view release on metacpan or search on metacpan
Amethyst/Brain/Infobot/Module/Zippy.pm view on Meta::CPAN
Psychoanalysis?? I thought this was a nude rap session!!!
PUNK ROCK!! DISCO DUCK!! BIRTH CONTROL!!
Quick, sing me the BUDAPEST NATIONAL ANTHEM!!
RELATIVES!!
Remember, in 2039, MOUSSE & PASTA will be available ONLY by prescription!!
RHAPSODY in Glue!
SANTA CLAUS comes down a FIRE ESCAPE wearing bright blue LEG WARMERS ... He scrubs the POPE with a mild soap or detergent for 15 minutes, starring JANE FONDA!!
Send your questions to ``ASK ZIPPY'', Box 40474, San Francisco, CA 94140, USA
SHHHH!! I hear SIX TATTOOED TRUCK-DRIVERS tossing ENGINE BLOCKS into empty OIL DRUMS ...
Should I do my BOBBIE VINTON medley?
Should I get locked in the PRINCICAL'S OFFICE today -- or have a VASECTOMY??
Should I start with the time I SWITCHED personalities with a BEATNIK hair stylist or my failure to refer five TEENAGERS to a good OCULIST? Sign my PETITION.
So this is what it feels like to be potato salad
So, if we convert SUPPLY-SIDE SOYABEAN FUTURES into HIGH-YIELD T-BILL INDICATORS, the PRE-INFLATIONARY risks will DWINDLE to a rate of 2 SHOPPING SPREES per EGGPLANT!!
Someone in DAYTON, Ohio is selling USED CARPETS to a SERBO-CROATIAN
Sometime in 1993 NANCY SINATRA will lead a BLOODLESS COUP on GUAM!!
Somewhere in DOWNTOWN BURBANK a prostitute is OVERCOOKING a LAMB CHOP!!
Somewhere in suburban Honolulu, an unemployed bellhop is whipping up a batch of illegal psilocybin chop suey!!
Somewhere in Tenafly, New Jersey, a chiropractor is viewing "Leave it
to Beaver"!
Spreading peanut butter reminds me of opera!! I wonder why?
factpacks/MacErrorCodes.fact view on Meta::CPAN
Mac Error -34 => ( dskFulErr ) Disk full **File System Error**
Mac Error -35 => ( nsvErr ) No such volume; volume not found
Mac Error -36 => ( ioErr ) I/O error (bummers) **File System Error**
Mac Error -37 => ( bdNamErr ) Bad file name; there may be no bad names in the final system! **File System Error**
Mac Error -38 => ( fnOpnErr ) File not open **File System Error**
Mac Error -39 => ( eofErr ) End of file; no additional data in the format **File System Error**
Mac Error -40 => ( posErr ) Tried to position to before start of file (r/w) **File System Error**
Mac Error -41 => ( mFulErr ) Memory full (open) or file won't fit (load) **File System Error**
Mac Error -42 => ( tmfoErr ) too many files open **File System Error**
Mac Error -43 => ( fnfErr ) File not found; Folder not found; Edition container not found; Target not found **File System Error**
Mac Error -44 => ( wPrErr ) Diskette is write protected; Volume is locked through hardware **File System Error**
Mac Error -45 => ( fLckdErr ) File is locked **File System Error**
Mac Error -45 => ( fLckedErr ) Publisher writing to an edition **File System Error**
Mac Error -46 => ( vLckdErr ) Volume is locked through software **File System Error**
Mac Error -47 => ( fBsyErr ) File is busy (delete); Section doing I/O **File System Error**
Mac Error -48 => ( dupFNErr ) Duplicate filename (rename); File found instead of folder **File System Error**
Mac Error -49 => ( opWrErr ) File already open with with write permission **File System Error**
Mac Error -50 => ( paramErr ) Error in user parameter list **File System Error**
Mac Error -51 => ( rfNumErr ) Reference number invalid **File System Error**
Mac Error -52 => ( gfpErr ) Get file position error **File System Error**
Mac Error -53 => ( volOffLinErr ) Volume is off line **File System Error**
Mac Error -54 => ( permErr ) Software lock on file; Not a subscriber [permissions error on file open] **File System Error**
Mac Error -55 => ( volOnLinErr ) drive volume already on-line at MountVol **File System Error**
Mac Error -56 => ( nsDrvErr ) no such drive (tried to mount a bad drive num) **File System Error**
factpacks/MacErrorCodes.fact view on Meta::CPAN
Mac Error -95 => ( excessCollsns ) Hardware error [excessive collisions on write] **AppleTalk Error**
Mac Error -97 => ( portInUse ) driver Open error code (port is in use) **AppleTalk Error**
