:screwage, Up:= S = + +scribble n. + +To modify a data structure in a random and unintentionally +destructive way. "Bletch! Somebody's disk-compactor program went +berserk and scribbled on the i-node table." "It was working fine +until one of the allocation routines scribbled on low core." +Synonymous with trash; compare mung, which conveys a bit more intention, +and mangle, which is more violent +and final. + + +Node:script kiddies, Next:scrog, Previous:scribble, Up:= +S = + +script kiddies pl.n. + +1. The lowest form of cracker; +script kiddies do mischief with scripts and programs written by +others, often without understanding the exploit. 2. People who cannot program, but who +create tacky HTML pages by copying JavaScript routines from other +tacky HTML pages. More generally, a script kiddie writes (or more +likely cuts and pastes) code without either having or desiring to +have a mental model of what the code does; someone who thinks of +code as magical incantations and asks only "what do I need to +type to make this happen?" + + +Node:scrog, Next:scrool, Previous:script kiddies, Up:= S = + +scrog /skrog/ vt. + +[Bell Labs] To damage, trash, or corrupt a data structure. +"The list header got scrogged." Also reported as `skrog', and +ascribed to the comic strip "The Wizard of Id". Compare scag; possibly the two are related. +Equivalent to scribble or mangle. + + +Node:scrool, Next:scrozzle, Previous:scrog, Up:= S += + +scrool /skrool/ n. + +[from the pioneering Roundtable chat system in Houston ca. +1984; prob. originated as a typo for `scroll'] The log of old +messages, available for later perusal or to help one get back in +synch with the conversation. It was originally called the `scrool +monster', because an early version of the roundtable software had +a bug where it would dump all 8K of scrool on a user's +terminal. + + +Node:scrozzle, Next:scruffies, Previous:scrool, Up:= S += + +scrozzle /skroz'l/ vt. + +Used when a self-modifying code segment runs incorrectly and +corrupts the running program or vital data. "The damn compiler +scrozzled itself again!" + + +Node:scruffies, Next:SCSI, Previous:scrozzle, Up:= +S = + +scruffies n. + +See neats vs. +scruffies. + + +Node:SCSI, Next:ScumOS, Previous:scruffies, Up:= S = + +SCSI n. + +[Small Computer System Interface] A bus-independent standard +for system-level interfacing between a computer and intelligent +devices. Typically annotated in literature with `sexy' +(/sek'see/), `sissy' (/sis'ee/), and `scuzzy' (/skuh'zee/) as +pronunciation guides -- the last being the overwhelmingly +predominant form, much to the dismay of the designers and their +marketing people. One can usually assume that a person who +pronounces it /S-C-S-I/ is clueless. + + +Node:ScumOS, Next:search-and-destroy mode, +Previous:SCSI, Up:= S = + +ScumOS /skuhm'os/ or /skuhm'O-S/ n. + +Unflattering hackerism for SunOS, the BSD Unix variant +supported on Sun Microsystems's Unix workstations (see also sun-stools), and compare AIDX, Macintrash, Nominal Semidestructor, HP-SUX. Despite what this term might +suggest, Sun was founded by hackers and still enjoys excellent +relations with hackerdom; usage is more often in exasperation +than outright loathing. + + +Node:search-and-destroy +mode, Next:second-system effect, Previous:ScumOS, Up:= S = + +search-and-destroy mode n. + +Hackerism for a noninteractive search-and-replace facility in +an editor, so called because an incautiously chosen match pattern +can cause infinite damage. + + +Node:second-system effect, +Next:secondary +damage, Previous:search-and-destroy mode, Up:= S = + +second-system effect n. + +(sometimes, more euphoniously, `second-system syndrome') When +one is designing the successor to a relatively small, elegant, +and successful system, there is a tendency to become grandiose in +one's success and design an elephantine feature-laden monstrosity. The +term was first used by Fred Brooks in his classic "The Mythical +Man-Month: Essays on Software Engineering" (Addison-Wesley, 1975; +ISBN 0-201-00650-2). It described the jump from a set of nice, +simple operating systems on the IBM 70xx series to OS/360 on the +360 series. A similar effect can also happen in an evolving +system; see Brooks's Law, +creeping elegance, +creeping featurism. +See also Multics, OS/2, X, software bloat. + +This version of the jargon lexicon has been described (with +altogether too much truth for comfort) as an example of +second-system effect run amok on jargon-1.... + + +Node:secondary damage, Next:security +through obscurity, Previous:second-system effect, Up:= S = + +secondary damage n. + +When a fatal error occurs (esp. a segfault) the immediate cause may be that a +pointer has been trashed due to a previous fandango on core. However, this +fandango may have been due to an earlier fandango, so no +amount of analysis will reveal (directly) how the damage +occurred. "The data structure was clobbered, but it was secondary +damage." + +By extension, the corruption resulting from N cascaded +fandangoes on core is `Nth-level damage'. There is at least one +case on record in which 17 hours of grovelling with adb actually dug +up the underlying bug behind an instance of seventh-level damage! +The hacker who accomplished this near-superhuman feat was +presented with an award by his fellows. + + +Node:security through +obscurity, Next:SED, +Previous:secondary +damage, Up:= S = + +security through obscurity + +(alt. `security by obscurity') A term applied by hackers to +most OS vendors' favorite way of coping with security holes -- +namely, ignoring them, documenting neither any known holes nor +the underlying security algorithms, trusting that nobody will +find out about them and that people who do find out about them +won't exploit them. This "strategy" never works for long and +occasionally sets the world up for debacles like the RTM worm of 1988 (see Great Worm), but once the brief moments +of panic created by such events subside most vendors are all too +willing to turn over and go back to sleep. After all, actually +fixing the bugs would siphon off the resources needed to +implement the next user-interface frill on marketing's wish list +-- and besides, if they started fixing security bugs customers +might begin to expect it and imagine that their +warranties of merchantability gave them some sort of +right to a system with fewer holes in it than a +shotgunned Swiss cheese, and then where would we be? + +Historical note: There are conflicting stories about the +origin of this term. It has been claimed that it was first used +in the Usenet newsgroup in _comp.sys.apollo_ during a +campaign to get HP/Apollo to fix security problems in its +Unix-clone Aegis/DomainOS (they +didn't change a thing). ITS fans, on +the other hand, say it was coined years earlier in opposition to +the incredibly paranoid Multics +people down the hall, for whom security was everything. In the +ITS culture it referred to (1) the fact that by the time a +tourist figured out how to make trouble he'd generally gotten +over the urge to make it, because he felt part of the community; +and (2) (self-mockingly) the poor coverage of the documentation +and obscurity of many commands. One instance of +deliberate security through obscurity is recorded; the +command to allow patching the running ITS system (escape escape +control-R) echoed as $$^D. If you actually typed alt alt ^D, that +set a flag that would prevent patching the system even if you +later got it right. + + +Node:SED, Next:segfault, Previous:security through obscurity, +Up:= S = + +SED /S-E-D/ n. + +[TMRC, from `Light-Emitting Diode'] Smoke-emitting diode. A +friode that lost the war. See also +LER. + + +Node:segfault, Next:seggie, Previous:SED, Up:= S = + + +segfault n.,vi. + +Syn. segment, segmentation fault. + + +Node:seggie, Next:segment, Previous:segfault, Up:= +S = + +seggie /seg'ee/ n. + +[Unix] Shorthand for segmentation fault reported from +Britain. + + +Node:segment, Next:segmentation fault, Previous:seggie, Up:= S = + +segment /seg'ment/ vi. + +To experience a segmentation fault. Confusingly, +this is often pronounced more like the noun `segment' than like +mainstream v. segment; this is because it is actually a noun +shorthand that has been verbed. + + +Node:segmentation fault, +Next:segv, Previous:segment, Up:= S = + +segmentation fault n. + +[Unix] 1. [techspeak] An error in which a running program +attempts to access memory not allocated to it and core dumps with a segmentation violation +error. This is often caused by improper usage of pointers in the +source code, dereferencing a null pointer, or (in C) +inadvertently using a non-pointer variable as a pointer. The +classic example is: + + int i; + scanf ("%d", i); /* should have used &i */ + + +2. To lose a train of thought or a line of reasoning. Also +uttered as an exclamation at the point of befuddlement. + + +Node:segv, Next:self-reference, Previous:segmentation fault, Up:= S = + +segv /seg'vee/ n.,vi. + +Yet another synonym for segmentation fault (actually, in +this case, `segmentation violation'). + + +Node:self-reference, Next:selvage, Previous:segv, Up:= S += + +self-reference n. + +See self-reference. + + +Node:selvage, Next:semi, Previous:self-reference, Up:= S = + +selvage /sel'v*j/ n. + +[from sewing and weaving] See chad +(sense 1). + + +Node:semi, Next:semi-automated, Previous:selvage, Up:= S = + +semi /se'mee/ or /se'mi:/ + +1. n. Abbreviation for `semicolon', when speaking. "Commands +to grind are prefixed by +semi-semi-star" means that the prefix is ;;*, not +1/4 of a star. 2. A prefix used with words such as `immediately' +as a qualifier. "When is the system coming up?" +"Semi-immediately." (That is, maybe not for an hour.) "We did +consider that possibility semi-seriously." See also infinite. + + +Node:semi-automated, Next:semi-infinite, Previous:semi, Up:= S = + +semi-automated adj. + +[US Geological Survey] A procedure that has yet to be +completely automated; it still requires a smidge of clueful human +interaction. Semi-automated programs usually come with +written-out operator instructions that are worth their weight in +gold - without them, very nasty things can happen. At USGS +semi-automated programs are often referred to as "semi-automated +weapons". + + +Node:semi-infinite, Next:senior bit, Previous:semi-automated, Up:= S = + +semi-infinite n. + +See infinite. + + +Node:senior bit, Next:September that never +ended, Previous:semi-infinite, Up:= S = + +senior bit n. + +[IBM; rare] Syn. meta +bit. + + +Node:September that +never ended, Next:server, +Previous:senior bit, +Up:= S = + +September that never ended + +All time since September 1993. One of the seasonal rhythms of +the Usenet used to be the annual September influx of clueless +newbies who, lacking any sense of netiquette, made a general nuisance of +themselves. This coincided with people starting college, getting +their first internet accounts, and plunging in without bothering +to learn what was acceptable. These relatively small drafts of +newbies could be assimilated within a few months. But in +September 1993, AOL users became able to post to Usenet, nearly +overwhelming the old-timers' capacity to acculturate them; to +those who nostalgically recall the period before hand, this +triggered an inexorable decline in the quality of discussions on +newsgroups. See also AOL!. + + +Node:server, Next:SEX, Previous:September that never +ended, Up:= S = + +server n. + +A kind of daemon that performs a +service for the requester and which often runs on a computer +other than the one on which the server runs. A particularly +common term on the Internet, which is rife with `web servers', +`name servers', `domain servers', `news servers', `finger +servers', and the like. + + +Node:SEX, Next:sex changer, Previous:server, Up:= +S = + +SEX /seks/ + +[Sun Users' Group & elsewhere] n. 1. Software EXchange. A +technique invented by the blue-green algae hundreds of millions +of years ago to speed up their evolution, which had been terribly +slow up until then. Today, SEX parties are popular among hackers +and others (of course, these are no longer limited to exchanges +of genetic software). In general, SEX parties are a Good Thing, but unprotected SEX can +propagate a virus. See also pubic directory. 2. The rather +Freudian mnemonic often used for Sign EXtend, a machine +instruction found in the PDP-11 and many other architectures. The +RCA 1802 chip used in the early Elf and SuperElf personal +computers had a `SEt X register' SEX instruction, but this seems +to have had little folkloric impact. The Data General instruction +set also had SEX. + +DEC's engineers nearly got a PDP-11 +assembler that used the SEX mnemonic out the door at +one time, but (for once) marketing wasn't asleep and forced a +change. That wasn't the last time this happened, either. The +author of "The Intel 8086 Primer", who was one of the original +designers of the 8086, noted that there was originally a +SEX instruction on that processor, too. He says that +Intel management got cold feet and decreed that it be changed, +and thus the instruction was renamed CBW and +CWD (depending on what was being extended). +Amusingly, the Intel 8048 (the microcontroller used in IBM PC +keyboards) is also missing straight SEX but has +logical-or and logical-and instructions ORL and +ANL. + +The Motorola 6809, used in the Radio Shack Color Computer and +in U.K.'s `Dragon 32' personal computer, actually had an official +SEX instruction; the 6502 in the Apple II with which +it competed did not. British hackers thought this made perfect +mythic sense; after all, it was commonly observed, you could (on +some theoretical level) have sex with a dragon, but you can't +have sex with an apple. + + +Node:sex changer, Next:shambolic link, Previous:SEX, Up:= S = + +sex changer n. + +Syn. gender mender. + + +Node:shambolic link, Next:shar file, Previous:sex changer, Up:= S = + +shambolic link /sham-bol'ik link/ n. + +A Unix symbolic link, particularly when it confuses you, +points to nothing at all, or results in your ending up in some +completely unexpected part of the +filesystem.... + + +Node:shar file, Next:sharchive, Previous:shambolic link, Up:= S = + +shar file /shar' fi:l/ n. + +Syn. sharchive. + + +Node:sharchive, Next:Share and enjoy!, Previous:shar file, Up:= S = + +sharchive /shar'ki:v/ n. + +[Unix and Usenet; from /bin/sh archive] A flattened representation of a set of one or +more files, with the unique property that it can be unflattened +(the original files restored) by feeding it through a standard +Unix shell; thus, a sharchive can be distributed to anyone +running Unix, and no special unpacking software is required. +Sharchives are also intriguing in that they are typically created +by shell scripts; the script that produces sharchives is thus a +script which produces self-unpacking scripts, which may +themselves contain scripts. (The downsides of sharchives are that +they are an ideal venue for Trojan +horse attacks and that, for recipients not running Unix, +no simple un-sharchiving program is possible; sharchives can and +do make use of arbitrarily-powerful shell features.) Sharchives +are also commonly referred to as `shar files' after the name of +the most common program for generating them. + + +Node:Share and enjoy!, Next:shareware, Previous:sharchive, Up:= S = + +Share and enjoy! imp. + +1. Commonly found at the end of software release announcements +and README files, this phrase +indicates allegiance to the hacker ethic of free information +sharing (see hacker ethic, +sense 1). 2. The motto of the complaints division of Sirius +Cybernetics Corporation (the ultimate gaggle of incompetent suits) in Douglas Adams's "Hitch Hiker's +Guide to the Galaxy". The irony of using this as a cultural +recognition signal appeals to hackers. + + +Node:shareware, Next:sharing violation, Previous:Share and enjoy!, +Up:= S = + +shareware /sheir'weir/ n. + +A kind of freeware (sense 1) +for which the author requests some payment, usually in the +accompanying documentation files or in an announcement made by +the software itself. Such payment may or may not buy additional +support or functionality. See also careware, charityware, crippleware, FRS, guiltware, +postcardware, and -ware; compare payware. + + +Node:sharing violation, Next:shebang, Previous:shareware, Up:= S = + +sharing violation + +[From a file error common to several OSs] A response to receiving information, typically +of an excessively personal nature, that you were probably happier +not knowing. "You know those little noises that Pat makes in +bed..?" "Whoa! Sharing violation!" In contrast to the original +file error, which indicated that you were not being +given data that you did want. + + +Node:shebang, Next:shelfware, Previous:sharing violation, Up:= S = + +shebang /sh*-bang/ n. + +The character sequence "#!" that frequently begins executable +shell scripts under Unix. Probably derived from "shell bang" +under the influence of American slang "the whole shebang" +(everything, the works). + + +Node:shelfware, Next:shell, Previous:shebang, Up:= S += + +shelfware /shelf'weir/ n. + +Software purchased on a whim (by an individual user) or in +accordance with policy (by a corporation or government agency), +but not actually required for any particular use. Therefore, it +often ends up on some shelf. + + +Node:shell, Next:shell out, Previous:shelfware, Up:= S = + +shell [orig. Multics +n. + +techspeak, widely propagated via Unix] 1. [techspeak] The +command interpreter used to pass commands to an operating system; +so called because it is the part of the operating system that +interfaces with the outside world. 2. More generally, any +interface program that mediates access to a special resource or +server for convenience, efficiency, +or security reasons; for this meaning, the usage is usually `a +shell around' whatever. This sort of program is also called a +`wrapper'. 3. A skeleton program, created by hand or by another +program (like, say, a parser generator), which provides the +necessary incantations to set +up some task and the control flow to drive it (the term driver is sometimes used synonymously). +The user is meant to fill in whatever code is needed to get real +work done. This usage is common in the AI and Microsoft Windows +worlds, and confuses Unix hackers. + +Historical note: Apparently, the original Multics shell (sense +1) was so called because it was a shell (sense 3); it ran user +programs not by starting up separate processes, but by +dynamically linking the programs into its own code, calling them +as subroutines, and then dynamically de-linking them on return. +The VMS command interpreter still does something very like +this. + + +Node:shell out, Next:shift left (or +right) logical, Previous:shell, Up:= S += + +shell out vi. + +[Unix] To spawn an interactive +subshell from within a program (e.g., a mailer or editor). "Bang +foo runs foo in a subshell, while bang alone shells out." + + +Node:shift left +(or right) logical, Next:shim, +Previous:shell out, +Up:= S = + +shift left (or right) logical + +[from any of various machines' instruction sets] 1. vi. To +move oneself to the left (right). To move out of the way. 2. +imper. "Get out of that (my) seat! You can shift to that empty +one to the left (right)." Often used without the `logical', or as +`left shift' instead of `shift left'. Sometimes heard as LSH +/lish/, from the PDP-10 instruction +set. See Programmer's +Cheer. + + +Node:shim, Next:shitogram, Previous:shift left (or right) +logical, Up:= S = + +shim n. + +A small piece of data inserted in order to achieve a desired +memory alignment or other addressing property. For example, the +PDP-11 Unix linker, in split I&D (instructions and data) +mode, inserts a two-byte shim at location 0 in data space so that +no data object will have an address of 0 (and be confused with +the C null pointer). See also loose +bytes. + + +Node:shitogram, Next:short card, Previous:shim, Up:= S = + + +shitogram /shit'oh-gram/ n. + +A really nasty piece of email. Compare nastygram, flame. + + +Node:short card, Next:shotgun debugging, Previous:shitogram, Up:= S = + +short card n. + +A half-length IBM XT expansion card or adapter that will fit +in one of the two short slots located towards the right rear of a +standard chassis (tucked behind the floppy disk drives). See also +tall card. + + +Node:shotgun debugging, Next:shovelware, Previous:short card, Up:= S = + +shotgun debugging n. + +The software equivalent of Easter egging; the making of +relatively undirected changes to software in the hope that a bug +will be perturbed out of existence. This almost never works, and +usually introduces more bugs. + + +Node:shovelware, Next:showstopper, Previous:shotgun debugging, Up:= S = + +shovelware /shuh'v*l-weir`/ n. + +1. Extra software dumped onto a CD-ROM or tape to fill up the +remaining space on the medium after the software distribution +it's intended to carry, but not integrated with the distribution. +2. A slipshod compilation of software dumped onto a CD-ROM +without much care for organization or even usability. + + +Node:showstopper, Next:shriek, Previous:shovelware, Up:= S = + +showstopper n. + +A hardware or (especially) software bug that makes an +implementation effectively unusable; one that absolutely has to +be fixed before development can go on. Opposite in connotation +from its original theatrical use, which refers to something +stunningly good. + + +Node:shriek, Next:Shub-Internet, Previous:showstopper, Up:= S = + +shriek n. + +See excl. Occasional CMU usage, +also in common use among APL fans and mathematicians, especially +category theorists. + + +Node:Shub-Internet, Next:sidecar, Previous:shriek, Up:= +S = + +Shub-Internet /shuhb' in't*r-net/ n. + +[MUD: from H. P. Lovecraft's evil fictional deity +Shub-Niggurath, the Black Goat with a Thousand Young] The harsh +personification of the Internet: Beast of a Thousand Processes, +Eater of Characters, Avatar of Line Noise, and Imp of Call +Waiting; the hideous multi-tendriled entity formed of all the +manifold connections of the net. A sect of MUDders worships +Shub-Internet, sacrificing objects and praying for good +connections. To no avail -- its purpose is malign and evil, and +is the cause of all network slowdown. Often heard as in "Freela +casts a tac nuke at Shub-Internet for slowing her down." (A +forged response often follows along the lines of: "Shub-Internet +gulps down the tac nuke and burps happily.") Also cursed by users +of the Web, FTP and TELNET when the system slows down. The dread +name of Shub-Internet is seldom spoken aloud, as it is said that +repeating it three times will cause the being to wake, deep +within its lair beneath the Pentagon. Compare Random Number God. + +[January 1996: It develops that one of the computer +administrators in the basement of the Pentagon read this entry +and fell over laughing. As a result, you too can now poke +Shub-Internet by pinging +_shub-internet.ims.disa.mil_. See also kremvax. - ESR] + +[April 1999: shub-internet.ims.disa.mil is no more, alas. But +Shub-Internet lives o^$#$*^ - ESR] + + +Node:sidecar, Next:SIG, Previous:Shub-Internet, Up:= S = + +sidecar n. + +1. Syn. slap on the +side. Esp. used of add-ons for the late and unlamented +IBM PCjr. 2. The IBM PC compatibility box that could be bolted +onto the side of an Amiga. Designed and produced by Commodore, it +broke all of the company's own design rules. If it worked with +any other peripherals, it was by magic. 3. More generally, any of various devices +designed to be connected to the expansion slot on the left side +of the Amiga 500 (and later, 600 & 1200), which included a +hard drive controller, a hard drive, and additional memory. + + +Node:SIG, Next:sig block, Previous:sidecar, Up:= S += + +SIG /sig/ n. + +(also common as a prefix in combining forms) A Special +Interest Group, in one of several technical areas, sponsored by +the Association for Computing Machinery; well-known ones include +SIGPLAN (the Special Interest Group on Programming Languages), +SIGARCH (the Special Interest Group for Computer Architecture) +and SIGGRAPH (the Special Interest Group for Computer Graphics). +Hackers, not surprisingly, like to overextend this naming +convention to less formal associations like SIGBEER (at ACM +conferences) and SIGFOOD (at University of Illinois). + + +Node:sig block, Next:sig quote, Previous:SIG, Up:= S += + +sig block /sig blok/ n. + +[Unix; often written `.sig' there] Short for `signature', used +specifically to refer to the electronic signature block that most +Unix mail- and news-posting software will automagically append to outgoing mail +and news. The composition of one's sig can be quite an art form, +including an ASCII logo or one's choice of witty sayings (see +sig quote, fool file); but many consider large sigs a +waste of bandwidth, and it has +been observed that the size of one's sig block is usually +inversely proportional to one's longevity and level of prestige +on the net. See also doubled +sig. + + +Node:sig quote, Next:sig virus, Previous:sig block, Up:= S = + +sig quote /sig kwoht/ n. + +[Usenet] A maxim, quote, proverb, joke, or slogan embedded in +one's sig block and intended to +convey something of one's philosophical stance, pet peeves, or +sense of humor. "Calm down, it's only ones and zeroes." + + +Node:sig virus, Next:signal-to-noise ratio, +Previous:sig quote, +Up:= S = + +sig virus n. + +A parasitic meme embedded in a +sig block. There was a meme plague or fad for these on +Usenet in late 1991. Most were equivalents of "I am a .sig virus. +Please reproduce me in your .sig block.". Of course, the .sig +virus's memetic hook is the giggle value of going along with the +gag; this, however, was a self-limiting phenomenon as more and +more people picked up on the idea. There were creative variants +on it; some people stuck `sig virus antibody' texts in their +sigs, and there was at least one instance of a sig virus +eater. + + +Node:signal-to-noise ratio, +Next:silicon, Previous:sig virus, Up:= S = + +signal-to-noise ratio [from analog electronics] n. + +Used by hackers in a generalization of its technical meaning. +`Signal' refers to useful information conveyed by some +communications medium, and `noise' to anything else on that +medium. Hence a low ratio implies that it is not worth paying +attention to the medium in question. Figures for such +metaphorical ratios are never given. The term is most often +applied to Usenet newsgroups during +flame wars. Compare bandwidth. See also coefficient of X, lost in the noise. + + +Node:silicon, Next:silly walk, Previous:signal-to-noise ratio, Up:= S = + +silicon n. + +Hardware, esp. ICs or microprocessor-based computer systems +(compare iron). Contrasted with +software. See also sandbender. + + +Node:silly walk, Next:silo, Previous:silicon, Up:= S += + +silly walk vi. + +[from Monty Python's Flying Circus] 1. A ridiculous procedure +required to accomplish a task. Like grovel, but more random and humorous. "I had to silly-walk +through half the /usr directories to find the maps file." 2. Syn. +fandango on core. + + +Node:silo, Next:Silver Book, Previous:silly walk, Up:= S = + +silo n. + +The FIFO input-character buffer in an RS-232 line card. So +called from DEC terminology used on DH +and DZ line cards for the VAX and PDP-11, presumably because it +was a storage space for fungible stuff that went in at the top +and came out at the bottom. + + +Node:Silver Book, Next:since time T +equals minus infinity, Previous:silo, Up:= S = + + +Silver Book n. + +Jensen and Wirth's infamous "Pascal User Manual and Report", +so called because of the silver cover of the widely distributed +Springer-Verlag second edition of 1978 (ISBN 0-387-90144-2). See +book titles, Pascal. + + +Node:since +time T equals minus infinity, Next:sitename, Previous:Silver Book, Up:= S = + +since time T equals minus infinity adv. + +A long time ago; for as long as anyone can remember; at the +time that some particular frob was first designed. Usually the +word `time' is omitted. See also time +T; contrast epoch. + + +Node:sitename, Next:skrog, Previous:since time T +equals minus infinity, Up:= +S = + +sitename /si:t'naym/ n. + +[Unix/Internet] The unique electronic name of a computer +system, used to identify it in UUCP mail, Usenet, or other forms +of electronic information interchange. The folklore interest of +sitenames stems from the creativity and humor they often display. +Interpreting a sitename is not unlike interpreting a vanity +license plate; one has to mentally unpack it, allowing for +mono-case and length restrictions and the lack of whitespace. +Hacker tradition deprecates dull, institutional-sounding names in +favor of punchy, humorous, and clever coinages (except that it is +considered appropriate for the official public gateway machine of +an organization to bear the organization's name or acronym). +Mythological references, cartoon characters, animal names, and +allusions to SF or fantasy literature are probably the most +popular sources for sitenames (in roughly descending order). The +obligatory comment when discussing these is Harris's Lament: "All +the good ones are taken!" See also network address. + + +Node:skrog, Next:skulker, Previous:sitename, Up:= +S = + +skrog v. + +Syn. scrog. + + +Node:skulker, Next:slab, Previous:skrog, Up:= S += + +skulker n. + +Syn. prowler. + + +Node:slab, Next:slack, Previous:skulker, Up:= S += + +slab [Apple] + +1. n. A continuous horizontal line of pixels, all with the +same color. 2. vi. To paint a slab on an output device. Apple's +QuickDraw, like most other professional-level graphics systems, +renders polygons and lines not with Bresenham's algorithm, but by +calculating `slab points' for each scan line on the screen in +succession, and then slabbing in the actual image pixels. + + +Node:slack, Next:slap on the side, Previous:slab, Up:= S = + +slack n. + +1. Space allocated to a disk file but not actually used to +store useful information. The techspeak equivalent is `internal +fragmentation'. Antonym: hole. 2. In +the theology of the Church of the SubGenius, +a mystical substance or quality that is the prerequisite of all +human happiness. + +Since Unix files are stored compactly, except for the +unavoidable wastage in the last block or fragment, it might be +said that "Unix has no slack". See ha ha only serious. + + +Node:slap on the side, +Next:slash, Previous:slack, Up:= S = + +slap on the side n. + +(also called a sidecar, or +abbreviated `SOTS'.) A type of external expansion hardware +marketed by computer manufacturers (e.g., Commodore for the Amiga +500/1000 series and IBM for the hideous failure called `PCjr'). +Various SOTS boxes provided necessities such as memory, hard +drive controllers, and conventional expansion slots. + + +Node:slash, Next:slashdot effect, Previous:slap on the side, +Up:= S = + +slash n. + +Common name for the slant (`/', ASCII 0101111) character. See +ASCII for other synonyms. + + +Node:slashdot effect, Next:sleep, Previous:slash, Up:= S += + +slashdot effect n. + +1. Also spelled "/. effect"; what is said to have happened +when a website being virtually unreachable because too many +people are hitting it after the site was mentioned in an +interesting article on the popular Slashdot news service. The term is +quite widely used by /. readers, including variants like "That +site has been slashdotted again!" 2. In a perhaps inevitable +generation, the term is being used to describe any similar effect +from being listed on a popular site. This would better be +described as a flash +crowd. + + +Node:sleep, Next:slim, Previous:slashdot effect, Up:= S = + +sleep vi. + +1. [techspeak] To relinquish a claim (of a process on a +multitasking system) for service; to indicate to the scheduler +that a process may be deactivated until some given event occurs +or a specified time delay elapses. 2. In jargon, used very +similarly to v. block; also in `sleep +on', syn. with `block on'. Often used to indicate that the +speaker has relinquished a demand for resources until some +(possibly unspecified) external event: "They can't get the fix +I've been asking for into the next release, so I'm going to sleep +on it until the release, then start hassling them again." + + +Node:slim, Next:slop, Previous:sleep, Up:= S += + +slim n. + +A small, derivative change (e.g., to code). + + +Node:slop, Next:slopsucker, Previous:slim, Up:= S = + + +slop n. + +1. A one-sided fudge +factor, that is, an allowance for error but in only one +of two directions. For example, if you need a piece of wire 10 +feet long and have to guess when you cut it, you make very sure +to cut it too long, by a large amount if necessary, rather than +too short by even a little bit, because you can always cut off +the slop but you can't paste it back on again. When discrete +quantities are involved, slop is often introduced to avoid the +possibility of being on the losing side of a fencepost error. 2. The percentage +of `extra' code generated by a compiler over the size of +equivalent assembler code produced by hand-hacking; i.e., the space (or maybe +time) you lose because you didn't do it yourself. This number is +often used as a measure of the goodness of a compiler; slop below +5% is very good, and 10% is usually acceptable. With modern +compiler technology, esp. on RISC machines, the compiler's slop +may actually be negative; that is, humans may be unable +to generate code as good. This is one of the reasons assembler +programming is no longer common. + + +Node:slopsucker, Next:Slowlaris, Previous:slop, Up:= S = + + +slopsucker /slop'suhk-r/ n. + +A lowest-priority task that waits around until everything else +has `had its fill' of machine resources. Only when the machine +would otherwise be idle is the task allowed to `suck up the +slop'. Also called a `hungry puppy' or `bottom feeder'. One +common variety of slopsucker hunts for large prime numbers. +Compare background. + + +Node:Slowlaris, Next:slurp, Previous:slopsucker, Up:= S = + +Slowlaris /slo'-lahr-is/ n. + +[Usenet; poss. from the variety of prosimian called a "slow +loris". The variant `Slowlartus' is also common, related to LART] Common hackish term for Solaris, Sun's +System VR4 version of UNIX that came out of the standardization +wars of the early 1990s. So named because especially on older +hardware, responsiveness was much less crisp than under the +preceding SunOS. Early releases of Solaris (that is, Solaris 2, +as some marketroids at Sun +retroactively rechristened SunOS as Solaris 1) were quite buggy, +and Sun was forced by customer demand to support SunOS for quite +some time. Newer versions are acknowledged to be among the best +commercial UNIX variants in 1998, but still lose single-processor +benchmarks to Sparc Linux. Compare +AIDX, HP-SUX, Nominal Semidestructor, Telerat, sun-stools. + + +Node:slurp, Next:smart, Previous:Slowlaris, Up:= S = + +slurp vt. + +To read a large data file entirely into core before working on it. This may be contrasted +with the strategy of reading a small piece at a time, processing +it, and then reading the next piece. "This program slurps in a +1K-by-1K matrix and does an FFT." See also sponge. + + +Node:smart, Next:smart terminal, Previous:slurp, Up:= S = + +smart adj. + +Said of a program that does the Right Thing in a wide variety of +complicated circumstances. There is a difference between calling +a program smart and calling it intelligent; in particular, there +do not exist any intelligent programs (yet -- see AI-complete). Compare robust (smart programs can be brittle). + + +Node:smart terminal, Next:smash case, Previous:smart, Up:= S = + +smart terminal n. + +1. A terminal that has enough computing capability to render +graphics or to offload some kind of front-end processing from the +computer it talks to. The development of workstations and +personal computers has made this term and the product it +describes semi-obsolescent, but one may still hear variants of +the phrase `act like a smart terminal' used to describe the +behavior of workstations or PCs with respect to programs that +execute almost entirely out of a remote server's storage, using local devices as +displays. 2. obs. Any terminal with an addressable cursor; the +opposite of a glass tty. Today, +a terminal with merely an addressable cursor, but with none of +the more-powerful features mentioned in sense 1, is called a +dumb terminal. + +There is a classic quote from Rob Pike (inventor of the blit terminal): "A smart terminal is not a +smartass terminal, but rather a terminal you can +educate." This illustrates a common design problem: The attempt +to make peripherals (or anything else) intelligent sometimes +results in finicky, rigid `special features' that become just so +much dead weight if you try to use the device in any way the +designer didn't anticipate. Flexibility and programmability, on +the other hand, are really smart. Compare hook. + + +Node:smash case, Next:smash the stack, Previous:smart terminal, Up:= S = + +smash case vi. + +To lose or obliterate the uppercase/lowercase distinction in +text input. "MS-DOS will automatically smash case in the names of +all the files you create." Compare fold +case. + + +Node:smash the stack, Next:smiley, Previous:smash case, Up:= S = + +smash the stack n. + +[C programming] To corrupt the execution stack by writing past +the end of a local array or other data structure. Code that +smashes the stack can cause a return from the routine to jump to +a random address, resulting in some of the most insidious +data-dependent bugs known to mankind. Variants include `trash' +the stack, scribble the stack, +mangle the stack; the term **mung the stack is not used, as this is never +done intentionally. See spam; see also +aliasing bug, fandango on core, memory leak, memory smash, precedence lossage, overrun screw. + + +Node:smiley, Next:smoke, Previous:smash the stack, Up:= S = + +smiley n. + +See emoticon. + + +Node:smoke, Next:smoke and mirrors, Previous:smiley, Up:= S = + +smoke vi. + +1. To crash or blow up, usually +spectacularly. "The new version smoked, just like the last one." +Used for both hardware (where it often describes an actual +physical event), and software (where it's merely colorful). 2. +[from automotive slang] To be conspicuously fast. "That processor +really smokes." Compare magic +smoke. + + +Node:smoke and mirrors, +Next:smoke test, +Previous:smoke, Up:= S = + +smoke and mirrors n. + +Marketing deceptions. The term is mainstream in this general +sense. Among hackers it's strongly associated with bogus demos +and crocked benchmarks (see also +MIPS, machoflops). "They claim their new box +cranks 50 MIPS for under $5000, but didn't specify the +instruction mix -- sounds like smoke and mirrors to me." The +phrase, popularized by newspaper columnist Jimmy Breslin c.1975, +has been said to derive from carnie slang for magic acts and +`freak show' displays that depend on `trompe l'oeil' effects, but +also calls to mind the fierce Aztec god Tezcatlipoca (lit. +"Smoking Mirror") for whom the hearts of huge numbers of human +sacrificial victims were regularly cut out. Upon hearing about a +rigged demo or yet another round of fantasy-based marketing +promises, hackers often feel analogously disheartened. See also +stealth manager. + + +Node:smoke test, Next:smoking clover, Previous:smoke and mirrors, +Up:= S = + +smoke test n. + +1. A rudimentary form of testing applied to electronic +equipment following repair or reconfiguration, in which power is +applied and the tester checks for sparks, smoke, or other +dramatic signs of fundamental failure. See magic smoke. 2. By extension, the first +run of a piece of software after construction or a critical +change. See and compare reality +check. + +There is an interesting semi-parallel to this term among +typographers and printers: When new typefaces are being punch-cut +by hand, a `smoke test' (hold the letter in candle smoke, then +press it onto paper) is used to check out new dies. + + +Node:smoking clover, Next:smoot, Previous:smoke test, Up:= S = + +smoking clover n. + +[ITS] A display hack +originally due to Bill Gosper. Many convergent lines are drawn on +a color monitor in such a way that every pixel struck has its +color incremented. The lines all have one endpoint in the middle +of the screen; the other endpoints are spaced one pixel apart +around the perimeter of a large square. The color map is then +repeatedly rotated. This results in a striking, rainbow-hued, +shimmering four-leaf clover. Gosper joked about keeping it hidden +from the FDA (the U.S.'s Food and Drug Administration) lest its +hallucinogenic properties cause it to be banned. + + +Node:smoot, Next:SMOP, Previous:smoking clover, Up:= S = + +smoot /smoot/ n. + +[MIT] A unit of length equal five feet seven inches. The +length of the Harvard Bridge in Boston is famously 364.4 smoots +plus or minus an ear (the ear stands for epsilon). This legend began with a fraternity +prank in 1958 during which the body length of Oliver Smoot (class +of '62) was actually used to measure out that distance. It is +commemorated by smoot marks that MIT students repaint every few +years; the tradition even survived the demolition and rebuilding +of the bridge in the late 1980s. The Boston police have been +known to use smoot markers to indicate accident locations on the +bridge. + + +Node:SMOP, Next:smurf, Previous:smoot, Up:= S += + +SMOP /S-M-O-P/ n. + +[Simple (or Small) Matter of Programming] 1. A piece of code, +not yet written, whose anticipated length is significantly +greater than its complexity. Used to refer to a program that +could obviously be written, but is not worth the trouble. Also +used ironically to imply that a difficult problem can be easily +solved because a program can be written to do it; the irony is +that it is very clear that writing such a program will be a great +deal of work. "It's easy to enhance a FORTRAN compiler to compile +COBOL as well; it's just an SMOP." 2. Often used ironically by +the intended victim when a suggestion for a program is made which +seems easy to the suggester, but is obviously (to the victim) a +lot of work. + + +Node:smurf, Next:SNAFU principle, Previous:SMOP, Up:= S = + +smurf /smerf/ n. + +1. [from the _soc.motss_ newsgroup on Usenet, after some +obnoxiously gooey cartoon characters] A newsgroup regular with a +habitual style that is irreverent, silly, and _cute_. Like +many other hackish terms for people, this one may be praise or +insult depending on who uses it. In general, being referred to as +a smurf is probably not going to make your day unless you've +previously adopted the label yourself in a spirit of irony. +Compare old fart. 2. [techspeak] +A ping packet with a forged source address sent to some other +network's broadcast address. All the machines on the destination +network will send a ping response to the forged source address +(the victim). This both overloads the victim's network and hides +the location of the attacker. + + +Node:SNAFU principle, Next:snail, Previous:smurf, Up:= S += + +SNAFU principle /sna'foo prin'si-pl/ n. + +[from a WWII Army acronym for `Situation Normal, All Fucked +Up'] "True communication is possible only between equals, because +inferiors are more consistently rewarded for telling their +superiors pleasant lies than for telling the truth." -- a central +tenet of Discordianism, often +invoked by hackers to explain why authoritarian hierarchies screw +up so reliably and systematically. The effect of the SNAFU +principle is a progressive disconnection of decision-makers from +reality. This lightly adapted version of a fable dating back to +the early 1960s illustrates the phenomenon perfectly: + +In the beginning was the plan, + + and then the specification; + +And the plan was without form, + + and the specification was void. + +And darkness + + was on the faces of the implementors thereof; + +And they spake unto their leader, + + saying: + +"It is a crock of shit, + + and smells as of a sewer." + + +And the leader took pity on them, + + and spoke to the project leader: + +"It is a crock of excrement, + + and none may abide the odor thereof." + + +And the project leader + + spake unto his section head, saying: + +"It is a container of excrement, + + and it is very strong, such that none may abide it." + + +The section head then hurried to his department manager, + + and informed him thus: + +"It is a vessel of fertilizer, + + and none may abide its strength." + + +The department manager carried these words + + to his general manager, + +and spoke unto him + + saying: + +"It containeth that which aideth the growth of plants, + + and it is very strong." + + +And so it was that the general manager rejoiced + + and delivered the good news unto the Vice President. + +"It promoteth growth, + + and it is very powerful." + + +The Vice President rushed to the President's side, + + and joyously exclaimed: + +"This powerful new software product + + will promote the growth of the company!" + + +And the President looked upon the product, + + and saw that it was very good. + + + +After the subsequent and inevitable disaster, the suits protect themselves by saying "I was +misinformed!", and the implementors are demoted or fired. Compare +Conway's Law. + + +Node:snail, Next:snail-mail, Previous:SNAFU principle, Up:= S = + +snail vt. + +To snail-mail something. +"Snail me a copy of those graphics, will you?" + + +Node:snail-mail, Next:snap, Previous:snail, Up:= S += + +snail-mail n. + +Paper mail, as opposed to electronic. Sometimes written as the +single word `SnailMail'. One's postal address is, +correspondingly, a `snail address'. Derives from earlier coinage +`USnail' (from `U.S. Mail'), for which there have even been +parody posters and stamps made. Also (less commonly) called +`P-mail', from `paper mail' or `physical mail'. Oppose email. + + +Node:snap, Next:snarf, Previous:snail-mail, Up:= S = + +snap v. + +To replace a pointer to a pointer with a direct pointer; to +replace an old address with the forwarding address found there. +If you telephone the main number for an institution and ask for a +particular person by name, the operator may tell you that +person's extension before connecting you, in the hopes that you +will `snap your pointer' and dial direct next time. The +underlying metaphor may be that of a rubber band stretched +through a number of intermediate points; if you remove all the +thumbtacks in the middle, it snaps into a straight line from +first to last. See chase +pointers. + +Often, the behavior of a trampoline is to perform an error check +once and then snap the pointer that invoked it so as henceforth +to bypass the trampoline (and its one-shot error check). In this +context one also speaks of `snapping links'. For example, in a +LISP implementation, a function interface trampoline might check +to make sure that the caller is passing the correct number of +arguments; if it is, and if the caller and the callee are both +compiled, then snapping the link allows that particular path to +use a direct procedure-call instruction with no further +overhead. + + +Node:snarf, Next:snarf & barf, Previous:snap, Up:= S = + +snarf /snarf/ vt. + +1. To grab, esp. to grab a large document or file for the +purpose of using it with or without the author's permission. See +also BLT. 2. [in the Unix community] To +fetch a file or set of files across a network. See also blast. This term was mainstream in the late +1960s, meaning `to eat piggishly'. It may still have this +connotation in context. "He's in the snarfing phase of hacking -- +FTPing megs of stuff a day." 3. To +acquire, with little concern for legal forms or _politesse_ +(but not quite by stealing). "They were giving away samples, so I +snarfed a bunch of them." 4. Syn. for slurp. "This program starts by snarfing the +entire database into core, then...." 5. [GEnie] To +spray food or programming +fluids due to laughing at the wrong moment. "I was +drinking coffee, and when I read your post I snarfed all over my +desk." "If I keep reading this topic, I think I'll have to +snarf-proof my computer with a keyboard condom." [This sense appears to be widespread +among mundane teenagers --ESR] + + +Node:snarf & barf, Next:snarf down, Previous:snarf, Up:= S = + +snarf & barf /snarf'n-barf`/ n. + +Under a WIMP +environment, the act of grabbing a region of text and +then stuffing the contents of that region into another region (or +the same one) to avoid retyping a command line. In the late +1960s, this was a mainstream expression for an `eat now, regret +it later' cheap-restaurant expedition. + + +Node:snarf down, Next:snark, Previous:snarf & barf, Up:= S = + +snarf down v. + +To snarf, with the connotation of +absorbing, processing, or understanding. "I'll snarf down the +latest version of the nethack +user's guide -- it's been a while since I played last and I don't +know what's changed recently." + + +Node:snark, Next:sneaker, Previous:snarf down, Up:= S = + +snark n. + +[Lewis Carroll, via the Michigan Terminal System] 1. A system +failure. When a user's process bombed, the operator would get the +message "Help, Help, Snark in MTS!" 2. More generally, any kind +of unexplained or threatening event on a computer (especially if +it might be a boojum). Often used to refer to an event or a log +file entry that might indicate an attempted security violation. +See snivitz. 3. UUCP name of +_snark.thyrsus.com_, home site of the Jargon File versions +from 2.*.* on (i.e., this lexicon). + + +Node:sneaker, Next:sneakernet, Previous:snark, Up:= S += + +sneaker n. + +An individual hired to break into places in order to test +their security; analogous to tiger +team. Compare samurai. + + +Node:sneakernet, Next:sniff, Previous:sneaker, Up:= S += + +sneakernet /snee'ker-net/ n. + +Term used (generally with ironic intent) for transfer of +electronic information by physically carrying tape, disks, or +some other media from one machine to another. "Never +underestimate the bandwidth of a station wagon filled with +magtape, or a 747 filled with CD-ROMs." Also called `Tennis-Net', +`Armpit-Net', `Floppy-Net' or `Shoenet'; in the 1990s, `Nike +network' after a well-known sneaker brand. + + +Node:sniff, Next:snivitz, Previous:sneakernet, Up:= S = + +sniff v.,n. + +1. To watch IP packets traversing a local network. Most often +in the phrase `packet sniffer', a program for doing same. +2.Synonym for poll. + + +Node:snivitz, Next:'Snooze, Previous:sniff, Up:= S += + +snivitz /sniv'itz/ n. + +A hiccup in hardware or software; a small, transient problem +of unknown origin (less serious than a snark). Compare glitch. + + +Node:'Snooze, Next:SO, Previous:snivitz, Up:= S += + +'Snooze /snooz/ [FidoNet] n. + +Fidonews, the weekly official on-line newsletter of FidoNet. +As the editorial policy of Fidonews is "anything that arrives, we +print", there are often large articles completely unrelated to +FidoNet, which in turn tend to elicit flamage in subsequent issues. + + +Node:SO, Next:social engineering, Previous:'Snooze, Up:= S = + +SO /S-O/ n. + +1. (also `S.O.') Abbrev. for Significant Other, almost +invariably written abbreviated and pronounced /S-O/ by hackers. +Used to refer to one's primary relationship, esp. a live-in to +whom one is not married. See MOTAS, +MOTOS, MOTSS. 2. [techspeak] The Shift Out control +character in ASCII (Control-N, 0001110). + + +Node:social engineering, +Next:social +science number, Previous:SO, +Up:= S = + +social engineering n. + +Term used among crackers and +samurai for cracking techniques +that rely on weaknesses in wetware +rather than software; the aim is to trick people into revealing +passwords or other information that compromises a target system's +security. Classic scams include phoning up a mark who has the +required information and posing as a field service tech or a +fellow employee with an urgent access problem. See also the tiger team story in the patch entry. + + +Node:social science +number, Next:sock +puppet, Previous:social engineering, Up:= S = + +social science number n. // + +[IBM] A statistic that is content-free, or nearly so. A measure +derived via methods of questionable validity from data of a +dubious and vague nature. Predictively, having a social science +number in hand is seldom much better than nothing, and can be +considerably worse. As a rule, management loves them. See also numbers, math-out, pretty pictures. + + +Node:sock puppet, Next:sodium substrate, Previous:social science +number, Up:= S = + +sock puppet n. + +[Usenet: from the act of placing a sock over your hand and +talking to it and pretending it's talking back] In Usenet +parlance, a pseudo through which the +puppeteer posts follow-ups to their own original message to give +the appearance that a number of people support the views held in +the original message. + + +Node:sodium substrate, Next:soft boot, Previous:sock puppet, Up:= S = + +sodium substrate n. + +Syn salt substrate. + + +Node:soft boot, Next:softcopy, Previous:sodium substrate, Up:= S = + +soft boot n. + +See boot. + + +Node:softcopy, Next:software bloat, Previous:soft boot, Up:= S = + +softcopy /soft'kop-ee/ n. + +[by analogy with `hardcopy'] A machine-readable form of +corresponding hardcopy. See bits, +machinable. + + +Node:software bloat, Next:software hoarding, +Previous:softcopy, Up:= S = + +software bloat n. + +The results of second-system effect or creeping featuritis. +Commonly cited examples include ls(1), X, BSD, Missed'em-five, and OS/2. + + +Node:software hoarding, Next:software laser, +Previous:software +bloat, Up:= S = + +software hoarding n. + +Pejorative term employed by members and adherents of the GNU project to describe the act of holding +software proprietary, keeping it under trade secret or license +terms which prohibit free redistribution and modification. Used +primarily in Free Software Foundation propaganda. For a summary +of related issues, see GNU. + + +Node:software laser, Next:software rot, Previous:software hoarding, +Up:= S = + +software laser n. + +An optical laser works by bouncing photons back and forth +between two mirrors, one totally reflective and one partially +reflective. If the lasing material (usually a crystal) has the +right properties, photons scattering off the atoms in the crystal +will excite cascades of more photons, all in lockstep. Eventually +the beam will escape through the partially-reflective mirror. One +kind of sorcerer's +apprentice mode involving bounce messages can produce closely +analogous results, with a cascade +of messages escaping to flood nearby systems. By mid-1993 there +had been at least two publicized incidents of this kind. + + +Node:software rot, Next:softwarily, Previous:software laser, Up:= S = + +software rot n. + +Term used to describe the tendency of software that has not +been used in a while to lose; such +failure may be semi-humorously ascribed to bit rot. More commonly, `software rot' +strikes when a program's assumptions become out of date. If the +design was insufficiently robust, +this may cause it to fail in mysterious ways. Syn. `code rot'. +See also link rot. + +For example, owing to endemic shortsightedness in the design +of COBOL programs, a good number of them succumbed to software +rot when their 2-digit year counters underwent wrap around at the beginning of the year +2000. Actually, related lossages often afflict centenarians who +have to deal with computer software designed by unimaginative +clods. One such incident became the focus of a minor public flap +in 1990, when a gentleman born in 1889 applied for a driver's +license renewal in Raleigh, North Carolina. The new system +refused to issue the card, probably because with 2-digit years +the ages 101 and 1 cannot be distinguished. + +Historical note: Software rot in an even funnier sense than +the mythical one was a real problem on early research computers +(e.g., the R1; see grind +crank). If a program that depended on a peculiar +instruction hadn't been run in quite a while, the user might +discover that the opcodes no longer did the same things they once +did. ("Hey, so-and-so needs an instruction to do such-and-such. +We can snarf this opcode, right? No +one uses it.") + +Another classic example of this sprang from the time an MIT +hacker found a simple way to double the speed of the +unconditional jump instruction on a PDP-6, so he patched the +hardware. Unfortunately, this broke some fragile timing software +in a music-playing program, throwing its output out of tune. This +was fixed by adding a defensive initialization routine to compare +the speed of a timing loop with the real-time clock; in other +words, it figured out how fast the PDP-6 was that day, and +corrected appropriately. + +Compare bit rot. + + +Node:softwarily, Next:softy, Previous:software rot, Up:= S = + +softwarily /soft-weir'i-lee/ adv. + +In a way pertaining to software. "The system is softwarily +unreliable." The adjective **`softwary' is not used. See +hardwarily. + + +Node:softy, Next:some random X, Previous:softwarily, Up:= S = + +softy n. + +[IBM] Hardware hackers' term for a software expert who is +largely ignorant of the mysteries of hardware. + + +Node:some random X, Next:sorcerer's +apprentice mode, Previous:softy, Up:= S += + +some random X adj. + +Used to indicate a member of class X, with the implication +that Xs are interchangeable. "I think some random cracker tripped +over the guest timeout last night." See also J. Random. + + +Node:sorcerer's +apprentice mode, Next:SOS, +Previous:some random +X, Up:= S = + +sorcerer's apprentice mode n. + +[from Goethe's "Der Zauberlehrling" via Paul Dukas's +"L'apprenti sorcier" the film "Fantasia"] A bug in a protocol +where, under some circumstances, the receipt of a message causes +multiple messages to be sent, each of which, when received, +triggers the same bug. Used esp. of such behavior caused by bounce message loops in email software. Compare broadcast storm, network meltdown, software laser, ARMM. + + +Node:SOS, Next:source, Previous:sorcerer's apprentice mode, +Up:= S = + +SOS /S-O-S/ + +n.,obs. An infamously losing text +editor. Once, back in the 1960s, when a text editor was needed +for the PDP-6, a hacker crufted together a quick-and-dirty `stopgap editor' to be +used until a better one was written. Unfortunately, the old one +was never really discarded when new ones came along. SOS is a +descendant (`Son of Stopgap') of that editor, and many PDP-10 +users gained the dubious pleasure of its acquaintance. Since then +other programs similar in style to SOS have been written, notably +the early font editor BILOS /bye'lohs/, the Brother-In-Law Of +Stopgap (the alternate expansion `Bastard Issue, Loins of +Stopgap' has been proposed). + + +Node:source, Next:source of all good bits, +Previous:SOS, Up:= S = + +source n. + +[very common] In reference to software, `source' is invariably +shorthand for `source code', the preferred human-readable and +human-modifiable form of the program. This is as opposed to +object code, the derived binary executable form of a program. +This shorthand readily takes derivative forms; one may speak of +"the sources of a system" or of "having source". + + +Node:source of all good +bits, Next:space-cadet keyboard, Previous:source, Up:= S = + +source of all good bits n. + +A person from whom (or a place from which) useful information +may be obtained. If you need to know about a program, a guru might be the source of all good bits. +The title is often applied to a particularly competent +secretary. + + +Node:space-cadet keyboard, +Next:spaceship +operator, Previous:source of all good bits, +Up:= S = + +space-cadet keyboard n. + +A now-legendary device used on MIT LISP machines, which +inspired several still-current jargon terms and influenced the +design of EMACS. It was equipped with +no fewer than seven shift keys: four keys for bucky bits (`control', `meta', +`hyper', and `super') and three like regular shift keys, called +`shift', `top', and `front'. Many keys had three symbols on them: +a letter and a symbol on the top, and a Greek letter on the +front. For example, the `L' key had an `L' and a two-way arrow on +the top, and the Greek letter lambda on the front. By pressing +this key with the right hand while playing an appropriate `chord' +with the left hand on the shift keys, you could get the following +results: + + + +L + + +lowercase l + + +shift-L + + +uppercase L + + +front-L + + +lowercase lambda + + +front-shift-L + + +uppercase lambda + + +top-L + + +two-way arrow (front and shift are ignored) + + +And of course each of these might also be typed with any +combination of the control, meta, hyper, and super keys. On this +keyboard, you could type over 8000 different characters! This +allowed the user to type very complicated mathematical text, and +also to have thousands of single-character commands at his +disposal. Many hackers were actually willing to memorize the +command meanings of that many characters if it reduced typing +time (this attitude obviously shaped the interface of EMACS). +Other hackers, however, thought having that many bucky bits was +overkill, and objected that such a keyboard can require three or +four hands to operate. See bucky +bits, cokebottle, double bucky, meta bit, quadruple bucky. + +Note: early versions of this entry incorrectly identified the +space-cadet keyboard with the `Knight keyboard'. Though both were +designed by Tom Knight, the latter term was properly applied only +to a keyboard used for ITS on the PDP-10 and modeled on the +Stanford keyboard (as described under bucky bits). The true space-cadet +keyboard evolved from the first Knight keyboard. + + +Node:spaceship operator, +Next:SPACEWAR, Previous:space-cadet +keyboard, Up:= S = + +spaceship operator n. + +The glyph <=>, so-called apparently because +in the low-resolution constant-width font used on many terminals +it vaguely resembles a flying saucer. Perl uses this to denote the signum-of-difference +operation. + + +Node:SPACEWAR, Next:spaghetti code, Previous:spaceship operator, +Up:= S = + +SPACEWAR n. + +A space-combat simulation game, inspired by E. E. "Doc" +Smith's "Lensman" books, in which two spaceships duel around a +central sun, shooting torpedoes at each other and jumping through +hyperspace. This game was first implemented on the PDP-1 at MIT +in 1962. In 1968-69, a descendant of the game motivated Ken +Thompson to build, in his spare time on a scavenged PDP-7, the +operating system that became Unix. +Less than nine years after that, SPACEWAR was commercialized as +one of the first video games; descendants are still feeping in video arcades everywhere. + + +Node:spaghetti code, Next:spaghetti inheritance, +Previous:SPACEWAR, Up:= S = + +spaghetti code n. + +Code with a complex and tangled control structure, esp. one +using many GOTOs, exceptions, or other `unstructured' branching +constructs. Pejorative. The synonym `kangaroo code' has been +reported, doubtless because such code has so many jumps in +it. + + +Node:spaghetti inheritance, +Next:spam, Previous:spaghetti code, Up:= S = + +spaghetti inheritance n. + +[encountered among users of object-oriented languages that use +inheritance, such as Smalltalk] A convoluted class-subclass +graph, often resulting from carelessly deriving subclasses from +other classes just for the sake of reusing their code. Coined in +a (successful) attempt to discourage such practice, through +guilt-by-association with spaghetti code. + + +Node:spam, Next:spam bait, Previous:spaghetti inheritance, Up:= S = + +spam vt.,vi.,n. + +[from "Monty Python's Flying Circus"] 1. To crash a program by +overrunning a fixed-size buffer with excessively large input +data. See also buffer +overflow, overrun +screw, smash the +stack. 2. To cause a newsgroup to be flooded with +irrelevant or inappropriate messages. You can spam a newsgroup +with as little as one well- (or ill-) planned message (e.g. +asking "What do you think of abortion?" on _soc.women_). +This is often done with cross-posting (e.g. any message which is +crossposted to _alt.rush-limbaugh_ and +_alt.politics.homosexuality_ will almost inevitably spam +both groups). This overlaps with troll behavior; the latter more specific term +has become more common. 3. To send many identical or +nearly-identical messages separately to a large number of Usenet +newsgroups. This is more specifically called `ECP', Excessive +Cross-Posting. This is one sure way to infuriate nearly everyone +on the Net. See also velveeta and +jello. 4. To bombard a newsgroup with +multiple copies of a message. This is more specifically called +`EMP', Excessive Multi-Posting. 5. To mass-mail unrequested +identical or nearly-identical email messages, particularly those +containing advertising. Especially used when the mail addresses +have been culled from network traffic or databases without the +consent of the recipients. Synonyms include UCE, UBE. 6. Any large, +annoying, quantity of output. For instance, someone on IRC who +walks away from their screen and comes back to find 200 lines of +text might say "Oh no, spam". + +The later definitions have become much more prevalent as the +Internet has opened up to non-techies, and to most people senses +3 4 and 5 are now primary. All three behaviors are considered +abuse of the net, and are almost universally grounds for +termination of the originator's email account or network +connection. In these senses the term `spam' has gone mainstream, +though without its original sense or folkloric freight - there is +apparently a widespread myth among lusers that "spamming" is what happens when you +dump cans of Spam into a revolving fan. + + +Node:spam bait, Next:spamblock, Previous:spam, Up:= S = + + +spam bait n. + +Email addresses included in, or comprising the entirety of, a +usenet message so that spammers mining a newsgroup with an address harvester will +collect them. These addresses can be people who have offended or +annoyed the poster, or who are included so that a spammer will +spam an official, thereby causing himself trouble. One +particularly effective form of spam bait is the address of a +teergrube. + + +Node:spamblock, Next:spamhaus, Previous:spam bait, Up:= S = + +spamblock /spam'blok/ n. + +[poss. by analogy to sunblock] Text inserted in an email +address to render it invalid and thus useless to spammers. For +example, the address `jrandom@hacker.org' might be transformed to +`jrandom@NOSPAM.hacker.org'. Adding spamblock to an address is +often referred to as `munging' it (see munge)-. This evasion tactic depends on the fact +that most spammers collect names with some sort of address harvester on volumes too +high to de-mung by hand, but individual humans reading an email +message can readily spot and remove a spamblock in the from +address. + +Note: This is not actually a very effective tactic, and may +already be passing out of use in early 1999 after about two years +of life. In both mail and news, it's essentially impossible to +keep a smart address harvester from mining out the addresses in +the message header and trace lines. Therefore the only people who +can be protected are third parties mentioned by email address in +the message - not a common enough case to interest spammers. + + +Node:spamhaus, Next:spamvertize, Previous:spamblock, Up:= S = + +spamhaus spam'hows n. + +Pejorative term for an internet service provider that permits +or even encourages spam mailings from +its systems. The plural is `spamhausen'. There is a web page +devoted to tracking +spamhausen. + +The most notorious of the spamhausen was Sanford Wallace's +Cyber Promotions Inc., shut down by a lawsuit on 16 October 1997. +The anniversary of the shutdown is celebrated on Usenet as Spam +Freedom Day, but lesser imitators of the Spamford still infest +various murky corners of the net. Since prosecution of spammers +became routine under the junk-fax laws and statues specifically +targeting spam, spamhausen have declined in relative importance; +today, hit-and-run attacks by spammers using relay rape and throwaway accounts on reputable +ISPs seem to account for most of the flow. + + +Node:spamvertize, Next:spangle, Previous:spamhaus, Up:= +S = + +spamvertize v. + +To advertise using spam. +Pejorative. + + +Node:spangle, Next:spawn, Previous:spamvertize, Up:= S = + +spangle n. + +[UK] The singular of bells and whistles. See also +spungle. + + +Node:spawn, Next:special-case, Previous:spangle, Up:= S = + +spawn n.,vi. + +1. [techspeak] In UNIX parlance, to create a child process +from within a process. Technically this is a `fork'; the term +`spawn' is a bit more general and is used for threads +(lightweight processes) as well as traditional heavyweight +processes. 2. In gaming, meant to indicate where (`spawn-point') +and when a player comes to life (or `re-spawns') after being +killed. Opposite of frag. + + +Node:special-case, Next:speedometer, Previous:spawn, Up:= S += + +special-case vt. + +To write unique code to handle input to or situations arising +in a program that are somehow distinguished from normal +processing. This would be used for processing of mode switches or +interrupt characters in an interactive interface (as opposed, +say, to text entry or normal commands), or for processing of +hidden flags in the input of +a batch program or filter. + + +Node:speedometer, Next:spell, Previous:special-case, Up:= S = + +speedometer n. + +A pattern of lights displayed on a linear set of LEDs (today) +or nixie tubes (yesterday, on ancient mainframes). The pattern is +shifted left every N times the operating system goes through its +main loop. A swiftly moving +pattern indicates that the system is mostly idle; the speedometer +slows down as the system becomes overloaded. The speedometer on +Sun Microsystems hardware bounces back and forth like the eyes on +one of the Cylons from the wretched "Battlestar Galactica" TV +series. + +Historical note: One computer, the GE 600 (later Honeywell +6000) actually had an analog speedometer on the front +panel, calibrated in instructions executed per second. + + +Node:spell, Next:spelling flame, Previous:speedometer, Up:= S = + +spell n. + +Syn. incantation. + + +Node:spelling flame, Next:spider, Previous:spell, Up:= S += + +spelling flame n. // + +[Usenet] A posting ostentatiously correcting a previous +article's spelling as a way of casting scorn on the point the +article was trying to make, instead of actually responding to +that point (compare dictionary +flame). Of course, people who are more than usually +slovenly spellers are prone to think any correction is a +spelling flame. It's an amusing comment on human nature that +spelling flames themselves often contain spelling errors. + + +Node:spider, Next:spider food, Previous:spelling flame, Up:= S = + +spider + +The Web-walking part of a search engine that collects pages +for indexing in the search engine's database. Also called a bot. The best-known spider is Scooter, the +web-walker for the Alta Vista search engine. + + +Node:spider food, Next:spiffy, Previous:spider, Up:= S += + +spider food n. + +Keywords embedded (usually invisibly) into a web page to +attract search engines (spiders). The intended result of +including spider food in one's web page is to insure that the +page appears high on the list of matching entries to a search +engine query. There are right and wrong ways to do this; the +right way is a discreet `meta keywords' tag, the wrong way is to +embed many repeats of a keyword in comments (and many search +engines now detect and ignore the latter). + + +Node:spiffy, Next:spike, Previous:spider food, Up:= S = + +spiffy /spi'fee/ adj. + +1. Said of programs having a pretty, clever, or exceptionally +well-designed interface. "Have you seen the spiffy X version of empire +yet?" 2. Said sarcastically of a program that is perceived to +have little more than a flashy interface going for it. Which +meaning should be drawn depends delicately on tone of voice and +context. This word was common mainstream slang during the 1940s, +in a sense close to 1. + + +Node:spike, Next:spin, Previous:spiffy, Up:= S += + +spike v. + +To defeat a selection mechanism by introducing a (sometimes +temporary) device that forces a specific result. The word is used +in several industries; telephone engineers refer to spiking a +relay by inserting a pin to hold the relay in either the closed +or open state, and railroaders refer to spiking a track switch so +that it cannot be moved. In programming environments it normally +refers to a temporary change, usually for testing purposes (as +opposed to a permanent change, which would be called hardwired). + + +Node:spin, Next:spl, Previous:spike, Up:= S += + +spin vi. + +Equivalent to buzz. More common +among C and Unix programmers. See the discussion of `spinlock' +under busy-wait. + + +Node:spl, Next:splash screen, Previous:spin, Up:= S += + +spl /S-P-L/ + +[abbrev, from Set Priority Level] The way traditional Unix +kernels implement mutual exclusion by running code at high +interrupt levels. Used in jargon to describe the act of tuning in +or tuning out ordinary communication. Classically, spl levels run +from 1 to 7; "Fred's at spl 6 today" would mean that he is very +hard to interrupt. "Wait till I finish this; I'll spl down then." +See also interrupts +locked out. + + +Node:splash screen, Next:splat, Previous:spl, Up:= S = + + +splash screen n. + +[Mac users] Syn. banner, sense +3. + + +Node:splat, Next:splat out, Previous:splash screen, Up:= S = + +splat n. + +1. Name used in many places (DEC, IBM, and others) for the +asterisk (*) character (ASCII 0101010). This may +derive from the `squashed-bug' appearance of the asterisk on many +early line printers. 2. [MIT] Name used by some people for the +# character (ASCII 0100011). 3. The feature key on a Mac (same as alt, sense 2). 4. obs. Name used by some +people for the Stanford/ITS extended ASCII circle-x character. +This character is also called `blobby' and `frob', among other +names; it is sometimes used by mathematicians as a notation for +`tensor product'. 5. obs. Name for the semi-mythical Stanford +extended ASCII circle-plus character. See also ASCII. + + +Node:splat out, Next:spod, Previous:splat, Up:= S += + +splat out v. + +[Usenet] To partially obscure a potentially provocative word +by substituting splat characters for +some of its letters (usually, but not always, the vowels). The +purpose is not to make the word unrecognizable but to make it a +mention rather than a use, so that no flamewar ensues. Words +often splatted out include N*z* (see Godwin's Law), *v*l*t**n (anywhere +fundamentalists might be lurking), *b*rt**n, and g*n c*ntr*l. +Compare UN*X. + + +Node:spod, Next:spoiler, Previous:splat out, Up:= S = + +spod n. + +[UK] 1. A lower form of life found on talker systems and MUDs. The spod has few friends in RL and uses talkers instead, finding communication +easier and preferable over the net. He has all the negative +traits of the computer geek +without having any interest in computers per se. Lacking any +knowledge of or interest in how networks work, and considering +his access a God-given right, he is a major irritant to +sysadmins, clogging up lines in order to reach new MUDs, +following passed-on instructions on how to sneak his way onto +Internet ("Wow! It's in America!") and complaining when he is not +allowed to use busy routes. A true spod will start any +conversation with "Are you male or female?" (and follow it up +with "Got any good numbers/IDs/passwords?") and will not talk to +someone physically present in the same terminal room until they +log onto the same machine that he is using and enter talk mode. +Compare newbie, tourist, weenie, +twink, terminal junkie, warez d00dz. 2. A backronym for "Sole Purpose, Obtain a +Degree"; according to some self-described spods, this term is +used by indifferent students to condemn their harder-working +fellows. Compare the defiant adoption of the term `geek' in the +mid-1990s by people who would previously have been stigmatized by +it (see computer geek). 3. +[obs.] An ordinary person; a random. +This is the meaning with which the term was coined, but the +inventor informs us he has himself accepted sense 1. + + +Node:spoiler, Next:spoiler space, Previous:spod, Up:= S += + +spoiler n. + +[Usenet] 1. A remark which reveals important plot elements +from books or movies, thus denying the reader (of the article) +the proper suspense when reading the book or watching the movie. +2. Any remark which telegraphs the solution of a problem or +puzzle, thus denying the reader the pleasure of working out the +correct answer (see also interesting). Either sense readily forms +compounds like `total spoiler', `quasi-spoiler' and even +`pseudo-spoiler'. + +By convention, articles which are spoilers in either sense +should contain the word `spoiler' in the Subject: line, or +guarantee via various tricks that the answer appears only after +several screens-full of warning, or conceal the sensitive +information via rot13, spoiler space or some combination of +these techniques. + + +Node:spoiler space, Next:sponge, Previous:spoiler, Up:= S = + +spoiler space + +[also `spoiler spoo'] A screenful of blank lines (and, often, +form-feeds) deliberately inserted in a message following a spoiler warning, so the actual spoiler +can't be seen without hitting a key. + + +Node:sponge, Next:spoof, Previous:spoiler space, Up:= S = + +sponge n. + +[Unix] A special case of a filter +that reads its entire input before writing any output; the +canonical example is a sort utility. Unlike most filters, a +sponge can conveniently overwrite the input file with the output +data stream. If a file system has versioning (as ITS did and VMS +does now) the sponge/filter distinction loses its usefulness, +because directing filter output would just write a new version. +See also slurp. + + +Node:spoof, Next:spool, Previous:sponge, Up:= S += + +spoof vi. + +To capture, alter, and retransmit a communication stream in a +way that misleads the recipient. As used by hackers, refers +especially to altering TCP/IP packet source addresses or other +packet-header data in order to masquerade as a trusted machine. +This term has become very widespread and is borderline +techspeak. + + +Node:spool, Next:spool file, Previous:spoof, Up:= S += + +spool vi. + +[from early IBM `Simultaneous Peripheral Operation On-Line', +but is widely thought to be a backronym] To send files to some device or +program (a `spooler') that queues them up and does something +useful with them later. Without qualification, the spooler is the +`print spooler' controlling output of jobs to a printer; but the +term has been used in connection with other peripherals +(especially plotters and graphics devices) and occasionally even +for input devices. See also demon. + + +Node:spool file, Next:spungle, Previous:spool, Up:= S += + +spool file n. + +Any file to which data is spooled +to await the next stage of processing. Especially used in +circumstances where spooling the data copes with a mismatch +between speeds in two devices or pieces of software. For example, +when you send mail under Unix, it's typically copied to a spool +file to await a transport demon's +attentions. This is borderline techspeak. + + +Node:spungle, Next:square tape, Previous:spool file, Up:= S = + +spungle n. + +[Durham, UK; portmanteau, spangle + bungle] A spangle of no actual usefulness. Example: +Roger the Bent Paperclip in Microsoft Word '98. A spungle's only +virtue is that it looks pretty, unless you find creeping +featurism ugly. + + +Node:square tape, Next:squirrelcide, Previous:spungle, Up:= S = + +square tape n. + +Mainframe magnetic tape cartridges for use with IBM 3480 or +compatible tape drives; or QIC tapes used on workstations and +micros. The term comes from the square (actually rectangular) +shape of the cartridges; contrast round tape. + + +Node:squirrelcide, Next:stack, Previous:square tape, Up:= S = + +squirrelcide n. + +[common on Usenet's _comp.risks_ newsgroup.] (alt. +`squirrelicide') What all too frequently happens when a squirrel +decides to exercise its species's unfortunate penchant for +shorting out power lines with their little furry bodies. Result: +one dead squirrel, one down computer installation. In this +situation, the computer system is said to have been +squirrelcided. + + +Node:stack, Next:stack puke, Previous:squirrelcide, Up:= S = + +stack n. + +The set of things a person has to do in the future. One speaks +of the next project to be attacked as having risen to the top of +the stack. "I'm afraid I've got real work to do, so this'll have +to be pushed way down on my stack." "I haven't done it yet +because every time I pop my stack something new gets pushed." If +you are interrupted several times in the middle of a +conversation, "My stack overflowed" means "I forget what we were +talking about." The implication is that more items were pushed +onto the stack than could be remembered, so the least recent +items were lost. The usual physical example of a stack is to be +found in a cafeteria: a pile of plates or trays sitting on a +spring in a well, so that when you put one on the top they all +sink down, and when you take one off the top the rest spring up a +bit. See also push and pop. + +At MIT, PDL used to be a more common +synonym for stack in all these +contexts, and this may still be true. Everywhere else stack seems to be the preferred term. Knuth ("The Art of Computer Programming", +second edition, vol. 1, p. 236) says: + +Many people who realized the importance of stacks and +queues independently have given other names to these structures: +stacks have been called push-down lists, reversion storages, +cellars, nesting stores, piles, last-in-first-out ("LIFO") lists, +and even yo-yo lists! + +Node:stack puke, Next:stale pointer bug, Previous:stack, Up:= S = + +stack puke n. + +Some processor architectures are said to `puke their guts onto +the stack' to save their internal state during exception +processing. The Motorola 68020, for example, regurgitates up to +92 bytes on a bus fault. On a pipelined machine, this can take a +while. + + +Node:stale pointer bug, +Next:star out, Previous:stack puke, Up:= S = + +stale pointer bug n. + +Synonym for aliasing bug +used esp. among microcomputer hackers. + + +Node:star out, Next:state, Previous:stale pointer bug, Up:= S = + +star out v. + +[University of York, England] To replace a user's encrypted +password in /etc/passwd with a single asterisk. Under Unix this +is not a legal encryption of any password; hence the user is not +permitted to log in. In general, accounts like adm, news, and +daemon are permanently "starred out"; occasionally a real user +might have the this inflicted upon him/her as a punishment, e.g. +"Graham was starred out for playing Omega in working hours". Also +occasionally known as The Order Of The Gold Star in this context. +"Don't do that, or you'll be awarded the Order of the Gold +Star..." Compare disusered. + + +Node:state, Next:stealth manager, Previous:star out, Up:= S = + +state n. + +1. Condition, situation. "What's the state of your latest +hack?" "It's winning away." "The system tried to read and write +the disk simultaneously and got into a totally wedged state." The standard question "What's +your state?" means "What are you doing?" or "What are you about +to do?" Typical answers are "about to gronk out", or "hungry". +Another standard question is "What's the state of the world?", +meaning "What's new?" or "What's going on?". The more terse and +humorous way of asking these questions would be "State-p?". +Another way of phrasing the first question under sense 1 would be +"state-p latest hack?". 2. Information being maintained in +non-permanent memory (electronic or human). + + +Node:stealth manager, Next:steam-powered, Previous:state, Up:= S = + +stealth manager n. + +[Corporate DP] A manager that appears out of nowhere, promises +undeliverable software to unknown end users, and vanishes before +the programming staff realizes what has happened. See smoke and mirrors. + + +Node:steam-powered, Next:STFW, Previous:stealth manager, Up:= S = + +steam-powered adj. + +Old-fashioned or underpowered; archaic. This term does not +have a strong negative loading and may even be used +semi-affectionately for something that clanks and wheezes a lot +but hangs in there doing the job. + + +Node:STFW, Next:stiffy, Previous:steam-powered, Up:= S = + +STFW imp. /S-T-F-W/ + +[Usenet] Commmon abbreviation for "Search The Fucking Web", a +suggestion that what you're asking for is a query better handled +by a search engine than a human being. Usage is common and +exactly parallel to both senses of RTFM. + + +Node:stiffy, Next:stir-fried random, Previous:STFW, Up:= S = + +stiffy n. + +3.5-inch microfloppies, so +called because their jackets are more rigid than those of the +5.25-inch and the (now totally obsolete) 8-inch floppy. Elsewhere +this might be called a `firmy'. For some odd reason, several +sources have taken the trouble to inform us that this term is +widespread in South Africa. + + +Node:stir-fried random, Next:stomp on, Previous:stiffy, Up:= S = + +stir-fried random n. + +(alt. `stir-fried mumble') Term used for the best dish of many +of those hackers who can cook. Consists of random fresh veggies +and meat wokked with random spices. Tasty and economical. See +random, great-wall, ravs, laser +chicken, oriental +food; see also mumble. + + +Node:stomp on, Next:Stone Age, Previous:stir-fried random, Up:= S = + +stomp on vt. + +To inadvertently overwrite something important, usually +automatically. "All the work I did this weekend got stomped on +last night by the nightly server script." Compare scribble, mangle, trash, +scrog, roach. + + +Node:Stone Age, Next:stone knives and +bearskins, Previous:stomp on, Up:= S = + +Stone Age n.,adj. + +1. In computer folklore, an ill-defined period from ENIAC (ca. +1943) to the mid-1950s; the great age of electromechanical dinosaurs. Sometimes used for the entire +period up to 1960-61 (see Iron +Age); however, it is funnier and more descriptive to +characterize the latter period in terms of a `Bronze Age' era of +transistor-logic, pre-ferrite-core +machines with drum or CRT mass storage (as opposed to just +mercury delay lines and/or relays). See also Iron Age. 2. More generally, a pejorative +for any crufty, ancient piece of hardware or software technology. +Note that this is used even by people who were there for the +Stone Age (sense 1). + + +Node:stone knives and +bearskins, Next:stoppage, +Previous:Stone Age, +Up:= S = + +stone knives and bearskins n. + +[from the Star Trek Classic episode "The City on the Edge of +Forever"] A term traditionally used to describe (and deprecate) +computing environments that are grotesquely primitive in light of +what is known about good ways to design things. As in "Don't get +too used to the facilities here. Once you leave SAIL it's stone +knives and bearskins as far as the eye can see". Compare steam-powered. + + +Node:stoppage, Next:store, Previous:stone knives and +bearskins, Up:= S = + + +stoppage /sto'p*j/ n. + +Extreme lossage that renders +something (usually something vital) completely unusable. "The +recent system stoppage was caused by a fried transformer." + + +Node:store, Next:strided, Previous:stoppage, Up:= +S = + +store n. + +[prob. from techspeak `main store'] In some varieties of +Commonwealth hackish, the preferred synonym for core. Thus, `bringing a program into store' means +not that one is returning shrink-wrapped software but that a +program is being swapped in. + + +Node:strided, Next:stroke, Previous:store, Up:= S += + +strided /stri:'d*d/ adj. + +[scientific computing] Said of a sequence of memory reads and +writes to addresses, each of which is separated from the last by +a constant interval called the `stride length'. These can be a +worst-case access pattern for the standard memory-caching schemes +when the stride length is a multiple of the cache line size. +Strided references are often generated by loops through an array, +and (if your data is large enough that access-time is +significant) it can be worthwhile to tune for better locality by +inverting double loops or by partially unrolling the outer loop +of a loop nest. This usage is borderline techspeak; the related +term `memory stride' is definitely techspeak. + + +Node:stroke, Next:strudel, Previous:strided, Up:= S += + +stroke n. + +Common name for the slant (`/', ASCII 0101111) character. See +ASCII for other synonyms. + + +Node:strudel, Next:stubroutine, Previous:stroke, Up:= S += + +strudel n. + +Common (spoken) name for the at-sign (`@', ASCII 1000000) +character. See ASCII for other +synonyms. + + +Node:stubroutine, Next:studly, Previous:strudel, Up:= S += + +stubroutine /stuhb'roo-teen/ n. + +[contraction of `stub subroutine'] Tiny, often vacuous +placeholder for a subroutine that is to be written or fleshed out +later. + + +Node:studly, Next:studlycaps, Previous:stubroutine, Up:= S = + +studly adj. + +Impressive; powerful. Said of code and designs which exhibit +both complexity and a virtuoso flair. Has connotations similar to +hairy but is more positive in tone. +Often in the emphatic `most studly' or as noun-form `studliness'. +"Smail 3.0's configuration parser is most studly." + + +Node:studlycaps, Next:stunning, Previous:studly, Up:= S += + +studlycaps /stuhd'lee-kaps/ n. + +A hackish form of silliness similar to BiCapitalization for trademarks, but +applied randomly and to arbitrary text rather than to trademarks. +ThE oRigiN and SigNificaNce of thIs pRacTicE iS oBscuRe. + + +Node:stunning, Next:stupid-sort, Previous:studlycaps, Up:= S = + +stunning adj. + +Mind-bogglingly stupid. Usually used in sarcasm. "You want to +code what in ADA? That's a ... stunning +idea!" + + +Node:stupid-sort, Next:Stupids, Previous:stunning, Up:= +S = + +stupid-sort n. + +Syn. bogo-sort. + + +Node:Stupids, Next:Sturgeon's Law, Previous:stupid-sort, Up:= S = + +Stupids n. + +Term used by samurai for the +suits who employ them; succinctly +expresses an attitude at least as common, though usually better +disguised, among other subcultures of hackers. There may be +intended reference here to an SF story originally published in +1952 but much anthologized since, Mark Clifton's "Star, Bright". +In it, a super-genius child classifies humans into a very few +`Brights' like herself, a huge majority of `Stupids', and a +minority of `Tweens', the merely ordinary geniuses. + + +Node:Sturgeon's Law, Next:sucking mud, Previous:Stupids, Up:= S = + +Sturgeon's Law prov. + +"Ninety percent of everything is crap". Derived from a quote +by science fiction author Theodore Sturgeon, who once said, +"Sure, 90% of science fiction is crud. That's because 90% of +everything is crud." Oddly, when Sturgeon's Law is cited, the +final word is almost invariably changed to `crap'. Compare Hanlon's Razor, Ninety-Ninety Rule. Though this +maxim originated in SF fandom, most hackers recognize it and are +all too aware of its truth. + + +Node:sucking mud, Next:sufficiently small, Previous:Sturgeon's Law, Up:= S = + +sucking mud adj. + +[Applied Data Research] (also `pumping mud') Crashed or wedged. Usually said of a machine that +provides some service to a network, such as a file server. This +Dallas regionalism derives from the East Texas oilfield lament, +"Shut 'er down, Ma, she's a-suckin' mud". Often used as a query. +"We are going to reconfigure the network, are you ready to suck +mud?" + + +Node:sufficiently small, +Next:suit, Previous:sucking mud, Up:= S = + +sufficiently small adj. + +Syn. suitably +small. + + +Node:suit, Next:suitable win, Previous:sufficiently small, Up:= S = + +suit n. + +1. Ugly and uncomfortable `business clothing' often worn by +non-hackers. Invariably worn with a `tie', a strangulation device +that partially cuts off the blood supply to the brain. It is +thought that this explains much about the behavior of +suit-wearers. Compare droid. 2. A +person who habitually wears suits, as distinct from a techie or +hacker. See pointy-haired, +burble, management, Stupids, SNAFU +principle, PHB, and brain-damaged. + + +Node:suitable win, Next:suitably small, Previous:suit, Up:= S = + +suitable win n. + +See win. + + +Node:suitably small, Next:Sun, Previous:suitable win, Up:= S = + +suitably small adj. + +[perverted from mathematical jargon] + +An expression used ironically to characterize unquantifiable +behavior that differs from expected or required behavior. For +example, suppose a newly created program came up with a correct +full-screen display, and one publicly exclaimed: "It works!" +Then, if the program dumped core on the first mouse click, one +might add: "Well, for suitably small values of `works'." Compare +the characterization of pi under random numbers. + + +Node:Sun, Next:sun lounge, Previous:suitably small, Up:= S = + +Sun n. + +Sun Microsystems. Hackers remember that the name was +originally an acronym, Stanford University Network. Sun started +out around 1980 with some hardware hackers (mainly) from Stanford +talking to some software hackers (mainly) from UC Berkeley; Sun's +original technology concept married a clever board design based +on the Motorola 68000 to BSD Unix. Sun +went on to lead the worstation industry through the 1980s, and +for years afterwards remained an engineering-driven company and a +good place for hackers to work. Though Sun drifted away from its +techie origins after 1990 and has since made some strategic moves +that disappointed and annoyed many hackers (especially by +maintaining proprietary control of Java and rejecting Linux), +it's still considered within the family in much the same way +DEC was in the 1970s and early +1980s. + + +Node:sun lounge, Next:sun-stools, Previous:Sun, Up:= S += + +sun lounge n. + +[UK] The room where all the Sun workstations live. The humor +in this term comes from the fact that it's also in mainstream use +to describe a solarium, and all those Sun workstations clustered +together give off an amazing amount of heat. + + +Node:sun-stools, Next:sunspots, Previous:sun lounge, Up:= S = + +sun-stools n. + +Unflattering hackerism for SunTools, a pre-X windowing +environment notorious in its day for size, slowness, and +misfeatures. X, however, is larger and +(some claim) slower; see second-system effect. + + +Node:sunspots, Next:super source quench, Previous:sun-stools, Up:= S = + +sunspots n. + +1. Notional cause of an odd error. "Why did the program +suddenly turn the screen blue?" "Sunspots, I guess." 2. Also the +cause of bit rot -- from the myth +that sunspots will increase cosmic +rays, which can flip single bits in memory. See also +phase of the +moon. + + +Node:super source quench, +Next:superloser, Previous:sunspots, Up:= S = + +super source quench n. + +A special packet designed to shut up an Internet host. The +Internet Protocol (IP) has a control message called Source Quench +that asks a host to transmit more slowly on a particular +connection to avoid congestion. It also has a Redirect control +message intended to instruct a host to send certain packets to a +different local router. A "super source quench" is actually a +redirect control packet, forged to look like it came from a local +router, that instructs a host to send all packets to its own +local loopback address. This will effectively tie many Internet +hosts up in knots. Compare Godzillagram, breath-of-life packet. + + +Node:superloser, Next:superprogrammer, Previous:super source +quench, Up:= S = + +superloser n. + +[Unix] A superuser with no clue - someone with root privileges +on a Unix system and no idea what he/she is doing, the moral +equivalent of a three-year-old with an unsafetied Uzi. Anyone who +thinks this is an uncommon situation reckons without the +territorial urges of management. + + +Node:superprogrammer, Next:superuser, Previous:superloser, Up:= S = + +superprogrammer n. + +A prolific programmer; one who can code exceedingly well and +quickly. Not all hackers are superprogrammers, but many are. +(Productivity can vary from one programmer to another by three +orders of magnitude. For example, one programmer might be able to +write an average of 3 lines of working code in one day, while +another, with the proper tools, might be able to write 3,000. +This range is astonishing; it is matched in very few other areas +of human endeavor.) The term `superprogrammer' is more commonly +used within such places as IBM than in the hacker community. It +tends to stress naive measures of productivity and to underweight +creativity, ingenuity, and getting the job done -- and +to sidestep the question of whether the 3,000 lines of code do +more or less useful work than three lines that do the Right Thing. Hackers tend to prefer the +terms hacker and wizard. + + +Node:superuser, Next:support, Previous:superprogrammer, Up:= S = + +superuser n. + +[Unix] Syn. root, avatar. This usage has spread to non-Unix +environments; the superuser is any account with all wheel bits on. A more specific term than wheel. + + +Node:support, Next:surf, Previous:superuser, Up:= S = + +support n. + +After-sale handholding; something many software vendors +promise but few deliver. To hackers, most support people are +useless -- because by the time a hacker calls support he or she +will usually know the software and the relevant manuals better +than the support people (sadly, this is not a joke or +exaggeration). A hacker's idea of `support' is a +tête-à-tête with the software's designer. + + +Node:surf, Next:Suzie COBOL, Previous:support, Up:= S = + +surf v. + +[from the `surf' idiom for rapidly flipping TV channels] To +traverse the Internet in search of interesting stuff, used esp. +if one is doing so with a World Wide Web browser. It is also +common to speak of `surfing in' to a particular resource. + +Hackers adopted this term early, but many have stopped using +it since it went completely mainstream around 1995. The passive, +couch-potato connotations that go with TV channel surfing were +never pleasant, and hearing non-hackers wax enthusiastic about +"surfing the net" tends to make hackers feel a bit as though +their home is being overrun by ignorami. + + +Node:Suzie COBOL, Next:swab, Previous:surf, Up:= S = + + +Suzie COBOL /soo'zee koh'bol/ + +1. [IBM: prob. from Frank Zappa's `Suzy Creamcheese'] n. A +coder straight out of training school who knows everything except +the value of comments in plain English. Also (fashionable among +personkind wishing to avoid accusations of sexism) `Sammy Cobol' +or (in some non-IBM circles) `Cobol Charlie'. 2. [proposed] +Meta-name for any code +grinder, analogous to J. Random Hacker. + + +Node:swab, Next:swap, Previous:Suzie COBOL, Up:= S = + +swab /swob/ + +[From the mnemonic for the PDP-11 `SWAp Byte' instruction, as +immortalized in the dd(1) option +conv=swab (see dd)] 1. vt. +To solve the NUXI problem by +swapping bytes in a file. 2. n. The program in V7 Unix used to +perform this action, or anything functionally equivalent to it. +See also big-endian, little-endian, middle-endian, bytesexual. + + +Node:swap, Next:swap space, Previous:swab, Up:= S = + + +swap vt. + +1. [techspeak] To move information from a fast-access memory +to a slow-access memory (`swap out'), or vice versa (`swap in'). +Often refers specifically to the use of disks as `virtual +memory'. As pieces of data or program are needed, they are +swapped into core for processing; when +they are no longer needed they may be swapped out again. 