Mac Error -98 => ( portNotCf ) driver Open error code (parameter RAM not configured for this connection) **AppleTalk Error**
Mac Error -99 => ( memROZErr ) hard error in ROZ **AppleTalk Error** or ( memROZError ) hard error in ROZ / ( memROZWarn ) soft error in ROZ **AppleTalk Error** or ( memROZWarn ) soft error in ROZ **AppleTalk Error**
Mac Error -100 => ( noScrapErr ) No scrap exists error **Scrap Manager Error**
Mac Error -102 => ( noTypeErr ) Format not available [no object of that type in scrap] **Scrap Manager Error**
Mac Error -108 => ( memFullErr ) Ran out of memory [not enough room in heap zone] **Storage Allocator Error**
Mac Error -109 => ( nilHandleErr ) GetHandleSize fails on baseText or substitutionText; NIL master pointer [handle was NIL in HandleZone or other] **Storage Allocator Error**
Mac Error -110 => ( memAdrErr ) Address was odd, or out of range **Storage Allocator Error**
Mac Error -111 => ( memWZErr ) Attempted to operate on a free block; GetHandleSize fails on baseText or substitutionText [WhichZone failed (applied to free block)] **Storage Allocator Error**
Mac Error -112 => ( memPurErr ) Trying to purge a locked or non-purgeable block **Storage Allocator Error**
Mac Error -113 => ( memAZErr ) Address in zone check failed **Storage Allocator Error**
Mac Error -114 => ( memPCErr ) Pointer Check failed **Storage Allocator Error**
Mac Error -115 => ( memBCErr ) Block Check failed **Storage Allocator Error**
Mac Error -116 => ( memSCErr ) Size Check failed **Storage Allocator Error**
Mac Error -117 => ( memLockedErr ) Trying to move a locked block (MoveHHi) **Storage Allocator Error**
Mac Error -120 => ( dirNFErr ) Directory not found **HFS Error**
Mac Error -121 => ( tmwdoErr ) No free WDCB available **HFS Error**
Mac Error -122 => ( badMovErr ) Move into offspring error **HFS Error**
Mac Error -123 => ( wrgVolTypErr ) Not an HFS volume [wrong volume type error or (obsolete) operation not supported for MFS] **HFS Error**
Mac Error -124 => ( volGoneErr ) Server volume has been disconnected **HFS Error**
Mac Error -125 => ( updPixMemErr ) Insufficient memory to update a pixmap **HFS Error**
Mac Error -127 => ( fsDSIntErr ) Internal file system error **HFS Error**
Mac Error -126 => ( dsMBarNFnd ) System error code for MBDF not found **Menu Manager Error**
Mac Error -127 => ( dsHMenuFindErr ) Could not find HMenu's parent in MenuKey **Menu Manager Error**
Mac Error -128 => ( userCanceledErr ) User canceled an operation **Menu Manager Error**
factpacks/MacErrorCodes.fact view on Meta::CPAN
Mac Error -604 => ( hardwareConfigErr ) hardware configuration not correct for call **Processes Errors**
Mac Error -605 => ( appMemFullErr ) Partition size specified in 'SIZE' resource is not big enough for launch **Processes Errors**
Mac Error -606 => ( appIsDaemon ) Application is background-only **Processes Errors**
Mac Error -607 => ( bufferIsSmall ) Buffer is too small **Processes Errors**
Mac Error -608 => ( noOutstandingHLE ) No outstanding high-level event **Processes Errors**
Mac Error -609 => ( connectionInvalid ) Connection is invalid **Processes Errors**
Mac Error -610 => ( noUserInteractionAllowed ) Attempted PostHighLevelEvent from background and no session yet established **Processes Errors**
Mac Error -620 => ( notEnoughMemoryErr ) Insufficient physical memory **Memory Dispatch Errors**
Mac Error -621 => ( notHeldErr ) Specified range of memory is not held **Memory Dispatch Errors**
Mac Error -622 => ( cannotMakeContiguousErr ) Cannot make specified range contiguous **Memory Dispatch Errors**
Mac Error -623 => ( notLockedErr ) Specified range of memory is not locked **Memory Dispatch Errors**
Mac Error -624 => ( interruptsMaskedErr ) Called with interrupts masked **Memory Dispatch Errors**
Mac Error -625 => ( cannotDeferErr ) Unable to defer additional user functions **Memory Dispatch Errors**
Mac Error -800 => ( rcDBNull ) The data item was NULL **DatabaseAccess (Pack 13) Errors**
Mac Error -801 => ( rcDBValue ) Data available or successfully retrieved **DatabaseAccess (Pack 13) Errors**