2. The +jargon use of these terms analogizes people's short-term memories +with core. Cramming for an exam might be spoken of as swapping +in. If you temporarily forget someone's name, but then remember +it, your excuse is that it was swapped out. To `keep something +swapped in' means to keep it fresh in your memory: "I reread the +TECO manual every few months to keep it swapped in." If someone +interrupts you just as you got a good idea, you might say "Wait a +moment while I swap this out", implying that a piece of paper is +your extra-somatic memory and that if you don't swap the idea out +by writing it down it will get overwritten and lost as you talk. +Compare page in, page out. + + +Node:swap space, Next:swapped in, Previous:swap, Up:= S += + +swap space n. + +Storage space, especially temporary storage space used during +a move or reconfiguration. "I'm just using that corner of the +machine room for swap space." + + +Node:swapped in, Next:swapped out, Previous:swap space, Up:= S = + +swapped in n. + +See swap. See also page in. + + +Node:swapped out, Next:swizzle, Previous:swapped in, Up:= S = + +swapped out n. + +See swap. See also page out. + + +Node:swizzle, Next:sync, Previous:swapped out, Up:= S = + +swizzle v. + +To convert external names, array indices, or references within +a data structure into address pointers when the data structure is +brought into main memory from external storage (also called +`pointer swizzling'); this may be done for speed in chasing +references or to simplify code (e.g., by turning lots of name +lookups into pointer dereferences). The converse operation is +sometimes termed `unswizzling'. See also snap. + + +Node:sync, Next:syntactic salt, Previous:swizzle, Up:= S = + +sync /sink/ n., vi. + +(var. `synch') 1. To synchronize, to bring into +synchronization. 2. [techspeak] To force all pending I/O to the +disk; see flush, sense 2. 3. More +generally, to force a number of competing processes or agents to +a state that would be `safe' if the system were to crash; thus, +to checkpoint (in the database-theory sense). + + +Node:syntactic salt, Next:syntactic sugar, Previous:sync, Up:= S = + +syntactic salt n. + +The opposite of syntactic +sugar, a feature designed to make it harder to write bad +code. Specifically, syntactic salt is a hoop the programmer must +jump through just to prove that he knows what's going on, rather +than to express a program action. Some programmers consider +required type declarations to be syntactic salt. A requirement to +write end if, end while, end +do, etc. to terminate the last block controlled by a +control construct (as opposed to just end) would +definitely be syntactic salt. Syntactic salt is like the real +thing in that it tends to raise hackers' blood pressures in an +unhealthy way. Compare candygrammar. + + +Node:syntactic sugar, Next:sys-frog, Previous:syntactic salt, Up:= S = + +syntactic sugar n. + +[coined by Peter Landin] Features added to a language or other +formalism to make it `sweeter' for humans, features which do not +affect the expressiveness of the formalism (compare chrome). Used esp. when there is an obvious and +trivial translation of the `sugar' feature into other constructs +already present in the notation. C's a[i] notation +is syntactic sugar for *(a + i). "Syntactic sugar +causes cancer of the semicolon." -- Alan Perlis. + +The variants `syntactic saccharin' and `syntactic syrup' are +also recorded. These denote something even more gratuitous, in +that syntactic sugar serves a purpose (making something more +acceptable to humans), but syntactic saccharin or syrup serve no +purpose at all. Compare candygrammar, syntactic salt. + + +Node:sys-frog, Next:sysadmin, Previous:syntactic sugar, Up:= S = + +sys-frog /sis'frog/ n. + +[the PLATO system] Playful variant of `sysprog', which is in +turn short for `systems programmer'. + + +Node:sysadmin, Next:sysape, Previous:sys-frog, Up:= +S = + +sysadmin /sis'ad-min/ n. + +Common contraction of `system admin'; see admin. + + +Node:sysape, Next:sysop, Previous:sysadmin, Up:= +S = + +sysape /sys'ayp/ n. + +A rather derogatory term for a computer operator; a play on +sysop common at sites that use the +banana hierarchy of problem complexity (see one-banana problem). + + +Node:sysop, Next:system, Previous:sysape, Up:= S += + +sysop /sis'op/ n. + +[esp. in the BBS world] The operator (and usually the owner) +of a bulletin-board system. A common neophyte mistake on FidoNet is to address a message to +`sysop' in an international echo, thus +sending it to hundreds of sysops around the world. + + +Node:system, Next:systems jock, Previous:sysop, Up:= S += + +system n. + +1. The supervisor program or OS on a computer. 2. The entire +computer system, including input/output devices, the supervisor +program or OS, and possibly other software. 3. Any large-scale +program. 4. Any method or algorithm. 5. `System hacker': one who +hacks the system (in senses 1 and 2 only; for sense 3 one +mentions the particular program: e.g., `LISP hacker') + + +Node:systems jock, Next:system mangler, Previous:system, Up:= S = + +systems jock n. + +See jock, sense 2. + + +Node:system mangler, Next:SysVile, Previous:systems jock, Up:= S = + +system mangler n. + +Humorous synonym for `system manager', poss. from the fact +that one major IBM OS had a root +account called SYSMANGR. Refers specifically to a systems +programmer in charge of administration, software maintenance, and +updates at some site. Unlike admin, +this term emphasizes the technical end of the skills +involved. + + +Node:SysVile, Next:T, Previous:system mangler, Up:= S = + +SysVile /sis-vi:l'/ n. + +See Missed'em-five. + + +Node:= T =, Next:= U =, Previous:= S =, Up:The Jargon Lexicon + += T = + + +T: + + +tail recursion: + + +talk mode: + + +talker system: + + +tall card: + + +tanked: + + +TANSTAAFL: + + +tape monkey: + + +tar and feather: + + +tarball: + + +tardegy: + + +taste: + + +tayste: + + +TCB: + + +TCP/IP: + + +TechRef: + + +TECO: + + +tee: + + +teergrube: + + +teledildonics: + + +Telerat: + + +TELNET: + + +ten-finger +interface: + + +tense: + + +tentacle: + + +tenured graduate +student: + + +tera-: + + +teraflop club: + + +terminak: + + +terminal brain +death: + + +terminal illness: + + +terminal junkie: + + +terpri: + + +test: + + +TeX: + + +text: + + +thanks in advance: + + +That's not a +bug that's a feature!: + + +the literature: + + +the network: + + +the +X that can be Y is not the true X: + + +theology: + + +theory: + + +thinko: + + +This can't happen: + + +This time for +sure!: + + +thrash: + + +thread: + + +three-finger +salute: + + +throwaway account: + + +thud: + + +thumb: + + +thundering herd +problem: + + +thunk: + + +tick: + + +tick-list features: + + +tickle a bug: + + +tiger team: + + +time bomb: + + +time sink: + + +time T: + + +times-or-divided-by: + + +TINC: + + +Tinkerbell program: + + +TINLC: + + +tip of the +ice-cube: + + +tired iron: + + +tits on a +keyboard: + + +TLA: + + +(TM): + + +TMRC: + + +TMRCie: + + +TMTOWTDI: + + +to a first +approximation: + + +to a zeroth +approximation: + + +toad: + + +toast: + + +toaster: + + +toeprint: + + +toggle: + + +tool: + + +toolsmith: + + +toor: + + +topic drift: + + +topic group: + + +TOPS-10: + + +TOPS-20: + + +tourist: + + +tourist +information: + + +touristic: + + +toy: + + +toy language: + + +toy problem: + + +toy program: + + +trampoline: + + +trap: + + +trap door: + + +trash: + + +trawl: + + +tree-killer: + + +treeware: + + +trit: + + +trivial: + + +troff: + + +troglodyte: + + +troglodyte mode: + + +Trojan horse: + + +troll: + + +Troll-O-Meter: + + +tron: + + +true-hacker: + + +tty: + + +tube: + + +tube time: + + +tunafish: + + +tune: + + +turbo nerd: + + +Turing tar-pit: + + +turist: + + +Tux: + + +tweak: + + +tweeter: + + +TWENEX: + + +twiddle: + + +twiddle: + + +twilight zone: + + +twink: + + +twirling baton: + + +two pi: + + +two-to-the-N: + + +twonkie: + + +Node:T, Next:tail recursion, Previous:SysVile, Up:= T = + +T /T/ + +1. [from LISP terminology for `true'] Yes. Used in reply to a +question (particularly one asked using The -P convention). In LISP, the +constant T means `true', among other things. Some Lisp hackers +use `T' and `NIL' instead of `Yes' and `No' almost reflexively. +This sometimes causes misunderstandings. When a waiter or flight +attendant asks whether a hacker wants coffee, he may absently +respond `T', meaning that he wants coffee; but of course he will +be brought a cup of tea instead. Fortunately, most hackers +(particularly those who frequent Chinese restaurants) like tea at +least as well as coffee -- so it is not that big a problem. 2. +See time T (also since time T +equals minus infinity). 3. [techspeak] In +transaction-processing circles, an abbreviation for the noun +`transaction'. 4. [Purdue] Alternate spelling of tee. 5. A dialect of LISP developed at Yale. (There is an intended +allusion to NIL, "New Implementation of Lisp", another dialect of +Lisp developed for the VAX) + + +Node:tail recursion, Next:talk mode, Previous:T, Up:= T = + +tail recursion n. + +If you aren't sick of it already, see tail recursion. + + +Node:talk mode, Next:talker system, Previous:tail recursion, Up:= T = + +talk mode n. + +A feature supported by Unix, ITS, and some other OSes that +allows two or more logged-in users to set up a real-time on-line +conversation. It combines the immediacy of talking with all the +precision (and verbosity) that written language entails. It is +difficult to communicate inflection, though conventions have +arisen for some of these (see the section on writing style in the +Prependices for details). + +Talk mode has a special set of jargon words, used to save +typing, which are not used orally. Some of these are identical to +(and probably derived from) Morse-code jargon used by ham-radio +amateurs since the 1920s. + + +AFAIAC + + +as far as I am concerned + + +AFAIK + + +as far as I know + + +BCNU + + +be seeing you + + +BTW + + +by the way + + +BYE? + + +are you ready to unlink? (this is the standard way to end a +talk-mode conversation; the other person types BYE +to confirm, or else continues the conversation) + + +CUL + + +see you later + + +ENQ? + + +are you busy? (expects ACK or NAK +in return) + + +FOO? + + +are you there? (often used on unexpected links, meaning also +"Sorry if I butted in ..." (linker) or "What's +up?" (linkee)) + +FWIW + + +for what it's worth + + +FYI + + +for your information + + +FYA + + +for your amusement + + +GA + + +go ahead (used when two people have tried to type +simultaneously; this cedes the right to type to the other) + + +GRMBL + + +grumble (expresses disquiet or disagreement) + + +HELLOP + + +hello? (an instance of the `-P' convention) + + +IIRC + + +if I recall correctly + + +JAM + + +just a minute (equivalent to SEC....) + + +MIN + + +same as JAM + + +NIL + + +no (see NIL) + + +NP + + +no problem + + +O + + +over to you + + +OO + + +over and out + + +/ + + +another form of "over to you" (from x/y as "x over y") + + +\ + + +lambda (used in discussing LISPy things) + + +OBTW + + +oh, by the way + + +OTOH + + +on the other hand + + +R U THERE? + + +are you there? + + +SEC + + +wait a second (sometimes written SEC...) + + +SYN + + +Are you busy? (expects ACK, SYN|ACK, or RST in return; this +is modeled on the TCP/IP handshake sequence) + + +T + + +yes (see the main entry for T) + + +TNX + + +thanks + + +TNX 1.0E6 + + +thanks a million (humorous) + + +TNXE6 + + +another form of "thanks a million" + + +WRT + + +with regard to, or with respect to. + + +WTF + + +the universal interrogative particle; WTF knows what it +means? + + +WTH + + +what the hell? + + +<double newline> + + +When the typing party has finished, he/she types two newlines +to signal that he/she is done; this leaves a blank line between +`speeches' in the conversation, making it easier to reread the +preceding text. + + +<name>: + + +When three or more terminals are linked, it is conventional +for each typist to prepend his/her +login name or handle and a colon (or a hyphen) to each line to +indicate who is typing (some conferencing facilities do this +automatically). The login name is often shortened to a unique +prefix (possibly a single letter) during a very long +conversation. + + +/\/\/\ + + +A giggle or chuckle. On a MUD, this usually means `earthquake +fault'. + +Most of the above sub-jargon is used at both Stanford and MIT. +Several of these expressions are also common in email, esp. FYI, FYA, BTW, BCNU, WTF, and CUL. A +few other abbreviations have been reported from commercial +networks, such as GEnie and CompuServe, where on-line `live' chat +including more than two people is common and usually involves a +more `social' context, notably the following: + + +<g> + + +grin + + +<gd&r> + + +grinning, ducking, and running + + +BBL + + +be back later + + +BRB + + +be right back + + +HHOJ + + +ha ha only joking + + +HHOK + + +ha ha only kidding + + +HHOS + + +ha ha only +serious + + +IMHO + + +in my humble opinion (see IMHO) + + +LOL + + +laughing out loud + + +NHOH + + +Never Heard of Him/Her (often used in initgame) + + +ROTF + + +rolling on the floor + + +ROTFL + + +rolling on the floor laughing + + +AFK + + +away from keyboard + + +b4 + + +before + + +CU l8tr + + +see you later + + +MORF + + +male or female? + + +TTFN + + +ta-ta for now + + +TTYL + + +talk to you later + + +OIC + + +oh, I see + + +rehi + + +hello again + +Most of these are not used at universities or in the Unix +world, though ROTF and TTFN have gained some currency there and +IMHO is common; conversely, most of the people who know these are +unfamiliar with FOO?, BCNU, HELLOP, NIL, and T. + +The MUD community uses a mixture of +Usenet/Internet emoticons, a few of the more natural of the +old-style talk-mode abbrevs, and some of the `social' list above; +specifically, MUD respondents report use of BBL, BRB, LOL, b4, +BTW, WTF, TTFN, and WTH. The use of `rehi' is also common; in +fact, mudders are fond of re- compounds and will frequently +`rehug' or `rebonk' (see bonk/oif) people. The word `re' by itself +is taken as `regreet'. In general, though, MUDders express a +preference for typing things out in full rather than using +abbreviations; this may be due to the relative youth of the MUD +cultures, which tend to include many touch typists and to assume +high-speed links. The following uses specific to MUDs are +reported: + + +CU l8er + + +see you later (mutant of CU l8tr) + + +FOAD + + +fuck off and die (use of this is generally OTT) + + +OTT + + +over the top (excessive, uncalled for) + + +ppl + + +abbrev for "people" + + +THX + + +thanks (mutant of TNX; clearly this comes in +batches of 1138 (the Lucasian K)). + + +UOK? + + +are you OK? + +Some B1FFisms (notably the variant +spelling d00d) appear to be passing into wider use +among some subgroups of MUDders. + +One final note on talk mode style: neophytes, when in talk +mode, often seem to think they must produce letter-perfect prose +because they are typing rather than speaking. This is not the +best approach. It can be very frustrating to wait while your +partner pauses to think of a word, or repeatedly makes the same +spelling error and backs up to fix it. It is usually best just to +leave typographical errors behind and plunge forward, unless +severe confusion may result; in that case it is often fastest +just to type "xxx" and start over from before the mistake. + +See also hakspek, emoticon. + + +Node:talker system, Next:tall card, Previous:talk mode, Up:= T = + +talker system n. + +British hackerism for software that enables real-time chat or +talk mode. + + +Node:tall card, Next:tanked, Previous:talker system, Up:= T = + +tall card n. + +A PC/AT-size expansion card (these can be larger than IBM PC +or XT cards because the AT case is bigger). See also short card. When IBM introduced the PS/2 +model 30 (its last gasp at supporting the ISA) they made the case +lower and many industry-standard tall cards wouldn't fit; this +was felt to be a reincarnation of the connector conspiracy, done with +less style. + + +Node:tanked, Next:TANSTAAFL, Previous:tall card, Up:= T = + +tanked adj. + +Same as down, used primarily by +Unix hackers. See also hosed. +Popularized as a synonym for `drunk' by Steve Dallas in the late +lamented "Bloom County" comic strip. + + +Node:TANSTAAFL, Next:tape monkey, Previous:tanked, Up:= +T = + +TANSTAAFL /tan'stah-fl/ + +[acronym, from Robert Heinlein's classic "The Moon is a Harsh +Mistress".] "There Ain't No Such Thing As A Free Lunch", often +invoked when someone is balking at the prospect of using an +unpleasantly heavyweight +technique, or at the poor quality of some piece of software, or +at the signal-to-noise +ratio of unmoderated Usenet newsgroups. "What? Don't tell +me I have to implement a database back end to get my address book +program to work!" "Well, TANSTAAFL you know." This phrase owes +some of its popularity to the high concentration of +science-fiction fans and political libertarians in hackerdom (see +Appendix B for +discussion). + + +Node:tape monkey, Next:tar and feather, Previous:TANSTAAFL, Up:= T = + +tape monkey n. + +A junior system administrator, one who might plausibly be +assigned to do physical swapping of tapes and subsequent storage. +When a backup needs to be restored, one might holler "Tape +monkey!" (Compare one-banana +problem) Also used to dismiss jobs not worthy of a highly +trained sysadmin's ineffable talents: "Cable up her PC? You must +be joking - I'm no tape monkey." + + +Node:tar and feather, Next:tarball, Previous:tape monkey, Up:= T = + +tar and feather vi. + +[from Unix tar(1)] To create a transportable +archive from a group of files by first sticking them together +with tar(1) (the Tape ARchiver) and then compressing +the result (see compress). The +latter action is dubbed `feathering' partly for euphony and (if +only for contrived effect) by analogy to what you do with an +airplane propeller to decrease wind resistance, or with an oar to +reduce water resistance; smaller files, after all, slip through +comm links more easily. Compare the more common tarball. + + +Node:tarball, Next:tardegy, Previous:tar and feather, Up:= T = + +tarball n. + +[very common; prob. based on the "tar baby" in the Uncle Remus +folk tales] An archive, created with the Unix tar(1) utility, +containing myriad related files. "Here, I'll just ftp you a +tarball of the whole project." Tarballs have been the standard +way to ship around source-code distributions since the mid-1980s; +in retrospect it seems odd that this term did not enter common +usage until the late 1990s. + + +Node:tardegy, Next:taste, Previous:tarball, Up:= T += + +tardegy + +n. [deliberate mangling of `tragedy'] An incident in which +someone who clearly deserves to be selected out of the gene pool +on grounds of extreme stupidity meets with a messy end. Coined on +the Darwin list, which is dedicated to chronicling such +incidents; but almost all hackers would instantly recognize the +intention of the term and laugh. + + +Node:taste, Next:tayste, Previous:tardegy, Up:= T += + +taste [primarily MIT] n. + +1. The quality in a program that tends to be inversely +proportional to the number of features, hacks, and kluges +programmed into it. Also `tasty', `tasteful', `tastefulness'. +"This feature comes in N tasty flavors." Although `tasty' and +`flavorful' are essentially synonyms, `taste' and flavor are not. Taste refers to sound judgment +on the part of the creator; a program or feature can +exhibit taste but cannot have taste. On the +other hand, a feature can have flavor. Also, flavor has the additional meaning of `kind' or +`variety' not shared by `taste'. The marked sense of flavor is more popular than `taste', though +both are widely used. See also elegant. 2. Alt. sp. of tayste. + + +Node:tayste, Next:TCB, Previous:taste, Up:= T += + +tayste /tayst/ + +n. Two bits; also as taste. Syn. +crumb, quarter. See nybble. + + +Node:TCB, Next:TCP/IP, Previous:tayste, Up:= T += + +TCB /T-C-B/ n. + +[IBM] 1. Trouble Came Back. An intermittent or +difficult-to-reproduce problem that has failed to respond to +neglect or shotgun +debugging. Compare heisenbug. Not to be confused with: 2. +Trusted Computing Base, an `official' jargon term from the Orange Book. + + +Node:TCP/IP, Next:TechRef, Previous:TCB, Up:= T = + + +TCP/IP /T'C-P I'P/ n. + +1. [Transmission Control Protocol/Internet Protocol] The +wide-area-networking protocol that makes the Internet work, and +the only one most hackers can speak the name of without laughing +or retching. Unlike such allegedly `standard' competitors such as +X.25, DECnet, and the ISO 7-layer stack, TCP/IP evolved primarily +by actually being used, rather than being handed down +from on high by a vendor or a heavily-politicized standards +committee. Consequently, it (a) works, (b) actually promotes +cheap cross-platform connectivity, and (c) annoys the hell out of +corporate and governmental empire-builders everywhere. Hackers +value all three of these properties. See creationism. 2. [Amateur Packet Radio] +Formerly expanded as "The Crap Phil Is Pushing". The reference is +to Phil Karn, KA9Q, and the context was an ongoing +technical/political war between the majority of sites still +running AX.25 and the TCP/IP relays. TCP/IP won. + + +Node:TechRef, Next:TECO, Previous:TCP/IP, Up:= T += + +TechRef /tek'ref/ n. + +[MS-DOS] The original "IBM PC Technical Reference Manual", +including the BIOS listing and complete schematics for the PC. +The only PC documentation in the original-issue package that was +considered serious by real hackers. + + +Node:TECO, Next:tee, Previous:TechRef, Up:= T += + +TECO /tee'koh/ n.,v. obs. + +1. [originally an acronym for `[paper] Tape Editor and +COrrector'; later, `Text Editor and COrrector'] n. A text editor +developed at MIT and modified by just about everybody. With all +the dialects included, TECO may have been the most prolific +editor in use before EMACS, to which +it was directly ancestral. Noted for its powerful +programming-language-like features and its unspeakably hairy +syntax. It is literally the case that every string of characters +is a valid TECO program (though probably not a useful one); one +common game used to be mentally working out what the TECO +commands corresponding to human names did. 2. vt. Originally, to +edit using the TECO editor in one of its infinite variations (see +below). 3. vt.,obs. To edit even when TECO is not the +editor being used! This usage is rare and now primarily +historical. + +As an example of TECO's obscurity, here is a TECO program that +takes a list of names such as: + +Loser, J. Random +Quux, The Great +Dick, Moby + + +sorts them alphabetically according to surname, and then puts +the surname last, removing the comma, to produce the +following: + +Moby Dick +J. Random Loser +The Great Quux + + +The program is + +[1 J^P$L$$ +J <.-Z; .,(S,$ -D .)FX1 @F^B $K :L I $ G1 L>$$ + + +(where ^B means `Control-B' (ASCII 0000010) and $ is actually +an alt or escape (ASCII 0011011) +character). + +In fact, this very program was used to produce the second, +sorted list from the first list. The first hack at it had a bug: GLS (the author) had accidentally +omitted the @ in front of F^B, which as +anyone can see is clearly the Wrong +Thing. It worked fine the second time. There is no space +to describe all the features of TECO, but it may be of interest +that ^P means `sort' and J<.-Z; +... L> is an idiomatic series of +commands for `do once for every line'. + +In mid-1991, TECO is pretty much one with the dust of history, +having been replaced in the affections of hackerdom by EMACS. Descendants of an early (and +somewhat lobotomized) version adopted by DEC can still be found +lurking on VMS and a couple of crufty PDP-11 operating systems, +however, and ports of the more advanced MIT versions remain the +focus of some antiquarian interest. See also retrocomputing, write-only language. + + +Node:tee, Next:teergrube, Previous:TECO, Up:= T = + + +tee n.,vt. + +[Purdue] A carbon copy of an electronic transmission. "Oh, +you're sending him the bits to that? +Slap on a tee for me." From the Unix command tee(1), +itself named after a pipe fitting (see plumbing). Can also mean `save one for me', +as in "Tee a slice for me!" Also spelled `T'. + + +Node:teergrube, Next:teledildonics, Previous:tee, Up:= T += + +teergrube /teer'groob/ n. + +[German for `tar pit'] A trap set to punish spammers who use +an address harvester; a +mail server deliberately set up to be really, really slow. To +activate it, scatter addresses that look like users on the +teergrube's host in places where the address harvester will be +trolling (one popular way is to embed the fake address in a +Usenet sig block next to a human-readable warning not to send +mail to it). The address harvester will dutifully collect the +address. When the spammer tries to mailbomb it, his mailer will +get stuck. + + +Node:teledildonics, Next:Telerat, Previous:teergrube, Up:= T = + +teledildonics /tel`*-dil-do'-niks/ n. + +Sex in a computer simulated virtual reality, esp. +computer-mediated sexual interaction between the VR presences of two humans. This practice is not +yet possible except in the rather limited form of erotic +conversation on MUDs and the like. The +term, however, is widely recognized in the VR community as a +ha ha only serious +projection of things to come. "When we can sustain a +multi-sensory surround good enough for teledildonics, +then we'll know we're getting somewhere." See also hot chat. + + +Node:Telerat, Next:TELNET, Previous:teledildonics, Up:= T = + +Telerat /tel'*-rat/ n. obs. + +Unflattering hackerism for `Teleray', a now-extinct line of +extremely losing terminals. Compare AIDX, Macintrash +Nominal +Semidestructor, ScumOS, +sun-stools, HP-SUX, Slowlaris. + + +Node:TELNET, Next:ten-finger interface, Previous:Telerat, Up:= T = + +TELNET /tel'net/ vt. + +(also commonly lowercased as `telnet') To communicate with +another Internet host using the TELNET (RFC 854) protocol (usually using a program of the +same name). TOPS-10 people used the word IMPCOM, since that was +the program name for them. Sometimes abbreviated to TN /T-N/. "I +usually TN over to SAIL just to read the AP News." + + +Node:ten-finger interface, +Next:tense, Previous:TELNET, Up:= T = + +ten-finger interface n. + +The interface between two networks that cannot be directly +connected for security reasons; refers to the practice of placing +two terminals side by side and having an operator read from one +and type into the other. + + +Node:tense, Next:tentacle, Previous:ten-finger interface, Up:= T = + +tense adj. + +Of programs, very clever and efficient. A tense piece of code +often got that way because it was highly bummed, but sometimes it was just based on a great +idea. A comment in a clever routine by Mike Kazar, once a +grad-student hacker at CMU: "This routine is so tense it will +bring tears to your eyes." A tense programmer is one who produces +tense code. + + +Node:tentacle, Next:tenured graduate student, +Previous:tense, Up:= T = + +tentacle n. + +A covert pseudo, sense 1. An +artificial identity created in cyberspace for nefarious and +deceptive purposes. The implication is that a single person may +have multiple tentacles. This term was originally floated in some +paranoid ravings on the cypherpunks list (see cypherpunk), and adopted in a spirit of +irony by other, saner members. It has since shown up, used +seriously, in the documentation for some remailer software, and +is now (1994) widely recognized on the net. + + +Node:tenured graduate +student, Next:tera-, +Previous:tentacle, Up:= T = + +tenured graduate student n. + +One who has been in graduate school for 10 years (the usual +maximum is 5 or 6): a `ten-yeared' student (get it?). Actually, +this term may be used of any grad student beginning in his +seventh year. Students don't really get tenure, of course, the +way professors do, but a tenth-year graduate student has probably +been around the university longer than any untenured +professor. + + +Node:tera-, Next:teraflop club, Previous:tenured graduate +student, Up:= T = + +tera- /te'r*/ pref. + +[SI] See quantifiers. + + +Node:teraflop club, Next:terminak, Previous:tera-, Up:= T += + +teraflop club /te'r*-flop kluhb/ n. + +[FLOP = Floating Point Operation] A mythical association of +people who consume outrageous amounts of computer time in order +to produce a few simple pictures of glass balls with intricate +ray-tracing techniques. Caltech professor James Kajiya is said to +have been the founder. Compare Knights of the Lambda +Calculus. + + +Node:terminak, Next:terminal brain death, Previous:teraflop club, Up:= T = + +terminak /ter'mi-nak`/ n. + +[Caltech, ca. 1979] Any malfunctioning computer terminal. A +common failure mode of Lear-Siegler ADM 3a terminals caused the +`L' key to produce the `K' code instead; complaints about this +tended to look like "Terminak #3 has a bad keyboard. Pkease fix." +Compare dread high-bit +disease, frogging; see +also AIDX, Nominal Semidestructor, ScumOS, sun-stools, Telerat, HP-SUX, +Slowlaris. + + +Node:terminal brain death, +Next:terminal +illness, Previous:terminak, Up:= +T = + +terminal brain death n. + +The extreme form of terminal +illness (sense 1). What someone who has obviously been +hacking continuously for far too long is said to be suffering +from. + + +Node:terminal illness, Next:terminal junkie, +Previous:terminal brain death, Up:= T = + +terminal illness n. + +1. Syn. raster burn. 2. +The `burn-in' condition your CRT tends to get if you don't have a +screen saver. + + +Node:terminal junkie, Next:terpri, Previous:terminal illness, Up:= T = + +terminal junkie n. + +[UK] A wannabee or early larval stage hacker who spends +most of his or her time wandering the directory tree and writing +noddy programs just to get a fix of +computer time. Variants include `terminal jockey', `console +junkie', and console +jockey. The term `console jockey' seems to imply more +expertise than the other three (possibly because of the exalted +status of the console relative to +an ordinary terminal). See also twink, read-only +user. Appropriately, this term was used in the works of +William S. Burroughs to describe a heroin addict with an +unlimited supply. + + +Node:terpri, Next:test, Previous:terminal junkie, Up:= T = + +terpri /ter'pree/ vi. + +[from LISP 1.5 (and later, MacLISP)] To output a newline. Now rare as jargon, though still used +as techspeak in Common LISP. It is a contraction of `TERminate +PRInt line', named for the fact that, on some early OSes and +hardware, no characters would be printed until a complete line +was formed, so this operation terminated the line and emitted the +output. + + +Node:test, Next:TeX, Previous:terpri, Up:= T += + +test n. + +1. Real users bashing on a prototype long enough to get +thoroughly acquainted with it, with careful monitoring and +followup of the results. 2. Some bored random user trying a +couple of the simpler features with a developer looking over his +or her shoulder, ready to pounce on mistakes. Judging by the +quality of most software, the second definition is far more +prevalent. See also demo. + + +Node:TeX, Next:text, Previous:test, Up:= T = + + +TeX /tekh/ n. + +An extremely powerful macro-based +text formatter written by Donald E. Knuth, very popular in the computer-science +community (it is good enough to have displaced Unix troff, the other favored formatter, even at many +Unix installations). TeX fans insist on the correct (guttural) +pronunciation, and the correct spelling (all caps, squished +together, with the E depressed below the baseline; the mixed-case +`TeX' is considered an acceptable kluge on ASCII-only devices). +Fans like to proliferate names from the word `TeX' -- such as +TeXnician (TeX user), TeXhacker (TeX programmer), TeXmaster +(competent TeX programmer), TeXhax, and TeXnique. See also CrApTeX. + +Knuth began TeX because he had become annoyed at the declining +quality of the typesetting in volumes I-III of his monumental +"Art of Computer Programming" (see Knuth, also bible). +In a manifestation of the typical hackish urge to solve the +problem at hand once and for all, he began to design his own +typesetting language. He thought he would finish it on his +sabbatical in 1978; he was wrong by only about 8 years. The +language was finally frozen around 1985, but volume IV of "The +Art of Computer Programming" is not expected to appear until +2002. The impact and influence of TeX's design has been such that +nobody minds this very much. Many grand hackish projects have +started as a bit of toolsmithing +on the way to something else; Knuth's diversion was simply on a +grander scale than most. + +TeX has also been a noteworthy example of free, shared, but +high-quality software. Knuth offers a monetary awards to anyone +who found and reported bugs dating from before the 1989 code +freeze; as the years wore on and the few remaining bugs were +fixed (and new ones even harder to find), the bribe went up. +Though well-written, TeX is so large (and so full of cutting edge +technique) that it is said to have unearthed at least one bug in +every Pascal system it has been compiled with. + + +Node:text, Next:thanks in advance, Previous:TeX, Up:= T = + +text n. + +1. [techspeak] Executable code, esp. a `pure code' portion +shared between multiple instances of a program running in a +multitasking OS. Compare English. +2. Textual material in the mainstream sense; data in ordinary +ASCII or EBCDIC representation (see flat-ASCII). "Those are text files; you can +review them using the editor." These two contradictory senses +confuse hackers, too. + + +Node:thanks in advance, +Next:That's not a +bug that's a feature!, Previous:text, Up:= T = + + +thanks in advance + +[Usenet] Conventional net.politeness ending a posted request +for information or assistance. Sometimes written `advTHANKSance' +or `aTdHvAaNnKcSe' or abbreviated `TIA'. See net.-, netiquette. + + +Node:That's not a bug +that's a feature!, Next:the literature, Previous:thanks in advance, +Up:= T = + +That's not a bug, that's a feature! + +The canonical first parry in a +debate about a purported bug. The complainant, if unconvinced, is +likely to retort that the bug is then at best a misfeature. See also feature. + + +Node:the literature, Next:the network, Previous:That's not a +bug that's a feature!, Up:= +T = + +the literature n. + +Computer-science journals and other publications, vaguely +gestured at to answer a question that the speaker believes is +trivial. Thus, one might answer an +annoying question by saying "It's in the literature." Oppose +Knuth, which has no connotation of +triviality. + + +Node:the network, Next:the +X that can be Y is not the true X, Previous:the literature, Up:= T = + +the network n. + +1. Historicaslly, the union of all the major noncommercial, +academic, and hacker-oriented networks, such as Internet, the +pre-1990 ARPANET, NSFnet, BITNET, +and the virtual UUCP and Usenet +`networks', plus the corporate in-house networks and commercial +time-sharing services (such as CompuServe, GEnie and AOL) that +gateway to them. A site is generally considered `on the network' +if it can be reached through some combination of Internet-style +(@-sign) and UUCP (bang-path) addresses. See Internet, bang +path, Internet +address, network +address. 2. Following the mass-culture discovery of the +Internet in 1994 and subsequent proliferation of cheap TCP/IP +connections, "the network" is increasingly synonymous with the +Internet itself (as it was before the second wave of wide-area +computer networking began around 1980). 3. A fictional conspiracy +of libertarian hacker-subversives and anti-authoritarian +monkeywrenchers described in Robert Anton Wilson's novel +"Schrödinger's Cat", to which many hackers have subsequently +decided they belong (this is an example of ha ha only serious). + +In sense 1, `the network' is often abbreviated to `the net'. +"Are you on the net?" is a frequent question when hackers first +meet face to face, and "See you on the net!" is a frequent +goodbye. + + +Node:the X +that can be Y is not the true X, Next:theology, Previous:the network, Up:= T = + +the X that can be Y is not the true X + +Yet another instance of hackerdom's peculiar attraction to +mystical references -- a common humorous way of making exclusive +statements about a class of things. The template is from the "Tao +te Ching": "The Tao which can be spoken of is not the true Tao." +The implication is often that the X is a mystery accessible only +to the enlightened. See the trampoline entry for an example, and +compare has the X +nature. + + +Node:theology, Next:theory, Previous:the +X that can be Y is not the true X, Up:= T = + +theology n. + +1. Ironically or humorously used to refer to religious issues. 2. Technical fine +points of an abstruse nature, esp. those where the resolution is +of theoretical interest but is relatively marginal with respect to actual use of a +design or system. Used esp. around software issues with a heavy +AI or language-design component, such as the smart-data vs. +smart-programs dispute in AI. + + +Node:theory, Next:thinko, Previous:theology, Up:= +T = + +theory n. + +The consensus, idea, plan, story, or set of rules that is +currently being used to inform a behavior. This usage is a +generalization and (deliberate) abuse of the technical meaning. +"What's the theory on fixing this TECO loss?" "What's the theory +on dinner tonight?" ("Chinatown, I guess.") "What's the current +theory on letting lusers on during the day?" "The theory behind +this change is to fix the following well-known +screw...." + + +Node:thinko, Next:This can't happen, Previous:theory, Up:= T = + +thinko /thing'koh/ n. + +[by analogy with `typo'] A momentary, correctable glitch in +mental processing, especially one involving recall of information +learned by rote; a bubble in the stream of consciousness. Syn. +braino; see also brain fart. Compare mouso. + + +Node:This can't happen, +Next:This time +for sure!, Previous:thinko, Up:= T += + +This can't happen + +Less clipped variant of can't +happen. + + +Node:This time for sure!, +Next:thrash, Previous:This can't happen, +Up:= T = + +This time, for sure! excl. + +Ritual affirmation frequently uttered during protracted +debugging sessions involving numerous small obstacles (e.g., +attempts to bring up a UUCP connection). For the proper effect, +this must be uttered in a fruity imitation of Bullwinkle J. +Moose. Also heard: "Hey, Rocky! Watch me pull a rabbit out of my +hat!" The canonical response is, +of course, "But that trick never works!" See hacker humor. + + +Node:thrash, Next:thread, Previous:This time for sure!, Up:= T = + +thrash vi. + +To move wildly or violently, without accomplishing anything +useful. Paging or swapping systems that are overloaded waste most +of their time moving data into and out of core (rather than +performing useful computation) and are therefore said to thrash. +Someone who keeps changing his mind (esp. about what to work on +next) is said to be thrashing. A person frantically trying to +execute too many tasks at once (and not spending enough time on +any single task) may also be described as thrashing. Compare +multitask. + + +Node:thread, Next:three-finger salute, Previous:thrash, Up:= T = + +thread n. + +[Usenet, GEnie, CompuServe] Common abbreviation of `topic +thread', a more or less continuous chain of postings on a single +topic. To `follow a thread' is to read a series of Usenet +postings sharing a common subject or (more correctly) which are +connected by Reference headers. The better newsreaders can +present news in thread order automatically. Not to be confused +with the techspeak sense of `thread', e.g. a lightweight +process. + +Interestingly, this is far from a neologism. The OED says: +"That which connects the successive points in anything, esp. a +narrative, train of thought, or the like; the sequence of events +or ideas continuing throughout the whole course of anything;" +Citations are given going back to 1642! + + +Node:three-finger salute, +Next:throwaway +account, Previous:thread, Up:= T += + +three-finger salute n. + +Syn. Vulcan nerve +pinch. + + +Node:throwaway account, Next:thud, Previous:three-finger salute, Up:= T = + +throwaway account n. + +1. An inexpensive Internet account purchased on a legitimate +ISP for the the sole purpose of spewing +spam. 2. An inexpensive Internet +account obtained for the sole purpose of doing something which +requires a valid email address but being able to ignore spam +since the user will not look at the account again. + + +Node:thud, Next:thumb, Previous:throwaway account, Up:= T = + +thud n. + +1. Yet another metasyntactic variable (see +foo). It is reported that at CMU from +the mid-1970s the canonical series of these was `foo', `bar', +`thud', `blat'. 2. Rare term for the hash character, `#' (ASCII +0100011). See ASCII for other +synonyms. + + +Node:thumb, Next:thundering herd problem, +Previous:thud, Up:= T = + +thumb n. + +The slider on a window-system scrollbar. So called because +moving it allows you to browse through the contents of a text +window in a way analogous to thumbing through a book. + + +Node:thundering herd +problem, Next:thunk, +Previous:thumb, Up:= T = + +thundering herd problem + +Scheduler thrashing. This can happen under Unix when you have +a number of processes that are waiting on a single event. When +that event (a connection to the web server, say) happens, every +process which could possibly handle the event is awakened. In the +end, only one of those processes will actually be able to do the +work, but, in the meantime, all the others wake up and contend +for CPU time before being put back to sleep. Thus the system +thrashes briefly while a herd of processes thunders through. If +this starts to happen many times per second, the performance +impact can be significant. + + +Node:thunk, Next:tick, Previous:thundering herd problem, Up:= T = + +thunk /thuhnk/ n. + +1. [obs.]"A piece of coding which provides an address", +according to P. Z. Ingerman, who invented thunks in 1961 as a way +of binding actual parameters to their formal definitions in +Algol-60 procedure calls. If a procedure is called with an +expression in the place of a formal parameter, the compiler +generates a thunk which computes the expression and leaves the +address of the result in some standard location. 2. Later +generalized into: an expression, frozen together with its +environment, for later evaluation if and when needed (similar to +what in techspeak is called a `closure'). The process of +unfreezing these thunks is called `forcing'. 3. A stubroutine, in an overlay programming +environment, that loads and jumps to the correct overlay. Compare +trampoline. 4. People and +activities scheduled in a thunklike manner. "It occurred to me +the other day that I am rather accurately modeled by a thunk -- I +frequently need to be forced to completion." -- paraphrased from +a plan file. + +Historical note: There are a couple of onomatopoeic myths +circulating about the origin of this term. The most common is +that it is the sound made by data hitting the stack; another +holds that the sound is that of the data hitting an accumulator. +Yet another suggests that it is the sound of the expression being +unfrozen at argument-evaluation time. In fact, according to the +inventors, it was coined after they realized (in the wee hours +after hours of discussion) that the type of an argument in +Algol-60 could be figured out in advance with a little +compile-time thought, simplifying the evaluation machinery. In +other words, it had `already been thought of'; thus it was +christened a `thunk', which is "the past tense of `think' at two +in the morning". + + +Node:tick, Next:tick-list features, Previous:thunk, Up:= T = + +tick n. + +1. A jiffy (sense 1). 2. In +simulations, the discrete unit of time that passes between +iterations of the simulation mechanism. In AI applications, this +amount of time is often left unspecified, since the only +constraint of interest is the ordering of events. This sort of AI +simulation is often pejoratively referred to as `tick-tick-tick' +simulation, especially when the issue of simultaneity of events +with long, independent chains of causes is handwaved. 3. In the FORTH language, a single +quote character. + + +Node:tick-list features, +Next:tickle a bug, +Previous:tick, Up:= T = + +tick-list features n. + +[Acorn Computers] Features in software or hardware that +customers insist on but never use (calculators in desktop TSRs +and that sort of thing). The American equivalent would be +`checklist features', but this jargon sense of the phrase has not +been reported. + + +Node:tickle a bug, Next:tiger team, Previous:tick-list features, +Up:= T = + +tickle a bug vt. + +To cause a normally hidden bug to manifest itself through some +known series of inputs or operations. "You can tickle the bug in +the Paradise VGA card's highlight handling by trying to set +bright yellow reverse video." + + +Node:tiger team, Next:time bomb, Previous:tickle a bug, Up:= T = + +tiger team n. + +[U.S. military jargon] 1. Originally, a team (of sneakers) whose purpose is to penetrate +security, and thus test security measures. These people are paid +professionals who do hacker-type tricks, e.g., leave cardboard +signs saying "bomb" in critical defense installations, +hand-lettered notes saying "Your codebooks have been stolen" +(they usually haven't been) inside safes, etc. After a successful +penetration, some high-ranking security type shows up the next +morning for a `security review' and finds the sign, note, etc., +and all hell breaks loose. Serious successes of tiger teams +sometimes lead to early retirement for base commanders and +security officers (see the patch +entry for an example). 2. Recently, and more generally, any +official inspection team or special firefighting group called in to look at a +problem. + +A subset of tiger teams are professional crackers, testing the security of military +computer installations by attempting remote attacks via networks +or supposedly `secure' comm channels. Some of their escapades, if +declassified, would probably rank among the greatest hacks of all +times. The term has been adopted in commercial computer-security +circles in this more specific sense. + + +Node:time bomb, Next:time sink, Previous:tiger team, Up:= T = + +time bomb n. + +A subspecies of logic bomb +that is triggered by reaching some preset time, either once or +periodically. There are numerous legends about time bombs set up +by programmers in their employers' machines, to go off if the +programmer is fired or laid off and is not present to perform the +appropriate suppressing action periodically. + +Interestingly, the only such incident for which we have been +pointed to documentary evidence took place in the Soviet Union in +1986! A disgruntled programmer at the Volga Automobile Plant +(where the Fiat clones called Ladas were manufactured) planted a +time bomb which, a week after he'd left on vacation, stopped the +entire main assembly line for a day. The case attracted lots of +attention in the Soviet Union because it was the first cracking +case to make it to court there. The perpetrator got a suspended +sentence of 3 years in jail and was barred from future work as a +programmer. + + +Node:time sink, Next:time T, Previous:time bomb, Up:= T = + +time sink n. + +[poss. by analogy with `heat sink' or `current sink'] A +project that consumes unbounded amounts of time. + + +Node:time T, Next:times-or-divided-by, Previous:time sink, Up:= T = + +time T /ti:m T/ n. + +1. An unspecified but usually well-understood time, often used +in conjunction with a later time T+1. "We'll meet on campus at +time T or at Louie's at time T+1" means, in the context of going +out for dinner: "We can meet on campus and go to Louie's, or we +can meet at Louie's itself a bit later." (Louie's was a Chinese +restaurant in Palo Alto that was a favorite with hackers.) Had +the number 30 been used instead of the number 1, it would have +implied that the travel time from campus to Louie's is 30 +minutes; whatever time T is (and that hasn't been decided on +yet), you can meet half an hour later at Louie's than you could +on campus and end up eating at the same time. See also since time T +equals minus infinity. + + +Node:times-or-divided-by, +Next:TINC, Previous:time T, Up:= T = + +times-or-divided-by quant. + +[by analogy with `plus-or-minus'] Term occasionally used when +describing the uncertainty associated with a scheduling estimate, +for either humorous or brutally honest effect. For a software +project, the scheduling uncertainty factor is usually at least +2. + + +Node:TINC, Next:Tinkerbell program, Previous:times-or-divided-by, +Up:= T = + +TINC // + +[Usenet] Abbreviation: "There Is No Cabal". See backbone cabal and NANA, but note that this abbreviation did not +enter use until long after the dispersal of the backbone +cabal. + + +Node:Tinkerbell program, +Next:TINLC, Previous:TINC, Up:= T = + +Tinkerbell program n. + +[Great Britain] A monitoring program used to scan incoming +network calls and generate alerts when calls are received from +particular sites, or when logins are attempted using certain IDs. +Named after `Project Tinkerbell', an experimental phone-tapping +program developed by British Telecom in the early 1980s. + + +Node:TINLC, Next:tip of the ice-cube, Previous:Tinkerbell +program, Up:= T = + +TINLC // + +Abbreviation: "There Is No Lumber Cartel". See Lumber Cartel. TINLC is a takeoff on +TINC. + + +Node:tip of the ice-cube, +Next:tired iron, +Previous:TINLC, Up:= T = + +tip of the ice-cube n. // + +[IBM] The visible part of something small and insignificant. +Used as an ironic comment in situations where `tip of the +iceberg' might be appropriate if the subject were at all +important. + + +Node:tired iron, Next:tits on a keyboard, +Previous:tip +of the ice-cube, Up:= T += + +tired iron n. + +[IBM] Hardware that is perfectly functional but far enough +behind the state of the art to have been superseded by new +products, presumably with sufficient improvement in bang-per-buck +that the old stuff is starting to look a bit like a dinosaur. + + +Node:tits on a keyboard, +Next:TLA, Previous:tired iron, Up:= T = + +tits on a keyboard n. + +Small bumps on certain keycaps to keep touch-typists +registered. Usually on the 5 of a numeric keypad, +and on the F and J of a QWERTY keyboard; but older Macs, perverse as +usual, had them on the D and K keys +(this changed in 1999). + + +Node:TLA, Next:(TM), Previous:tits on a keyboard, Up:= T = + +TLA /T-L-A/ n. + +[Three-Letter Acronym] 1. Self-describing abbreviation for a +species with which computing terminology is infested. 2. Any +confusing acronym. Examples include MCA, FTP, SNA, CPU, MMU, +SCCS, DMU, FPU, NNTP, TLA. People who like this looser usage +argue that not all TLAs have three letters, just as not all +four-letter words have four letters. One also hears of `ETLA' +(Extended Three-Letter Acronym, pronounced /ee tee el ay/) being +used to describe four-letter acronyms. The term `SFLA' (Stupid +Four-Letter Acronym) has also been reported. See also YABA. + +The self-effacing phrase "TDM TLA" (Too Damn +Many...) is often used to bemoan the plethora of +TLAs in use. In 1989, a random of the journalistic persuasion +asked hacker Paul Boutin "What do you think will be the biggest +problem in computing in the 90s?" Paul's straight-faced response: +"There are only 17,000 three-letter acronyms." (To be exact, +there are 26^3 = 17,576.) There is probably some karmic justice +in the fact that Paul Boutin subsequently became a +journalist. + + +Node:(TM), Next:TMRC, Previous:TLA, +Up:= T = + +(TM) // + +[Usenet] ASCII rendition of the trademark-superscript symbol +appended to phrases that the author feels should be recorded for +posterity, perhaps in future editions of this lexicon. Sometimes +used ironically as a form of protest against the recent spate of +software and algorithm patents and `look and feel' lawsuits. See +also UN*X. + + +Node:TMRC, Next:TMRCie, Previous:(TM), Up:= T = + + +TMRC /tmerk'/ n. + +The Tech Model Railroad Club at MIT, one of the wellsprings of +hacker culture. The 1959 "Dictionary of the TMRC Language" +compiled by Peter Samson included several terms that became +basics of the hackish vocabulary (see esp. foo, mung, and frob). + +By 1962, TMRC's legendary layout was already a marvel of +complexity and has grown in the years since. All the features +described here were still present when the old layout was +decomissioned in 1998 just before the demolition of MIT Building +20, and will almost certainly be retained when the old layout is +rebuilt (expected in 2003). The control system alone featured +about 1200 relays. There were scram +switches located at numerous places around the room that +could be thwacked if something undesirable was about to occur, +such as a train going full-bore at an obstruction. Another +feature of the system was a digital clock on the dispatch board, +which was itself something of a wonder in those bygone days +before cheap LEDs and seven-segment displays. When someone hit a +scram switch the clock stopped and the display was replaced with +the word `FOO'; at TMRC the scram switches are therefore called +`foo switches'. + +Steven Levy, in his book "Hackers" (see the Bibliography in Appendix C), gives a +stimulating account of those early years. TMRC's Signals and +Power Committee included many of the early PDP-1 hackers and the +people who later became the core of the MIT AI Lab staff. Thirty +years later that connection is still very much alive, and this +lexicon accordingly includes a number of entries from a recent +revision of the TMRC dictionary. + +TMRC has a web page at http://web.mit.edu/tmrc/www/. + + +Node:TMRCie, Next:TMTOWTDI, Previous:TMRC, Up:= T = + + +TMRCie /tmerk'ee/, n. + +[MIT] A denizen of TMRC. + + +Node:TMTOWTDI, Next:to a first approximation, +Previous:TMRCie, Up:= T = + +TMTOWTDI /tim-toh'-dee/ + +There's More Than One Way To Do It. This abbreviation of the +official motto of Perl is frequently +used on newsgroups and mailing lists related to that +language. + + +Node:to a first +approximation, Next:to a zeroth approximation, +Previous:TMTOWTDI, Up:= T = + +to a first approximation adj. + +1. [techspeak] When one is doing certain numerical +computations, an approximate solution may be computed by any of +several heuristic methods, then refined to a final value. By +using the starting point of a first approximation of the answer, +one can write an algorithm that converges more quickly to the +correct result. 2. In jargon, a preface to any comment that +indicates that the comment is only approximately true. The remark +"To a first approximation, I feel good" might indicate that +deeper questioning would reveal that not all is perfect (e.g., a +nagging cough still remains after an illness). + + +Node:to a zeroth +approximation, Next:toad, +Previous:to a first approximation, +Up:= T = + +to a zeroth approximation + +[from `to a first approximation'] A really sloppy +approximation; a wild guess. Compare social science number. + + +Node:toad, Next:toast, Previous:to a zeroth approximation, +Up:= T = + +toad vt. [MUD] + +1. Notionally, to change a MUD +player into a toad. 2. To permanently and totally exile a player +from the MUD. A very serious action, which can only be done by a +MUD wizard; often involves a lot of +debate among the other characters first. See also frog, FOD. + + +Node:toast, Next:toaster, Previous:toad, Up:= T = + + +toast 1. n. + +Any completely inoperable system or component, esp. one that +has just crashed and burned: "Uh, oh ... I think +the serial board is toast." 2. vt. To cause a system to crash +accidentally, especially in a manner that requires manual +rebooting. "Rick just toasted the firewall machine again." Compare +fried. + + +Node:toaster, Next:toeprint, Previous:toast, Up:= T += + +toaster n. + +1. The archetypal really stupid application for an embedded +microprocessor controller; often used in comments that imply that +a scheme is inappropriate technology (but see elevator controller). "DWIM for an assembler? That'd be as silly as +running Unix on your toaster!" +2. A very, very dumb computer. "You could run this program on any +dumb toaster." See bitty box, +Get a real +computer!, toy, beige toaster. 3. A Macintosh, esp. +the Classic Mac. Some hold that this is implied by sense 2. 4. A +peripheral device. "I bought my box without toasters, but since +then I've added two boards and a second disk drive." 5. A +specialized computer used as an appliance. See web toaster, video toaster. + + +Node:toeprint, Next:toggle, Previous:toaster, Up:= T += + +toeprint n. + +A footprint of especially +small size. + + +Node:toggle, Next:tool, Previous:toeprint, Up:= +T = + +toggle vt. + +To change a bit from whatever state +it is in to the other state; to change from 1 to 0 or from 0 to +1. This comes from `toggle switches', such as standard light +switches, though the word `toggle' actually refers to the +mechanism that keeps the switch in the position to which it is +flipped rather than to the fact that the switch has two +positions. There are four things you can do to a bit: set it +(force it to be 1), clear (or zero) it, leave it alone, or toggle +it. (Mathematically, one would say that there are four distinct +boolean-valued functions of one boolean argument, but saying that +is much less fun than talking about toggling bits.) + + +Node:tool, Next:toolsmith, Previous:toggle, Up:= T += + +tool 1. n. + +A program used primarily to create, manipulate, modify, or +analyze other programs, such as a compiler or an editor or a +cross-referencing program. Oppose app, +operating system. 2. +[Unix] An application program with a simple, `transparent' +(typically text-stream) interface designed specifically to be +used in programmed combination with other tools (see filter, plumbing). 3. [MIT: general to students +there] vi. To work; to study (connotes tedium). The TMRC +Dictionary defined this as "to set one's brain to the +grindstone". See hack. 4. n. [MIT] A +student who studies too much and hacks too little. (MIT's student +humor magazine rejoices in the name "Tool and Die".) + + +Node:toolsmith, Next:toor, Previous:tool, Up:= T = + + +toolsmith n. + +The software equivalent of a tool-and-die specialist; one who +specializes in making the tools with +which other programmers create applications. Many hackers +consider this more fun than applications per se; to understand +why, see uninteresting. Jon +Bentley, in the "Bumper-Sticker Computer Science" chapter of his +book "More Programming Pearls", quotes Dick Sites from DEC as saying "I'd rather write programs to +write programs than write programs". + + +Node:toor, Next:topic drift, Previous:toolsmith, Up:= T = + +toor n. + +The Bourne-Again Super-user. An alternate account with UID of +0, created on Unix machines where the root user has an +inconvenient choice of shell. Compare avatar. + + +Node:topic drift, Next:topic group, Previous:toor, Up:= T += + +topic drift n. + +Term used on GEnie, Usenet and other electronic fora to +describe the tendency of a thread to +drift away from the original subject of discussion (and thus, +from the Subject header of the originating message), or the +results of that tendency. The header in each post can be changed +to keep current with the posts, but usually isn't due to +forgetfulness or laziness. A single post may often result in +several posts each responding to a different point in the +original. Some subthreads will actually be in response to some +off-the-cuff side comment, possibly degenerating into a flame war, or just as often evolving +into a separate discussion. Hence, discussions aren't really so +much threads as they are trees. Except that they don't really +have leaves, or multiple branching roots; usually some lines of +discussion will just sort of die off after everyone gets tired of +them. This could take anywhere from hours to weeks, or even +longer. + +The term `topic drift' is often used in gentle reminders that +the discussion has strayed off any useful track. "I think we +started with a question about Niven's last book, but we've ended +up discussing the sexual habits of the common marmoset. Now +that's topic drift!" + + +Node:topic group, Next:TOPS-10, Previous:topic drift, Up:= T = + +topic group n. + +Syn. forum. + + +Node:TOPS-10, Next:TOPS-20, Previous:topic group, Up:= T = + +TOPS-10 /tops-ten/ n. + +DEC's proprietary OS for the fabled +PDP-10 machines, long a favorite of +hackers but now effectively extinct. A fountain of hacker +folklore; see Appendix A. See also ITS, +TOPS-20, TWENEX, VMS, operating system. TOPS-10 was +sometimes called BOTS-10 (from `bottoms-ten') as a comment on the +inappropriateness of describing it as the top of anything. + + +Node:TOPS-20, Next:tourist, Previous:TOPS-10, Up:= T += + +TOPS-20 /tops-twen'tee/ n. + +See TWENEX. + + +Node:tourist, Next:tourist information, Previous:TOPS-20, Up:= T = + +tourist n. + +1. [ITS] A guest on the system, especially one who generally +logs in over a network from a remote location for comm mode, email, games, and other trivial +purposes. One step below luser. ITS +hackers often used to spell this turist, perhaps by some sort of tenuous analogy +with luser (this usage may also have +expressed the ITS culture's penchant for six-letterisms, and-or +been some sort of tribute to Alan Turing). Compare twink, lurker, +read-only user. 2. [IRC] +An IRC user who goes from channel to +channel without saying anything; see channel hopping. + + +Node:tourist information, +Next:touristic, Previous:tourist, Up:= T = + +tourist information n. + +Information in an on-line display that is not immediately +useful, but contributes to a viewer's gestalt of what's going on +with the software or hardware behind it. Whether a given piece of +info falls in this category depends partly on what the user is +looking for at any given time. The `bytes free' information at +the bottom of an MS-DOS dir display is tourist +information; so (most of the time) is the TIME information in a +Unix ps(1) display. + + +Node:touristic, Next:toy, Previous:tourist information, Up:= T = + +touristic adj. + +Having the quality of a tourist. +Often used as a pejorative, as in `losing touristic scum'. Often +spelled `turistic' or `turistik', so that phrase might be more +properly rendered `lusing turistic scum'. + + +Node:toy, Next:toy language, Previous:touristic, Up:= T = + +toy n. + +A computer system; always used with qualifiers. 1. `nice toy': +One that supports the speaker's hacking style adequately. 2. +`just a toy': A machine that yields insufficient computrons for the speaker's preferred uses. +This is not condemnatory, as is bitty +box; toys can at least be fun. It is also strongly +conditioned by one's expectations; Cray XMP users sometimes +consider the Cray-1 a `toy', and certainly all RISC boxes and +mainframes are toys by their standards. See also Get a real computer!. + + +Node:toy language, Next:toy problem, Previous:toy, Up:= T = + +toy language n. + +A language useful for instructional purposes or as a +proof-of-concept for some aspect of computer-science theory, but +inadequate for general-purpose programming. Bad Things can result when a toy language +is promoted as a general purpose solution for programming (see +bondage-and-discipline +language); the classic example is Pascal. Several moderately well-known +formalisms for conceptual tasks such as programming Turing +machines also qualify as toy languages in a less negative sense. +See also MFTL. + + +Node:toy problem, Next:toy program, Previous:toy language, Up:= T = + +toy problem n. + +[AI] A deliberately oversimplified case of a challenging +problem used to investigate, prototype, or test algorithms for a +real problem. Sometimes used pejoratively. See also gedanken, toy +program. + + +Node:toy program, Next:trampoline, Previous:toy problem, Up:= T = + +toy program n. + +1. One that can be readily comprehended; hence, a trivial +program (compare noddy). 2. One for +which the effort of initial coding dominates the costs through +its life cycle. See also noddy. + + +Node:trampoline, Next:trap, Previous:toy program, Up:= T = + +trampoline n. + +An incredibly hairy technique, +found in some HLL and program-overlay +implementations (e.g., on the Macintosh), that involves +on-the-fly generation of small executable (and, likely as not, +self-modifying) code objects to do indirection between code +sections. Under BSD and possibly in other Unixes, trampoline code +is used to transfer control from the kernel back to user mode +when a signal (which has had a handler installed) is sent to a +process. hese pieces of live +data are called `trampolines'. Trampolines are +notoriously difficult to understand in action; in fact, it is +said by those who use this term that the trampoline that doesn't +bend your brain is not the true trampoline. See also snap. + + +Node:trap, Next:trap door, Previous:trampoline, Up:= T = + +trap + +1. n. A program interrupt, usually an interrupt caused by some +exceptional situation in the user program. In most cases, the OS +performs some action, then returns control to the program. 2. vi. +To cause a trap. "These instructions trap to the monitor." Also +used transitively to indicate the cause of the trap. "The monitor +traps all input/output instructions." + +This term is associated with assembler programming +(`interrupt' or `exception' is more common among HLL programmers) and appears to be fading into +history among programmers as the role of assembler continues to +shrink. However, it is still important to computer architects and +systems hackers (see system, sense +1), who use it to distinguish deterministically repeatable +exceptions from timing-dependent ones (such as I/O +interrupts). + + +Node:trap door, Next:trash, Previous:trap, Up:= T = + + +trap door n. + +(alt. `trapdoor') 1. Syn. back +door -- a Bad Thing. 2. +[techspeak] A `trap-door function' is one which is easy to +compute but very difficult to compute the inverse of. Such +functions are Good Things with +important applications in cryptography, specifically in the +construction of public-key cryptosystems. + + +Node:trash, Next:trawl, Previous:trap door, Up:= T = + +trash vt. + +To destroy the contents of (said of a data structure). The +most common of the family of near-synonyms including mung, mangle, and +scribble. + + +Node:trawl, Next:tree-killer, Previous:trash, Up:= T += + +trawl v. + +To sift through large volumes of data (e.g., Usenet postings, +FTP archives, or the Jargon File) looking for something of +interest. + + +Node:tree-killer, Next:treeware, Previous:trawl, Up:= T += + +tree-killer n. + +[Sun] 1. A printer. 2. A person who wastes paper. This epithet +should be interpreted in a broad sense; `wasting paper' includes +the production of spiffy but content-free documents. Thus, most +suits are tree-killers. The negative +loading of this term may reflect the epithet `tree-killer' +applied by Treebeard the Ent to the Orcs in J.R.R. Tolkien's +"Lord of the Rings" (see also elvish, elder +days). + + +Node:treeware, Next:trit, Previous:tree-killer, Up:= T = + +treeware /tree'weir/ n. + +Printouts, books, and other information media made from pulped +dead trees. Compare tree-killer, see documentation. + + +Node:trit, Next:trivial, Previous:treeware, Up:= +T = + +trit /trit/ n. + +[by analogy with `bit'] One base-3 digit; the amount of +information conveyed by a selection among one of three equally +likely outcomes (see also bit). Trits +arise, for example, in the context of a flag that should actually be able to assume +three values -- such as yes, no, or unknown. Trits are +sometimes jokingly called `3-state bits'. A trit may be +semi-seriously referred to as `a bit and a half', although it is +linearly equivalent to 1.5849625 bits (that is, log2(3) +bits). + + +Node:trivial, Next:troff, Previous:trit, Up:= T = + + +trivial adj. + +1. Too simple to bother detailing. 2. Not worth the speaker's +time. 3. Complex, but solvable by methods so well known that +anyone not utterly cretinous +would have thought of them already. 4. Any problem one has +already solved (some claim that hackish `trivial' usually +evaluates to `I've seen it before'). Hackers' notions of +triviality may be quite at variance with those of non-hackers. +See nontrivial, uninteresting. + +The physicist Richard Feynman, who had the hacker nature to an +amazing degree (see his essay "Los Alamos From Below" in "Surely +You're Joking, Mr. Feynman!"), defined `trivial theorem' as "one +that has already been proved". + + +Node:troff, Next:troglodyte, Previous:trivial, Up:= T += + +troff /T'rof/ or /trof/ n. + +[Unix] The gray eminence of Unix text processing; a formatting +and phototypesetting program, written originally in PDP-11 +assembler and then in barely-structured early C by the late +Joseph Ossanna, modeled after the earlier ROFF which was in turn +modeled after the Multics and CTSS program RUNOFF by Jerome Saltzer +(that name came from the expression "to run off a +copy"). A companion program, nroff, +formats output for terminals and line printers. + +In 1979, Brian Kernighan modified troff so that it could drive +phototypesetters other than the Graphic Systems CAT. His paper +describing that work ("A Typesetter-independent troff," AT&T +CSTR #97) explains troff's durability. After discussing the +program's "obvious deficiencies -- a rebarbative input syntax, +mysterious and undocumented properties in some areas, and a +voracious appetite for computer resources" and noting the +ugliness and extreme hairiness of the code and internals, +Kernighan concludes: + +None of these remarks should be taken as denigrating +Ossanna's accomplishment with TROFF. It has proven a remarkably +robust tool, taking unbelievable abuse from a variety of +preprocessors and being forced into uses that were never +conceived of in the original design, all with considerable grace +under fire. + + +The success of TeX and desktop +publishing systems have reduced troff's relative +importance, but this tribute perfectly captures the strengths +that secured troff a place in hacker folklore; +indeed, it could be taken more generally as an indication of +those qualities of good programs that, in the long run, hackers +most admire. + + +Node:troglodyte, Next:troglodyte mode, Previous:troff, Up:= T = + +troglodyte n. + +[Commodore] 1. A hacker who never leaves his cubicle. The term +`gnoll' (from Dungeons & Dragons) is also reported. 2. A +curmudgeon attached to an obsolescent computing environment. The +combination `ITS troglodyte' was flung around some during the +Usenet and email wringle-wrangle attending the 2.x.x revision of +the Jargon File; at least one of the people it was intended to +describe adopted it with pride. + + +Node:troglodyte mode, Next:Trojan horse, Previous:troglodyte, Up:= T = + +troglodyte mode n. + +[Rice University] Programming with the lights turned off, +sunglasses on, and the terminal inverted (black on white) because +you've been up for so many days straight that your eyes hurt (see +raster burn). Loud music +blaring from a stereo stacked in the corner is optional but +recommended. See larval +stage, hack mode. + + +Node:Trojan horse, Next:troll, Previous:troglodyte mode, Up:= T = + +Trojan horse n. + +[coined by MIT-hacker-turned-NSA-spook Dan Edwards] A +malicious, security-breaking program that is disguised as +something benign, such as a directory lister, archiver, game, or +(in one notorious 1990 case on the Mac) a program to find and +destroy viruses! See back door, +virus, worm, phage, mockingbird. + + +Node:troll, Next:Troll-O-Meter, Previous:Trojan horse, Up:= T = + +troll v.,n. + +1. [From the Usenet group _alt.folklore.urban_] To utter +a posting on Usenet designed to +attract predictable responses or flames; or, the post itself. Derives from the +phrase "trolling for newbies" which +in turn comes from mainstream "trolling", a style of fishing in +which one trails bait through a likely spot hoping for a bite. +The well-constructed troll is a post that induces lots of newbies +and flamers to make themselves look even more clueless than they +already do, while subtly conveying to the more savvy and +experienced that it is in fact a deliberate troll. If you don't +fall for the joke, you get to be in on it. See also YHBT. 2. An individual who chronically trolls in +sense 1; regularly posts specious arguments, flames or personal +attacks to a newsgroup, discussion list, or in email for no other +purpose than to annoy someone or disrupt a discussion. Trolls are +recognizable by the fact that the have no real interest in +learning about the topic at hand - they simply want to utter +flame bait. Like the ugly creatures they are named after, they +exhibit no redeeming characteristics, and as such, they are +recognized as a lower form of life on the net, as in, "Oh, ignore +him, he's just a troll." 3. [Berkeley] Computer lab monitor. A +popular campus job for CS students. Duties include helping +newbies and ensuring that lab policies are followed. Probably +so-called because it involves lurking in dark cavelike +corners. + +Some people claim that the troll (sense 1) is properly a +narrower category than flame +bait, that a troll is categorized by containing some +assertion that is wrong but not overtly controversial. See also +Troll-O-Meter. + +The use of `troll' in either sense is a live metaphor that +readily produces elaborations and combining forms. For example, +one not infrequently sees the warning "Do not feed the troll" as +part of a followup to troll postings. + + +Node:Troll-O-Meter, Next:tron, Previous:troll, Up:= T += + +Troll-O-Meter n. + +Common Usenet jargon for a notional instrument used to measure +the quality of a Usenet troll. "Come +on, everyone! If the above doesn't set off the Troll-O-Meter, +we're going to have to get him to run around with a big blinking +sign saying `I am a troll, I'm only in it for the controversy and +flames' and shooting random gobs of Jell-O(tm) at us before the +point is proven." Mentions of the Troll-O-Meter are often +accompanied by an ASCII picture of an arrow pointing at a numeric +scale. Compare bogometer. + + +Node:tron, Next:true-hacker, Previous:Troll-O-Meter, Up:= T = + +tron v. + +[NRL, CMU; prob. fr. the movie "Tron"] To become inaccessible +except via email or talk(1), especially when one is +normally available via telephone or in person. Frequently used in +the past tense, as in: "Ran seems to have tronned on us this +week" or "Gee, Ran, glad you were able to un-tron yourself". One +may also speak of `tron mode'; compare spod. + +Note that many dialects of BASIC have a TRON/TROFF command +pair that enables/disables line number tracing; this has no +obvious relationship to the slang usage. + + +Node:true-hacker, Next:tty, Previous:tron, Up:= T = + + +true-hacker n. + +[analogy with `trufan' from SF fandom] One who exemplifies the +primary values of hacker culture, esp. competence and helpfulness +to other hackers. A high compliment. "He spent 6 hours helping me +bring up UUCP and netnews on my FOOBAR 4000 last week -- +manifestly the act of a true-hacker." Compare demigod, oppose munchkin. + + +Node:tty, Next:tube, Previous:true-hacker, Up:= T = + +tty /T-T-Y/, /tit'ee/ n. + +The latter pronunciation was primarily ITS, but some Unix +people say it this way as well; this pronunciation is +not considered to have sexual undertones. 1. A terminal +of the teletype variety, characterized by a noisy mechanical +printer, a very limited character set, and poor print quality. +Usage: antiquated (like the TTYs themselves). See also bit-paired keyboard. 2. +[especially Unix] Any terminal at all; sometimes used to refer to +the particular terminal controlling a given job. 3. [Unix] Any +serial port, whether or not the device connected to it is a +terminal; so called because under Unix such devices have names of +the form tty*. Ambiguity between senses 2 and 3 is common but +seldom bothersome. + + +Node:tube, Next:tube time, Previous:tty, Up:= T = + + +tube + +1. n. A CRT terminal. Never used in the mainstream sense of +TV; real hackers don't watch TV, except for Loony Toons, Rocky +& Bullwinkle, Trek Classic, the Simpsons, and the occasional +cheesy old swashbuckler movie. 2. [IBM] To send a copy of +something to someone else's terminal. "Tube me that note?" + + +Node:tube time, Next:tunafish, Previous:tube, Up:= T = + + +tube time n. + +Time spent at a terminal or console. More inclusive than +hacking time; commonly used in discussions of what parts of one's +environment one uses most heavily. "I find I'm spending too much +of my tube time reading mail since I started this revision." + + +Node:tunafish, Next:tune, Previous:tube time, Up:= T = + +tunafish n. + +In hackish lore, refers to the mutated punchline of an age-old +joke to be found at the bottom of the manual pages of +tunefs(8) in the original BSD 4.2 distribution. The joke was removed in +later releases once commercial sites started using 4.2, but +apparently restored on the 4.4BSD tape and in {Net,Free,Open}BSD. +Tunefs relates to the `tuning' of file-system parameters for +optimum performance, and at the bottom of a few pages of wizardly +inscriptions was a `BUGS' section consisting of the line "You can +tune a file system, but you can't tunafish". Variants of this can +be seen in other BSD versions, though it has been excised from +some versions by humorless management droids. The [nt]roff source for SunOS 4.1.1 +contains a comment apparently designed to prevent this: "Take +this out and a Unix Demon will dog your steps from now until the +time_t's wrap around." + +[It has since been pointed out that indeed you can tunafish. +Usually at a canning factory... --ESR] + + +Node:tune, Next:turbo nerd, Previous:tunafish, Up:= +T = + +tune vt. + +[from automotive or musical usage] To optimize a program or +system for a particular environment, esp. by adjusting numerical +parameters designed as hooks for +tuning, e.g., by changing #define lines in C. One +may `tune for time' (fastest execution), `tune for space' (least +memory use), or `tune for configuration' (most efficient use of +hardware). See bum, hot spot, hand-hacking. + + +Node:turbo nerd, Next:Turing tar-pit, Previous:tune, Up:= T = + +turbo nerd n. + +See computer geek. + + +Node:Turing tar-pit, Next:turist, Previous:turbo nerd, Up:= T = + +Turing tar-pit n. + +1. A place where anything is possible but nothing of interest +is practical. Alan Turing helped lay the foundations of computer +science by showing that all machines and languages capable of +expressing a certain very primitive set of operations are +logically equivalent in the kinds of computations they can carry +out, and in principle have capabilities that differ only in speed +from those of the most powerful and elegantly designed computers. +However, no machine or language exactly matching Turing's +primitive set has ever been built (other than possibly as a +classroom exercise), because it would be horribly slow and far +too painful to use. A `Turing tar-pit' is any computer language +or other tool that shares this property. That is, it's +theoretically universal -- but in practice, the harder you +struggle to get any real work done, the deeper its inadequacies +suck you in. Compare bondage-and-discipline +language. 2. The perennial holy +wars over whether language A or B is the "most +powerful". + + +Node:turist, Next:Tux, Previous:Turing tar-pit, Up:= T = + +turist /too'rist/ n. + +Var. sp. of tourist, q.v. Also +in adjectival form, `turistic'. Poss. influenced by luser and `Turing'. + + +Node:Tux, Next:tweak, Previous:turist, Up:= T += + +Tux + +Tux the Penguin is the official emblem of Linux, This eventuated after a logo contest in +1996, during which Linus Torvalds endorsed the idea of a penguin +logo in a couple of famously funny postings. Linus +explained that he was once bitten by a killer penguin in +Australia and has felt a special affinity for the species ever +since. (Linus has since admitted that he was also thinking of +Feathers McGraw, the evil-genius penguin jewel thief who appeared +in a Wallace & Grommit feature cartoon, "The Wrong +Trousers".) + +Larry Ewing designed the +official Tux logo. It has proved a wise choice, amenable to +hundreds of recognizable variations used as emblems of +Linux-related projects, products, and user groups. In fact, Tux +has spawned an entire mythology, of which the Gospel According to +Tux and the mock-epic poem "Tuxowolf" are among the +best-known examples. + +There is a `real' Tux - a black-footed penguin resident at the +Bristol Zoo. Several friends of Linux bought a zoo sponsorship +for Linus as a birthday present in 1996. + + +Node:tweak, Next:tweeter, Previous:Tux, Up:= T = + + +tweak vt. + +1. To change slightly, usually in reference to a value. Also +used synonymously with twiddle. If +a program is almost correct, rather than figure out the precise +problem you might just keep tweaking it until it works. See frobnicate and fudge factor; also see shotgun debugging. 2. To tune or bum a +program; preferred usage in the U.K. + + +Node:tweeter, Next:TWENEX, Previous:tweak, Up:= T += + +tweeter n. + +[University of Waterloo] Syn. perf, +chad (sense 1). This term (like woofer) has been in use at Waterloo since +1972 but is elsewhere unknown. In audio jargon, the word refers +to the treble speaker(s) on a hi-fi. + + +Node:TWENEX, Next:twiddle, Previous:tweeter, Up:= T += + +TWENEX /twe'neks/ n. + +The TOPS-20 operating system by DEC +-- the second proprietary OS for the PDP-10 -- preferred by most +PDP-10 hackers over TOPS-10 (that is, by those who were not ITS or WAITS +partisans). TOPS-20 began in 1969 as Bolt, Beranek & Newman's +TENEX operating system using special paging hardware. By the +early 1970s, almost all of the systems on the ARPANET ran TENEX. +DEC purchased the rights to TENEX from BBN and began work to make +it their own. The first in-house code name for the operating +system was VIROS (VIRtual memory Operating System); when +customers started asking questions, the name was changed to SNARK +so DEC could truthfully deny that there was any project called +VIROS. When the name SNARK became known, the name was briefly +reversed to become KRANS; this was quickly abandoned when someone +objected that `krans' meant `funeral wreath' in Swedish (though +some Swedish speakers have since said it means simply `wreath'; +this part of the story may be apocryphal). Ultimately DEC picked +TOPS-20 as the name of the operating system, and it was as +TOPS-20 that it was marketed. The hacker community, mindful of +its origins, quickly dubbed it TWENEX (a contraction of `twenty +TENEX'), even though by this point very little of the original +TENEX code remained (analogously to the differences between +AT&T V6 Unix and BSD). DEC people cringed when they heard +"TWENEX", but the term caught on nevertheless (the written +abbreviation `20x' was also used). TWENEX was successful and very +popular; in fact, there was a period in the early 1980s when it +commanded as fervent a culture of partisans as Unix or ITS -- but +DEC's decision to scrap all the internal rivals to the VAX +architecture and its relatively stodgy VMS OS killed the DEC-20 +and put a sad end to TWENEX's brief day in the sun. DEC attempted +to convince TOPS-20 users to convert to VMS, but instead, by the late 1980s, most of the +TOPS-20 hackers had migrated to Unix. + + +Node:twiddle, Next:twilight zone, Previous:TWENEX, Up:= +T = + +twiddle n. + +1. Tilde (ASCII 1111110, ~). Also called +`squiggle', `sqiggle' (sic -- pronounced /skig'l/), and +`twaddle', but twiddle is the most common term. 2. A small and +insignificant change to a program. Usually fixes one bug and +generates several new ones (see also shotgun debugging). 3. vt. To +change something in a small way. Bits, for example, are often +twiddled. Twiddling a switch or knobs +implies much less sense of purpose than toggling or tweaking it; +see frobnicate. To speak of +twiddling a bit connotes aimlessness, and at best doesn't specify +what you're doing to the bit; `toggling a bit' has a more +specific meaning (see bit +twiddling, toggle). 4. +Uncommon name for the twirling +baton prompt. + + +Node:twilight zone, Next:twink, Previous:twiddle, Up:= T += + +twilight zone n. // + +[IRC] Notionally, the area of cyberspace where IRC operators live. An op +is said to have a "connection to the twilight zone". + + +Node:twink, Next:twirling baton, Previous:twilight zone, Up:= T = + +twink /twink/ n. + +1. [Berkeley] A clue-repellant user; the next step beyond a +clueless one. 2. [UCSC] A read-only user. Also reported on the +Usenet group _soc.motss_; may derive from gay slang for a +cute young thing with nothing upstairs (compare mainstream +`chick'). + + +Node:twirling baton, Next:two pi, Previous:twink, Up:= T += + +twirling baton n. + +[PLATO] The overstrike sequence -/|\-/|\- which produces an +animated twirling baton. If you output it with a single backspace +between characters, the baton spins in place. If you output the +sequence BS SP between characters, the baton spins from left to +right. If you output BS SP BS BS between characters, the baton +spins from right to left. This is also occasionally called a +twiddle prompt. + +The twirling baton was a popular component of animated +signature files on the pioneering PLATO educational timesharing +system. The archie Internet service is perhaps the +best-known baton program today; it uses the twirling baton as an +idler indicating that the program is working on a query. The +twirling baton is also used as a boot progress indicator on +several BSD variants of Unix; if it stops you're probably going +to have a long and trying day. + + +Node:two pi, Next:two-to-the-N, Previous:twirling baton, Up:= T = + +two pi quant. + +The number of years it takes to finish one's thesis. Occurs in +stories in the following form: "He started on his thesis; 2 pi +years later..." + + +Node:two-to-the-N, Next:twonkie, Previous:two pi, Up:= T += + +two-to-the-N quant. + +An amount much larger than N but +smaller than infinity. "I have +2-to-the-N things to do before I can go out for lunch" means you +probably won't show up. + + +Node:twonkie, Next:u-, Previous:two-to-the-N, Up:= T = + +twonkie /twon'kee/ n. + +The software equivalent of a Twinkie (a variety of +sugar-loaded junk food, or (in gay slang with a small t) the male +equivalent of `chick'); a useless `feature' added to look sexy +and placate a marketroid +(compare Saturday-night +special). The term may also be related to "The Twonky", +title menace of a classic SF short story by Lewis Padgett (Henry +Kuttner and C. L. Moore), first published in the September 1942 +"Astounding Science Fiction" and subsequently much +anthologized. + + +Node:= U =, Next:= V =, Previous:= T =, Up:The Jargon Lexicon + += U = + + +u-: + + +UBD: + + +UBE: + + +UCE: + + +UDP: + + +UN*X: + + +undefined +external reference: + + +under the hood: + + +undocumented +feature: + + +uninteresting: + + +Unix: + + +Unix brain damage: + + +Unix conspiracy: + + +Unix weenie: + + +unixism: + + +unswizzle: + + +unwind the stack: + + +unwind-protect: + + +up: + + +upload: + + +upthread: + + +urchin: + + +URL: + + +Usenet: + + +Usenet Death +Penalty: + + +user: + + +user-friendly: + + +user-obsequious: + + +userland: + + +USG Unix: + + +UTSL: + + +UUCPNET: + + +Node:u-, Next:UBD, +Previous:twonkie, Up:= U = + +u- pref. + +Written shorthand for micro-; +techspeak when applied to metric units, jargon when used +otherwise. Derived from the Greek letter "mu", the first letter +of "micro" (and which letter looks a lot like the English letter +"u"). + + +Node:UBD, Next:UBE, Previous:u-, +Up:= U = + +UBD /U-B-D/ n. + +[abbreviation for `User Brain Damage'] An abbreviation used to +close out trouble reports obviously due to utter cluelessness on +the user's part. Compare pilot +error; oppose PBD; see also +brain-damaged. + + +Node:UBE, Next:UCE, Previous:UBD, +Up:= U = + +UBE // n. + +[abbrev., Unsoliclited Bulk Email] A widespread, more formal +term for email spam. Compare UCE. The UBE term recognizes that spam is +uttered by nonprofit and advocacy groups whose motives are not +commercial. + + +Node:UCE, Next:UDP, Previous:UBE, +Up:= U = + +UCE n. + +[abbrev., Unsolicited Commercial Email] A widespread, more +formal term for email spam. Compare +UBE, which may be superseding it. + + +Node:UDP, Next:UN*X, Previous:UCE, +Up:= U = + +UDP /U-D-P/ v.,n. + +[Usenet] Abbreviation for Usenet Death Penalty. Common +(probably now more so than the full form), and frequently verbed. +Compare IDP. + + +Node:UN*X, Next:undefined external +reference, Previous:UDP, +Up:= U = + +UN*X n. + +Used to refer to the Unix operating system (a trademark of +AT&T, then of Novell, then of SCO, and then of Caldera) in +writing, but avoiding the need for the ugly (TM) typography. Also used to refer to any or all +varieties of Unixoid operating systems. Ironically, lawyers now +say that the requirement for the trademark postfix has no legal +force, but the asterisk usage is entrenched anyhow. It has been +suggested that there may be a psychological connection to +practice in certain religions (especially Judaism) in which the +name of the deity is never written out in full, e.g., `YHWH' or +`G-d' is used. See also glob and splat out. + + +Node:undefined +external reference, Next:under the hood, Previous:UN*X, Up:= U = + +undefined external reference excl. + +[Unix] A message from Unix's linker. Used in speech to flag +loose ends or dangling references in an argument or +discussion. + + +Node:under the hood, Next:undocumented +feature, Previous:undefined external +reference, Up:= U = + + +under the hood adj. + +[hot-rodder talk] 1. Used to introduce the underlying +implementation of a product (hardware, software, or idea). +Implies that the implementation is not intuitively obvious from +the appearance, but the speaker is about to enable the listener +to grok it. "Let's now look under the +hood to see how ...." 2. Can also imply that the +implementation is much simpler than the appearance would +indicate: "Under the hood, we are just fork/execing the shell." +3. Inside a chassis, as in "Under the hood, this baby has a 40MHz +68030!" + + +Node:undocumented feature, +Next:uninteresting, +Previous:under the +hood, Up:= U = + +undocumented feature n. + +See feature. + + +Node:uninteresting, Next:Unix, Previous:undocumented feature, Up:= U = + +uninteresting adj. + +1. Said of a problem that, although nontrivial, can be solved simply by +throwing sufficient resources at it. 2. Also said of problems for +which a solution would neither advance the state of the art nor +be fun to design and code. + +Hackers regard uninteresting problems as intolerable wastes of +time, to be solved (if at all) by lesser mortals. Real +hackers (see toolsmith) +generalize uninteresting problems enough to make them interesting +and solve them -- thus solving the original problem as a special +case (and, it must be admitted, occasionally turning a molehill +into a mountain, or a mountain into a tectonic plate). See WOMBAT, SMOP; +compare toy problem, oppose +interesting. + + +Node:Unix, Next:Unix brain damage, Previous:uninteresting, Up:= U = + +Unix /yoo'niks/ n. + +[In the authors' words, "A weak pun on Multics"; very early on +it was `UNICS'] (also `UNIX') An interactive time-sharing system +invented in 1969 by Ken Thompson after Bell Labs left the Multics +project, originally so he could play games on his scavenged +PDP-7. Dennis Ritchie, the inventor of C, is considered a +co-author of the system. The turning point in Unix's history came +when it was reimplemented almost entirely in C during 1972-1974, +making it the first source-portable OS. Unix subsequently +underwent mutations and expansions at the hands of many different +people, resulting in a uniquely flexible and developer-friendly +environment. By 1991, Unix had become the most widely used +multiuser general-purpose operating system in the world - and +since 1996 the variiant called Linux +has been at the cutting edge of the open source movement. Many people +consider the success of Unix the most important victory yet of +hackerdom over industry opposition (but see Unix weenie and Unix conspiracy for an opposing +point of view). See Version 7, +BSD, USG +Unix, Linux. + +Some people are confused over whether this word is +appropriately `UNIX' or `Unix'; both forms are common, and used +interchangeably. Dennis Ritchie says that the `UNIX' spelling +originally happened in CACM's 1974 paper "The UNIX Time-Sharing +System" because "we had a new typesetter and troff had just been invented and we were +intoxicated by being able to produce small caps." Later, dmr +tried to get the spelling changed to `Unix' in a couple of Bell +Labs papers, on the grounds that the word is not acronymic. He +failed, and eventually (his words) "wimped out" on the issue. So, +while the trademark today is `UNIX', both capitalizations are +grounded in ancient usage; the Jargon File uses `Unix' in +deference to dmr's wishes. + + +Node:Unix brain damage, +Next:Unix conspiracy, +Previous:Unix, Up:= U = + +Unix brain damage n. + +Something that has to be done to break a network program +(typically a mailer) on a non-Unix system so that it will +interoperate with Unix systems. The hack may qualify as `Unix +brain damage' if the program conforms to published standards and +the Unix program in question does not. Unix brain damage happens +because it is much easier for other (minority) systems to change +their ways to match non-conforming behavior than it is to change +all the hundreds of thousands of Unix systems out there. + +An example of Unix brain damage is a kluge in a mail server to recognize bare line +feed (the Unix newline) as an equivalent form to the Internet +standard newline, which is a carriage return followed by a line +feed. Such things can make even a hardened jock weep. + + +Node:Unix conspiracy, Next:Unix weenie, Previous:Unix brain +damage, Up:= U = + +Unix conspiracy n. + +[ITS] According to a conspiracy theory long popular among +ITS and TOPS-20 fans, Unix's growth is the result of a +plot, hatched during the 1970s at Bell Labs, whose intent was to +hobble AT&T's competitors by making them dependent upon a +system whose future evolution was to be under AT&T's control. +This would be accomplished by disseminating an operating system +that is apparently inexpensive and easily portable, but also +relatively unreliable and insecure (so as to require continuing +upgrades from AT&T). This theory was lent a substantial +impetus in 1984 by the paper referenced in the back door entry. + +In this view, Unix was designed to be one of the first +computer viruses (see virus) -- but a +virus spread to computers indirectly by people and market forces, +rather than directly through disks and networks. Adherents of +this `Unix virus' theory like to cite the fact that the +well-known quotation "Unix is snake oil" was uttered by DEC president Kenneth Olsen shortly before +DEC began actively promoting its own family of Unix workstations. +(Olsen now claims to have been misquoted.) + +[If there was ever such a conspiracy, it got thoroughly out of +the plotters' control after 1990. AT&T sold its UNIX +operation to Novell around the same time Linux and other free-UNIX distributions were +beginning to make noise. --ESR] + + +Node:Unix weenie, Next:unixism, Previous:Unix conspiracy, Up:= U = + +Unix weenie n. + +[ITS] 1. A derogatory play on `Unix wizard', common among +hackers who use Unix by necessity but would prefer alternatives. +The implication is that although the person in question may +consider mastery of Unix arcana to be a wizardly skill, the only +real skill involved is the ability to tolerate (and the bad taste +to wallow in) the incoherence and needless complexity that is +alleged to infest many Unix programs. "This shell script tries to +parse its arguments in 69 bletcherous ways. It must have been +written by a real Unix weenie." 2. A derogatory term for anyone +who engages in uncritical praise of Unix. Often appearing in the +context "stupid Unix weenie". See Weenix, Unix +conspiracy. See also weenie. + + +Node:unixism, Next:unswizzle, Previous:Unix weenie, Up:= U = + +unixism n. + +A piece of code or a coding technique that depends on the +protected multi-tasking environment with relatively low +process-spawn overhead that exists on virtual-memory Unix +systems. Common unixisms include: +gratuitous use of fork(2); the assumption that +certain undocumented but well-known features of Unix libraries +such as stdio(3) are supported elsewhere; reliance +on obscure side-effects of system +calls (use of sleep(2) with a 0 argument to clue the +scheduler that you're willing to give up your time-slice, for +example); the assumption that freshly allocated memory is zeroed; +and the assumption that fragmentation problems won't arise from +never free()ing memory. Compare vaxocentrism; see also New Jersey. + + +Node:unswizzle, Next:unwind the stack, Previous:unixism, Up:= U = + +unswizzle v. + +See swizzle. + + +Node:unwind the stack, Next:unwind-protect, Previous:unswizzle, Up:= U = + +unwind the stack vi. + +1. [techspeak] During the execution of a procedural language, +one is said to `unwind the stack' from a called procedure up to a +caller when one discards the stack frame and any number of frames +above it, popping back up to the level of the given caller. In C +this is done with longjmp/setjmp, in +LISP or C++ with throw/catch. See also smash the stack. 2. People can +unwind the stack as well, by quickly dealing with a bunch of +problems: "Oh heck, let's do lunch. Just a second while I unwind +my stack." + + +Node:unwind-protect, Next:up, Previous:unwind the stack, Up:= U = + +unwind-protect n. + +[MIT: from the name of a LISP operator] A task you must +remember to perform before you leave a place or finish a project. +"I have an unwind-protect to call my advisor." + + +Node:up, Next:upload, Previous:unwind-protect, Up:= U = + +up adj. + +1. Working, in order. "The down escalator is up." Oppose down. 2. `bring up': vt. To create a working +version and start it. "They brought up a down system." 