Mac Error -802 => ( rcDBError ) Error executing function **DatabaseAccess (Pack 13) Errors**
Mac Error -803 => ( rcDBBadType ) Next data item not of requested data type **DatabaseAccess (Pack 13) Errors**
Mac Error -804 => ( rcDBBreak ) Function timed out **DatabaseAccess (Pack 13) Errors**
Mac Error -805 => ( rcDBExec ) Query currently executing **DatabaseAccess (Pack 13) Errors**
Mac Error -806 => ( reDBBadSessID ) Session ID is invalid **DatabaseAccess (Pack 13) Errors**
Mac Error -807 => ( rcDBBadSessNum ) Invalid session number **DatabaseAccess (Pack 13) Errors**
factpacks/jargon-split.fact view on Meta::CPAN
blinkenlights7 is astaunished the blinkenlights. See also {geef}.
blit is /blit/ vt. 1. To copy a large array of bits from one part of a computer's memory to another part, particularly when the memory is being used to determine what is shown on a display screen. "The storage allocator picks through the tabl...
blit2 is memory, and then blits it all back down again." See {bitblt}, {BLT}, {dd}, {cat}, {blast}, {snarf}. More generally, to perform some operation (such as toggling) on a large array of bits while moving them. 2. All-capitalized as `BL...
blit3 is designed by Rob Pike at Bell Labs, later commercialized as the AT&T 5620. (The folk etymology from `Bell Labs Intelligent Terminal' is incorrect.)
blitter is /blit'r/ n. A special-purpose chip or hardware system built to perform {blit} operations, esp. used for fast implementation of bit-mapped graphics. The Commodore Amiga and a few other micros have these, but in 1991 the trend is awa...
blitter2 is reincarnation}). Syn. {raster blaster}.
blivet is /bliv'*t/ [allegedly from a World War II military term meaning "ten pounds of manure in a five-pound bag"] n. 1. An intractable problem. 2. A crucial piece of hardware that can't be fixed or replaced if it breaks. 3. A tool that ha...
blivet2 is programmers that it has become an unmaintainable tissue of hacks. 4. An out-of-control but unkillable development effort. 5. An embarrassing bug that pops up during a customer demo. This term has other meanings in other technica...
blivet3 is hardware engineers of various kinds it seems to mean any random object of unknown purpose (similar to hackish use of {frob}). It has also been used to describe an amusing trick-the-eye drawing resembling a three-pronged fork that ...
blivet4 is until one realizes that the parts fit together in an impossible way.
block is [from process scheduling terminology in OS theory] 1. vi. To delay or sit idle while waiting for something. "We're blocking until everyone gets here." Compare {busy-wait}. 2. `block on' vt. To block, waiting for (something). "Lunc...
block transfer computations is n. From the television series "Dr. Who", in which it referred to computations so fiendishly subtle and complex that they could not be performed by machines. Used to refer to any task that should be expressible as...
blow an EPROM is /bloh *n ee'prom/ v. (alt. `blast an EPROM', `burn an EPROM') To program a read-only memory, e.g. for use with an embedded system. This term arises because the programming process for the Programmable Read-Only Memories (PROM...
blow an EPROM2 is Programmable Read-Only Memories (EPROMs) involved intentionally blowing tiny electrical fuses on the chip. Thus, one was said to `blow' (or `blast') a PROM, and the terminology carried over even though the write process on ...
blow away is vt. To remove (files and directories) from permanent storage, generally by accident. "He reformatted the wrong partition and blew away last night's netnews." Oppose {nuke}.
blow out is vi. Of software, to fail spectacularly; almost as serious as {crash and burn}. See {blow past}, {blow up}.
blow past is vt. To {blow out} despite a safeguard. "The server blew past the 5K reserve buffer."
blow up is vi. 1. [scientific computation] To become unstable. Suggests that the computation is diverging so rapidly that it will soon overflow or at least go {nonlinear}. 2. Syn. {blow out}.