3. `come +up' vi. To become ready for production use. + + +Node:upload, Next:upthread, Previous:up, Up:= U = + +upload /uhp'lohd/ v. + +1. [techspeak] To transfer programs or data over a digital +communications link from a system near you (espercially a smaller +or peripheral `client' system) to one further away from you +(especially a larger or central `host' system). A transfer in the +other direction is, of course, called a download 2. [speculatively] To move the +essential patterns and algorithms that make up one's mind from +one's brain into a computer. Those who are convinced that such +patterns and algorithms capture the complete essence of the self +view this prospect with pleasant anticipation. + + +Node:upthread, Next:urchin, Previous:upload, Up:= U += + +upthread adv. + +Earlier in the discussion (see thread), i.e., `above'. "As Joe pointed out +upthread, ..." See also followup. + + +Node:urchin, Next:URL, Previous:upthread, Up:= +U = + +urchin n. + +See munchkin. + + +Node:URL, Next:Usenet, Previous:urchin, Up:= U += + +URL /U-R-L/ or /erl/ n. + +Uniform Resource Locator, an address widget that identifies a +document or resource on the World Wide Web. This entry is here +primarily to record the fact that the term is commonly pronounced +both /erl/, and /U-R-L/ (the latter predominates in more formal +contexts). + + +Node:Usenet, Next:Usenet Death Penalty, Previous:URL, Up:= U = + +Usenet /yoos'net/ or /yooz'net/ n. + +[from `Users' Network'; the original spelling was USENET, but +the mixed-case form is now widely preferred] A distributed bboard (bulletin board) system supported +mainly by Unix machines. Originally implemented in 1979-1980 by +Steve Bellovin, Jim Ellis, Tom Truscott, and Steve Daniel at Duke +University, it has swiftly grown to become international in scope +and is now probably the largest decentralized information utility +in existence. As of early 1996, it hosts over 10,000 newsgroups and an average of over 500 +megabytes (the equivalent of several thousand paper pages) of new +technical articles, news, discussion, chatter, and flamage every day (and that leaves out the +graphics...). + +By the year the Internet hit the mainstream (1994) the +original UUCP transport for Usenet was fading out of use (see +UUCPNET) - almost all Usenet +connections were over Internet links. A lot of newbies and +journalists began to refer to "Internet newsgroups" as though +Usenet was and always had been just another Internet service. +This ignorance greatly annoys experienced Usenetters. + + +Node:Usenet Death Penalty, +Next:user, Previous:Usenet, Up:= U = + +Usenet Death Penalty + +[Usenet] A sanction against sites that habitually spew Usenet +spam. This can be either passive or +active. A passive UDP refers to the dropping of all postings by a +particular domain so as to inhibit propagation. An active UDP +refers to third-party cancellation of all postings by the UDPed +domain. A partial UDP is one which applies only to certain +newsgroups or hierarchies in Usenet. Compare Internet Death Penalty, +with which this term is sometimes confused. + + +Node:user, Next:user-friendly, Previous:Usenet Death Penalty, Up:= U = + +user n. + +1. Someone doing `real work' with the computer, using it as a +means rather than an end. Someone who pays to use a computer. See +real user. 2. A programmer who +will believe anything you tell him. One who asks silly questions. +[GLS observes: This is slightly unfair. It is true that users ask +questions (of necessity). Sometimes they are thoughtful or deep. +Very often they are annoying or downright stupid, apparently +because the user failed to think for two seconds or look in the +documentation before bothering the maintainer.] See luser. 3. Someone who uses a program from the +outside, however skillfully, without getting into the internals +of the program. One who reports bugs instead of just going ahead +and fixing them. + +The general theory behind this term is that there are two +classes of people who work with a program: there are implementors +(hackers) and lusers. The users are +looked down on by hackers to some extent because they don't +understand the full ramifications of the system in all its glory. +(The few users who do are known as `real winners'.) The term is a +relative one: a skilled hacker may be a user with respect to some +program he himself does not hack. A LISP hacker might be one who +maintains LISP or one who uses LISP (but with the skill of a +hacker). A LISP user is one who uses LISP, whether skillfully or +not. Thus there is some overlap between the two terms; the subtle +distinctions must be resolved by context. + + +Node:user-friendly, Next:user-obsequious, Previous:user, Up:= U = + +user-friendly adj. + +Programmer-hostile. Generally used by hackers in a critical +tone, to describe systems that hold the user's hand so +obsessively that they make it painful for the more experienced +and knowledgeable to get any work done. See menuitis, drool-proof paper, Macintrash, user-obsequious. + + +Node:user-obsequious, Next:userland, Previous:user-friendly, Up:= U = + +user-obsequious adj. + +Emphatic form of user-friendly. Connotes a system so +verbose, inflexible, and determinedly simple-minded that it is +nearly unusable. "Design a system any fool can use and only a +fool will want to use it." See WIMP environment, Macintrash. + + +Node:userland, Next:USG Unix, Previous:user-obsequious, Up:= U = + +userland n. + +Anywhere outside the kernel. "That code belongs in userland." +This term has been in common use among Linux kernel hackers since at leat 1997, and +seems to have originated in that community. + + +Node:USG Unix, Next:UTSL, Previous:userland, Up:= +U = + +USG Unix /U-S-G yoo'niks/ n.,obs. + +Refers to AT&T Unix commercial versions after Version 7, especially System III and +System V releases 1, 2, and 3. So called because during most of +the lifespan of those versions AT&T's support crew was called +the `Unix Support Group', but it is applied to version that pre- +and post-dated the USG group but were of the same lineage. This +term is now historical. See BSD, Unix. + + +Node:UTSL, Next:UUCPNET, Previous:USG Unix, Up:= U = + +UTSL // n. + +[Unix] On-line acronym for `Use the Source, Luke' (a pun on +Obi-Wan Kenobi's "Use the Force, Luke!" in "Star Wars") -- +analogous to RTFS (sense 1), but more +polite. This is a common way of suggesting that someone would be +better off reading the source code that supports whatever feature +is causing confusion, rather than making yet another futile pass +through the manuals, or broadcasting questions on Usenet that +haven't attracted wizards to answer +them. + +Once upon a time in elder +days, everyone running Unix had source. After 1978, +AT&T's policy tightened up, so this objurgation was in theory +appropriately directed only at associates of some outfit with a +Unix source license. In practice, bootlegs of Unix source code +(made precisely for reference purposes) were so ubiquitous that +one could utter it at almost anyone on the network without +concern. + +Nowadays, free Unix clones have become widely enough +distributed that anyone can read source legally. The most widely +distributed is certainly Linux, with variants of the NET/2 and +4.4BSD distributions running second. Cheap commercial Unixes with +source such as BSD/OS are accelerating this trend. + + +Node:UUCPNET, Next:V7, Previous:UTSL, +Up:= U = + +UUCPNET n. obs. + +The store-and-forward network consisting of all the world's +connected Unix machines (and others running some clone of the +UUCP (Unix-to-Unix CoPy) software). Any machine reachable only +via a bang path is on UUCPNET. +This term has been rendered obsolescent by the spread of cheap +Internet connections in the 1990s; the few remaining UUCP links +are essentially slow channels to the Internet rather than an +autonomous network. See network +address. + + +Node:= V =, Next:= W =, Previous:= U =, Up:The Jargon Lexicon + += V = + + +V7: + + +vadding: + + +vanilla: + + +vanity domain: + + +vannevar: + + +vaporware: + + +var: + + +vaston: + + +VAX: + + +VAXectomy: + + +VAXen: + + +vaxherd: + + +vaxism: + + +vaxocentrism: + + +vdiff: + + +veeblefester: + + +velveeta: + + +ventilator card: + + +Venus flytrap: + + +verbage: + + +verbiage: + + +Version 7: + + +vgrep: + + +vi: + + +video toaster: + + +videotex: + + +virgin: + + +virtual: + + +virtual beer: + + +virtual Friday: + + +virtual reality: + + +virtual shredder: + + +virus: + + +visionary: + + +VMS: + + +voice: + + +voice-net: + + +voodoo programming: + + +VR: + + +Vulcan nerve +pinch: + + +vulture capitalist: + + +Node:V7, Next:vadding, Previous:UUCPNET, Up:= V += + +V7 /V'sev'en/ n. + +See Version 7. + + +Node:vadding, Next:vanilla, Previous:V7, Up:= V = + +vadding /vad'ing/ n. + +[from VAD, a permutation of ADV (i.e., ADVENT), used to avoid a particular admin's continual search-and-destroy sweeps for +the game] A leisure-time activity of certain hackers involving +the covert exploration of the `secret' parts of large buildings +-- basements, roofs, freight elevators, maintenance crawlways, +steam tunnels, and the like. A few go so far as to learn +locksmithing in order to synthesize vadding keys. The verb is `to +vad' (compare phreaking; see also +hack, sense 9). This term dates from +the late 1970s, before which such activity was simply called +`hacking'; the older usage is still prevalent at MIT. + +The most extreme and dangerous form of vadding is `elevator +rodeo', a.k.a. `elevator surfing', a sport played by wrasslin' +down a thousand-pound elevator car with a 3-foot piece of string, +and then exploiting this mastery in various stimulating ways +(such as elevator hopping, shaft exploration, rat-racing, and the +ever-popular drop experiments). Kids, don't try this at home! See +also hobbit (sense 2). + + +Node:vanilla, Next:vanity domain, Previous:vadding, Up:= V = + +vanilla adj. + +[from the default flavor of ice cream in the U.S.] Ordinary +flavor, standard. When used of food, +very often does not mean that the food is flavored with vanilla +extract! For example, `vanilla wonton soup' means ordinary wonton +soup, as opposed to hot-and-sour wonton soup. Applied to hardware +and software, as in "Vanilla Version 7 Unix can't run on a +vanilla 11/34." Also used to orthogonalize chip nomenclature; for +instance, a 74V00 means what TI calls a 7400, as distinct from a +74LS00, etc. This word differs from canonical in that the latter means +`default', whereas vanilla simply means `ordinary'. For example, +when hackers go on a great-wall, +hot-and-sour soup is the canonical soup to get (because that is what +most of them usually order) even though it isn't the vanilla +(wonton) soup. + + +Node:vanity domain, Next:vannevar, Previous:vanilla, Up:= V = + +vanity domain n. + +[common; from `vanity plate' as in car license plate] An +Internet domain, particularly in the .com or .org top-level +domains, apparently created for no reason other than boosting the +creator's ego. + + +Node:vannevar, Next:vaporware, Previous:vanity domain, Up:= V = + +vannevar /van'*-var/ n. + +A bogus technological prediction or a foredoomed engineering +concept, esp. one that fails by implicitly assuming that +technologies develop linearly, incrementally, and in isolation +from one another when in fact the learning curve tends to be +highly nonlinear, revolutions are common, and competition is the +rule. The prototype was Vannevar Bush's prediction of `electronic +brains' the size of the Empire State Building with a +Niagara-Falls-equivalent cooling system for their tubes and +relays, a prediction made at a time when the semiconductor effect +had already been demonstrated. Other famous vannevars have +included magnetic-bubble memory, LISP machines, videotex, and a paper from the late 1970s +that computed a purported ultimate limit on areal density for ICs +that was in fact less than the routine densities of 5 years +later. + + +Node:vaporware, Next:var, Previous:vannevar, Up:= +V = + +vaporware /vay'pr-weir/ n. + +Products announced far in advance of any release (which may or +may not actually take place). See also brochureware. + + +Node:var, Next:vaston, Previous:vaporware, Up:= V = + +var /veir/ or /var/ n. + +Short for `variable'. Compare arg, +param. + + +Node:vaston, Next:VAX, Previous:var, +Up:= V = + +vaston n. + +[Durham, UK] The unit of `load average'. A measure of how much +work a computer is doing. A meter displaying this as a function +of time is known as a `vastometer'. First used during a computing +practical in December 1996. + + +Node:VAX, Next:VAXectomy, Previous:vaston, Up:= V += + +VAX /vaks/ n. + +1. [from Virtual Address eXtension] The most successful +minicomputer design in industry history, possibly excepting its +immediate ancestor, the PDP-11. Between its release in 1978 and +its eclipse by killer micros +after about 1986, the VAX was probably the hacker's favorite +machine of them all, esp. after the 1982 release of 4.2 BSD Unix +(see BSD). Esp. noted for its large, +assembler-programmer-friendly instruction set -- an asset that +became a liability after the RISC revolution. 2. A major brand of +vacuum cleaner in Britain. Cited here because its sales pitch, +"Nothing sucks like a VAX!" became a sort of battle-cry of RISC +partisans. It is even sometimes claimed that DEC actually entered +a cross-licensing deal with the vacuum-Vax people that allowed +them to market VAX computers in the U.K. in return for not +challenging the vacuum cleaner trademark in the U.S. + +A rival brand actually pioneered the slogan: its original form +was "Nothing sucks like Electrolux". It has apparently become a +classic example (used in advertising textbooks) of the perils of +not knowing the local idiom. But in 1996, the press manager of +Electrolux AB, while confirming that the company used this slogan +in the late 1960s, also tells us that their marketing people were +fully aware of the possible double entendre and intended it to +gain attention. + +And gain attention it did - the VAX-vacuum-cleaner people +thought the slogan a sufficiently good idea to copy it. Several +British hackers report that VAX's promotions used it in +1986-1987, and we have one report from a New Zealander that the +infamous slogan surfaced there in TV ads for the product in +1992. + + +Node:VAXectomy, Next:VAXen, Previous:VAX, Up:= V = + + +VAXectomy /vak-sek't*-mee/ n. + +[by analogy with `vasectomy'] A VAX removal. DEC's Microvaxen, especially, are much slower than +newer RISC-based workstations such as the SPARC. Thus, if one +knows one has a replacement coming, VAX removal can be cause for +celebration. + + +Node:VAXen, Next:vaxherd, Previous:VAXectomy, Up:= V = + +VAXen /vak'sn/ n. + +[from `oxen', perhaps influenced by `vixen'] (alt. `vaxen') +The plural canonically used among hackers for the DEC VAX computers. "Our installation has four +PDP-10s and twenty vaxen." See boxen. + + +Node:vaxherd, Next:vaxism, Previous:VAXen, Up:= V += + +vaxherd /vaks'herd/ n. obs. + +[from `oxherd'] A VAX operator. The image is reinforced +because VAXen actually did tend to come in herds, technically +known as `clusters'. + + +Node:vaxism, Next:vaxocentrism, Previous:vaxherd, Up:= V = + +vaxism /vak'sizm/ n. + +A piece of code that exhibits vaxocentrism in critical areas. Compare +PC-ism, unixism. + + +Node:vaxocentrism, Next:vdiff, Previous:vaxism, Up:= V += + +vaxocentrism /vak`soh-sen'trizm/ n. + +[analogy with `ethnocentrism'] A notional disease said to +afflict C programmers who persist in coding according to certain +assumptions that are valid (esp. under Unix) on VAXen but false elsewhere. Among these are: + + +The assumption that dereferencing a null pointer is safe +because it is all bits 0, and location 0 is readable and 0. +Problem: this may instead cause an illegal-address trap on +non-VAXen, and even on VAXen under OSes other than BSD Unix. +Usually this is an implicit assumption of sloppy code (forgetting +to check the pointer before using it), rather than deliberate +exploitation of a misfeature. + + +The assumption that characters are signed. + + +The assumption that a pointer to any one type can freely be +cast into a pointer to any other type. A stronger form of this is +the assumption that all pointers are the same size and format, +which means you don't have to worry about getting the casts or +types correct in calls. Problem: this fails on word-oriented +machines or others with multiple pointer formats. + + +The assumption that the parameters of a routine are stored in +memory, on a stack, contiguously, and in strictly ascending or +descending order. Problem: this fails on many RISC +architectures. + + +The assumption that pointer and integer types are the same +size, and that pointers can be stuffed into integer variables +(and vice-versa) and drawn back out without being truncated or +mangled. Problem: this fails on segmented architectures or +word-oriented machines with funny pointer formats. + + +The assumption that a data type of any size may begin at any +byte address in memory (for example, that you can freely +construct and dereference a pointer to a word- or greater-sized +object at an odd char address). Problem: this fails on many (esp. +RISC) architectures better optimized for HLL execution speed, and can cause an illegal +address fault or bus error. + + +The (related) assumption that there is no padding at the end +of types and that in an array you can thus step right from the +last byte of a previous component to the first byte of the next +one. This is not only machine- but compiler-dependent. + + +The assumption that memory address space is globally flat and +that the array reference foo[-1] is necessarily +valid. Problem: this fails at 0, or other places on +segment-addressed machines like Intel chips (yes, segmentation is +universally considered a brain-damaged way to design machines +(see moby), but that is a separate +issue). + + +The assumption that objects can be arbitrarily large with no +special considerations. Problem: this fails on segmented +architectures and under non-virtual-addressing environments. + + +The assumption that the stack can be as large as memory. +Problem: this fails on segmented architectures or almost anything +else without virtual addressing and a paged stack. + + +The assumption that bits and addressable units within an +object are ordered in the same way and that this order is a +constant of nature. Problem: this fails on big-endian machines. + + +The assumption that it is meaningful to compare pointers to +different objects not located within the same array, or to +objects of different types. Problem: the former fails on +segmented architectures, the latter on word-oriented machines or +others with multiple pointer formats. + + +The assumption that an int is 32 bits, or +(nearly equivalently) the assumption that sizeof(int) == +sizeof(long). Problem: this fails on PDP-11s, 286-based +systems and even on 386 and 68000 systems under some compilers +(and on 64-bit systems like the Alpha, of course). + + +The assumption that argv[] is writable. Problem: +this fails in many embedded-systems C environments and even under +a few flavors of Unix. + +Note that a programmer can validly be accused of vaxocentrism +even if he or she has never seen a VAX. Some of these assumptions +(esp. 2-5) were valid on the PDP-11, the original C machine, and +became endemic years before the VAX. The terms `vaxocentricity' +and `all-the-world's-a-VAX syndrome' have been used +synonymously. + + +Node:vdiff, Next:veeblefester, Previous:vaxocentrism, Up:= V = + +vdiff /vee'dif/ v.,n. + +Visual diff. The operation of finding differences between two +files by eyeball search. +The term `optical diff' has also been reported, and is sometimes +more specifically used for the act of superimposing two nearly +identical printouts on one another and holding them up to a light +to spot differences. Though this method is poor for detecting +omissions in the `rear' file, it can also be used with printouts +of graphics, a claim few if any diff programs can make. See diff. + + +Node:veeblefester, Next:velveeta, Previous:vdiff, Up:= V += + +veeblefester /vee'b*l-fes`tr/ n. + +[from the "Born Loser" comix via Commodore; prob. originally +from "Mad" Magazine's `Veeblefetzer' parodies beginning in #15, +1954] Any obnoxious person engaged in the (alleged) professions +of marketing or management. Antonym of hacker. Compare suit, marketroid. + + +Node:velveeta, Next:ventilator card, Previous:veeblefester, Up:= V = + +velveeta n. + +[Usenet: by analogy with spam. The +trade name Velveeta is attached in the U.S. to a particularly +nasty processed-cheese spread.] Also knows as ECP; a message that is excessively cross-posted, +as opposed to spam which is too +frequently posted. This term is widely recognized but not +commonly used; most people refer to both kinds of abuse as spam. +Compare jello. + + +Node:ventilator card, Next:Venus flytrap, Previous:velveeta, Up:= V = + +ventilator card n. + +Syn. lace card. + + +Node:Venus flytrap, Next:verbage, Previous:ventilator card, Up:= V = + +Venus flytrap n. + +[after the insect-eating plant] See firewall machine. + + +Node:verbage, Next:verbiage, Previous:Venus flytrap, Up:= V = + +verbage /ver'b*j/ n. + +A deliberate misspelling and mispronunciation of verbiage that assimilates it to the word +`garbage'. Compare content-free. More pejorative than +`verbiage'. + + +Node:verbiage, Next:Version 7, Previous:verbage, Up:= V += + +verbiage n. + +When the context involves a software or hardware system, this +refers to documentation. This +term borrows the connotations of mainstream `verbiage' to suggest +that the documentation is of marginal utility and that the +motives behind its production have little to do with the +ostensible subject. + + +Node:Version 7, Next:vgrep, Previous:verbiage, Up:= +V = + +Version 7 alt. V7 /vee' se'vn/ n. + +The first widely distributed version of Unix, released unsupported by Bell Labs in 1978. +The term is used adjectivally to describe Unix features and +programs that date from that release, and are thus guaranteed to +be present and portable in all Unix versions (this was the +standard gauge of portability before the POSIX and IEEE 1003 +standards). Note that this usage does not derive from +the release being the "seventh version of Unix"; research Unix +at Bell Labs has traditionally been numbered according to the +edition of the associated documentation. Indeed, only the +widely-distributed Sixth and Seventh Editions are widely known as +V[67]; the OS that might today be known as `V10' is instead known +in full as "Tenth Edition Research Unix" or just "Tenth Edition" +for short. For this reason, "V7" is often read by cognoscenti as +"Seventh Edition". See BSD, USG Unix, Unix. +Some old-timers impatient with commercialization and kernel bloat +still maintain that V7 was the Last True Unix. + + +Node:vgrep, Next:vi, Previous:Version 7, Up:= V = + +vgrep /vee'grep/ v.,n. + +Visual grep. The operation of finding patterns in a file +optically rather than digitally (also called an `optical grep'). +See grep; compare vdiff. + + +Node:vi, Next:video toaster, Previous:vgrep, Up:= V += + +vi /V-I/, not /vi:/ and never /siks/ +n. + +[from `Visual Interface'] A screen editor crufted together by +Bill Joy for an early BSD release. +Became the _de facto_ standard Unix editor and a nearly +undisputed hacker favorite outside of MIT until the rise of EMACS after about 1984. Tends to frustrate +new users no end, as it will neither take commands while +expecting input text nor vice versa, and the default setup on +older versions provides no indication of which mode the editor is +in (years ago, a correspondent reported that he has often heard +the editor's name pronounced /vi:l/; there is now a vi clone +named `vile'). Nevertheless vi (and variants such as vim and +elvis) is still widely used (about half the respondents in a 1991 +Usenet poll preferred it), and even EMACS fans often resort to it +as a mail editor and for small editing jobs (mainly because it +starts up faster than the bulkier versions of EMACS). See holy wars. + + +Node:video toaster, Next:videotex, Previous:vi, Up:= V = + + +video toaster n. + +Historically, an Amiga fitted with a particular line of +special video effects hardware from NewTek - long a popular +platform at special-effects and video production houses. More +generally, any computer system designed specifically for video +production and manipulation. Compare web toaster and see toaster. + + +Node:videotex, Next:virgin, Previous:video toaster, Up:= V = + +videotex n. obs. + +An electronic service offering people the privilege of paying +to read the weather on their television screens instead of having +somebody read it to them for free while they brush their teeth. +The idea bombed everywhere it wasn't government-subsidized, +because by the time videotex was practical the installed base of +personal computers could hook up to timesharing services and do +the things for which videotex might have been worthwhile better +and cheaper. Videotex planners badly overestimated both the +appeal of getting information from a computer and the cost of +local intelligence at the user's end. Like the gorilla arm effect, this has been a +cautionary tale to hackers ever since. See also vannevar. + + +Node:virgin, Next:virtual, Previous:videotex, Up:= +V = + +virgin adj. + +Unused; pristine; in a known initial state. "Let's bring up a +virgin system and see if it crashes again." (Esp. useful after +contracting a virus through SEX.) Also, by extension, buffers and the +like within a program that have not yet been used. + + +Node:virtual, Next:virtual beer, Previous:virgin, Up:= +V = + +virtual adj. + +[via the technical term `virtual memory', prob. from the term +`virtual image' in optics] 1. Common alternative to logical; often used to refer to the artificial +objects (like addressable virtual memory larger than physical +memory) simulated by a computer system as a convenient way to +manage access to shared resources. 2. Simulated; performing the +functions of something that isn't really there. An imaginative +child's doll may be a virtual playmate. Oppose real. + + +Node:virtual beer, Next:virtual Friday, Previous:virtual, Up:= V = + +virtual beer n. + +Praise or thanks. Used universally in the Linux community. +Originally this term signified cash, after a famous incident in +which some some Britishers who wanted to buy Linus a beer and +sent him money to Finland to do so. + + +Node:virtual Friday, Next:virtual reality, Previous:virtual beer, Up:= V = + +virtual Friday n. + +(also `logical Friday') The last day before an extended +weekend, if that day is not a `real' Friday. For example, the +U.S. holiday Thanksgiving is always on a Thursday. The next day +is often also a holiday or taken as an extra day off, in which +case Wednesday of that week is a virtual Friday (and Thursday is +a virtual Saturday, as is Friday). There are also `virtual +Mondays' that are actually Tuesdays, after the three-day weekends +associated with many national holidays in the U.S. + + +Node:virtual reality, Next:virtual shredder, +Previous:virtual +Friday, Up:= V = + +virtual reality n. + +1. Computer simulations that use 3-D graphics and devices such +as the Dataglove to allow the user to interact with the +simulation. See cyberspace. 2. A +form of network interaction incorporating aspects of role-playing +games, interactive theater, improvisational comedy, and `true +confessions' magazines. In a virtual reality forum (such as +Usenet's _alt.callahans_ newsgroup or the MUD experiments on Internet), interaction between +the participants is written like a shared novel complete with +scenery, `foreground characters' that may be personae utterly +unlike the people who write them, and common `background +characters' manipulable by all parties. The one iron law is that +you may not write irreversible changes to a character without the +consent of the person who `owns' it. Otherwise anything goes. See +bamf, cyberspace, teledildonics. + + +Node:virtual shredder, Next:virus, Previous:virtual reality, Up:= V = + +virtual shredder n. + +The jargonic equivalent of the bit +bucket at shops using IBM's VM/CMS operating system. +VM/CMS officially supports a whole bestiary of virtual card +readers, virtual printers, and other phantom devices; these are +used to supply some of the same capabilities Unix gets from pipes +and I/O redirection. + + +Node:virus, Next:visionary, Previous:virtual shredder, Up:= V = + +virus n. + +[from the obvious analogy with biological viruses, via SF] A +cracker program that searches out other programs and `infects' +them by embedding a copy of itself in them, so that they become +Trojan horses. When these +programs are executed, the embedded virus is executed too, thus +propagating the `infection'. This normally happens invisibly to +the user. Unlike a worm, a virus +cannot infect other computers without assistance. It is +propagated by vectors such as humans trading programs with their +friends (see SEX). The virus may do +nothing but propagate itself and then allow the program to run +normally. Usually, however, after propagating silently for a +while, it starts doing things like writing cute messages on the +terminal or playing strange tricks with the display (some viruses +include nice display hacks). +Many nasty viruses, written by particularly perversely minded +crackers, do irreversible damage, +like nuking all the user's files. + +In the 1990s, viruses became a serious problem, especially +among Windows users; the lack of security on these machines +enables viruses to spread easily, even infecting the operating +system (Unix machines, by contrast, are immune to such attacks). +The production of special anti-virus software has become an +industry, and a number of exaggerated media reports have caused +outbreaks of near hysteria among users; many lusers tend to blame everything that +doesn't work as they had expected on virus attacks. Accordingly, +this sense of `virus' has passed not only into techspeak but into +also popular usage (where it is often incorrectly used to denote +a worm or even a Trojan horse). See phage; compare back +door; see also Unix +conspiracy. + + +Node:visionary, Next:VMS, Previous:virus, Up:= V += + +visionary n. + +1. One who hacks vision, in the sense of an Artificial +Intelligence researcher working on the problem of getting +computers to `see' things using TV cameras. (There isn't any +problem in sending information from a TV camera to a computer. +The problem is, how can the computer be programmed to make use of +the camera information? See SMOP, +AI-complete.) 2. [IBM] One who +reads the outside literature. At IBM, apparently, such a penchant +is viewed with awe and wonder. + + +Node:VMS, Next:voice, Previous:visionary, Up:= V = + +VMS /V-M-S/ n. + +DEC's proprietary operating system +for its VAX minicomputer; one of the seven or so environments +that loom largest in hacker folklore. Many Unix fans generously +concede that VMS would probably be the hacker's favorite +commercial OS if Unix didn't exist; though true, this makes VMS +fans furious. One major hacker gripe with VMS concerns its +slowness -- thus the following limerick: + + There once was a system called VMS + Of cycles by no means abstemious. + It's chock-full of hacks + And runs on a VAX + And makes my poor stomach all squeamious. + --- The Great Quux + + +See also VAX, TOPS-10, TOPS-20, Unix, +runic. + + +Node:voice, Next:voice-net, Previous:VMS, Up:= V = + + +voice vt. + +To phone someone, as opposed to emailing them or connecting in +talk mode. "I'm busy now; I'll +voice you later." + + +Node:voice-net, Next:voodoo programming, Previous:voice, Up:= V = + +voice-net n. + +Hackish way of referring to the telephone system, analogizing +it to a digital network. Usenet sig +blocks not uncommonly include the sender's phone next to +a "Voice:" or "Voice-Net:" header; common variants of this are +"Voicenet" and "V-Net". Compare paper-net, snail-mail. + + +Node:voodoo programming, +Next:VR, Previous:voice-net, Up:= V = + +voodoo programming n. + +[from George Bush's "voodoo economics"] 1. The use by guess or +cookbook of an obscure or hairy system, feature, or algorithm that +one does not truly understand. The implication is that the +technique may not work, and if it doesn't, one will never know +why. Almost synonymous with black +magic, except that black magic typically isn't documented +and nobody understands it. Compare magic, deep +magic, heavy +wizardry, rain dance, +cargo cult +programming, wave +a dead chicken. 2. Things programmers do that they know +shouldn't work but they try anyway, and which sometimes actually +work, such as recompiling everything. + + +Node:VR, Next:Vulcan nerve pinch, Previous:voodoo +programming, Up:= V = + + +VR // [MUD] n. + +On-line abbrev for virtual +reality, as opposed to RL. + + +Node:Vulcan nerve pinch, +Next:vulture +capitalist, Previous:VR, +Up:= V = + +Vulcan nerve pinch n. + +[from the old "Star Trek" TV series via Commodore Amiga +hackers] The keyboard combination that forces a soft-boot or jump +to ROM monitor (on machines that support such a feature). On PC +clones this is Ctrl-Alt-Del; on Suns, L1-A; on Macintoshes, it is +<Cmd>-<Power switch> or +<CMD>-<CTRL>-<POWER>! Also called three-finger salute. Compare +quadruple bucky. + + +Node:vulture capitalist, +Next:W2K bug, Previous:Vulcan nerve +pinch, Up:= V = + +vulture capitalist n. + +Pejorative hackerism for `venture capitalist', deriving from +the common practice of pushing contracts that deprive inventors +of control over their own innovations and most of the money they +ought to have made from them. + + +Node:= W =, Next:= X =, Previous:= V =, Up:The Jargon Lexicon + += W = + + +W2K bug: + + +wabbit: + + +WAITS: + + +waldo: + + +walk: + + +walk off the end +of: + + +walking drives: + + +wall: + + +wall follower: + + +wall time: + + +wall wart: + + +wallpaper: + + +wango: + + +wank: + + +wannabee: + + +war dialer: + + +-ware: + + +warez: + + +warez d00dz: + + +warez kiddies: + + +warlording: + + +warm boot: + + +wart: + + +washing machine: + + +washing software: + + +water MIPS: + + +wave a dead +chicken: + + +weasel: + + +web pointer: + + +web toaster: + + +webify: + + +webmaster: + + +web ring: + + +wedged: + + +wedgie: + + +wedgitude: + + +weeble: + + +weeds: + + +weenie: + + +Weenix: + + +well-behaved: + + +well-connected: + + +wetware: + + +whack: + + +whack-a-mole: + + +whacker: + + +whales: + + +whalesong: + + +What's a spline?: + + +wheel: + + +wheel bit: + + +wheel of +reincarnation: + + +wheel wars: + + +White Book: + + +whitelist: + + +whizzy: + + +wibble: + + +WIBNI: + + +widget: + + +wiggles: + + +WIMP environment: + + +win: + + +win big: + + +win win: + + +Winchester: + + +windoid: + + +window shopping: + + +Windoze: + + +winged comments: + + +winkey: + + +winnage: + + +winner: + + +winnitude: + + +Wintel: + + +wired: + + +wirehead: + + +wirewater: + + +wish list: + + +within delta of: + + +within epsilon of: + + +wizard: + + +Wizard Book: + + +wizard hat: + + +wizard mode: + + +wizardly: + + +wok-on-the-wall: + + +womb box: + + +WOMBAT: + + +womble: + + +wonky: + + +woofer: + + +workaround: + + +working as +designed: + + +worm: + + +wormhole: + + +wound around the +axle: + + +wrap around: + + +write-only code: + + +write-only +language: + + +write-only memory: + + +Wrong Thing: + + +wugga wugga: + + +wumpus: + + +WYSIAYG: + + +WYSIWYG: + + +Node:W2K bug, Next:wabbit, Previous:vulture capitalist, Up:= W = + +W2K bug + +[from `Y2K bug' for the Year 2000 problem] The upcoming +deployment of Microsoft's Windows 2000 operating system, which +hackers generally expect will be among the worst train wrecks in +the history of software engineering. Such is the power of +Microsoft marketing, however, that it is also expected this will +not become obvious until it has incurred hundreds of millions of +dollars in downtime and lost opportunity costs. + + +Node:wabbit, Next:WAITS, Previous:W2K bug, Up:= +W = + +wabbit /wab'it/ n. + +[almost certainly from Elmer Fudd's immortal line "You +wascawwy wabbit!"] 1. A legendary early hack reported on a +System/360 at RPI and elsewhere around 1978; this may have +descended (if only by inspiration) from a hack called RABBITS +reported from 1969 on a Burroughs 5500 at the University of +Washington Computer Center. The program would make two copies of +itself every time it was run, eventually crashing the system. 2. +By extension, any hack that includes infinite self-replication +but is not a virus or worm. See fork +bomb and rabbit job, +see also cookie +monster. + + +Node:WAITS, Next:waldo, Previous:wabbit, Up:= W += + +WAITS /wayts/ n. + +The mutant cousin of TOPS-10 +used on a handful of systems at SAIL +up to 1990. There was never an `official' expansion of WAITS (the +name itself having been arrived at by a rather sideways process), +but it was frequently glossed as `West-coast Alternative to ITS'. +Though WAITS was less visible than ITS, there was frequent +exchange of people and ideas between the two communities, and +innovations pioneered at WAITS exerted enormous indirect +influence. The early screen modes of EMACS, for example, were directly inspired by +WAITS's `E' editor -- one of a family of editors that were the +first to do `real-time editing', in which the editing commands +were invisible and where one typed text at the point of +insertion/overwriting. The modern style of multi-region windowing +is said to have originated there, and WAITS alumni at XEROX PARC +and elsewhere played major roles in the developments that led to +the XEROX Star, the Macintosh, and the Sun workstations. Also +invented there were bucky bits +-- thus, the ALT key on every IBM PC is a WAITS legacy. One WAITS +feature very notable in pre-Web days was a news-wire interface +that allowed WAITS hackers to read, store, and filter AP and UPI +dispatches from their terminals; the system also featured a +still-unusual level of support for what is now called +`multimedia' computing, allowing analog audio and video signals +to be switched to programming terminals. + + +Node:waldo, Next:walk, Previous:WAITS, Up:= W += + +waldo /wol'doh/ n. + +[From Robert A. Heinlein's story "Waldo"] 1. A mechanical +agent, such as a gripper arm, controlled by a human limb. When +these were developed for the nuclear industry in the mid-1940s +they were named after the invention described by Heinlein in the +story, which he wrote in 1942. Now known by the more generic term +`telefactoring', this technology is of intense interest to NASA +for tasks like space station maintenance. 2. At Harvard +(particularly by Tom Cheatham and students), this is used instead +of foobar as a metasyntactic +variable and general nonsense word. See foo, bar, foobar, quux. + + +Node:walk, Next:walk off the end of, +Previous:waldo, Up:= W = + +walk n.,vt. + +Traversal of a data structure, especially an array or +linked-list data structure in core. +See also codewalker, silly walk, clobber. + + +Node:walk off the end +of, Next:walking +drives, Previous:walk, +Up:= W = + +walk off the end of vt. + +To run past the end of an array, list, or medium after +stepping through it -- a good way to land in trouble. Often the +result of an off-by-one +error. Compare clobber, +roach, smash the stack. + + +Node:walking drives, Next:wall, Previous:walk off the end of, Up:= W = + +walking drives n. + +An occasional failure mode of magnetic-disk drives back in the +days when they were huge, clunky washing machines. Those old dinosaur parts carried terrific angular +momentum; the combination of a misaligned spindle or worn +bearings and stick-slip interactions with the floor could cause +them to `walk' across a room, lurching alternate corners forward +a couple of millimeters at a time. There is a legend about a +drive that walked over to the only door to the computer room and +jammed it shut; the staff had to cut a hole in the wall in order +to get at it! Walking could also be induced by certain patterns +of drive access (a fast seek across the whole width of the disk, +followed by a slow seek in the other direction). Some bands of +old-time hackers figured out how to induce disk-accessing +patterns that would do this to particular drive models and held +disk-drive races. + + +Node:wall, Next:wall follower, Previous:walking drives, Up:= W = + +wall interj. + +[WPI] 1. An indication of confusion, usually spoken with a +quizzical tone: "Wall??" 2. A request for further explication. +Compare octal forty. 3. +[Unix, from `write all'] v. To send a message to everyone +currently logged in, esp. with the wall(8) utility. + +It is said that sense 1 came from the idiom `like talking to a +blank wall'. It was originally used in situations where, after +you had carefully answered a question, the questioner stared at +you blankly, clearly having understood nothing that was +explained. You would then throw out a "Hello, wall?" to elicit +some sort of response from the questioner. Later, confused +questioners began voicing "Wall?" themselves. + + +Node:wall follower, Next:wall time, Previous:wall, Up:= W = + +wall follower n. + +A person or algorithm that compensates for lack of +sophistication or native stupidity by efficiently following some +simple procedure shown to have been effective in the past. Used +of an algorithm, this is not necessarily pejorative; it recalls +`Harvey Wallbanger', the winning robot in an early AI contest +(named, of course, after the cocktail). Harvey successfully +solved mazes by keeping a `finger' on one wall and running till +it came out the other end. This was inelegant, but it was +mathematically guaranteed to work on simply-connected mazes -- +and, in fact, Harvey outperformed more sophisticated robots that +tried to `learn' each maze by building an internal representation +of it. Used of humans, the term is pejorative and +implies an uncreative, bureaucratic, by-the-book mentality. See +also code grinder; compare +droid. + + +Node:wall time, Next:wall wart, Previous:wall follower, Up:= W = + +wall time n. + +(also `wall clock time') 1. `Real world' time (what the clock +on the wall shows), as opposed to the system clock's idea of +time. 2. The real running time of a program, as opposed to the +number of ticks required to execute it +(on a timesharing system these always differ, as no one program +gets all the ticks, and on multiprocessor systems with good +thread support one may get more processor time than real +time). + + +Node:wall wart, Next:wallpaper, Previous:wall time, Up:= W = + +wall wart n. + +A small power-supply brick with integral male plug, designed +to plug directly into a wall outlet; called a `wart' because when +installed on a power strip it tends to block up at least one more +socket than it uses.. These are frequently associated with modems +and other small electronic devices which would become +unacceptably bulky or hot if they had power supplies on board +(there are other reasons as well having to do with the cost of UL +certification). + + +Node:wallpaper, Next:wango, Previous:wall wart, Up:= W = + +wallpaper n. + +1. A file containing a listing (e.g., assembly listing) or a +transcript, esp. a file containing a transcript of all or part of +a login session. (The idea was that the paper for such listings +was essentially good only for wallpaper, as evidenced at +Stanford, where it was used to cover windows.) Now rare, esp. +since other systems have developed other terms for it (e.g., +PHOTO on TWENEX). However, the Unix world doesn't have an +equivalent term, so perhaps wallpaper will take hold there. The term +probably originated on ITS, where the commands to begin and end +transcript files were :WALBEG and +:WALEND, with default file WALL PAPER +(the space was a path delimiter). 2. The background pattern used +on graphical workstations (this is techspeak under the `Windows' +graphical user interface to MS-DOS). 3. `wallpaper file' n. The +file that contains the wallpaper information before it is +actually printed on paper. (Even if you don't intend ever to +produce a real paper copy of the file, it is still called a +wallpaper file.) + + +Node:wango, Next:wank, Previous:wallpaper, Up:= W = + +wango /wang'goh/ n. + +Random bit-level grovelling going +on in a system during some unspecified operation. Often used in +combination with mumble. For +example: "You start with the `.o' file, run it through this +postprocessor that does mumble-wango -- and it comes out a snazzy +object-oriented executable." + + +Node:wank, Next:wannabee, Previous:wango, Up:= W += + +wank /wangk/ n.,v.,adj. + +[Columbia University: prob. by mutation from Commonwealth +slang v. `wank', to masturbate] Used much as hack is elsewhere, as a noun denoting a clever +technique or person or the result of such cleverness. May +describe (negatively) the act of hacking for hacking's sake +("Quit wanking, let's go get supper!") or (more positively) a +wizard. Adj. `wanky' describes +something particularly clever (a person, program, or algorithm). +Conversations can also get wanky when there are too many wanks +involved. This excess wankiness is signalled by an overload of +the `wankometer' (compare bogometer). When the wankometer overloads, +the conversation's subject must be changed, or all non-wanks will +leave. Compare `neep-neeping' (under neep-neep). Usage: U.S. only. In Britain and +the Commonwealth this word is extremely rude and is best +avoided unless one intends to give offense. Adjectival `wanky' is +less offensive and simply means `stupid' or `broken' (this is +mainstream in Great Britain). + + +Node:wannabee, Next:war dialer, Previous:wank, Up:= W = + + +wannabee /won'*-bee/ n. + +(also, more plausibly, spelled `wannabe') [from a term +recently used to describe Madonna fans who dress, talk, and act +like their idol; prob. originally from biker slang] A would-be +hacker. The connotations of this +term differ sharply depending on the age and exposure of the +subject. Used of a person who is in or might be entering larval stage, it is +semi-approving; such wannabees can be annoying but most hackers +remember that they, too, were once such creatures. When used of +any professional programmer, CS academic, writer, or suit, it is derogatory, implying that said person +is trying to cuddle up to the hacker mystique but doesn't, +fundamentally, have a prayer of understanding what it is all +about. Overuse of terms from this lexicon is often an indication +of the wannabee nature. Compare +newbie. + +Historical note: The wannabee phenomenon has a slightly +different flavor now (1993) than it did ten or fifteen years ago. +When the people who are now hackerdom's tribal elders were in +larval stage, the process of +becoming a hacker was largely unconscious and unaffected by +models known in popular culture -- communities formed +spontaneously around people who, as individuals, felt +irresistibly drawn to do hackerly things, and what wannabees +experienced was a fairly pure, skill-focused desire to become +similarly wizardly. Those days of innocence are gone forever; +society's adaptation to the advent of the microcomputer after +1980 included the elevation of the hacker as a new kind of folk +hero, and the result is that some people semi-consciously set out +to be hackers and borrow hackish prestige by fitting the +popular image of hackers. Fortunately, to do this really well, +one has to actually become a wizard. Nevertheless, old-time +hackers tend to share a poorly articulated disquiet about the +change; among other things, it gives them mixed feelings about +the effects of public compendia of lore like this one. + + +Node:war dialer, Next:-ware, Previous:wannabee, Up:= +W = + +war dialer n. + +A cracking tool, a program that calls a given list or range of +phone numbers and records those which answer with handshake tones +(and so might be entry points to computer or telecommunications +systems). Some of these programs have become quite sophisticated, +and can now detect modem, fax, or PBX tones and log each one +separately. The war dialer is one of the most important tools in +the phreaker's kit. These programs +evolved from early demon +dialers. + + +Node:-ware, Next:warez, Previous:war dialer, Up:= W = + +-ware suff. + +[from `software'] Commonly used to form jargon terms for +classes of software. For examples, see annoyware, careware, crippleware, crudware, freeware, fritterware, guiltware, liveware, meatware, payware, psychedelicware, shareware, shelfware, vaporware, wetware. + + +Node:warez, Next:warez d00dz, Previous:-ware, Up:= W += + +warez /weirz/ n. + +Widely used in cracker +subcultures to denote cracked version of commercial software, +that is versions from which copy-protection has been stripped. +Hackers recognize this term but don't use it themselves. See +warez d00dz, courier, leech, +elite. + + +Node:warez d00dz, Next:warez kiddies, Previous:warez, Up:= W = + +warez d00dz /weirz doodz/ n. + +A substantial subculture of crackers refer to themselves as `warez d00dz'; +there is evidently some connection with B1FF here. As `Ozone Pilot', one former warez +d00d, wrote: + +Warez d00dz get illegal copies of copyrighted +software. If it has copy protection on it, they break the +protection so the software can be copied. Then they distribute it +around the world via several gateways. Warez d00dz form badass +group names like RAZOR and the like. They put up boards that +distribute the latest ware, or pirate program. The whole point of +the Warez sub-culture is to get the pirate program released and +distributed before any other group. I know, I know. But don't +ask, and it won't hurt as much. This is how they prove their +poweress [sic]. It gives them the right to say, "I released +King's Quest IVXIX before you so obviously my testicles are +larger." Again don't ask... + + +The studly thing to do if one is a warez d00d, it appears, is +emit `0-day warez', that is copies of commercial software copied +and cracked on the same day as its retail release. Warez d00ds +also hoard software in a big way, collecting untold megabytes of +arcade-style games, pornographic JPGs, and applications they'll +never use onto their hard disks. As Ozone Pilot acutely +observes: + +[BELONG] is the only word you will need to know. +Warez d00dz want to belong. They have been shunned by everyone, +and thus turn to cyberspace for acceptance. That is why they +always start groups like TGW, FLT, USA and the like. Structure +makes them happy. [...] Warez d00dz will never have a handle like +"Pink Daisy" because warez d00dz are insecure. Only someone who +is very secure with a good dose of self-esteem can stand up to +the cries of fag and girlie-man. More likely you will find warez +d00dz with handles like: Doctor Death, Deranged Lunatic, +Hellraiser, Mad Prince, Dreamdevil, The Unknown, Renegade +Chemist, Terminator, and Twin Turbo. They like to sound badass +when they can hide behind their terminals. More likely, if you +were given a sample of 100 people, the person whose handle is +Hellraiser is the last person you'd associate with the +name. + + +The contrast with Internet hackers is stark and instructive. +See cracker, wannabee, handle, elite, +courier, leech; compare weenie, spod. + + +Node:warez kiddies, Next:warlording, Previous:warez d00dz, Up:= W = + +warez kiddies n. + +Even more derogatory way of referring to warez d00dz; refers to the fact that +most warez d00dz are around the age of puberty. Compare script kiddies. + + +Node:warlording, Next:warm boot, Previous:warez kiddies, Up:= W = + +warlording v. + +[from the Usenet group _alt.fan.warlord_] The act of +excoriating a bloated, ugly, or derivative sig block. Common grounds for warlording +include the presence of a signature rendered in a BUAF, over-used or cliched sig quotes, ugly ASCII art, or simply excessive size. The +original `Warlord' was a B1FF-like +newbie c.1991 who featured in his +sig a particularly large and obnoxious ASCII graphic resembling +the sword of Conan the Barbarian in the 1981 John Milius movie; +the group name _alt.fan.warlord_ was sarcasm, and the +characteristic mode of warlording is devastatingly sarcastic +praise. + + +Node:warm boot, Next:wart, Previous:warlording, Up:= W = + +warm boot n. + +See boot. + + +Node:wart, Next:washing machine, Previous:warm boot, Up:= W = + +wart n. + +A small, crocky feature that sticks out of an otherwise clean design. Something conspicuous for +localized ugliness, especially a special-case exception to a +general rule. For example, in some versions of +csh(1), single quotes literalize every character +inside them except !. In ANSI C, the ?? +syntax used for obtaining ASCII characters in a foreign +environment is a wart. See also miswart. + + +Node:washing machine, Next:washing software, +Previous:wart, Up:= W = + +washing machine n. + +1. Old-style 14-inch hard disks in floor-standing cabinets. So +called because of the size of the cabinet and the `top-loading' +access to the media packs -- and, of course, they were always set +on `spin cycle'. The washing-machine idiom transcends language +barriers; it is even used in Russian hacker jargon. See also +walking drives. The thick +channel cables connecting these were called `bit hoses' (see +hose, sense 3). 