BLT is /B-L-T/, /bl*t/ or (rarely) /belt/ n.,vt. Synonym for {blit}. This is the original form of {blit} and the ancestor of {bitblt}. It referred to any large bit-field copy or move operation (one resource-intensive memory-shuffling operati...
BLT2 is and TOPS-10 was sardonically referred to as `The Big BLT'). The jargon usage has outlasted the {PDP-10} BLock Transfer instruction from which {BLT} derives; nowadays, the assembler mnemonic {BLT} almost always means `Branch if Less ...
Blue Book is n. 1. Informal name for one of the three standard references on the page-layout and graphics-control language PostScript (`PostScript Language Tutorial and Cookbook', Adobe Systems, Addison-Wesley 1985, QA76.73.P67P68, ISBN 0-201-...
factpacks/jargon-split.fact view on Meta::CPAN
bogus is adj. 1. Non-functional. "Your patches are bogus." 2. Useless. "OPCON is a bogus program." 3. False. "Your arguments are bogus." 4. Incorrect. "That algorithm is bogus." 5. Unbelievable. "You claim to have solved the halting pro...
bogus2 is bogus." 6. Silly. "Stop writing those bogus sagas." Astrology is bogus. So is a bolt that is obviously about to break. So is someone who makes blatantly false claims to have solved a scientific problem. (This word seems to have...
bogus3 is {random} --- mostly the negative ones.) It is claimed that `bogus' was originally used in the hackish sense at Princeton in the late 1960s. It was spread to CMU and Yale by Michael Shamos, a migratory Princeton alumnus. A glossary ...
bogus4 is word was first popularized (see {autobogotiphobia} under {bogotify}). The word spread into hackerdom from CMU and MIT. By the early 1980s it was also current in something like the hackish sense in West Coast teen slang, and it had...
bogus5 is Cambridge reports, by contrast, that these uses of `bogus' grate on British nerves; in Britain the word means, rather specifically, `counterfeit', as in "a bogus 10-pound note".
Bohr bug is /bohr buhg/ [from quantum physics] n. A repeatable {bug}; one that manifests reliably under a possibly unknown but well-defined set of conditions. Antonym of {heisenbug}; see also {mandelbug}.
boink is /boynk/ [USENET ascribed there to the TV series "Cheers" and "Moonlighting"] 1. To have sex with; compare {bounce}, sense 3. (This is mainstream slang.) In Commonwealth hackish the variant `bonk' is more common. 2. After the origin...
boink2 is for almost any net social gathering, e.g., Miniboink, a small boink held by Nancy Gillett in 1988; Minniboink, a Boinkcon in Minnesota in 1989; Humpdayboinks, Wednesday get-togethers held in the San Francisco Bay Area. Compare {@-...
bomb is 1. v. General synonym for {crash} (sense 1) except that it is not used as a noun; esp. used of software or OS failures. "Don't run Empire with less than 32K stack, it'll bomb." 2. n.,v. Atari ST and Macintosh equivalents of a UNIX `pan...
bomb2 is of little black-powder bombs or mushroom clouds are displayed, indicating that the system has died. On the Mac, this may be accompanied by a decimal (or occasionally hexadecimal) number indicating what went wrong, similar to the Ami...
bomb3 is {{MS-DOS}} machines tend to get {locked up} in this situation.
bondage-and-discipline language is A language (such as Pascal, Ada, APL, or Prolog) that, though ostensibly general-purpose, is designed so as to enforce an author's theory of `right programming' even though said theory is demonstrably inadequ...
bondage-and-discipline language2 is general-purpose programming. Often abbreviated `B&D'; thus, one may speak of things "having the B&D nature". See {{Pascal}}; oppose {languages of choice}.
bonk/oif is /bonk/, /oyf/ interj. In the {MUD} community, it has become traditional to express pique or censure by `bonking' the offending person. There is a convention that one should acknowledge a bonk by saying `oif!' and a myth to the eff...
bonk/oif2 is bonk/oif balance, causing much trouble in the universe. Some MUDs have implemented special commands for bonking and oifing. See also {talk mode}, {posing}.