2. [CMU] A machine +used exclusively for washing +software. CMU has clusters of these. + + +Node:washing software, Next:water MIPS, Previous:washing machine, Up:= W = + +washing software n. + +The process of recompiling a software distribution (used more +often when the recompilation is occuring from scratch) to pick up +and merge together all of the various changes that have been made +to the source. + + +Node:water MIPS, Next:wave a dead chicken, +Previous:washing +software, Up:= W = + +water MIPS n. + +(see MIPS, sense 2) Large, +water-cooled machines of either today's ECL-supercomputer flavor +or yesterday's traditional mainframe type. + + +Node:wave a dead chicken, +Next:weasel, Previous:water MIPS, Up:= W = + +wave a dead chicken v. + +To perform a ritual in the direction of crashed software or +hardware that one believes to be futile but is nevertheless +necessary so that others are satisfied that an appropriate degree +of effort has been expended. "I'll wave a dead chicken over the +source code, but I really think we've run into an OS bug." +Compare voodoo +programming, rain +dance; see also casting the runes. + + +Node:weasel, Next:web pointer, Previous:wave a dead chicken, Up:= W = + +weasel n. + +[Cambridge] A naive user, one who deliberately or accidentally +does things that are stupid or ill-advised. Roughly synonymous +with loser. + + +Node:web pointer, Next:web toaster, Previous:weasel, Up:= +W = + +web pointer n. + +A World Wide Web URL. See also hotlink, which has slightly different +connotations. + + +Node:web toaster, Next:webify, Previous:web pointer, Up:= W = + +web toaster n. + +A small specialized computer, shipped with no monitor or +keyboard or any other external peripherals, pre-configured to be +controlled through an Ethernet port and function as a WWW server. +Products of this kind (for example the Cobalt Qube) are often +about the size of a toaster. See toaster; compare video toaster. + + +Node:webify, Next:webmaster, Previous:web toaster, Up:= W = + +webify n. + +To put a piece of (possibly already existing) material on the +WWW. Frequently used for papers ("Why don't you webify all your +publications?") or for demos ("They webified their 6.866 final +project"). This term seems to have been (rather logically) +independently invented multiple times in the early 1990s. + + +Node:webmaster, Next:web ring, Previous:webify, Up:= W += + +webmaster n. + +[WWW: from postmaster] The +person at a site providing World Wide Web information who is +responsible for maintaining the public pages and keeping the Web +server running and properly configured. + + +Node:web ring, Next:wedged, Previous:webmaster, Up:= W = + +web ring n. + +Two or more web sites connected by prominent links between +sites sharing a common interest or theme. Usually such cliques +have the topology of a ring, in order to make it easy for +visitors to navigate through all of them. + + +Node:wedged, Next:wedgie, Previous:web ring, Up:= W = + +wedged adj. + +1. To be stuck, incapable of proceeding without help. This is +different from having crashed. If the system has crashed, it has +become totally non-functioning. If the system is wedged, it is +trying to do something but cannot make progress; it may be +capable of doing a few things, but not be fully operational. For +example, a process may become wedged if it deadlocks with another (but not all instances +of wedging are deadlocks). See also gronk, locked +up, hosed, hung (wedged is more severe than hung). 2. Often refers to humans suffering +misconceptions. "He's totally wedged -- he's convinced that he +can levitate through meditation." 3. [Unix] Specifically used to +describe the state of a TTY left in a losing state by abort of a +screen-oriented program or one that has messed with the line +discipline in some obscure way. + +There is some dispute over the origin of this term. It is +usually thought to derive from a common description of +recto-cranial inversion; however, it may actually have originated +with older `hot-press' printing technology in which physical type +elements were locked into type frames with wedges driven in by +mallets. Once this had been done, no changes in the typesetting +for that page could be made. + + +Node:wedgie, Next:wedgitude, Previous:wedged, Up:= W += + +wedgie n. + +[Fairchild] A bug. Prob. related to wedged. + + +Node:wedgitude, Next:weeble, Previous:wedgie, Up:= W += + +wedgitude /wedj'i-t[y]ood/ n. + +The quality or state of being wedged. + + +Node:weeble, Next:weeds, Previous:wedgitude, Up:= W = + +weeble /weeb'l/ interj. + +[Cambridge] Used to denote frustration, usually at amazing +stupidity. "I stuck the disk in upside down." +"Weeble...." Compare gurfle. + + +Node:weeds, Next:weenie, Previous:weeble, Up:= W += + +weeds n. + +1. Refers to development projects or algorithms that have no +possible relevance or practical application. Comes from `off in +the weeds'. Used in phrases like "lexical analysis for microcode +is serious weeds...." 2. At CDC/ETA before its +demise, the phrase `go off in the weeds' was equivalent to IBM's +branch to Fishkill +and mainstream hackerdom's jump off into +never-never land. + + +Node:weenie, Next:Weenix, Previous:weeds, Up:= W += + +weenie n. + +1. [on BBSes] Any of a species of luser resembling a less +amusing version of B1FF that infests +many BBS systems. The typical weenie is +a teenage boy with poor social skills travelling under a +grandiose handle derived from +fantasy or heavy-metal rock lyrics. Among sysops, `the weenie +problem' refers to the marginally literate and profanity-laden +flamage weenies tend to spew all +over a newly-discovered BBS. Compare spod, computer +geek, terminal +junkie, warez d00dz. +2. [Among hackers] When used with a qualifier (for example, as in +Unix weenie, VMS weenie, IBM +weenie) this can be either an insult or a term of praise, +depending on context, tone of voice, and whether or not it is +applied by a person who considers him or herself to be the same +sort of weenie. Implies that the weenie has put a major +investment of time, effort, and concentration into the area +indicated; whether this is good or bad depends on the hearer's +judgment of how the speaker feels about that area. See also bigot. 3. The semicolon character, +; (ASCII 0111011). + + +Node:Weenix, Next:well-behaved, Previous:weenie, Up:= +W = + +Weenix /wee'niks/ n. + +1. [ITS] A derogatory term for Unix, derived from Unix weenie. According to one noted +ex-ITSer, it is "the operating system preferred by Unix Weenies: +typified by poor modularity, poor reliability, hard file +deletion, no file version numbers, case sensitivity everywhere, +and users who believe that these are all advantages". (Some ITS +fans behave as though they believe Unix stole a future that +rightfully belonged to them. See ITS, +sense 2.) 2. [Brown University] A Unix-like OS developed for +tutorial purposes at Brown University. See http://www.cs.brown.edu/courses/cs167/weenix.html. +Named independently of the ITS usage. + + +Node:well-behaved, Next:well-connected, Previous:Weenix, Up:= W = + +well-behaved adj. + +1. [primarily MS-DOS] Said of +software conforming to system interface guidelines and standards. +Well-behaved software uses the operating system to do chores such +as keyboard input, allocating memory and drawing graphics. Oppose +ill-behaved. 2. Software that +does its job quietly and without counterintuitive effects. Esp. +said of software having an interface spec sufficiently simple and +well-defined that it can be used as a tool by other software. See cat. 3. Said of an algorithm that doesn't crash or blow +up, even when given pathological input. Implies that the +stability of the algorithm is intrinsic, which makes this +somewhat different from bulletproof. + + +Node:well-connected, Next:wetware, Previous:well-behaved, Up:= W = + +well-connected adj. + +Said of a computer installation, asserts that it has reliable +email links with the network and/or that it relays a large +fraction of available Usenet +newsgroups. `Well-known' can be almost synonymous, but also +implies that the site's name is familiar to many (due perhaps to +an archive service or active Usenet users). + + +Node:wetware, Next:whack, Previous:well-connected, Up:= W = + +wetware /wet'weir/ n. + +[prob. from the novels of Rudy Rucker] 1. The human nervous +system, as opposed to computer hardware or software. "Wetware has +7 plus or minus 2 temporary registers." 2. Human beings +(programmers, operators, administrators) attached to a computer +system, as opposed to the system's hardware or software. See +liveware, meatware. + + +Node:whack, Next:whack-a-mole, Previous:wetware, Up:= W = + +whack v. + +According to arch-hacker James Gosling (designer of NeWS, GOSMACS +and Java), to "...modify a program with no idea whatsoever how it +works." (See whacker.) It is +actually possible to do this in nontrivial circumstances if the +change is small and well-defined and you are very good at glarking things from context. As a trivial +example, it is relatively easy to change all stderr +writes to stdout writes in a piece of C filter code +which remains otherwise mysterious. + + +Node:whack-a-mole, Next:whacker, Previous:whack, Up:= W += + +whack-a-mole n. + +[from the carnival game which involves quickly and repeatedly +hitting the heads of mechanical moles with a mallet as they pop +up from their holes.] 1. The practice of repeatedly causing +spammers' throwaway +accounts and drop boxes to be terminated. 2. After sense +1 became established in the mid-1990s the term passed into more +generalized use, and now is commonly found in such combinations +as `whack-a-mole windows'; the obnoxious pop-ip advertisement +windows spawned in flocks when you surg to sites like Geocities +or Tripod. + + +Node:whacker, Next:whales, Previous:whack-a-mole, Up:= W = + +whacker n. + +[University of Maryland: from hacker] 1. A person, similar to a hacker, who enjoys exploring the details of +programmable systems and how to stretch their capabilities. +Whereas a hacker tends to produce great hacks, a whacker only +ends up whacking the system or program in question. Whackers are +often quite egotistical and eager to claim wizard status, regardless of the views of their +peers. 2. A person who is good at programming quickly, though +rather poorly and ineptly. + + +Node:whales, Next:whalesong, Previous:whacker, Up:= W += + +whales n. + +See like +kicking dead whales down the beach. + + +Node:whalesong, Next:What's a spline?, Previous:whales, Up:= W = + +whalesong n. + +The peculiar clicking and whooshing sounds made by a PEP modem +such as the Telebit Trailblazer as it tries to synchronize with +another PEP modem for their special high-speed mode. This sound +isn't anything like the normal two-tone handshake between +conventional V-series modems and is instantly recognizable to +anyone who has heard it more than once. It sounds, in fact, very +much like whale songs. This noise is also called "the moose call" +or "moose tones". + + +Node:What's a spline?, +Next:wheel, Previous:whalesong, Up:= W = + +What's a spline? + +[XEROX PARC] This phrase expands to: "You have just used a +term that I've heard for a year and a half, and I feel I should +know, but don't. My curiosity has finally overcome my guilt." The +PARC lexicon adds "Moral: don't hesitate to ask questions, even +if they seem obvious." + + +Node:wheel, Next:wheel bit, Previous:What's a spline?, Up:= W = + +wheel n. + +[from slang `big wheel' for a powerful person] A person who +has an active wheel bit. "We +need to find a wheel to unwedge the hung tape drives." (See wedged, sense 1.) The traditional name of +security group zero in BSD (to which +the major system-internal users like root belong) is `wheel'. Some vendors have +expanded on this usage, modifying Unix so that only members of +group `wheel' can go root. + + +Node:wheel bit, Next:wheel of reincarnation, +Previous:wheel, Up:= W = + +wheel bit n. + +A privilege bit that allows the possessor to perform some +restricted operation on a timesharing system, such as read or +write any file on the system regardless of protections, change or +look at any address in the running monitor, crash or reload the +system, and kill or create jobs and user accounts. The term was +invented on the TENEX operating system, and carried over to +TOPS-20, XEROX-IFS, and others. The state of being in a +privileged logon is sometimes called `wheel mode'. This term +entered the Unix culture from TWENEX in the mid-1980s and has +been gaining popularity there (esp. at university sites). See +also root. + + +Node:wheel of +reincarnation, Next:wheel +wars, Previous:wheel +bit, Up:= W = + +wheel of reincarnation + +[coined in a paper by T. H. Myer and I.E. Sutherland "On the +Design of Display Processors", Comm. ACM, Vol. 11, no. 6, June +1968)] Term used to refer to a well-known effect whereby function +in a computing system family is migrated out to special-purpose +peripheral hardware for speed, then the peripheral evolves toward +more computing power as it does its job, then somebody notices +that it is inefficient to support two asymmetrical processors in +the architecture and folds the function back into the main CPU, +at which point the cycle begins again. + +Several iterations of this cycle have been observed in +graphics-processor design, and at least one or two in +communications and floating-point processors. Also known as `the +Wheel of Life', `the Wheel of Samsara', and other variations of +the basic Hindu/Buddhist theological idea. See also blitter, bit +bang. + + +Node:wheel wars, Next:White Book, Previous:wheel of reincarnation, +Up:= W = + +wheel wars n. + +[Stanford University] A period in larval stage during which student +hackers hassle each other by attempting to log each other out of +the system, delete each other's files, and otherwise wreak havoc, +usually at the expense of the lesser users. + + +Node:White Book, Next:whitelist, Previous:wheel wars, Up:= W = + +White Book n. + +1. Syn. K&R. 2. Adobe's +fourth book in the PostScript series, describing the +previously-secret format of Type 1 fonts; "Adobe Type 1 Font +Format, version 1.1", (Addison-Wesley, 1990, ISBN 0-201-57044-0). +See also Red Book, Green Book, Blue Book. + + +Node:whitelist, Next:whizzy, Previous:White Book, Up:= W = + +whitelist n. + +The opposite of a blacklist. That is, instead of being an +explicit list of people who are banned, it's an explicit list of +people who are to be admitted. Hackers use this especially of +lists of email addresses that are explicitly enabled to get past +strict anti-spam filters. + + +Node:whizzy, Next:wibble, Previous:whitelist, Up:= W = + +whizzy adj. + +(alt. `wizzy') [Sun] Describes a cuspy program; one that is feature-rich and well +presented. + + +Node:wibble, Next:WIBNI, Previous:whizzy, Up:= W += + +wibble + +[UK, perh. originally from the first "Roger Irrelevant" strip +in "VIZ" comics, spread via "Your Sinclair magazine in the 1980s +and early 1990s"] 1. n.,v. Commonly used to describe chatter, +content-free remarks or other essentially meaningless +contributions to threads in newsgroups. "Oh, rspence is wibbling +again". 2. [UK IRC] An explicit on-line no-op equivalent to humma. 3. One of the preferred metasyntactic variables in +the UK, forming a series with wobble, +wubble, and flob (attributed to the +hilarious historical comedy "Blackadder"). 4. A pronounciation of +the letters "www", as seen in URLs; i.e., www.foo.com may be pronounced "wibble dot foo dot com" +(compare dub dub dub). + +The ancestral sense of this word is reported to have been "My +brain is packing it in now. I give up. Tilt! Tilt! +Tilt!" + + +Node:WIBNI, Next:widget, Previous:wibble, Up:= W += + +WIBNI // n. + +[Bell Labs: Wouldn't It Be Nice If] What most requirements +documents and specifications consist entirely of. Compare IWBNI. + + +Node:widget, Next:wiggles, Previous:WIBNI, Up:= W += + +widget n. + +1. A meta-thing. Used to stand for a real object in didactic +examples (especially database tutorials). Legend has it that the +original widgets were holders for buggy whips. "But suppose the +parts list for a widget has 52 entries...." 2. +[poss. evoking `window gadget'] A user interface object in X graphical user interfaces. + + +Node:wiggles, Next:WIMP environment, Previous:widget, Up:= W = + +wiggles n. + +[scientific computation] In solving partial differential +equations by finite difference and similar methods, wiggles are +sawtooth (up-down-up-down) oscillations at the shortest +wavelength representable on the grid. If an algorithm is +unstable, this is often the most unstable waveform, so it grows +to dominate the solution. Alternatively, stable (though +inaccurate) wiggles can be generated near a discontinuity by a +Gibbs phenomenon. + + +Node:WIMP environment, Next:win, Previous:wiggles, Up:= W += + +WIMP environment n. + +[acronym: `Window, Icon, Menu, Pointing device (or Pull-down +menu)'] A graphical-user-interface environment such as X or the Macintosh interface, esp. as described +by a hacker who prefers command-line interfaces for their +superior flexibility and extensibility. However, it is also used +without negative connotations; one must pay attention to voice +tone and other signals to interpret correctly. See menuitis, user-obsequious. + + +Node:win, Next:win big, Previous:WIMP environment, Up:= W = + +win + +[MIT; now common everywhere] 1. vi. To succeed. A program wins +if no unexpected conditions arise, or (especially) if it +sufficiently robust to take +exceptions in stride. 2. n. Success, or a specific instance +thereof. A pleasing outcome. "So it turned out I could use a +lexer generator instead of +hand-coding my own pattern recognizer. What a win!" Emphatic +forms: `moby win', `super win', `hyper-win' (often used +interjectively as a reply). For some reason `suitable win' is +also common at MIT, usually in reference to a satisfactory +solution to a problem. Oppose lose; +see also big win, which isn't +quite just an intensification of `win'. + + +Node:win big, Next:win win, Previous:win, Up:= W = + + +win big vi. + +To experience serendipity. "I went shopping and won big; there +was a 2-for-1 sale." See big +win. + + +Node:win win, Next:Winchester, Previous:win big, Up:= +W = + +win win excl. + +Expresses pleasure at a win. + + +Node:Winchester, Next:windoid, Previous:win win, Up:= +W = + +Winchester n. + +Informal generic term for sealed-enclosure magnetic-disk +drives in which the read-write head planes over the disk surface +on an air cushion. There is a legend that the name arose because +the original 1973 engineering prototype for what later became the +IBM 3340 featured two 30-megabyte volumes; 30-30 became +`Winchester' when somebody noticed the similarity to the common +term for a famous Winchester rifle (in the latter, the first 30 +referred to caliber and the second to the grain weight of the +charge). (It is sometimes incorrectly claimed that Winchester was +the laboratory in which the technology was developed.) + + +Node:windoid, Next:window shopping, Previous:Winchester, Up:= W = + +windoid n. + +In the Macintosh world, a style of window with much less +adornment (smaller or missing title bar, zoom box, etc, etc) than +a standard window. + + +Node:window shopping, Next:Windoze, Previous:windoid, Up:= W = + +window shopping n. + +[US Geological Survey] Among users of WIMP environments like X or the Macintosh, extended experimentation with +new window colors, fonts, and icon shapes. This activity can take +up hours of what might otherwise have been productive working +time. "I spent the afternoon window shopping until I found the +coolest shade of green for my active window borders -- now they +perfectly match my medium slate blue background." Serious window +shoppers will spend their days with bitmap editors, creating new +and different icons and background patterns for all to see. Also: +`window dressing', the act of applying new fonts, colors, etc. +See fritterware, compare macdink. + + +Node:Windoze, Next:winged comments, Previous:window shopping, Up:= W = + +Windoze /win'dohz/ n. + +See Microsloth +Windows. + + +Node:winged comments, Next:winkey, Previous:Windoze, Up:= W = + +winged comments n. + +Comments set on the same line as code, as opposed to boxed comments. In C, for +example: + +d = sqrt(x*x + y*y); /* distance from origin */ + + +Generally these refer only to the action(s) taken on that +line. + + +Node:winkey, Next:winnage, Previous:winged comments, Up:= W = + +winkey n. + +(alt. `winkey face') See emoticon. + + +Node:winnage, Next:winner, Previous:winkey, Up:= W += + +winnage /win'*j/ n. + +The situation when a lossage is corrected, or when something +is winning. + + +Node:winner, Next:winnitude, Previous:winnage, Up:= W += + +winner + +1. n. An unexpectedly good situation, program, programmer, or +person. 2. `real winner': Often sarcastic, but also used as high +praise (see also the note under user). +"He's a real winner -- never reports a bug till he can duplicate +it and send in an example." + + +Node:winnitude, Next:Wintel, Previous:winner, Up:= W += + +winnitude /win'*-t[y]ood/ n. + +The quality of winning (as opposed to winnage, which is the result of winning). +"Guess what? They tweaked the microcode and now the LISP +interpreter runs twice as fast as it used to." "That's really +great! Boy, what winnitude!" "Yup. I'll probably get a +half-hour's winnage on the next run of my program." Perhaps +curiously, the obvious antonym `lossitude' is rare. + + +Node:Wintel, Next:wired, Previous:winnitude, Up:= W = + +Wintel n. + +Microsoft Windows plus Intel - the tacit alliance that +dominated desktop computing in the 1990s. Now (1999) possibly on +the verge of breaking up under pressure from Linux; see Lintel. + + +Node:wired, Next:wirehead, Previous:Wintel, Up:= W += + +wired n. + +See hardwired. + + +Node:wirehead, Next:wirewater, Previous:wired, Up:= W += + +wirehead /wi:r'hed/ n. + +[prob. from SF slang for an electrical-brain-stimulation +addict] 1. A hardware hacker, especially one who concentrates on +communications hardware. 2. An expert in local-area networks. A +wirehead can be a network software wizard too, but will always +have the ability to deal with network hardware, down to the +smallest component. Wireheads are known for their ability to lash +up an Ethernet terminator from spare resistors, for example. + + +Node:wirewater, Next:wish list, Previous:wirehead, Up:= +W = + +wirewater n. + +Syn. programming +fluid. This melds the mainstream slang adjective `wired' +(stimulated, up, hyperactive) with `firewater'; however, it +refers to caffeinacious rather than alcoholic beverages. + + +Node:wish list, Next:within delta of, Previous:wirewater, Up:= W = + +wish list n. + +A list of desired features or bug fixes that probably won't +get done for a long time, usually because the person responsible +for the code is too busy or can't think of a clean way to do it. +"OK, I'll add automatic filename completion to the wish list for +the new interface." Compare tick-list features. + + +Node:within delta of, Next:within epsilon of, +Previous:wish list, +Up:= W = + +within delta of adj. + +See delta. + + +Node:within epsilon of, +Next:wizard, Previous:within delta of, Up:= W = + +within epsilon of adj. + +See epsilon. + + +Node:wizard, Next:Wizard Book, Previous:within epsilon of, Up:= W = + +wizard n. + +1. Transitively, a person who knows how a complex piece of +software or hardware works (that is, who groks it); esp. someone who can find and fix bugs +quickly in an emergency. Someone is a hacker if he or she has general hacking +ability, but is a wizard with respect to something only if he or +she has specific detailed knowledge of that thing. A good hacker +could become a wizard for something given the time to study it. +2. The term `wizard' is also used intransitively of someone who +has extremely high-level hacking or problem-solving ability. 3. A +person who is permitted to do things forbidden to ordinary +people; one who has wheel privileges +on a system. 4. A Unix expert, esp. a Unix systems programmer. +This usage is well enough established that `Unix Wizard' is a +recognized job title at some corporations and to most +headhunters. See guru, lord high fixer. See also deep magic, heavy wizardry, incantation, magic, mutter, +rain dance, voodoo programming, wave a dead chicken. + + +Node:Wizard Book, Next:wizard hat, Previous:wizard, Up:= +W = + +Wizard Book n. + +"Structure and Interpretation of Computer Programs" (Hal +Abelson, Jerry Sussman and Julie Sussman; MIT Press, 1984, 1996; +ISBN 0-262-01153-0), an excellent computer science text used in +introductory courses at MIT. So called because of the wizard on +the jacket. One of the bibles of the +LISP/Scheme world. Also, less commonly, known as the Purple Book. + + +Node:wizard hat, Next:wizard mode, Previous:Wizard Book, Up:= W = + +wizard hat n. + +[also, after Terry Pratchett, `pointy hat'] Notional headgear +worn by whoever is the wizard in a +particular context. The implication is that it's a transferable +role. "Talk to Alice, she's wearing the TCP/IP wizard hat while +Bob is on vacation." This metaphor is sufficiently live that one +may actually see hackers miming the act of putting on, taking +off, or transferring a phantom hat. Compare patch pumpkin. + + +Node:wizard mode, Next:wizardly, Previous:wizard hat, Up:= W = + +wizard mode n. + +[from rogue] A special access mode +of a program or system, usually passworded, that permits some +users godlike privileges. Generally not used for operating +systems themselves (`root mode' or `wheel mode' would be used +instead). This term is often used with respect to games that have +editable state. + + +Node:wizardly, Next:wok-on-the-wall, Previous:wizard mode, Up:= W = + +wizardly adj. + +Pertaining to wizards. A wizardly feature is one that only a wizard could +understand or use properly. + + +Node:wok-on-the-wall, Next:womb box, Previous:wizardly, Up:= W = + +wok-on-the-wall n. + +A small microwave dish antenna used for cross-campus private +network circuits, from the obvious resemblance between a +microwave dish and the Chinese culinary utensil. + + +Node:womb box, Next:WOMBAT, Previous:wok-on-the-wall, Up:= W = + +womb box n. + +1. [TMRC] Storage space for equipment. 2. [proposed] A variety +of hard-shell equipment case with heavy interior padding and/or +shaped carrier cutouts in a foam-rubber matrix; mundanely called +a `flight case'. Used for delicate test equipment, electronics, +and musical instruments. + + +Node:WOMBAT, Next:womble, Previous:womb box, Up:= W = + +WOMBAT /wom'bat/ adj. + +[acronym: Waste Of Money, Brains, And Time] Applied to +problems which are both profoundly uninteresting in themselves and unlikely +to benefit anyone interesting even if solved. Often used in +fanciful constructions such as `wrestling with a wombat'. See +also crawling horror, +SMOP. Also note the rather different +usage as a metasyntactic variable in Commonwealth Hackish. + +Users of the PDP-11 database program DATATRIEVE adopted the +wombat as their notional mascot; the program's help file +responded to "HELP WOMBAT" with factual information about Real +World wombats. + + +Node:womble, Next:wonky, Previous:WOMBAT, Up:= W += + +womble n. + +[Unisys UK: from British animated characters] A user who has +great difficulty in communicating their requirements and/or in +using the resulting software. Extreme case of luser. An especially senior or high-ranking +womble is referred to as Great-Uncle Bulgaria. + + +Node:wonky, Next:woofer, Previous:womble, Up:= W += + +wonky /wong'kee/ adj. + +[from Australian slang] Yet another approximate synonym for +broken. Specifically connotes a +malfunction that produces behavior seen as crazy, humorous, or +amusingly perverse. "That was the day the printer's font logic +went wonky and everybody's listings came out in Tengwar." Also in +`wonked out'. See funky, demented, bozotic. + + +Node:woofer, Next:workaround, Previous:wonky, Up:= W += + +woofer n. + +[University of Waterloo] Some varieties of wide paper for +printers have a perforation 8.5 inches from the left margin that +allows the excess on the right-hand side to be torn off when the +print format is 80 columns or less wide. The right-hand excess +may be called `woofer'. This term (like tweeter) has been in use at Waterloo since +1972, but is elsewhere unknown. In audio jargon, the word refers +to the bass speaker(s) on a hi-fi. + + +Node:workaround, Next:working as designed, +Previous:woofer, Up:= W = + +workaround n. + +1. A temporary kluge used to +bypass, mask, or otherwise avoid a bug +or misfeature in some system. +Theoretically, workarounds are always replaced by fixes; in practice, customers often find +themselves living with workarounds for long periods of time. "The +code died on NUL characters in the input, so I fixed it to +interpret them as spaces." "That's not a fix, that's a +workaround!" 2. A procedure to be employed by the user in order +to do what some currently non-working feature should do. +Hypothetical example: "Using META-F7 crashes the 4.43 build of Weemax, but as a +workaround you can type CTRL-R, then SHIFT-F5, and delete the +remaining cruft by hand." + + +Node:working as designed, +Next:worm, Previous:workaround, Up:= W = + +working as designed adj. + +[IBM] 1. In conformance to a wrong or inappropriate +specification; useful, but misdesigned. 2. Frequently used as a +sardonic comment on a program's utility. 3. Unfortunately also +used as a bogus reason for not accepting a criticism or +suggestion. At IBM, this sense is used +in official documents! See BAD. + + +Node:worm, Next:wormhole, Previous:working as designed, Up:= W = + +worm n. + +[from `tapeworm' in John Brunner's novel "The Shockwave +Rider", via XEROX PARC] A program that propagates itself over a +network, reproducing itself as it goes. Compare virus. Nowadays the term has negative +connotations, as it is assumed that only crackers write worms. Perhaps the best-known +example was Robert T. Morris's Great +Worm of 1988, a `benign' one that got out of control and +hogged hundreds of Suns and VAXen across the U.S. See also cracker, RTM, +Trojan horse, ice. + + +Node:wormhole, Next:wound around the axle, +Previous:worm, Up:= W = + +wormhole /werm'hohl/ n. + +[from the `wormhole' singularities hypothesized in some +versions of General Relativity theory] 1. [n.,obs.] A location in +a monitor which contains the address of a routine, with the +specific intent of making it easy to substitute a different +routine. This term is now obsolescent; modern operating systems +use clusters of wormholes extensively (for modularization of I/O +handling in particular, as in the Unix device-driver +organization) but the preferred techspeak for these clusters is +`device tables', `jump tables' or `capability tables'. 2. +[Amateur Packet Radio] A network path using a commercial +satellite link to join two or more amateur VHF networks. So +called because traffic routed through a wormhole leaves and +re-enters the amateur network over great distances with usually +little clue in the message routing header as to how it got from +one relay to the other. Compare gopher hole (sense 2). + + +Node:wound around the +axle, Next:wrap +around, Previous:wormhole, Up:= +W = + +wound around the axle adj. + +In an infinite loop. Often used by older computer types. + + +Node:wrap around, Next:write-only code, Previous:wound around the +axle, Up:= W = + +wrap around vi. + +(also n. `wraparound' and v. shorthand `wrap') 1. [techspeak] +The action of a counter that starts over at zero or at `minus +infinity' (see infinity) after its +maximum value has been reached, and continues incrementing, +either because it is programmed to do so or because of an +overflow (as when a car's odometer starts over at 0). 2. To +change phase gradually and +continuously by maintaining a steady wake-sleep cycle somewhat +longer than 24 hours, e.g., living six long (28-hour) days in a +week (or, equivalently, sleeping at the rate of 10 microhertz). +This sense is also called phase-wrapping. + + +Node:write-only code, Next:write-only language, +Previous:wrap around, +Up:= W = + +write-only code n. + +[a play on `read-only memory'] Code so arcane, complex, or +ill-structured that it cannot be modified or even comprehended by +anyone but its author, and possibly not even by him/her. A Bad Thing. + + +Node:write-only language, +Next:write-only +memory, Previous:write-only code, Up:= W = + +write-only language n. + +A language with syntax (or semantics) sufficiently dense and +bizarre that any routine of significant size is automatically +write-only code. A +sobriquet applied occasionally to C and often to APL, though +INTERCAL and TECO certainly deserve it more. See also Befunge. + + +Node:write-only memory, Next:Wrong Thing, Previous:write-only +language, Up:= W = + +write-only memory n. + +The obvious antonym to `read-only memory'. Out of frustration +with the long and seemingly useless chain of approvals required +of component specifications, during which no actual checking +seemed to occur, an engineer at Signetics once created a +specification for a write-only memory and included it with a +bunch of other specifications to be approved. This inclusion came +to the attention of Signetics management only when regular customers +started calling and asking for pricing information. Signetics +published a corrected edition of the data book and requested the +return of the `erroneous' ones. Later, in 1972, Signetics bought +a double-page spread in "Electronics" magazine's April issue and +used the spec as an April Fools' Day joke. Instead of the more +conventional characteristic curves, the 25120 "fully encoded, +9046 x N, Random Access, write-only-memory" data sheet included +diagrams of "bit capacity vs. Temp.", "Iff vs. Vff", "Number of +pins remaining vs. number of socket insertions", and "AQL vs. +selling price". The 25120 required a 6.3 VAC VFF supply, a +10V +VCC, and VDD of 0V, +/- 2%. + + +Node:Wrong Thing, Next:wugga wugga, Previous:write-only memory, Up:= W = + +Wrong Thing n. + +A design, action, or decision that is clearly incorrect or +inappropriate. Often capitalized; always emphasized in speech as +if capitalized. The opposite of the Right Thing; more generally, anything +that is not the Right Thing. In cases where `the good is the +enemy of the best', the merely good -- although good -- is +nevertheless the Wrong Thing. "In C, the default is for +module-level declarations to be visible everywhere, rather than +just within the module. This is clearly the Wrong Thing." + + +Node:wugga wugga, Next:wumpus, Previous:Wrong Thing, Up:= W = + +wugga wugga /wuh'g* wuh'g*/ n. + +Imaginary sound that a computer program makes as it labors +with a tedious or difficult task.grind (sense 4). + + +Node:wumpus, Next:WYSIAYG, Previous:wugga wugga, Up:= W = + +wumpus /wuhm'p*s/ n. + +The central monster (and, in many versions, the name) of a +famous family of very early computer games called "Hunt The +Wumpus'. The original was invented in 1970 (several years before +ADVENT) by Gregory Yob. The wumpus +lived somewhere in a cave with the topology of an dodecahedron's +edge/vertex graph (later versions supported other topologies, +including an icosahedron and Möbius strip). The player +started somewhere at random in the cave with five `crooked +arrows'; these could be shot through up to three connected rooms, +and would kill the wumpus on a hit (later versions introduced the +wounded wumpus, which got very angry). Unfortunately for players, +the movement necessary to map the maze was made hazardous not +merely by the wumpus (which would eat you if you stepped on him) +but also by bottomless pits and colonies of super bats that would +pick you up and drop you at a random location (later versions +added `anaerobic termites' that ate arrows, bat migrations, and +earthquakes that randomly changed pit locations). + +This game appears to have been the first to use a non-random +graph-structured map (as opposed to a rectangular grid like the +even older Star Trek games). In this respect, as in the +dungeon-like setting and its terse, amusing messages, it +prefigured ADVENT and Zork and was directly ancestral to the latter +(Zork acknowledged this heritage by including a super-bat +colony). A C emulation of the original Basic game is available at +the Retrocomputing Museum, http://www.ccil.org/retro. + + +Node:WYSIAYG, Next:WYSIWYG, Previous:wumpus, Up:= W += + +WYSIAYG /wiz'ee-ayg/ adj. + +Describes a user interface under which "What You See Is +All You Get"; an unhappy variant of WYSIWYG. Visual, `point-and-shoot'-style +interfaces tend to have easy initial learning curves, but also to +lack depth; they often frustrate advanced users who would be +better served by a command-style interface. When this happens, +the frustrated user has a WYSIAYG problem. This term is most +often used of editors, word processors, and document formatting +programs. WYSIWYG `desktop publishing' programs, for example, are +a clear win for creating small documents with lots of fonts and +graphics in them, especially things like newsletters and +presentation slides. When typesetting book-length manuscripts, on +the other hand, scale changes the nature of the task; one quickly +runs into WYSIAYG limitations, and the increased power and +flexibility of a command-driven formatter like TeX or Unix's troff +becomes not just desirable but a necessity. Compare YAFIYGI. + + +Node:WYSIWYG, Next:X, Previous:WYSIAYG, Up:= W += + +WYSIWYG /wiz'ee-wig/ adj. + +[Traced to Flip Wilson's "Geraldine" character c.1970] +Describes a user interface under which "What You See Is What You +Get", as opposed to one that uses more-or-less obscure commands +that do not result in immediate visual feedback. True WYSIWYG in +environments supporting multiple fonts or graphics is a a +rarely-attained ideal; there are variants of this term to express +real-world manifestations including WYSIAWYG (What You See Is +Almost What You Get) and WYSIMOLWYG (What You See Is +More or Less What You Get). All these can be mildly derogatory, +as they are often used to refer to dumbed-down user-friendly interfaces targeted at +non-programmers; a hacker has no fear of obscure commands +(compare WYSIAYG). On the other +hand, EMACS was one of the very first +WYSIWYG editors, replacing (actually, at first overlaying) the +extremely obscure, command-based TECO. +See also WIMP +environment. [Oddly enough, WYSIWYG has already made it +into the OED, in lower case yet. --ESR] + + +Node:= X =, Next:= Y =, Previous:= W =, Up:The Jargon Lexicon + += X = + + +X: + + +XEROX PARC: + + +XOFF: + + +XON: + + +xor: + + +xref: + + +XXX: + + +xyzzy: + + +Node:X, Next:XEROX PARC, Previous:WYSIWYG, Up:= X += + +X /X/ n. + +1. Used in various speech and writing contexts (also in +lowercase) in roughly its algebraic sense of `unknown within a +set defined by context' (compare N). +Thus, the abbreviation 680x0 stands for 68000, 68010, 68020, +68030, or 68040, and 80x86 stands for 80186, 80286, 80386, 80486, +80586 or 80686 (note that a Unix hacker might write these as +680[0-6]0 and 80[1-6]86 or 680?0 and 80?86 respectively; see +glob). 2. [after the name of an +earlier window system called `W'] An over-sized, over-featured, +over-engineered and incredibly over-complicated window system +developed at MIT and widely used on Unix systems. + + +Node:XEROX PARC, Next:XOFF, Previous:X, Up:= X = + +XEROX PARC /zee'roks park'/ n. + +The famed Palo Alto Research Center. For more than a decade, +from the early 1970s into the mid-1980s, PARC yielded an +astonishing volume of groundbreaking hardware and software +innovations. The modern mice, windows, and icons style of +software interface was invented there. So was the laser printer +and the local-area network; and PARC's series of D machines +anticipated the powerful personal computers of the 1980s by a +decade. Sadly, the prophets at PARC were without honor in their +own company, so much so that it became a standard joke to +describe PARC as a place that specialized in developing brilliant +ideas for everyone else. + +The stunning shortsightedness and obtusity of XEROX's +top-level suits has been well +anatomized in "Fumbling The Future: How XEROX Invented, Then +Ignored, the First Personal Computer" by Douglas K. Smith and +Robert C. Alexander (William Morrow & Co., 1988, ISBN +0-688-09511-9). + + +Node:XOFF, Next:XON, Previous:XEROX PARC, Up:= X = + +XOFF /X-of/ n. + +Syn. control-S. + + +Node:XON, Next:xor, Previous:XOFF, +Up:= X = + +XON /X-on/ n. + +Syn. control-Q. + + +Node:xor, Next:xref, Previous:XON, +Up:= X = + +xor /X'or/, /kzor/ conj. + +Exclusive or. `A xor B' means `A or B, but not both'. "I want +to get cherry pie xor a banana split." This derives from the +technical use of the term as a function on truth-values that is +true if exactly one of its two arguments is true. + + +Node:xref, Next:XXX, Previous:xor, +Up:= X = + +xref /X'ref/ v.,n. + +Hackish standard abbreviation for `cross-reference'. + + +Node:XXX, Next:xyzzy, Previous:xref, Up:= X = + + +XXX /X-X-X/ n. + +A marker that attention is needed. Commonly used in program +comments to indicate areas that are kluged up or need to be. Some +hackers liken `XXX' to the notional heavy-porn movie rating. +Compare FIXME. + + +Node:xyzzy, Next:YA-, Previous:XXX, +Up:= X = + +xyzzy /X-Y-Z-Z-Y/, /X-Y-ziz'ee/, /ziz'ee/, or +/ik-ziz'ee/ adj. + +[from the ADVENT game] The canonical `magic word'. This comes from +ADVENT, in which the idea is to +explore an underground cave with many rooms and to collect the +treasures you find there. If you type `xyzzy' at the appropriate +time, you can move instantly between two otherwise distant +points. If, therefore, you encounter some bit of magic, you might remark on this quite succinctly +by saying simply "Xyzzy!" "Ordinarily you can't look at someone +else's screen if he has protected it, but if you type +quadruple-bucky-clear the system will let you do it anyway." +"Xyzzy!" It's traditional for xyzzy to be an Easter egg in games with text +interfaces. + +Xyzzy has actually been implemented as an undocumented no-op +command on several OSes; in Data General's AOS/VS, for example, +it would typically respond "Nothing happens", just as ADVENT did if the magic was invoked at the +wrong spot or before a player had performed the action that +enabled the word. In more recent 32-bit versions, by the way, +AOS/VS responds "Twice as much happens". + +Early versions of the popular `minesweeper' game under +Microsoft Windows had a cheat mode triggered by the command +`xyzzy<enter><right-shift>' that turns the top-left +pixel of the screen different colors depending on whether or not +the cursor is over a bomb. This feature temporarily diasappeared +in Windows 98, but reappeared in Windows 2000. + +The following passage from "The Wonderful Wizard of Oz" by L. +Frank Baum, suggesting a possible pre-ADVENT origin, has recently +come to light: + +"Ziz-zy, zuz-zy, zik!" said Dorothy, who was now standing on +both feet. This ended the saying of the charm, and they heard a +great chattering and flapping of wings, as the band of Winged +Monkeys flew up to them. + + +Node:= Y =, Next:= Z =, Previous:= X =, Up:The Jargon Lexicon + += Y = + + +YA-: + + +YABA: + + +YAFIYGI: + + +YAUN: + + +Yellow Book: + + +yellow card: + + +yellow wire: + + +Yet Another: + + +YHBT: + + +YKYBHTLW: + + +YMMV: + + +You are +not expected to understand this: + + +You +know you've been hacking too long when: + + +Your mileage may +vary: + + +Yow!: + + +yoyo mode: + + +Yu-Shiang Whole +Fish: + + +Node:YA-, Next:YABA, Previous:xyzzy, Up:= Y += + +YA- abbrev. + +[Yet Another] In hackish acronyms this almost invariably +expands to Yet Another, +following the precedent set by Unix yacc(1) (Yet +Another Compiler-Compiler). See YABA. + + +Node:YABA, Next:YAFIYGI, Previous:YA-, Up:= Y = + + +YABA /ya'b*/ n. + +[Cambridge] Yet Another Bloody Acronym. Whenever some program +is being named, someone invariably suggests that it be given a +name that is acronymic. The response from those with a trace of +originality is to remark ironically that the proposed name would +then be `YABA-compatible'. Also used in response to questions +like "What is WYSIWYG?" See also TLA. + + +Node:YAFIYGI, Next:YAUN, Previous:YABA, Up:= Y = + + +YAFIYGI /yaf'ee-y*-gee/ adj. + +[coined in response to WYSIWYG] Describes the command-oriented +ed/vi/nroff/TeX style of word processing or other user interface, +the opposite of WYSIWYG. Stands for +"You asked for it, you got it", because what you actually asked +for is often not apparent until long after it is too late to do +anything about it. Used to denote perversity ("Real Programmers +use YAFIYGI tools...and like it!") or, +less often, a necessary tradeoff ("Only a YAFIYGI tool can have +full programmable flexibility in its interface."). + +This precise sense of "You asked for it, you got it" seems to +have first appeared in Ed Post's classic parody "Real Programmers +don't use Pascal" (see Real +Programmers); the acronym is a more recent invention. + + +Node:YAUN, Next:Yellow Book, Previous:YAFIYGI, Up:= Y = + +YAUN /yawn/ n. + +[Acronym for `Yet Another Unix Nerd'] Reported from the San +Diego Computer Society (predominantly a microcomputer users' +group) as a good-natured punning insult aimed at Unix +zealots. + + +Node:Yellow Book, Next:yellow card, Previous:YAUN, Up:= Y += + +Yellow Book n. + +The print version of this Jargon File; "The New Hacker's +Dictionary" from MIT Press; The book includes essentially all the +material the File, plus a Foreword by Guy L. Steele Jr. and a +Preface by Eric S. Raymond. Most importantly, the book version is +nicely typeset and includes almost all of the infamous Crunchly +cartoons by the Great Quux, each attached to an appropriate +entry. The first edition (1991, ISBN 0-262-68069-6) corresponded +to the Jargon File version 2.9.6. The second edition (1993, ISBN +0-262-68079-3) corresponded to the Jargon File 3.0.0. The third +(1996, ISBN 0-262-68092-0) corresponded to 4.0.0. + + +Node:yellow card, Next:yellow wire, Previous:Yellow Book, Up:= Y = + +yellow card n. + +See green card. + + +Node:yellow wire, Next:Yet Another, Previous:yellow card, Up:= Y = + +yellow wire n. + +[IBM] Repair wires used when connectors (especially ribbon +connectors) got broken due to some schlemiel pinching them, or to +reconnect cut traces after the FE mistakenly cut one. Compare +blue wire, purple wire, red wire. + + +Node:Yet Another, Next:YHBT, Previous:yellow wire, Up:= Y = + +Yet Another adj. + +[From Unix's yacc(1), `Yet Another +Compiler-Compiler', a LALR parser generator] 1. Of your own work: +A humorous allusion often used in titles to acknowledge that the +topic is not original, though the content is. As in `Yet Another +AI Group' or `Yet Another Simulated Annealing Algorithm'. 