book titles is There is a tradition in hackerdom of informally tagging important textbooks and standards documents with the dominant color of their covers or with some other conspicuous feature of the cover. Many of these are described in thi...
book titles2 is {Aluminum Book}, {Blue Book}, {Cinderella Book}, {Devil Book}, {Dragon Book}, {Green Book}, {Orange Book}, {Pink-Shirt Book}, {Purple Book}, {Red Book}, {Silver Book}, {White Book}, {Wizard Book}, {Yellow Book}, and {bible}.b...
book titles3 is v.,n. To load and initialize the operating system on a machine. This usage is no longer jargon (having passed into techspeak) but has given rise to some derivatives that are still jargon. The derivative `reboot' implies that...
book titles4 is that the boot is a {bounce} intended to clear some state of {wedgitude}. This is sometimes used of human thought processes, as in the following exchange "You've lost me." "OK, reboot. Here's the theory...." This term is als...
book titles5 is power-off condition) and `warm boot' (with the CPU and all devices already powered up, as after a hardware reset or software crash). Another variant `soft boot', reinitialization of only part of a system, under control of oth...
book titles6 is the {mess-dos} emulator, control-alt-insert will cause a soft-boot of the emulator, while leaving the rest of the system running." Opposed to this there is `hard boot', which connotes hostility towards or frustration with the...
factpacks/jargon-split.fact view on Meta::CPAN
computron is /kom'pyoo-tron`/ n. 1. A notional unit of computing power combining instruction speed and storage capacity, dimensioned roughly in instructions-per-second times megabytes-of-main-store times megabytes-of-mass-storage. "That machi...
computron2 is enough computrons!" This usage is usually found in metaphors that treat computing power as a fungible commodity good, like a crop yield or diesel horsepower. See {bitty box}, {Get a real computer!}, {toy}, {crank}. 2. A mythi...
computron3 is quantity of computation or information, in much the same way that an electron bears one unit of electric charge (see also {bogon}). An elaborate pseudo-scientific theory of computrons has been developed based on the physical f...
computron4 is more rapidly as it is heated. It is argued that an object melts because the molecules have lost their information about where they are supposed to be (that is, they have emitted computrons). This explains why computers get so ho...
computron5 is computrons. Conversely, it should be possible to cool down an object by placing it in the path of a computron beam. It is believed that this may also explain why machines that work at the factory fail in the computer room the ...
computron6 is other hardware. (This theory probably owes something to the "Warlock" stories by Larry Niven, the best known being "What Good is a Glass Dagger?", in which magic is fueled by an exhaustible natural resource called `mana'.)
condition out is vt. To prevent a section of code from being compiled by surrounding it with a conditional-compilation directive whose condition is always false. The {canonical} examples are `#if 0' (or `#ifdef notdef', though some find this ...
condom is n. 1. The protective plastic bag that accompanies 3.5-inch microfloppy diskettes. Rarely, also used of (paper) disk envelopes. Unlike the write protect tab, the condom (when left on) not only impedes the practice of {SEX} but has al...
condom2 is drive mechanisms attempt to access the disk --- and can even fatally frustrate insertion. 2. The protective cladding on a {light pipe}.
connector conspiracy is [probably came into prominence with the appearance of the KL-10 (one model of the {PDP-10}), none of whose connectors matched anything else] n. The tendency of manufacturers (or, by extension, programmers or purveyors o...
connector conspiracy2 is that don't fit together with the old stuff, thereby making you buy either all new stuff or expensive interface devices. The KL-10 Massbus connector was actually *patented* by DEC, which reputedly refused to license ...
connector conspiracy3 is parties out of competition for the lucrative Massbus peripherals market. This is a source of never-ending frustration for the diehards who maintain older PDP-10 or VAX systems. Their CPUs work fine, but they are st...
connector conspiracy4 is drives with low capacity and high power requirements. In these latter days of open-systems computing this term has fallen somewhat into disuse, to be replaced by the observation that "Standards are great! There are ...
cons is /konz/ or /kons/ [from LISP] 1. vt. To add a new element to a specified list, esp. at the top. "OK, cons picking a replacement for the console TTY onto the agenda." 2. `cons up' vt. To synthesize from smaller pieces "to cons up an ex...