2. Of +others' work: Describes something of which there are already far +too many. See also YA-, YABA, YAUN. + + +Node:YHBT, Next:YKYBHTLW, Previous:Yet Another, Up:= Y = + +YHBT // + +[Usenet: very common] Abbreviation: You Have Been Trolled (see +troll, sense 1). Especially used in +"YHBT. YHL. HAND.", which is widely understood to expand to "You +Have Been Trolled. You Have Lost. Have A Nice Day". You are quite +likely to see this if you respond incautiously to a +flame-provoking post that was obviously floated as sucker +bait. + + +Node:YKYBHTLW, Next:YMMV, Previous:YHBT, Up:= Y = + + +YKYBHTLW // abbrev. + +Abbreviation of `You know you've been hacking too long +when...', which became established on the Usenet group +_alt.folklore.computers_ during extended discussion of the +indicated entry in the Jargon File. + + +Node:YMMV, Next:You are +not expected to understand this, Previous:YKYBHTLW, Up:= Y = + +YMMV // cav. + +Abbreviation for Your mileage may vary +common on Usenet. + + +Node:You are not +expected to understand this, Next:You +know you've been hacking too long when, Previous:YMMV, Up:= Y = + +You are not expected to understand this [Unix] cav. + +The canonical comment describing something magic or too complicated to bother explaining +properly. From an infamous comment in the context-switching code +of the V6 Unix kernel. Dennis Ritchie has explained this +in detail. + + +Node:You +know you've been hacking too long when, Next:Your mileage may vary, +Previous:You are +not expected to understand this, Up:= Y = + +You know you've been hacking too long when + +The set-up line for a genre of one-liners told by hackers +about themselves. These include the following: + + + +not only do you check your email more often than your paper +mail, but you remember your network address faster than your +postal one. + + +your SO kisses you on the neck and +the first thing you think is "Uh, oh, priority interrupt." + + +you go to balance your checkbook and discover that you're +doing it in octal. + + +your computers have a higher street value than your car. + + +in your universe, `round numbers' are powers of 2, not +10. + + +more than once, you have woken up recalling a dream in some +programming language. + + +you realize you have never seen half of your best +friends. + + + +A list +list of these can be found by searching for this phrase on the +web. + +[An early version of this entry said "All but one of these +have been reliably reported as hacker traits (some of them quite +often). Even hackers may have trouble spotting the ringer." The +ringer was balancing one's checkbook in octal, which I made up +out of whole cloth. Although more respondents picked that one out +as fiction than any of the others, I also received multiple +independent reports of its actually happening, most famously to +Grace Hopper while she was working with BINAC in 1949. --ESR] + + +Node:Your mileage may +vary, Next:Yow!, Previous:You +know you've been hacking too long when, Up:= Y = + +Your mileage may vary cav. + +[from the standard disclaimer attached to EPA mileage ratings +by American car manufacturers] 1. A ritual warning often found in +Unix freeware distributions. Translates roughly as "Hey, I tried +to write this portably, but who knows what'll happen on +your system?" 2. More generally, a qualifier attached to advice. +"I find that sending flowers works well, but your mileage may +vary." + + +Node:Yow!, Next:yoyo mode, Previous:Your mileage may vary, Up:= Y = + +Yow! /yow/ interj. + +[from "Zippy the Pinhead" comix] A favored hacker expression +of humorous surprise or emphasis. "Yow! Check out what happens +when you twiddle the foo option on this display hack!" Compare +gurfle. + + +Node:yoyo mode, Next:Yu-Shiang Whole Fish, +Previous:Yow!, Up:= Y = + +yoyo mode n. + +The state in which the system is said to be when it rapidly +alternates several times between being up and being down. +Interestingly (and perhaps not by coincidence), many hardware +vendors give out free yoyos at Usenix exhibits. + +Sun Microsystems gave out logoized yoyos at SIGPLAN '88. +Tourists staying at one of Atlanta's most respectable hotels were +subsequently treated to the sight of 200 of the country's top +computer scientists testing yo-yo algorithms in the lobby. + + +Node:Yu-Shiang Whole Fish, +Next:zap, Previous:yoyo mode, Up:= Y = + +Yu-Shiang Whole Fish /yoo-shyang hohl fish/ n. obs. + +The character gamma (extended SAIL ASCII 0001001), which with +a loop in its tail looks like a little fish swimming down the +page. The term is actually the name of a Chinese dish in which a +fish is cooked whole (not parsed) and +covered with Yu-Shiang (or Yu-Hsiang) sauce. Usage: primarily by +people on the MIT LISP Machine, which could display this +character on the screen. Tends to elicit incredulity from people +who hear about it second-hand. + + +Node:= Z =, Previous:= Y =, Up:The Jargon Lexicon + += Z = + + +zap: + + +zapped: + + +Zawinski's Law: + + +zbeba: + + +zen: + + +zero: + + +zero-content: + + +Zero-One-Infinity +Rule: + + +zeroth: + + +zigamorph: + + +zip: + + +zipperhead: + + +zombie: + + +zorch: + + +Zork: + + +zorkmid: + + +Node:zap, Next:zapped, Previous:Yu-Shiang Whole Fish, Up:= Z = + +zap + +1. n. Spiciness. 2. vt. To make food spicy. 3. vt. To make +someone `suffer' by making his food spicy. (Most hackers love +spicy food. Hot-and-sour soup is considered wimpy unless it makes +you wipe your nose for the rest of the meal.) See zapped. 4. vt. To modify, usually to correct; +esp. used when the action is performed with a debugger or binary +patching tool. Also implies surgical precision. "Zap the debug +level to 6 and run it again." In the IBM mainframe world, binary +patches are applied to programs or to the OS with a program +called `superzap', whose file name is `IMASPZAP' (possibly +contrived from I M A SuPerZAP). 5. vt. To erase or reset. 6. To +fry a chip with static electricity. "Uh +oh -- I think that lightning strike may have zapped the disk +controller." + + +Node:zapped, Next:Zawinski's Law, Previous:zap, Up:= Z = + +zapped adj. + +Spicy. This term is used to distinguish between food that is +hot (in temperature) and food that is spicy-hot. For +example, the Chinese appetizer Bon Bon Chicken is a kind of +chicken salad that is cold but zapped; by contrast, vanilla wonton soup is hot but not zapped. See +also oriental food, laser chicken. See zap, senses 1 and 2. + + +Node:Zawinski's Law, Next:zbeba, Previous:zapped, Up:= Z += + +Zawinski's Law + +"Every program attempts to expand until it can read mail. +Those programs which cannot so expand are replaced by ones which +can." Coined by Jamie Zawinski (who called it the "Law of +Software Envelopment") to express his belief that all truly +useful programs experience pressure to evolve into toolkits and +application platforms (the mailer thing, he says, is just a side +effect of that). It is commonly cited, though with widely varying +degrees of accuracy. + + +Node:zbeba, Next:zen, Previous:Zawinski's Law, Up:= Z = + +zbeba n. + +[USENET] The word `moron' in rot13. Used to describe newbies who are behaving +with especial cluelessness. + + +Node:zen, Next:zero, Previous:zbeba, Up:= Z += + +zen vt. + +To figure out something by meditation or by a sudden flash of +enlightenment. Originally applied to bugs, but occasionally +applied to problems of life in general. "How'd you figure out the +buffer allocation problem?" "Oh, I zenned it." Contrast grok, which connotes a time-extended version +of zenning a system. Compare hack +mode. See also guru. + + +Node:zero, Next:zero-content, Previous:zen, Up:= Z += + +zero vt. + +1. To set to 0. Usually said of small pieces of data, such as +bits or words (esp. in the construction `zero out'). 2. To erase; +to discard all data from. Said of disks and directories, where +`zeroing' need not involve actually writing zeroes throughout the +area being zeroed. One may speak of something being `logically +zeroed' rather than being `physically zeroed'. See scribble. + + +Node:zero-content, Next:Zero-One-Infinity Rule, +Previous:zero, Up:= Z = + +zero-content adj. + +Syn. content-free. + + +Node:Zero-One-Infinity +Rule, Next:zeroth, +Previous:zero-content, +Up:= Z = + +Zero-One-Infinity Rule prov. + +"Allow none of foo, one of foo, or any number of foo." A rule of thumb for software design, which +instructs one to not place random +limits on the number of instances of a given entity (such as: +windows in a window system, letters in an OS's filenames, etc.). +Specifically, one should either disallow the entity entirely, +allow exactly one instance (an "exception"), or allow as many as +the user wants - address space and memory permitting. + +The logic behind this rule is that there are often situations +where it makes clear sense to allow one of something instead of +none. However, if one decides to go further and allow N (for N +> 1), then why not N+1? And if N+1, then why not N+2, and so +on? Once above 1, there's no excuse not to allow any N; hence, +infinity. + +Many hackers recall in this connection Isaac Asimov's SF novel +"The Gods Themselves" in which a character announces that the +number 2 is impossible - if you're going to believe in more than +one universe, you might as well believe in an infinite number of +them. + + +Node:zeroth, Next:zigamorph, Previous:Zero-One-Infinity Rule, Up:= Z = + +zeroth /zee'rohth/ adj. + +First. Among software designers, comes from C's and LISP's +0-based indexing of arrays. Hardware people also tend to start +counting at 0 instead of 1; this is natural since, e.g., the 256 +states of 8 bits correspond to the binary numbers 0, 1, +..., 255 and the digital devices known as +`counters' count in this way. + +Hackers and computer scientists often like to call the first +chapter of a publication `Chapter 0', especially if it is of an +introductory nature (one of the classic instances was in the +First Edition of K&R). In +recent years this trait has also been observed among many pure +mathematicians (who have an independent tradition of numbering +from 0). Zero-based numbering tends to reduce fencepost errors, though it cannot +eliminate them entirely. + + +Node:zigamorph, Next:zip, Previous:zeroth, Up:= Z += + +zigamorph /zig'*-morf/ n. + +1. Hex FF (11111111) when used as a delimiter or fence character. Usage: primarily at IBM shops. +2. [proposed] n. The Unicode non-character U+FFFF +(1111111111111111), a character code which is not assigned to any +character, and so is usable as end-of-string. (Unicode is a +16-bit character code intended to cover all of the world's +writing systems, including Latin, Greek, Cyrillic, Chinese, +hiragana, katakana, Devanagari, Thai, Laotian and many other +scripts - support for elvish is +planned for a future release). + + +Node:zip, Next:zipperhead, Previous:zigamorph, Up:= Z = + +zip vt. + +[primarily MS-DOS] To create a compressed archive from a group +of files using PKWare's PKZIP or a compatible archiver. Its use +is spreading now that portable implementations of the algorithm +have been written. Commonly used as follows: "I'll zip it up and +send it to you." See tar and +feather. + + +Node:zipperhead, Next:zombie, Previous:zip, Up:= Z = + + +zipperhead n. + +[IBM] A person with a closed mind. + + +Node:zombie, Next:zorch, Previous:zipperhead, Up:= Z = + +zombie n. + +[Unix] A process that has died but has not yet relinquished +its process table slot (because the parent process hasn't +executed a wait(2) for it yet). These can be seen in +ps(1) listings occasionally. Compare orphan. + + +Node:zorch, Next:Zork, Previous:zombie, Up:= Z += + +zorch /zorch/ + +1. [TMRC] v. To attack with an inverse heat sink. 2. [TMRC] v. +To travel, with v approaching c [that is, with velocity +approaching lightspeed --ESR]. 3. [MIT] v. To propel something +very quickly. "The new comm software is very fast; it really +zorches files through the network." 4. [MIT] n. Influence. +Brownie points. Good karma. The intangible and fuzzy currency in +which favors are measured. "I'd rather not ask him for that just +yet; I think I've used up my quota of zorch with him for the +week." 5. [MIT] n. Energy, drive, or ability. "I think I'll punt that change for now; I've been up for +30 hours and I've run out of zorch." 6. [MIT] v. To flunk an exam +or course. + + +Node:Zork, Next:zorkmid, Previous:zorch, Up:= Z += + +Zork /zork/ n. + +The second of the great early experiments in computer fantasy +gaming; see ADVENT. Originally +written on MIT-DM during 1977-1979, later distributed with BSD +Unix (as a patched, sourceless RT-11 FORTRAN binary; see retrocomputing) and commercialized +as `The Zork Trilogy' by Infocom. +The FORTRAN source was later rewritten for portability and +released to Usenet under the name "Dungeon". Both FORTRAN +"Dungeon" and translated C versions are available at many FTP +sites. See also grue. + + +Node:zorkmid, Previous:Zork, Up:= Z += + +zorkmid /zork'mid/ n. + +The canonical unit of currency in hacker-written games. This +originated in Zork but has spread to +nethack and is referred to in +several other games. + +(Lexicon Entries End Here) + + +Node:Appendix A, Next:Appendix B, Previous:The Jargon Lexicon, Up:Top + +Hacker Folklore + +This appendix contains several legends and fables that +illuminate the meaning of various entries in the lexicon. + + +The Meaning of Hack: +...and three famous ones + + +TV Typewriters: A Tale of +Hackish Ingenuity + + +A Story About Magic: +By Guy Steele + + +Some AI Koans: Wit and +Wisdom of the Masters + + +OS and JEDGAR: Intrigue and +mayhem under ITS + + +The Story of Mel: One +of hackerdom's great myths + + +Node:The Meaning of Hack, +Next:TV Typewriters, +Previous:Appendix A, +Up:Appendix A + +The Meaning of `Hack' + +"The word hack doesn't really have +69 different meanings", according to MIT hacker Phil Agre. "In +fact, hack has only one meaning, an +extremely subtle and profound one which defies articulation. +Which connotation is implied by a given use of the word depends +in similarly profound ways on the context. Similar remarks apply +to a couple of other hacker words, most notably random." + +Hacking might be characterized as `an appropriate application +of ingenuity'. Whether the result is a quick-and-dirty patchwork +job or a carefully crafted work of art, you have to admire the +cleverness that went into it. + +An important secondary meaning of hack is `a creative practical joke'. This kind of +hack is easier to explain to non-hackers than the programming +kind. Of course, some hacks have both natures; see the lexicon +entries for pseudo and kgbvax. But here are some examples of pure +practical jokes that illustrate the hacking spirit: + +In 1961, students from Caltech (California Institute +of Technology, in Pasadena) hacked the Rose Bowl football game. +One student posed as a reporter and `interviewed' the director of +the University of Washington card stunts (such stunts involve +people in the stands who hold up colored cards to make pictures). +The reporter learned exactly how the stunts were operated, and +also that the director would be out to dinner later. + +While the director was eating, the students (who called +themselves the `Fiendish Fourteen') picked a lock and stole a +blank direction sheet for the card stunts. They then had a +printer run off 2300 copies of the blank. The next day they +picked the lock again and stole the master plans for the stunts +-- large sheets of graph paper colored in with the stunt +pictures. Using these as a guide, they made new instructions for +three of the stunts on the duplicated blanks. Finally, they broke +in once more, replacing the stolen master plans and substituting +the stack of diddled instruction sheets for the original set. + +The result was that three of the pictures were totally +different. Instead of `WASHINGTON', the word ``CALTECH' was +flashed. Another stunt showed the word `HUSKIES', the Washington +nickname, but spelled it backwards. And what was supposed to have +been a picture of a husky instead showed a beaver. (Both Caltech +and MIT use the beaver -- nature's engineer -- as a mascot.) + +After the game, the Washington faculty athletic representative +said: "Some thought it ingenious; others were indignant." The +Washington student body president remarked: "No hard feelings, +but at the time it was unbelievable. We were amazed." + + +This is now considered a classic hack, particularly because +revising the direction sheets constituted a form of +programming. + +Here is another classic hack: + +On November 20, 1982, MIT hacked the Harvard-Yale +football game. Just after Harvard's second touchdown against +Yale, in the first quarter, a small black ball popped up out of +the ground at the 40-yard line, and grew bigger, and bigger, and +bigger. The letters `MIT' appeared all over the ball. As the +players and officials stood around gawking, the ball grew to six +feet in diameter and then burst with a bang and a cloud of white +smoke. + +The "Boston Globe" later reported: "If you want to know the +truth, MIT won The Game." + +The prank had taken weeks of careful planning by members of +MIT's Delta Kappa Epsilon fraternity. The device consisted of a +weather balloon, a hydraulic ram powered by Freon gas to lift it +out of the ground, and a vacuum-cleaner motor to inflate it. They +made eight separate expeditions to Harvard Stadium between 1 and +5 A.M., locating an unused 110-volt circuit in the +stadium and running buried wires from the stadium circuit to the +40-yard line, where they buried the balloon device. When the time +came to activate the device, two fraternity members had merely to +flip a circuit breaker and push a plug into an outlet. + +This stunt had all the earmarks of a perfect hack: surprise, +publicity, the ingenious use of technology, safety, and +harmlessness. The use of manual control allowed the prank to be +timed so as not to disrupt the game (it was set off between +plays, so the outcome of the game would not be unduly affected). +The perpetrators had even thoughtfully attached a note to the +balloon explaining that the device was not dangerous and +contained no explosives. + +Harvard president Derek Bok commented: "They have an awful lot +of clever people down there at MIT, and they did it again." +President Paul E. Gray of MIT said: "There is absolutely no truth +to the rumor that I had anything to do with it, but I wish there +were." + + +The hacks above are verifiable history; they can be proved to +have happened. Many other classic-hack stories from MIT and +elsewhere, though retold as history, have the characteristics of +what Jan Brunvand has called `urban folklore' (see FOAF). Perhaps the best known of these is the +legend of the infamous trolley-car hack, an alleged incident in +which engineering students are said to have welded a trolley car +to its tracks with thermite. Numerous versions of this have been +recorded from the 1940s to the present, most set at MIT but at +least one very detailed version set at CMU. + +Brian Leibowitz has researched MIT hacks both real and +mythical extensively; the interested reader is referred to his +delightful pictorial compendium "The Journal of the Institute for +Hacks, Tomfoolery, and Pranks" (MIT Museum, 1990; ISBN +0-917027-03-5). The Institute has a World Wide Web page at http://hacks.mit.edu/Hacks/Gallery.html. +There is rumored to be a sequel entitled "Is This The Way To +Baker Street?". The Caltech Alumni Association has published two +similar books titled "Legends of Caltech" and "More Legends of +Caltech". + +Finally, here is a story about one of the classic computer +hacks. + +Back in the mid-1970s, several of the system support +staff at Motorola discovered a relatively simple way to crack +system security on the Xerox CP-V timesharing system. Through a +simple programming strategy, it was possible for a user program +to trick the system into running a portion of the program in +`master mode' (supervisor state), in which memory protection does +not apply. The program could then poke a large value into its +`privilege level' byte (normally write-protected) and could then +proceed to bypass all levels of security within the +file-management system, patch the system monitor, and do numerous +other interesting things. In short, the barn door was wide open. + +Motorola quite properly reported this problem to Xerox via an +official `level 1 SIDR' (a bug report with an intended urgency of +`needs to be fixed yesterday'). Because the text of each SIDR was +entered into a database that could be viewed by quite a number of +people, Motorola followed the approved procedure: they simply +reported the problem as `Security SIDR', and attached all of the +necessary documentation, ways-to-reproduce, etc. + +The CP-V people at Xerox sat on their thumbs; they either +didn't realize the severity of the problem, or didn't assign the +necessary operating-system-staff resources to develop and +distribute an official patch. + +Months passed. The Motorola guys pestered their Xerox +field-support rep, to no avail. Finally they decided to take +direct action, to demonstrate to Xerox management just how easily +the system could be cracked and just how thoroughly the security +safeguards could be subverted. + +They dug around in the operating-system listings and devised a +thoroughly devilish set of patches. These patches were then +incorporated into a pair of programs called `Robin Hood' and +`Friar Tuck'. Robin Hood and Friar Tuck were designed to run as +`ghost jobs' (daemons, in Unix terminology); they would use the +existing loophole to subvert system security, install the +necessary patches, and then keep an eye on one another's statuses +in order to keep the system operator (in effect, the superuser) +from aborting them. + +One fine day, the system operator on the main CP-V software +development system in El Segundo was surprised by a number of +unusual phenomena. These included the following: + + +Tape drives would rewind and dismount their tapes in the +middle of a job. + + +Disk drives would seek back and forth so rapidly that they +would attempt to walk across the floor (see walking drives). + + +The card-punch output device would occasionally start up of +itself and punch a lace card. +These would usually jam in the punch. + + +The console would print snide and insulting messages from +Robin Hood to Friar Tuck, or vice versa. + + +The Xerox card reader had two output stackers; it could be +instructed to stack into A, stack into B, or stack into A (unless +a card was unreadable, in which case the bad card was placed into +stacker B). One of the patches installed by the ghosts added some +code to the card-reader driver... after reading a +card, it would flip over to the opposite stacker. As a result, +card decks would divide themselves in half when they were read, +leaving the operator to recollate them manually. + +Naturally, the operator called in the operating-system +developers. They found the bandit ghost jobs running, and gunned them... and were once +again surprised. When Robin Hood was gunned, the following +sequence of events took place: + +!X id1 + +id1: Friar Tuck... I am under attack! Pray save me! +id1: Off (aborted) + +id2: Fear not, friend Robin! I shall rout the Sheriff + of Nottingham's men! + +id1: Thank you, my good fellow! + + +Each ghost-job would detect the fact that the other had been +killed, and would start a new copy of the recently slain program +within a few milliseconds. The only way to kill both ghosts was +to kill them simultaneously (very difficult) or to deliberately +crash the system. + +Finally, the system programmers did the latter -- only to find +that the bandits appeared once again when the system rebooted! It +turned out that these two programs had patched the boot-time OS +image (the kernel file, in Unix terms) and had added themselves +to the list of programs that were to be started at boot time +(this is similar to the way MS-DOS viruses propagate). + +The Robin Hood and Friar Tuck ghosts were finally eradicated +when the system staff rebooted the system from a clean boot-tape +and reinstalled the monitor. Not long thereafter, Xerox released +a patch for this problem. + +It is alleged that Xerox filed a complaint with Motorola's +management about the merry-prankster actions of the two employees +in question. It is not recorded that any serious disciplinary +action was taken against either of them. + + + +Node:TV Typewriters, Next:A Story About Magic, +Previous:The +Meaning of Hack, Up:Appendix +A + +TV Typewriters A Tale of Hackish Ingenuity + +Here is a true story about a glass tty: One day an MIT hacker +was in a motorcycle accident and broke his leg. He had to stay in +the hospital quite a while, and got restless because he couldn't +hack. Two of his friends therefore +took a terminal and a modem for it to the hospital, so that he +could use the computer by telephone from his hospital bed. + +Now this happened some years before the spread of home +computers, and computer terminals were not a familiar sight to +the average person. When the two friends got to the hospital, a +guard stopped them and asked what they were carrying. They +explained that they wanted to take a computer terminal to their +friend who was a patient. + +The guard got out his list of things that patients were +permitted to have in their rooms: TV, radio, electric razor, +typewriter, tape player, ... no computer +terminals. Computer terminals weren't on the list, so the guard +wouldn't let it in. Rules are rules, you know. (This guard was +clearly a droid.) + +Fair enough, said the two friends, and they left again. They +were frustrated, of course, because they knew that the terminal +was as harmless as a TV or anything else on the +list... which gave them an idea. + +The next day they returned, and the same thing happened: a +guard stopped them and asked what they were carrying. They said: +"This is a TV typewriter!" The guard was skeptical, so they +plugged it in and demonstrated it. "See? You just type on the +keyboard and what you type shows up on the TV screen." Now the +guard didn't stop to think about how utterly useless a typewriter +would be that didn't produce any paper copies of what you typed; +but this was clearly a TV typewriter, no doubt about it. So he +checked his list: "A TV is all right, a typewriter is all right +... okay, take it on in!" + +[Historical note: Many years ago, "Popular Electronics" +published solder-it-yourself plans for a TV typewriter. Despite +the essential uselessness of the device, it was an enormously +popular project. Steve Ciarcia, the man behind "Byte" magazine's +"Circuit Cellar" feature, resurrected this ghost in one of his +books of the early 1980s. He ascribed its popularity (no doubt +correctly) to the feeling of power the builder could achieve by +being able to decide himself what would be shown on the TV. +--ESR] + +[Antihistorical note: On September 23rd, 1992, the L.A. Times +ran the following bit in Steve Harvey's `Only in L.A.' +column: + +It must have been borrowed from a museum: Solomon +Waters of Altadena, a 6-year-old first-grader, came home from his +first day of school and excitedly told his mother how he had +written on "a machine that looks like a computer-but without the +TV screen." + +She asked him if it could have been a "typewriter." + +"Yeah! Yeah!" he said. "That's what it was called." + + +I have since investigated this matter and determined that many +of today's teenagers have never seen a slide rule, +either.... - ESR] + + +Node:A Story About Magic, +Next:Some AI Koans, +Previous:TV +Typewriters, Up:Appendix +A + +A Story About `Magic' + +Some years ago, I (GLS) was snooping around in the cabinets +that housed the MIT AI Lab's PDP-10, and noticed a little switch +glued to the frame of one cabinet. It was obviously a homebrew +job, added by one of the lab's hardware hackers (no one knows +who). + +You don't touch an unknown switch on a computer without +knowing what it does, because you might crash the computer. The +switch was labeled in a most unhelpful way. It had two positions, +and scrawled in pencil on the metal switch body were the words +`magic' and `more magic'. The switch was in the `more magic' +position. + +I called another hacker over to look at it. He had never seen +the switch before either. Closer examination revealed that the +switch had only one wire running to it! The other end of the wire +did disappear into the maze of wires inside the computer, but +it's a basic fact of electricity that a switch can't do anything +unless there are two wires connected to it. This switch had a +wire connected on one side and no wire on its other side. + +It was clear that this switch was someone's idea of a silly +joke. Convinced by our reasoning that the switch was inoperative, +we flipped it. The computer instantly crashed. + +Imagine our utter astonishment. We wrote it off as +coincidence, but nevertheless restored the switch to the `more +magic' position before reviving the computer. + +A year later, I told this story to yet another hacker, David +Moon as I recall. He clearly doubted my sanity, or suspected me +of a supernatural belief in the power of this switch, or perhaps +thought I was fooling him with a bogus saga. To prove it to him, +I showed him the very switch, still glued to the cabinet frame +with only one wire connected to it, still in the `more magic' +position. We scrutinized the switch and its lone connection, and +found that the other end of the wire, though connected to the +computer wiring, was connected to a ground pin. That clearly made +the switch doubly useless: not only was it electrically +nonoperative, but it was connected to a place that couldn't +affect anything anyway. So we flipped the switch. + +The computer promptly crashed. + +This time we ran for Richard Greenblatt, a long-time MIT +hacker, who was close at hand. He had never noticed the switch +before, either. He inspected it, concluded it was useless, got +some diagonal cutters and diked it +out. We then revived the computer and it has run fine ever +since. + +We still don't know how the switch crashed the machine. There +is a theory that some circuit near the ground pin was marginal, +and flipping the switch changed the electrical capacitance enough +to upset the circuit as millionth-of-a-second pulses went through +it. But we'll never know for sure; all we can really say is that +the switch was magic. + +I still have that switch in my basement. Maybe I'm silly, but +I usually keep it set on `more magic'. + +1994: Another explanation of this story has since been +offered. Note that the switch body was metal. Suppose that the +non-connected side of the switch was connected to the switch body +(usually the body is connected to a separate earth lug, but there +are exceptions). The body is connected to the computer case, +which is, presumably, grounded. Now the circuit ground within the +machine isn't necessarily at the same potential as the case +ground, so flipping the switch connected the circuit ground to +the case ground, causing a voltage drop/jump which reset the +machine. This was probably discovered by someone who found out +the hard way that there was a potential difference between the +two, and who then wired in the switch as a joke. + + +Node:Some AI Koans, Next:OS and JEDGAR, Previous:A Story About +Magic, Up:Appendix A + + +Some AI Koans + +These are some of the funniest examples of a genre of jokes +told at the MIT AI Lab about various noted hackers. The original +koans were composed by Danny Hillis, who would later found +Connection Machines, Inc. In reading these, it is at least useful +to know that Minsky, Sussman, and Drescher are AI researchers of +note, that Tom Knight was one of the Lisp machine's principal +designers, and that David Moon wrote much of Lisp Machine +Lisp. + +* * * + +A novice was trying to fix a broken Lisp machine by turning +the power off and on. + +Knight, seeing what the student was doing, spoke sternly: "You +cannot fix a machine by just power-cycling it with no +understanding of what is going wrong." + +Knight turned the machine off and on. + +The machine worked. + +* * * + +One day a student came to Moon and said: "I understand how to +make a better garbage collector. We must keep a reference count +of the pointers to each cons." + +Moon patiently told the student the following story: + +"One day a student came to Moon and said: `I +understand how to make a better garbage +collector... + + +[Ed. note: Pure reference-count garbage collectors have +problems with circular structures that point to themselves.] + +* * * + +In the days when Sussman was a novice, Minsky once came to him +as he sat hacking at the PDP-6. + +"What are you doing?", asked Minsky. + +"I am training a randomly wired neural net to play +Tic-Tac-Toe" Sussman replied. + +"Why is the net wired randomly?", asked Minsky. + +"I do not want it to have any preconceptions of how to play", +Sussman said. + +Minsky then shut his eyes. + +"Why do you close your eyes?", Sussman asked his teacher. + +"So that the room will be empty." + +At that moment, Sussman was enlightened. + +* * * + +A disciple of another sect once came to Drescher as he was +eating his morning meal. + +"I would like to give you this personality test", said the +outsider, "because I want you to be happy." + +Drescher took the paper that was offered him and put it into +the toaster, saying: "I wish the toaster to be happy, too." + + +Node:OS and JEDGAR, Next:The Story of Mel, +Previous:Some AI +Koans, Up:Appendix A + + +OS and JEDGAR + +This story says a lot about the ITS ethos. + +On the ITS system there was a program that allowed you to see +what was being printed on someone else's terminal. It spied on +the other guy's output by examining the insides of the monitor +system. The output spy program was called OS. Throughout the rest +of the computer science world (and at IBM too) OS means +`operating system', but among old-time ITS hackers it almost +always meant `output spy'. + +OS could work because ITS purposely had very little in the way +of `protection' that prevented one user from trespassing on +another's areas. Fair is fair, however. There was another program +that would automatically notify you if anyone started to spy on +your output. It worked in exactly the same way, by looking at the +insides of the operating system to see if anyone else was looking +at the insides that had to do with your output. This `counterspy' +program was called JEDGAR (a six-letterism pronounced as two +syllables: /jed'gr/), in honor of the former head of the FBI. + +But there's more. JEDGAR would ask the user for `license to +kill'. If the user said yes, then JEDGAR would actually gun the job of the luser who was spying. Unfortunately, people +found that this made life too violent, especially when tourists +learned about it. One of the systems hackers solved the problem +by replacing JEDGAR with another program that only pretended to +do its job. It took a long time to do this, because every copy of +JEDGAR had to be patched. To this day no one knows how many +people never figured out that JEDGAR had been defanged. + +Interestingly, there is still a security module named JEDGAR +alive as of late 1994 -- in the Unisys MCP for large systems. It +is unknown to us whether the name is tribute or independent +invention. + + +Node:The Story of Mel, +Previous:OS and +JEDGAR, Up:Appendix A + + +The Story of Mel + +This was posted to Usenet by its author, Ed Nather (utastro!nather), on May 21, 1983. + +A recent article devoted to the macho side of programming +made the bald and unvarnished statement: + + Real Programmers write in FORTRAN. + +Maybe they do now, +in this decadent era of +Lite beer, hand calculators, and ``user-friendly'' software +but back in the Good Old Days, +when the term ``software'' sounded funny +and Real Computers were made out of drums and vacuum tubes, +Real Programmers wrote in machine code. +Not FORTRAN. Not RATFOR. Not, even, assembly language. +Machine Code. +Raw, unadorned, inscrutable hexadecimal numbers. +Directly. + +Lest a whole new generation of programmers +grow up in ignorance of this glorious past, +I feel duty-bound to describe, +as best I can through the generation gap, +how a Real Programmer wrote code. +I'll call him Mel, +because that was his name. + +I first met Mel when I went to work for Royal McBee Computer Corp., +a now-defunct subsidiary of the typewriter company. +The firm manufactured the LGP-30, +a small, cheap (by the standards of the day) +drum-memory computer, +and had just started to manufacture +the RPC-4000, a much-improved, +bigger, better, faster --- drum-memory computer. +Cores cost too much, +and weren't here to stay, anyway. +(That's why you haven't heard of the company, +or the computer.) + +I had been hired to write a FORTRAN compiler +for this new marvel and Mel was my guide to its wonders. +Mel didn't approve of compilers. + +``If a program can't rewrite its own code'', +he asked, ``what good is it?'' + +Mel had written, +in hexadecimal, +the most popular computer program the company owned. +It ran on the LGP-30 +and played blackjack with potential customers +at computer shows. +Its effect was always dramatic. +The LGP-30 booth was packed at every show, +and the IBM salesmen stood around +talking to each other. +Whether or not this actually sold computers +was a question we never discussed. + +Mel's job was to re-write +the blackjack program for the RPC-4000. +(Port? What does that mean?) +The new computer had a one-plus-one +addressing scheme, +in which each machine instruction, +in addition to the operation code +and the address of the needed operand, +had a second address that indicated where, on the revolving drum, +the next instruction was located. + +In modern parlance, +every single instruction was followed by a GO TO! +Put that in Pascal's pipe and smoke it. + +Mel loved the RPC-4000 +because he could optimize his code: +that is, locate instructions on the drum +so that just as one finished its job, +the next would be just arriving at the ``read head'' +and available for immediate execution. +There was a program to do that job, +an ``optimizing assembler'', +but Mel refused to use it. + +``You never know where it's going to put things'', +he explained, ``so you'd have to use separate constants''. + +It was a long time before I understood that remark. +Since Mel knew the numerical value +of every operation code, +and assigned his own drum addresses, +every instruction he wrote could also be considered +a numerical constant. +He could pick up an earlier ``add'' instruction, say, +and multiply by it, +if it had the right numeric value. +His code was not easy for someone else to modify. + +I compared Mel's hand-optimized programs +with the same code massaged by the optimizing assembler program, +and Mel's always ran faster. +That was because the ``top-down'' method of program design +hadn't been invented yet, +and Mel wouldn't have used it anyway. +He wrote the innermost parts of his program loops first, +so they would get first choice +of the optimum address locations on the drum. +The optimizing assembler wasn't smart enough to do it that way. + +Mel never wrote time-delay loops, either, +even when the balky Flexowriter +required a delay between output characters to work right. +He just located instructions on the drum +so each successive one was just past the read head +when it was needed; +the drum had to execute another complete revolution +to find the next instruction. +He coined an unforgettable term for this procedure. +Although ``optimum'' is an absolute term, +like ``unique'', it became common verbal practice +to make it relative: +``not quite optimum'' or ``less optimum'' +or ``not very optimum''. +Mel called the maximum time-delay locations +the ``most pessimum''. + +After he finished the blackjack program +and got it to run +(``Even the initializer is optimized'', +he said proudly), +he got a Change Request from the sales department. +The program used an elegant (optimized) +random number generator +to shuffle the ``cards'' and deal from the ``deck'', +and some of the salesmen felt it was too fair, +since sometimes the customers lost. +They wanted Mel to modify the program +so, at the setting of a sense switch on the console, +they could change the odds and let the customer win. + +Mel balked. +He felt this was patently dishonest, +which it was, +and that it impinged on his personal integrity as a programmer, +which it did, +so he refused to do it. +The Head Salesman talked to Mel, +as did the Big Boss and, at the boss's urging, +a few Fellow Programmers. +Mel finally gave in and wrote the code, +but he got the test backwards, +and, when the sense switch was turned on, +the program would cheat, winning every time. +Mel was delighted with this, +claiming his subconscious was uncontrollably ethical, +and adamantly refused to fix it. + +After Mel had left the company for greener pa$ture$, +the Big Boss asked me to look at the code +and see if I could find the test and reverse it. +Somewhat reluctantly, I agreed to look. +Tracking Mel's code was a real adventure. + +I have often felt that programming is an art form, +whose real value can only be appreciated +by another versed in the same arcane art; +there are lovely gems and brilliant coups +hidden from human view and admiration, sometimes forever, +by the very nature of the process. +You can learn a lot about an individual +just by reading through his code, +even in hexadecimal. +Mel was, I think, an unsung genius. + +Perhaps my greatest shock came +when I found an innocent loop that had no test in it. +No test. None. +Common sense said it had to be a closed loop, +where the program would circle, forever, endlessly. +Program control passed right through it, however, +and safely out the other side. +It took me two weeks to figure it out. + +The RPC-4000 computer had a really modern facility +called an index register. +It allowed the programmer to write a program loop +that used an indexed instruction inside; +each time through, +the number in the index register +was added to the address of that instruction, +so it would refer +to the next datum in a series. +He had only to increment the index register +each time through. +Mel never used it. + +Instead, he would pull the instruction into a machine register, +add one to its address, +and store it back. +He would then execute the modified instruction +right from the register. +The loop was written so this additional execution time +was taken into account --- +just as this instruction finished, +the next one was right under the drum's read head, +ready to go. +But the loop had no test in it. + +The vital clue came when I noticed +the index register bit, +the bit that lay between the address +and the operation code in the instruction word, +was turned on --- +yet Mel never used the index register, +leaving it zero all the time. +When the light went on it nearly blinded me. + +He had located the data he was working on +near the top of memory --- +the largest locations the instructions could address --- +so, after the last datum was handled, +incrementing the instruction address +would make it overflow. +The carry would add one to the +operation code, changing it to the next one in the instruction set: +a jump instruction. +Sure enough, the next program instruction was +in address location zero, +and the program went happily on its way. + +I haven't kept in touch with Mel, +so I don't know if he ever gave in to the flood of +change that has washed over programming techniques +since those long-gone days. +I like to think he didn't. +In any event, +I was impressed enough that I quit looking for the +offending test, +telling the Big Boss I couldn't find it. +He didn't seem surprised. + +When I left the company, +the blackjack program would still cheat +if you turned on the right sense switch, +and I think that's how it should be. +I didn't feel comfortable +hacking up the code of a Real Programmer. + + + + + +This is one of hackerdom's great heroic epics, free verse or +no. In a few spare images it captures more about the esthetics +and psychology of hacking than all the scholarly volumes on the +subject put together. For an opposing point of view, see the +entry for Real +Programmer. + +[1992 postscript -- the author writes: "The original +submission to the net was not in free verse, nor any +approximation to it -- it was straight prose style, in +non-justified paragraphs. In bouncing around the net it +apparently got modified into the `free verse' form now popular. +In other words, it got hacked on the net. That seems appropriate, +somehow." The author adds that he likes the `free-verse' version +better...] + +[1999 update: Mel's last name is now known. The manual for the +LGP-30 refers to "Mel Kaye of Royal McBee who did the bulk of the +programming [...] of the ACT 1 system".] + + +Node:Appendix B, Next:Appendix C, Previous:Appendix A, Up:Top + +A Portrait of J. Random Hacker + +This profile reflects detailed comments on an earlier `trial +balloon' version from about a hundred Usenet respondents. Where +comparatives are used, the implicit `other' is a randomly +selected segment of the non-hacker population of the same size as +hackerdom. + +An important point: Except in some relatively minor respects +such as slang vocabulary, hackers don't get to be the way they +are by imitating each other. Rather, it seems to be the case that +the combination of personality traits that makes a hacker so +conditions one's outlook on life that one tends to end up being +like other hackers whether one wants to or not (much as bizarrely +detailed similarities in behavior and preferences are found in +genetic twins raised separately). + + +General Appearance: + + +Dress: + + +Reading Habits: + + +Other Interests: + + +Physical +Activity and Sports: + + +Education: + + +Things +Hackers Detest and Avoid: + + +Food: + + +Politics: + + +Gender and +Ethnicity: + + +Religion: + + +Ceremonial +Chemicals: + + +Communication +Style: + + +Geographical +Distribution: + + +Sexual Habits: + + +Personality +Characteristics: + + +Weaknesses of the +Hacker Personality: + + +Miscellaneous: + + +Node:General Appearance, +Next:Dress, Up:Appendix B + +General Appearance + +Intelligent. Scruffy. Intense. Abstracted. Surprisingly for a +sedentary profession, more hackers run to skinny than fat; both +extremes are more common than elsewhere. Tans are rare. + + +Node:Dress, Next:Reading Habits, Previous:General Appearance, +Up:Appendix B + +Dress + +Casual, vaguely post-hippie; T-shirts, jeans, running shoes, +Birkenstocks (or bare feet). Long hair, beards, and moustaches +are common. High incidence of tie-dye and intellectual or +humorous `slogan' T-shirts (only rarely computer related; that +would be too obvious). + +A substantial minority prefers `outdoorsy' clothing -- hiking +boots ("in case a mountain should suddenly spring up in the +machine room", as one famous parody put it), khakis, lumberjack +or chamois shirts, and the like. + +Very few actually fit the "National Lampoon" Nerd stereotype, +though it lingers on at MIT and may have been more common before +1975. At least since the late Seventies backpacks have been more +common than briefcases, and the hacker `look' has been more +whole-earth than whole-polyester. + +Hackers dress for comfort, function, and minimal maintenance +hassles rather than for appearance (some, perhaps unfortunately, +take this to extremes and neglect personal hygiene). They have a +very low tolerance of suits and other `business' attire; in fact, +it is not uncommon for hackers to quit a job rather than conform +to a dress code. + +Female hackers almost never wear visible makeup, and many use +none at all. + + +Node:Reading Habits, Next:Other Interests, Previous:Dress, Up:Appendix B + +Reading Habits + +Omnivorous, but usually includes lots of science and science +fiction. The typical hacker household might subscribe to +"Analog", "Scientific American", "Whole-Earth Review", and +"Smithsonian" (most hackers ignore "Wired" and other +self-consciously `cyberpunk' magazines, considering them wannabee fodder). Hackers often have a +reading range that astonishes liberal arts people but tend not to +talk about it as much. Many hackers spend as much of their spare +time reading as the average American burns up watching TV, and +often keep shelves and shelves of well-thumbed books in their +homes. + + +Node:Other Interests, Next:Physical +Activity and Sports, Previous:Reading Habits, Up:Appendix B + +Other Interests + +Some hobbies are widely shared and recognized as going with +the culture: science fiction, music, medievalism (in the active +form practiced by the Society for Creative Anachronism and +similar organizations), chess, go, backgammon, wargames, and +intellectual games of all kinds. (Role-playing games such as +Dungeons and Dragons used to be extremely popular among hackers +but they lost a bit of their luster as they moved into the +mainstream and became heavily commercialized. More recently, +"Magic: The Gathering" has been widely popular among hackers.) +Logic puzzles. Ham radio. Other interests that seem to correlate +less strongly but positively with hackerdom include linguistics +and theater teching. + + +Node:Physical +Activity and Sports, Next:Education, Previous:Other Interests, Up:Appendix B + +Physical Activity and Sports + +Many (perhaps even most) hackers don't follow or do sports at +all and are determinedly anti-physical. Among those who do, +interest in spectator sports is low to non-existent; sports are +something one does, not something one watches on TV. + +Further, hackers avoid most team sports like the plague. +Volleyball was long a notable exception, perhaps because it's +non-contact and relatively friendly; Ultimate Frisbee has become +quite popular for similar reasons. Hacker sports are almost +always primarily self-competitive ones involving concentration, +stamina, and micromotor skills: martial arts, bicycling, auto +racing, kite flying, hiking, rock climbing, aviation, +target-shooting, sailing, caving, juggling, skiing, skating, +skydiving, scuba diving. Hackers' delight in techno-toys also +tends to draw them towards hobbies with nifty complicated +equipment that they can tinker with. + +The popularity of martial arts in the hacker culture deserves +special mention. Many observers have noted it, and the connection +has grown noticeably stronger over time. In the 1970s, many +hackers admired martial arts disciplines from a distance, sensing +a compatible ideal in their exaltation of skill through rigorous +self-discipline and concentration. As martial arts became +increasingly mainstreamed in the U.S. and other western +countries, hackers moved from admiring to doing in large numbers. +In 1997, for example, your humble editor recalls sitting down +with five strangers at the first Perl conference and discovering +that four of us were in active training in some sort of martial +art - and, what is more interesting, nobody at the table found +this particularly odd. + +Today (2000), martial arts seems to have become established as +the hacker exercise form of choice, and the martial-arts culture +combining skill-centered elitism with a willingness to let +anybody join seems a stronger parallel to hacker behavior than +ever. Common usages