cons2 is fundamental operation for building structures. It takes any two objects and returns a `dot-pair' or two-branched tree with one object hanging from each branch. Because the result of a cons is an object, it can be used to build bin...
cons3 is think of it as a sort of universal constructor, and that is where the jargon meanings spring from.
considered harmful is adj. Edsger W. Dijkstra's note in the March 1968 `Communications of the ACM', "Goto Statement Considered Harmful", fired the first salvo in the structured programming wars. Amusingly, the ACM considered the resulting a...
considered harmful2 is policy) no longer print an article taking so assertive a position against a coding practice. In the ensuing decades, a large number of both serious papers and parodies have borne titles of the form "X considered Y". ...
considered harmful3 is over with the realization that both sides were wrong, but use of such titles has remained as a persistent minor in-joke (the `considered silly' found at various places in this lexicon is related).
console is n. 1. The operator's station of a {mainframe}. In times past, this was a privileged location that conveyed godlike powers to anyone with fingers on its keys. Under UNIX and other modern timesharing OSes, such privileges are guarde...
console2 is just the {tty} the system was booted from. Some of the mystique remains, however, and it is traditional for sysadmins to post urgent messages to all users from the console (on UNIX, /dev/console). 2. On microcomputer UNIX boxes, ...
factpacks/jargon-split.fact view on Meta::CPAN
huff is v. To compress data using a Huffman code. Various programs that use such methods have been called `HUFF' or some variant thereof. Oppose {puff}. Compare {crunch}, {compress}.
humma is // excl. A filler word used on various `chat' and `talk' programs when you had nothing to say but felt that it was important to say something. The word apparently originated (at least with this definition) on the MECC Timeshare Syste...
humma2 is time-sharing system running in Minnesota during the 1970s and the early 1980s) but was later sighted on early UNIX systems.
Humor, Hacker is n. A distinctive style of shared intellectual humor found among hackers, having the following distinctive characteristics 1. Fascination with form-vs.-content jokes, paradoxes, and humor having to do with confusion of metale...
Humor, Hacker2 is laugh hold a red index card in front of him/her with "GREEN" written on it, or vice-versa (note, however, that this is funny only the first time). 2. Elaborate deadpan parodies of large intellectual constructs, such as spec...
Humor, Hacker3 is documents, language descriptions (see {INTERCAL}), and even entire scientific theories (see {quantum bogodynamics}, {computron}). 3. Jokes that involve screwily precise reasoning from bizarre, ludicrous, or just grossly cou...
Humor, Hacker4 is puns and wordplay. 5. A fondness for apparently mindless humor with subversive currents of intelligence in it --- for example, old Warner Brothers and Rocky & Bullwinkle cartoons, the Marx brothers, the early B-52s, and Mon...
Humor, Hacker5 is this trait with elements of high camp and slapstick is especially favored. 6. References to the symbol-object antinomies and associated ideas in Zen Buddhism and (less often) Taoism. See {has the X nature}, {Discordianis...
Humor, Hacker6 is See also {filk}, {retrocomputing}, and appendix B. If you have an itchy feeling that all 6 of these traits are really aspects of one thing that is incredibly difficult to talk about exactly, you are (a) correct and (b) respo...
Humor, Hacker7 is recognizable (though in a less marked form) throughout {{science-fiction fandom}}.
hung is [from `hung up'] adj. Equivalent to {wedged}, but more common at UNIX/C sites. Not generally used of people. Syn. with {locked up}, {wedged}; compare {hosed}. See also {hang}. A hung state is distinguished from {crash}ed or {down}, ...
hung2 is but because it is not running rather than because it is waiting for something. However, the recovery from both situations is often the same.
hungry puppy is n. Syn. {slopsucker}.
hungus is /huhng'g*s/ [perhaps related to slang `humongous'] adj. Large, unwieldy, usually unmanageable. "TCP is a hungus piece of code." "This is a hungus set of modifications."
hyperspace is /hi'per-spays/ n. A memory location that is *far* away from where the program counter should be pointing, often inaccessible because it is not even mapped in. "Another core dump --- looks like the program jumped off to hyperspac...
hyperspace2 is never-never land}.) This usage is from the SF notion of a spaceship jumping `into hyperspace', that is, taking a shortcut through higher-dimensional space --- in other words, bypassing this universe. The variant `east hypers...
hyperspace3 is hackers.*I didn't change anything! interj. An aggrieved cry often heard as bugs manifest during a regression test. The {canonical} reply to this assertion is "Then it works just the same as it did before, doesn't it?" See also...
hyperspace4 is applications programmers trying to blame an obvious applications problem on an unrelated systems software change, for example a divide-by-0 fault after terminals were added to a network. Usually, their statement is found to be f...
hyperspace5 is admit some major restructuring of the program that shouldn't have broken anything, in their opinion, but which actually {hosed} the code completely.