in hacker slang un-ironically analogize +programming to kung fu (thus, one hears talk of "code-fu" or in +reference to specific skills like "HTML-fu"). Albeit with +slightly more irony, today's hackers readily analogize +assimilation into the hacker culture with the plot of a Jet Li +movie: the aspiring newbie studies with masters of the tradition, +develops his art through deep meditation, ventures forth to +perform heroic feats of hacking, and eventually becomes a master +who trains the next generation of newbies. + + +Node:Education, Next:Things Hackers Detest +and Avoid, Previous:Physical Activity and +Sports, Up:Appendix B + + +Education + +Nearly all hackers past their teens are either college-degreed +or self-educated to an equivalent level. The self-taught hacker +is often considered (at least by other hackers) to be +better-motivated, and may be more respected, than his +school-shaped counterpart. Academic areas from which people often +gravitate into hackerdom include (besides the obvious computer +science and electrical engineering) physics, mathematics, +linguistics, and philosophy. + + +Node:Things +Hackers Detest and Avoid, Next:Food, Previous:Education, Up:Appendix B + +Things Hackers Detest and Avoid + +IBM mainframes. All the works of Microsoft. Smurfs, Ewoks, and +other forms of offensive cuteness. Bureaucracies. Stupid people. +Easy listening music. Television (with occasional exceptions for +cartoons, movies, and good SF like "Star Trek" classic or Babylon +5). Business suits. Dishonesty. Incompetence. Boredom. COBOL. +BASIC. Character-based menu interfaces. + + +Node:Food, Next:Politics, Previous:Things Hackers Detest +and Avoid, Up:Appendix B + + +Food + +Ethnic. Spicy. Oriental, esp. Chinese and most esp. Szechuan, +Hunan, and Mandarin (hackers consider Cantonese vaguely +_déclassé_). Hackers prefer the exotic; for +example, the Japanese-food fans among them will eat with gusto +such delicacies as fugu (poisonous pufferfish) and whale. Thai +food has experienced flurries of popularity. Where available, +high-quality Jewish delicatessen food is much esteemed. A visible +minority of Southwestern and Pacific Coast hackers prefers +Mexican. + +For those all-night hacks, pizza and microwaved burritos are +big. Interestingly, though the mainstream culture has tended to +think of hackers as incorrigible junk-food junkies, many have at +least mildly health-foodist attitudes and are fairly +discriminating about what they eat. This may be generational; +anecdotal evidence suggests that the stereotype was more on the +mark before the early 1980s. + + +Node:Politics, Next:Gender and Ethnicity, Previous:Food, Up:Appendix B + +Politics + +Vaguely liberal-moderate, except for the strong libertarian +contingent which rejects conventional left-right politics +entirely. The only safe generalization is that hackers tend to be +rather anti-authoritarian; thus, both conventional conservatism +and `hard' leftism are rare. Hackers are far more likely than +most non-hackers to either (a) be aggressively apolitical or (b) +entertain peculiar or idiosyncratic political ideas and actually +try to live by them day-to-day. + + +Node:Gender and Ethnicity, +Next:Religion, Previous:Politics, Up:Appendix B + +Gender and Ethnicity + +Hackerdom is still predominantly male. However, the percentage +of women is clearly higher than the low-single-digit range +typical for technical professions, and female hackers are +generally respected and dealt with as equals. + +In the U.S., hackerdom is predominantly Caucasian with strong +minorities of Jews (East Coast) and Orientals (West Coast). The +Jewish contingent has exerted a particularly pervasive cultural +influence (see Food, above, and note +that several common jargon terms are obviously mutated +Yiddish). + +The ethnic distribution of hackers is understood by them to be +a function of which ethnic groups tend to seek and value +education. Racial and ethnic prejudice is notably uncommon and +tends to be met with freezing contempt. + +When asked, hackers often ascribe their culture's gender- and +color-blindness to a positive effect of text-only network +channels, and this is doubtless a powerful influence. Also, the +ties many hackers have to AI research and SF literature may have +helped them to develop an idea of personhood that is inclusive +rather than exclusive -- after all, if one's imagination readily +grants full human rights to future AI programs, robots, dolphins, +and extraterrestrial aliens, mere color and gender can't seem +very important any more. + + +Node:Religion, Next:Ceremonial Chemicals, Previous:Gender and +Ethnicity, Up:Appendix B + + +Religion + +Agnostic. Atheist. Non-observant Jewish. Neo-pagan. Very +commonly, three or more of these are combined in the same person. +Conventional faith-holding Christianity is rare though not +unknown. + +Even hackers who identify with a religious affiliation tend to +be relaxed about it, hostile to organized religion in general and +all forms of religious bigotry in particular. Many enjoy `parody' +religions such as Discordianism and the Church of the +SubGenius. + +Also, many hackers are influenced to varying degrees by Zen +Buddhism or (less commonly) Taoism, and blend them easily with +their `native' religions. + +There is a definite strain of mystical, almost Gnostic +sensibility that shows up even among those hackers not actively +involved with neo-paganism, Discordianism, or Zen. Hacker +folklore that pays homage to `wizards' and speaks of incantations +and demons has too much psychological truthfulness about it to be +entirely a joke. + + +Node:Ceremonial Chemicals, +Next:Communication +Style, Previous:Religion, Up:Appendix B + +Ceremonial Chemicals + +Most hackers don't smoke tobacco, and use alcohol in +moderation if at all. However, there has been something of a +trend towards exotic beers since about 1995, especially among +younger Linux hackers apparently influenced by Linus Torvalds's +fondness for Guiness. + +Limited use of non-addictive psychedelic drugs, such as +cannabis, LSD, psilocybin, nitrous oxide, etc., used to be +relatively common and is still regarded with more tolerance than +in the mainstream culture. Use of `downers' and opiates, on the +other hand, appears to be particularly rare; hackers seem in +general to dislike drugs that make them stupid. But on the gripping hand, many +hackers regularly wire up on caffeine and/or sugar for all-night +hacking runs. + + +Node:Communication Style, +Next:Geographical Distribution, +Previous:Ceremonial Chemicals, Up:Appendix B + +Communication Style + +See the discussions of speech and writing styles near the +beginning of this File. Though hackers often have poor +person-to-person communication skills, they are as a rule quite +sensitive to nuances of language and very precise in their use of +it. They are often better at writing than at speaking. + + +Node:Geographical +Distribution, Next:Sexual Habits, Previous:Communication Style, Up:Appendix B + +Geographical Distribution + +In the United States, hackerdom revolves on a Bay +Area-to-Boston axis; about half of the hard core seems to live +within a hundred miles of Cambridge (Massachusetts) or Berkeley +(California), although there are significant contingents in Los +Angeles, in the Pacific Northwest, and around Washington DC. +Hackers tend to cluster around large cities, especially +`university towns' such as the Raleigh-Durham area in North +Carolina or Princeton, New Jersey (this may simply reflect the +fact that many are students or ex-students living near their alma +maters). + + +Node:Sexual Habits, Next:Personality +Characteristics, Previous:Geographical Distribution, +Up:Appendix B + +Sexual Habits + +Hackerdom easily tolerates a much wider range of sexual and +lifestyle variation than the mainstream culture. It includes a +relatively large gay and bisexual contingent. Hackers are +somewhat more likely to live in polygynous or polyandrous +relationships, practice open marriage, or live in communes or +group houses. In this, as in general appearance, hackerdom +semi-consciously maintains `counterculture' values. + + +Node:Personality +Characteristics, Next:Weaknesses of the +Hacker Personality, Previous:Sexual Habits, Up:Appendix B + +Personality Characteristics + +The most obvious common `personality' characteristics of +hackers are high intelligence, consuming curiosity, and facility +with intellectual abstractions. Also, most hackers are +`neophiles', stimulated by and appreciative of novelty +(especially intellectual novelty). Most are also relatively +individualistic and anti-conformist. + +Although high general intelligence is common among hackers, it +is not the _sine qua non_ one might expect. Another trait is +probably even more important: the ability to mentally absorb, +retain, and reference large amounts of `meaningless' detail, +trusting to later experience to give it context and meaning. A +person of merely average analytical intelligence who has this +trait can become an effective hacker, but a creative genius who +lacks it will swiftly find himself outdistanced by people who +routinely upload the contents of thick reference manuals into +their brains. [During the production of the first book version of +this document, for example, I learned most of the rather complex +typesetting language TeX over about four working days, mainly by +inhaling Knuth's 477-page manual. My editor's flabbergasted +reaction to this genuinely surprised me, because years of +associating with hackers have conditioned me to consider such +performances routine and to be expected. --ESR] + +Contrary to stereotype, hackers are not usually +intellectually narrow; they tend to be interested in any subject +that can provide mental stimulation, and can often discourse +knowledgeably and even interestingly on any number of obscure +subjects -- if you can get them to talk at all, as opposed to, +say, going back to their hacking. + +It is noticeable (and contrary to many outsiders' +expectations) that the better a hacker is at hacking, the more +likely he or she is to have outside interests at which he or she +is more than merely competent. + +Hackers are `control freaks' in a way that has nothing to do +with the usual coercive or authoritarian connotations of the +term. In the same way that children delight in making model +trains go forward and back by moving a switch, hackers love +making complicated things like computers do nifty stuff for them. +But it has to be their nifty stuff. They don't like +tedium, nondeterminism, or most of the fussy, boring, ill-defined +little tasks that go with maintaining a normal existence. +Accordingly, they tend to be careful and orderly in their +intellectual lives and chaotic elsewhere. Their code will be +beautiful, even if their desks are buried in 3 feet of crap. + +Hackers are generally only very weakly motivated by +conventional rewards such as social approval or money. They tend +to be attracted by challenges and excited by interesting toys, +and to judge the interest of work or other activities in terms of +the challenges offered and the toys they get to play with. + +In terms of Myers-Briggs and equivalent psychometric systems, +hackerdom appears to concentrate the relatively rare INTJ and +INTP types; that is, introverted, intuitive, and thinker types +(as opposed to the extroverted-sensate personalities that +predominate in the mainstream culture). ENT[JP] types are also +concentrated among hackers but are in a minority. + + +Node:Weaknesses of the +Hacker Personality, Next:Miscellaneous, Previous:Personality +Characteristics, Up:Appendix +B + +Weaknesses of the Hacker Personality + +Hackers have relatively little ability to identify emotionally +with other people. This may be because hackers generally aren't +much like `other people'. Unsurprisingly, hackers also tend +towards self-absorption, intellectual arrogance, and impatience +with people and tasks perceived to be wasting their time. + +As cynical as hackers sometimes wax about the amount of idiocy +in the world, they tend by reflex to assume that everyone is as +rational, `cool', and imaginative as they consider themselves. +This bias often contributes to weakness in communication skills. +Hackers tend to be especially poor at confrontation and +negotiation. + +Because of their passionate embrace of (what they consider to +be) the Right Thing, hackers +can be unfortunately intolerant and bigoted on technical issues, +in marked contrast to their general spirit of camaraderie and +tolerance of alternative viewpoints otherwise. Old-time ITS partisans look down on the ever-growing +hordes of Unix hackers; Unix +aficionados despise VMS and MS-DOS; and hackers who are used to +conventional command-line user interfaces loudly loathe +mouse-and-menu based systems such as the Macintosh. Hackers who +don't indulge in Usenet consider it +a huge waste of time and bandwidth; fans of old adventure games such +as ADVENT and Zork consider MUDs to +be glorified chat systems devoid of atmosphere or interesting +puzzles; hackers who are willing to devote endless hours to +Usenet or MUDs consider IRC to be a +real waste of time; IRCies think MUDs might be okay if +there weren't all those silly puzzles in the way. And, of course, +there are the perennial holy +wars -- EMACS vs. vi, big-endian vs. +little-endian, RISC vs. CISC, +etc., etc., etc. As in society at large, the intensity and +duration of these debates is usually inversely proportional to +the number of objective, factual arguments available to buttress +any position. + +As a result of all the above traits, many hackers have +difficulty maintaining stable relationships. At worst, they can +produce the classic computer +geek: withdrawn, relationally incompetent, sexually +frustrated, and desperately unhappy when not submerged in his or +her craft. Fortunately, this extreme is far less common than +mainstream folklore paints it -- but almost all hackers will +recognize something of themselves in the unflattering paragraphs +above. + +Hackers are often monumentally disorganized and sloppy about +dealing with the physical world. Bills don't get paid on time, +clutter piles up to incredible heights in homes and offices, and +minor maintenance tasks get deferred indefinitely. + +1994-95's fad behavioral disease was a syndrome called +Attention Deficit Disorder (ADD), supposedly characterized by +(among other things) a combination of short attention span with +an ability to `hyperfocus' imaginatively on interesting tasks. In +1998-1999 another syndrome that is said to overlap with many +hacker traits entered popular awareness: Asperger's syndrome +(AS). This disorder is also sometimes called `high-function +autism', though researchers are divided on whether AS is in fact +a mild form of autism or a distinct syndrome with a different +etiology. AS patients exhibit mild to severe deficits in +interpreting facial and body-language cues and in modeling or +empathizing with others' emotions. Though some AS patients +exhibit mild retardation, others compensate for their deficits +with high intelligence and analytical ability, and frequently +seek out technical fields where problem-solving abilities are at +a premium and people skills are relatively unimportant. Both +syndromes are thought to relate to abnormalities in +neurotransmitter chemistry, especially the brain's processing of +serotonin. + +Many hackers have noticed that mainstream culture has shown a +tendency to pathologize and medicalize normal variations in +personality, especially those variations that make life more +complicated for authority figures and conformists. Thus, hackers +aware of the issue tend to be among those questioning whether ADD +and AS actually exist; and if so whether they are really +`diseases' rather than extremes of a normal genetic variation +like having freckles or being able to taste DPT. In either case, +they have a sneaking tendency to wonder if these syndromes are +over-diagnosed and over-treated. After all, people in authority +will always be inconvenienced by schoolchildren or workers or +citizens who are prickly, intelligent individualists - thus, any +social system that depends on authority relationships will tend +to helpfully ostracize and therapize and drug such `abnormal' +people until they are properly docile and stupid and +`well-socialized'. + +So hackers tend to believe they have good reason for +skepticism about clinical explanations of the hacker personality. +That being said, most would also concede that some hacker traits +coincide with indicators for ADD and AS - the status of caffeeine +as a hacker beverage of choice may be connected to the fact that +it bonds to the same neural receptors as Ritalin, the drug most +commonly prescribed for ADD. It is probably true that boosters of +both would find a rather higher rate of clinical ADD among +hackers than the supposedly mainstream-normal 3-5% (AS is rarer +and there are not yet good estimates of incidence as of +2000). + + +Node:Miscellaneous, Previous:Weaknesses of the +Hacker Personality, Up:Appendix B + +Miscellaneous + +Hackers are more likely to have cats than dogs (in fact, it is +widely grokked that cats have the hacker nature). Many drive +incredibly decrepit heaps and forget to wash them; richer ones +drive spiffy Porsches and RX-7s and then forget to have them +washed. Almost all hackers have terribly bad handwriting, and +often fall into the habit of block-printing everything like +junior draftsmen. + + +Node:Appendix C, Next:Bibliography, Previous:Appendix B, Up:Top + +Helping Hacker Culture Grow + +If you enjoyed the Jargon File, please help the culture that +created it grow and flourish. Here are several ways you can +help: + +• If you are a writer or journalist, don't say or write +hacker when you mean cracker. If you work with writers or +journalists, educate them on this issue and push them to do the +right thing. If you catch a newspaper or magazine abusing the +work `hacker', write them and straighten them out (this appendix +includes a model letter). + +• If you're a techie or computer hobbyist, get involved +with one of the free Unixes. Toss out that lame Microsoft OS, or +confine it to one disk partition and put Linux or FreeBSD or +NetBSD on the other one. And the next time your friend or boss is +thinking about some proprietary software `solution' that costs +more than it's worth, be ready to blow the competition away with +open-source software running over a Unix. + +• Contribute to organizations like the Free Software +Foundation that promote the production of high-quality free and +open-source software. You can reach the Free Software Foundation +at _gnu@gnu.org_, by phone at +1-617-542-5942, or by +snail-mail at 59 Temple Place, Suite 330, Boston, MA 02111-1307 +USA. + +• Support the League for Programming Freedom, which +opposes over-broad software patents that constantly threaten to +blow up in hackers' faces, preventing them from developing +innovative software for tomorrow's needs. You can reach the +League for Programming Freedom at _lpf@uunet.uu.net_. by +phone at +1 617 621 7084, or by snail-mail at 1 Kendall Square +#143, P.O.Box 9171, Cambridge, Massachusetts 02139 USA. + +• Join the continuing fight against Internet censorship, visit the +Center for Democracy and Technology Home Page at http://www.cdt.org. + +• If you do nothing else, please help fight government attempts to +seize political control of Internet content and restrict strong +cryptography. The so-called `Communications Decency Act' was declared +unconstitutional by the Supreme Court, but U.S. cryptography policy +still infringes our First Amendment rights. Surf to the Center for +Democracy and technology's home page at http://www.cdt.org to see what +you can do to help fight censorship of the net. + +Here's the text of a letter RMS wrote to the Wall Street +Journal to complain about their policy of using "hacker" only in +a pejorative sense. We hear that most major newspapers have the +same policy. If you'd like to help change this situation, send +your favorite newspaper the same letter - or, better yet, write +your own letter. + +Dear Editor: + +This letter is not meant for publication, although you can +publish it if you wish. It is meant specifically for you, the +editor, not the public. + +I am a hacker. That is to say, I enjoy playing with computers +-- working with, learning about, and writing clever computer +programs. I am not a cracker; I don't make a practice of breaking +computer security. + +There's nothing shameful about the hacking I do. But when I +tell people I am a hacker, people think I'm admitting something +naughty -- because newspapers such as yours misuse the word +"hacker", giving the impression that it means "security breaker" +and nothing else. You are giving hackers a bad name. + +The saddest thing is that this problem is perpetuated +deliberately. Your reporters know the difference between "hacker" +and "security breaker". They know how to make the distinction, +but you don't let them! You insist on using "hacker" +pejoratively. When reporters try to use another word, you change +it. When reporters try to explain the other meanings, you cut +it. + +Of course, you have a reason. You say that readers have become +used to your insulting usage of "hacker", so that you cannot +change it now. Well, you can't undo past mistakes today; but that +is no excuse to repeat them tomorrow. + +If I were what you call a "hacker", at this point I would +threaten to crack your computer and crash it. But I am a hacker, +not a cracker. I don't do that kind of thing! I have enough +computers to play with at home and at work; I don't need yours. +Besides, it's not my way to respond to insults with violence. My +response is this letter. + +You owe hackers an apology; but more than that, you owe us +ordinary respect. + +Sincerely, etc. + + + +Node:Bibliography, Previous:Appendix C, Up:Top + +Bibliography + +Here are some other books you can read to help you understand +the hacker mindset. + + + Escher, Bach: An Eternal Golden +BraidGödel, Escher, Bach: An Eternal Golden Braid + +Douglas Hofstadter + +Basic Books, 1979 + +ISBN 0-394-74502-7 + +This book reads like an intellectual Grand Tour of hacker +preoccupations. Music, mathematical logic, programming, +speculations on the nature of intelligence, biology, and Zen are +woven into a brilliant tapestry themed on the concept of encoded +self-reference. The perfect left-brain companion to +"Illuminatus". + + +Illuminatus! + + I. "The Eye in the Pyramid" + + II. "The Golden Apple" + + III. "Leviathan". + +Robert Shea and Robert Anton Wilson + +Dell, 1988 + +ISBN 0-440-53981-1 + +This work of alleged fiction is an incredible +berserko-surrealist rollercoaster of world-girdling conspiracies, +intelligent dolphins, the fall of Atlantis, who really killed +JFK, sex, drugs, rock'n'roll, and the Cosmic Giggle Factor. First +published in three volumes, but there is now a one-volume trade +paperback, carried by most chain bookstores under SF. The perfect +right-brain companion to Hofstadter's "Gödel, Escher, Bach". +See Eris, Discordianism, random numbers, Church of the +SubGenius. + + +The +Hitchhiker's Guide to the Galaxy + +Douglas Adams + +Pocket Books, 1981 + +ISBN 0-671-46149-4 + +This `Monty Python in Space' spoof of SF genre traditions has +been popular among hackers ever since the original British radio +show. Read it if only to learn about Vogons (see bogon) and the significance of the number 42 +(see random numbers) -- +and why the winningest chess program of 1990 was called `Deep +Thought'. + + +The Tao of +Programming + +James Geoffrey + +Infobooks, 1987 + +ISBN 0-931137-07-1 + +This gentle, funny spoof of the "Tao Te Ching" contains much +that is illuminating about the hacker way of thought. "When you +have learned to snatch the error code from the trap frame, it +will be time for you to leave." + + +Hackers + +Steven Levy + +Anchor/Doubleday 1984 + +ISBN 0-385-19195-2 + +Levy's book is at its best in describing the early MIT hackers +at the Model Railroad Club and the early days of the +microcomputer revolution. He never understood Unix or the +networks, though, and his enshrinement of Richard Stallman as +"the last true hacker" turns out (thankfully) to have been quite +misleading. Despite being a bit dated and containing some minor +errors (many fixed in the paperback edition), this remains a +useful and stimulating book that captures the feel of several +important hacker subcultures. + + +The +Computer Contradictionary + +Stan Kelly-Bootle + +MIT Press, 1995 + +ISBN 0-262-61112-0 + +This pastiche of Ambrose Bierce's famous work is similar in +format to the Jargon File (and quotes several entries from +TNHD-2) but somewhat different in tone and intent. It is more +satirical and less anthropological, and is largely a product of +the author's literate and quirky imagination. For example, it +defines `computer science' as "a study akin to numerology and +astrology, but lacking the precision of the former and the +success of the latter" and `implementation' as "The fruitless +struggle by the talented and underpaid to fulfill promises made +by the rich and ignorant"; `flowchart' becomes "to obfuscate a +problem with esoteric cartoons". Revised and expanded from "The +Devil's DP Dictionary", McGraw-Hill 1981, ISBN 0-07-034022-6; +that work had some stylistic influence on TNHD-1. + + + +The Devouring Fungus: Tales from the Computer Age + +Karla Jennings + +Norton, 1990 + +ISBN 0-393-30732-8 + +The author of this pioneering compendium knits together a +great deal of computer- and hacker-related folklore with good +writing and a few well-chosen cartoons. She has a keen eye for +the human aspects of the lore and is very good at illuminating +the psychology and evolution of hackerdom. Unfortunately, a +number of small errors and awkwardnesses suggest that she didn't +have the final manuscript checked over by a native speaker; the +glossary in the back is particularly embarrassing, and at least +one classic tale (the Magic Switch story, retold here under A Story About Magic in +Appendix A is given in incomplete and badly mangled form. +Nevertheless, this book is a win overall and can be enjoyed by +hacker and non-hacker alike. + + +The Soul +of a New Machine + +Tracy Kidder + +Little, Brown, 1981 + +(paperback: Avon, 1982 + +ISBN 0-380-59931-7) + +This book (a 1982 Pulitzer Prize winner) documents the +adventure of the design of a new Data General computer, the +MV-8000 Eagle. It is an amazingly well-done portrait of the +hacker mindset -- although largely the hardware hacker -- done by +a complete outsider. It is a bit thin in spots, but with enough +technical information to be entertaining to the serious hacker +while providing non-technical people a view of what day-to-day +life can be like -- the fun, the excitement, the disasters. +During one period, when the microcode and logic were glitching at +the nanosecond level, one of the overworked engineers departed +the company, leaving behind a note on his terminal as his letter +of resignation: "I am going to a commune in Vermont and will deal +with no unit of time shorter than a season." + + +Life +with UNIX: a Guide for Everyone + +Don Libes and Sandy Ressler + +Prentice-Hall, 1989 + +ISBN 0-13-536657-7 + +The authors of this book set out to tell you all the things +about Unix that tutorials and technical books won't. The result +is gossipy, funny, opinionated, downright weird in spots, and +invaluable. Along the way they expose you to enough of Unix's +history, folklore and humor to qualify as a first-class source +for these things. Because so much of today's hackerdom is +involved with Unix, this in turn illuminates many of its in-jokes +and preoccupations. + + +True +Names ... and Other Dangers + +Vernor Vinge + +Baen Books, 1987 + +ISBN 0-671-65363-6 + +Hacker demigod Richard Stallman used to say that the title +story of this book "expresses the spirit of hacking best". Until +the subject of the next entry came out, it was hard to even +nominate another contender. The other stories in this collection +are also fine work by an author who has since won multiple Hugos +and is one of today's very best practitioners of hard SF. + + +Snow Crash + +Neal Stephenson + +Bantam, 1992 + +ISBN 0-553-56261-4 + +Stephenson's epic, comic cyberpunk novel is deeply knowing +about the hacker psychology and its foibles in a way no other +author of fiction has ever even approached. His imagination, his +grasp of the relevant technical details, and his ability to +communicate the excitement of hacking and its results are +astonishing, delightful, and (so far) unsurpassed. + + + +Cyberpunk: Outlaws and Hackers on the Computer +Frontier + +Katie Hafner & John Markoff + +Simon & Schuster 1991 + +ISBN 0-671-68322-5 + +This book gathers narratives about the careers of three +notorious crackers into a clear-eyed but sympathetic portrait of +hackerdom's dark side. The principals are Kevin Mitnick, "Pengo" +and "Hagbard" of the Chaos Computer Club, and Robert T. Morris +(see RTM, sense 2) . Markoff and Hafner +focus as much on their psychologies and motivations as on the +details of their exploits, but don't slight the latter. The +result is a balanced and fascinating account, particularly useful +when read immediately before or after Cliff Stoll's The Cuckoo's Egg. It is +especially instructive to compare RTM, a true hacker who +blundered, with the sociopathic phone-freak Mitnick and the +alienated, drug-addled crackers who made the Chaos Club +notorious. The gulf between wizard +and wannabee has seldom been made +more obvious. + + +Technobabble + +John Barry + +MIT Press 1991 + +ISBN 0-262-02333-4 + +Barry's book takes a critical and humorous look at the +`technobabble' of acronyms, neologisms, hyperbole, and metaphor +spawned by the computer industry. Though he discusses some of the +same mechanisms of jargon formation that occur in hackish, most +of what he chronicles is actually suit-speak -- the obfuscatory +language of press releases, marketroids, and Silicon Valley CEOs +rather than the playful jargon of hackers (most of whom wouldn't +be caught dead uttering the kind of pompous, passive-voiced word +salad he deplores). + + +The Cuckoo's Egg + +Clifford Stoll + +Doubleday 1989 + +ISBN 0-385-24946-2 + +Clifford Stoll's absorbing tale of how he tracked Markus Hess +and the Chaos Club cracking ring nicely illustrates the +difference between `hacker' and `cracker'. Stoll's portrait of +himself, his lady Martha, and his friends at Berkeley and on the +Internet paints a marvelously vivid picture of how hackers and +the people around them like to live and how they think. + +#===================== THE JARGON FILE ENDS HERE ====================# + + + + +End of the Project Gutenberg EBook of The New Hacker's Dictionary version 4.2.2, by various editors + +*** END OF THIS PROJECT GUTENBERG EBOOK THE NEW HACKER'S DICTIONARY 4.2.2 *** + +***** This file should be named 3008-0.txt or 3008-0.zip ***** +This and all associated files of various formats will be found in: + http://www.gutenberg.org/3/0/0/3008/ + +Updated editions will replace the previous one--the old editions will +be renamed. + +Creating the works from print editions not protected by U.S. copyright +law means that no one owns a United States copyright in these works, +so the Foundation (and you!) can copy and distribute it in the United +States without permission and without paying copyright +royalties. Special rules, set forth in the General Terms of Use part +of this license, apply to copying and distributing Project +Gutenberg-tm electronic works to protect the PROJECT GUTENBERG-tm +concept and trademark. Project Gutenberg is a registered trademark, +and may not be used if you charge for the eBooks, unless you receive +specific permission. If you do not charge anything for copies of this +eBook, complying with the rules is very easy. You may use this eBook +for nearly any purpose such as creation of derivative works, reports, +performances and research. They may be modified and printed and given +away--you may do practically ANYTHING in the United States with eBooks +not protected by U.S. copyright law. Redistribution is subject to the +trademark license, especially commercial redistribution. + +START: FULL LICENSE + +THE FULL PROJECT GUTENBERG LICENSE +PLEASE READ THIS BEFORE YOU DISTRIBUTE OR USE THIS WORK + +To protect the Project Gutenberg-tm mission of promoting the free +distribution of electronic works, by using or distributing this work +(or any other work associated in any way with the phrase "Project +Gutenberg"), you agree to comply with all the terms of the Full +Project Gutenberg-tm License available with this file or online at +www.gutenberg.org/license. + +Section 1. General Terms of Use and Redistributing Project +Gutenberg-tm electronic works + +1.A. By reading or using any part of this Project Gutenberg-tm +electronic work, you indicate that you have read, understand, agree to +and accept all the terms of this license and intellectual property +(trademark/copyright) agreement. If you do not agree to abide by all +the terms of this agreement, you must cease using and return or +destroy all copies of Project Gutenberg-tm electronic works in your +possession. If you paid a fee for obtaining a copy of or access to a +Project Gutenberg-tm electronic work and you do not agree to be bound +by the terms of this agreement, you may obtain a refund from the +person or entity to whom you paid the fee as set forth in paragraph +1.E.8. + +1.B. "Project Gutenberg" is a registered trademark. It may only be +used on or associated in any way with an electronic work by people who +agree to be bound by the terms of this agreement. There are a few +things that you can do with most Project Gutenberg-tm electronic works +even without complying with the full terms of this agreement. See +paragraph 1.C below. There are a lot of things you can do with Project +Gutenberg-tm electronic works if you follow the terms of this +agreement and help preserve free future access to Project Gutenberg-tm +electronic works. See paragraph 1.E below. + +1.C. The Project Gutenberg Literary Archive Foundation ("the +Foundation" or PGLAF), owns a compilation copyright in the collection +of Project Gutenberg-tm electronic works. Nearly all the individual +works in the collection are in the public domain in the United +States. If an individual work is unprotected by copyright law in the +United States and you are located in the United States, we do not +claim a right to prevent you from copying, distributing, performing, +displaying or creating derivative works based on the work as long as +all references to Project Gutenberg are removed. Of course, we hope +that you will support the Project Gutenberg-tm mission of promoting +free access to electronic works by freely sharing Project Gutenberg-tm +works in compliance with the terms of this agreement for keeping the +Project Gutenberg-tm name associated with the work. You can easily +comply with the terms of this agreement by keeping this work in the +same format with its attached full Project Gutenberg-tm License when +you share it without charge with others. + +1.D. The copyright laws of the place where you are located also govern +what you can do with this work. Copyright laws in most countries are +in a constant state of change. If you are outside the United States, +check the laws of your country in addition to the terms of this +agreement before downloading, copying, displaying, performing, +distributing or creating derivative works based on this work or any +other Project Gutenberg-tm work. The Foundation makes no +representations concerning the copyright status of any work in any +country outside the United States. + +1.E. Unless you have removed all references to Project Gutenberg: + +1.E.1. The following sentence, with active links to, or other +immediate access to, the full Project Gutenberg-tm License must appear +prominently whenever any copy of a Project Gutenberg-tm work (any work +on which the phrase "Project Gutenberg" appears, or with which the +phrase "Project Gutenberg" is associated) is accessed, displayed, +performed, viewed, copied or distributed: + + This eBook is for the use of anyone anywhere in the United States and + most other parts of the world at no cost and with almost no + restrictions whatsoever. You may copy it, give it away or re-use it + under the terms of the Project Gutenberg License included with this + eBook or online at www.gutenberg.org. If you are not located in the + United States, you'll have to check the laws of the country where you + are located before using this ebook. + +1.E.2. If an individual Project Gutenberg-tm electronic work is +derived from texts not protected by U.S. copyright law (does not +contain a notice indicating that it is posted with permission of the +copyright holder), the work can be copied and distributed to anyone in +the United States without paying any fees or charges. If you are +redistributing or providing access to a work with the phrase "Project +Gutenberg" associated with or appearing on the work, you must comply +either with the requirements of paragraphs 1.E.1 through 1.E.7 or +obtain permission for the use of the work and the Project Gutenberg-tm +trademark as set forth in paragraphs 1.E.8 or 1.E.9. + +1.E.3. If an individual Project Gutenberg-tm electronic work is posted +with the permission of the copyright holder, your use and distribution +must comply with both paragraphs 1.E.1 through 1.E.7 and any +additional terms imposed by the copyright holder. Additional terms +will be linked to the Project Gutenberg-tm License for all works +posted with the permission of the copyright holder found at the +beginning of this work. + +1.E.4. Do not unlink or detach or remove the full Project Gutenberg-tm +License terms from this work, or any files containing a part of this +work or any other work associated with Project Gutenberg-tm. + +1.E.5. Do not copy, display, perform, distribute or redistribute this +electronic work, or any part of this electronic work, without +prominently displaying the sentence set forth in paragraph 1.E.1 with +active links or immediate access to the full terms of the Project +Gutenberg-tm License. + +1.E.6. You may convert to and distribute this work in any binary, +compressed, marked up, nonproprietary or proprietary form, including +any word processing or hypertext form. However, if you provide access +to or distribute copies of a Project Gutenberg-tm work in a format +other than "Plain Vanilla ASCII" or other format used in the official +version posted on the official Project Gutenberg-tm web site +(www.gutenberg.org), you must, at no additional cost, fee or expense +to the user, provide a copy, a means of exporting a copy, or a means +of obtaining a copy upon request, of the work in its original "Plain +Vanilla ASCII" or other form. Any alternate format must include the +full Project Gutenberg-tm License as specified in paragraph 1.E.1. + +1.E.7. Do not charge a fee for access to, viewing, displaying, +performing, copying or distributing any Project Gutenberg-tm works +unless you comply with paragraph 1.E.8 or 1.E.9. + +1.E.8. You may charge a reasonable fee for copies of or providing +access to or distributing Project Gutenberg-tm electronic works +provided that + +* You pay a royalty fee of 20% of the gross profits you derive from + the use of Project Gutenberg-tm works calculated using the method + you already use to calculate your applicable taxes. The fee is owed + to the owner of the Project Gutenberg-tm trademark, but he has + agreed to donate royalties under this paragraph to the Project + Gutenberg Literary Archive Foundation. Royalty payments must be paid + within 60 days following each date on which you prepare (or are + legally required to prepare) your periodic tax returns. Royalty + payments should be clearly marked as such and sent to the Project + Gutenberg Literary Archive Foundation at the address specified in + Section 4, "Information about donations to the Project Gutenberg + Literary Archive Foundation." + +* You provide a full refund of any money paid by a user who notifies + you in writing (or by e-mail) within 30 days of receipt that s/he + does not agree to the terms of the full Project Gutenberg-tm + License. You must require such a user to return or destroy all + copies of the works possessed in a physical medium and discontinue + all use of and all access to other copies of Project Gutenberg-tm + works. + +* You provide, in accordance with paragraph 1.F.3, a full refund of + any money paid for a work or a replacement copy, if a defect in the + electronic work is discovered and reported to you within 90 days of + receipt of the work. + +* You comply with all other terms of this agreement for free + distribution of Project Gutenberg-tm works. + +1.E.9. If you wish to charge a fee or distribute a Project +Gutenberg-tm electronic work or group of works on different terms than +are set forth in this agreement, you must obtain permission in writing +from both the Project Gutenberg Literary Archive Foundation and The +Project Gutenberg Trademark LLC, the owner of the Project Gutenberg-tm +trademark. Contact the Foundation as set forth in Section 3 below. + +1.F. + +1.F.1. Project Gutenberg volunteers and employees expend considerable +effort to identify, do copyright research on, transcribe and proofread +works not protected by U.S. copyright law in creating the Project +Gutenberg-tm collection. Despite these efforts, Project Gutenberg-tm +electronic works, and the medium on which they may be stored, may +contain "Defects," such as, but not limited to, incomplete, inaccurate +or corrupt data, transcription errors, a copyright or other +intellectual property infringement, a defective or damaged disk or +other medium, a computer virus, or computer codes that damage or +cannot be read by your equipment. + +1.F.2. LIMITED WARRANTY, DISCLAIMER OF DAMAGES - Except for the "Right +of Replacement or Refund" described in paragraph 1.F.3, the Project +Gutenberg Literary Archive Foundation, the owner of the Project +Gutenberg-tm trademark, and any other party distributing a Project +Gutenberg-tm electronic work under this agreement, disclaim all +liability to you for damages, costs and expenses, including legal +fees. YOU AGREE THAT YOU HAVE NO REMEDIES FOR NEGLIGENCE, STRICT +LIABILITY, BREACH OF WARRANTY OR BREACH OF CONTRACT EXCEPT THOSE +PROVIDED IN PARAGRAPH 1.F.3. YOU AGREE THAT THE FOUNDATION, THE +TRADEMARK OWNER, AND ANY DISTRIBUTOR UNDER THIS AGREEMENT WILL NOT BE +LIABLE TO YOU FOR ACTUAL, DIRECT, INDIRECT, CONSEQUENTIAL, PUNITIVE OR +INCIDENTAL DAMAGES EVEN IF YOU GIVE NOTICE OF THE POSSIBILITY OF SUCH +DAMAGE. + +1.F.3. LIMITED RIGHT OF REPLACEMENT OR REFUND - If you discover a +defect in this electronic work within 90 days of receiving it, you can +receive a refund of the money (if any) you paid for it by sending a +written explanation to the person you received the work from. If you +received the work on a physical medium, you must return the medium +with your written explanation. The person or entity that provided you +with the defective work may elect to provide a replacement copy in +lieu of a refund. If you received the work electronically, the person +or entity providing it to you may choose to give you a second +opportunity to receive the work electronically in lieu of a refund. If +the second copy is also defective, you may demand a refund in writing +without further opportunities to fix the problem. + +1.F.4. Except for the limited right of replacement or refund set forth +in paragraph 1.F.3, this work is provided to you 'AS-IS', WITH NO +OTHER WARRANTIES OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT +LIMITED TO WARRANTIES OF MERCHANTABILITY OR FITNESS FOR ANY PURPOSE. + +1.F.5. Some states do not allow disclaimers of certain implied +warranties or the exclusion or limitation of certain types of +damages. If any disclaimer or limitation set forth in this agreement +violates the law of the state applicable to this agreement, the +agreement shall be interpreted to make the maximum disclaimer or +limitation permitted by the applicable state law. The invalidity or +unenforceability of any provision of this agreement shall not void the +remaining provisions. + +1.F.6. INDEMNITY - You agree to indemnify and hold the Foundation, the +trademark owner, any agent or employee of the Foundation, anyone +providing copies of Project Gutenberg-tm electronic works in +accordance with this agreement, and any volunteers associated with the +production, promotion and distribution of Project Gutenberg-tm +electronic works, harmless from all liability, costs and expenses, +including legal fees, that arise directly or indirectly from any of +the following which you do or cause to occur: (a) distribution of this +or any Project Gutenberg-tm work, (b) alteration, modification, or +additions or deletions to any Project Gutenberg-tm work, and (c) any +Defect you cause. + +Section 2. Information about the Mission of Project Gutenberg-tm + +Project Gutenberg-tm is synonymous with the free distribution of +electronic works in formats readable by the widest variety of +computers including obsolete, old, middle-aged and new computers. It +exists because of the efforts of hundreds of volunteers and donations +from people in all walks of life. + +Volunteers and financial support to provide volunteers with the +assistance they need are critical to reaching Project Gutenberg-tm's +goals and ensuring that the Project Gutenberg-tm collection will +remain freely available for generations to come. In 2001, the Project +Gutenberg Literary Archive Foundation was created to provide a secure +and permanent future for Project Gutenberg-tm and future +generations. To learn more about the Project Gutenberg Literary +Archive Foundation and how your efforts and donations can help, see +Sections 3 and 4 and the Foundation information page at +www.gutenberg.org + +Section 3. Information about the Project Gutenberg Literary Archive Foundation + +The Project Gutenberg Literary Archive Foundation is a non profit +501(c)(3) educational corporation organized under the laws of the +state of Mississippi and granted tax exempt status by the Internal +Revenue Service. The Foundation's EIN or federal tax identification +number is 64-6221541. Contributions to the Project Gutenberg Literary +Archive Foundation are tax deductible to the full extent permitted by +U.S. federal laws and your state's laws. + +The Foundation's principal office is in Fairbanks, Alaska, with the +mailing address: PO Box 750175, Fairbanks, AK 99775, but its +volunteers and employees are scattered throughout numerous +locations. Its business office is located at 809 North 1500 West, Salt +Lake City, UT 84116, (801) 596-1887. Email contact links and up to +date contact information can be found at the Foundation's web site and +official page at www.gutenberg.org/contact + +For additional contact information: + + Dr. Gregory B. Newby + Chief Executive and Director + gbnewby@pglaf.org + +Section 4. Information about Donations to the Project Gutenberg +Literary Archive Foundation + +Project Gutenberg-tm depends upon and cannot survive without wide +spread public support and donations to carry out its mission of +increasing the number of public domain and licensed works that can be +freely distributed in machine readable form accessible by the widest +array of equipment including outdated equipment. Many small donations +($1 to $5,000) are particularly important to maintaining tax exempt +status with the IRS. + +The Foundation is committed to complying with the laws regulating +charities and charitable donations in all 50 states of the United +States. Compliance requirements are not uniform and it takes a +considerable effort, much paperwork and many fees to meet and keep up +with these requirements. We do not solicit donations in locations +where we have not received written confirmation of compliance. To SEND +DONATIONS or determine the status of compliance for any particular +state visit www.gutenberg.org/donate + +While we cannot and do not solicit contributions from states where we +have not met the solicitation requirements, we know of no prohibition +against accepting unsolicited donations from donors in such states who +approach us with offers to donate. + +International donations are gratefully accepted, but we cannot make +any statements concerning tax treatment of donations received from +outside the United States. U.S. laws alone swamp our small staff. + +Please check the Project Gutenberg Web pages for current donation +methods and addresses. Donations are accepted in a number of other +ways including checks, online payments and credit card donations. To +donate, please visit: www.gutenberg.org/donate + +Section 5. General Information About Project Gutenberg-tm electronic works. + +Professor Michael S. Hart was the originator of the Project +Gutenberg-tm concept of a library of electronic works that could be +freely shared with anyone. For forty years, he produced and +distributed Project Gutenberg-tm eBooks with only a loose network of +volunteer support. + +Project Gutenberg-tm eBooks are often created from several printed +editions, all of which are confirmed as not protected by copyright in +the U.S. unless a copyright notice is included. Thus, we do not +necessarily keep eBooks in compliance with any particular paper +edition. + +Most people start at our Web site which has the main PG search +facility: www.gutenberg.org + +This Web site includes information about Project Gutenberg-tm, +including how to make donations to the Project Gutenberg Literary +Archive Foundation, how to help produce our new eBooks, and how to +subscribe to our email newsletter to hear about new eBooks. + + |