I see no X here. is Hackers (and the interactive computer games they write) traditionally favor this slightly marked usage over other possible equivalents such as "There's no X here!" or "X is missing." or "Where's the X?". This goes back to...
I see no X here.2 is respond in this wise if you asked it to do something involving an object not present at your location in the game.
i14y is // n. Abbrev. for `interoperability', with the `14' replacing fourteen letters. Used in the {X} (windows) community. Refers to portability and compatibility of data formats (even binary ones) between different programs or implementat...
i18n is // n. Abbrev. for `internationali{z,s}ation', with the 18 replacing 18 letters. Used in the {X} (windows) community.
IBM is /I-B-M/ Inferior But Marketable; It's Better Manually; Insidious Black Magic; It's Been Malfunctioning; Incontinent Bowel Movement; and a near-{infinite} number of even less complimentary expansions, including `International Business Ma...
IBM2 is illustrate the considerable antipathy most hackers have long felt toward the `industry leader' (see {fear and loathing}). What galls hackers about most IBM machines above the PC level isn't so much that they are underpowered and over...
IBM3 is but that the designs are incredibly archaic, {crufty}, and {elephantine} ... and you can't *fix* them --- source code is locked up tight, and programming tools are expensive, hard to find, and bletcherous to use once you've found the...
IBM4 is family this may have begun to change --- but then, we thought that when the PC-RT came out, too. In the spirit of universal peace and brotherhood, this lexicon now includes a number of entries attributed to `IBM'; these derive from s...
IBM5 is circulated within IBM's own beleaguered hacker underground.
IBM discount is n. A price increase. Outside IBM, this derives from the common perception that IBM products are generally overpriced (see {clone}); inside, it is said to spring from a belief that large numbers of IBM employees living in an ar...
ice is [coined by USENETter Tom Maddox, popularized by William Gibson's cyberpunk SF novels acronym for `Intrusion Countermeasure Electronics'] Security software (in Gibson's novels, software that responds to intrusion by attempting to literal...
ice2 is program designed for cracking security on a system. Neither term is in serious use yet as of mid-1991, but many hackers find the metaphor attractive, and each may develop a denotation in the future.
ifdef out is /if'def owt/ v. Syn. for {condition out}, specific to {C}.
ill-behaved is adj. 1. [numerical analysis] Said of an algorithm or computational method that tends to blow up because of accumulated roundoff error or poor convergence properties. 2. Software that bypasses the defined {OS} interfaces to do t...
ill-behaved2 is itself, often in a way that depends on the hardware of the machine it is running on or which is nonportable or incompatible with other pieces of software. In the IBM PC/MS-DOS world, there is a folk theorem (nearly true) to th...
ill-behaved3 is and performance penalties in the OS interface) all interesting applications are ill-behaved. See also {bare metal}. Oppose {well-behaved}, compare {PC-ism}. See {mess-dos}.
IMHO is // [from SF fandom via USENET; acronym for `In My Humble Opinion'] "IMHO, mixed-case C names should be avoided, as mistyping something in the wrong case can cause hard-to-detect errors --- and they look too Pascalish anyhow." Also se...
factpacks/jargon-split.fact view on Meta::CPAN
Internet address is n. 1. [techspeak] An absolute network address of the form foo@bar.baz, where foo is a user name, bar is a {sitename}, and baz is a `domain' name, possibly including periods itself. Contrast with {bang path}; see also {netw...
Internet address2 is Internet machines and most UUCP sites can now resolve these addresses, thanks to a large amount of behind-the-scenes magic and PD software written since 1980 or so. See also {bang path}, {domainist}. 2. More loosely, any ...
Internet address3 is this includes {bang path} addresses and some internal corporate and government networks. Reading Internet addresses is something of an art. Here are the four most important top-level functional Internet domains followed...
Internet address4 is com commercial organizations edu educational institutions gov U.S. government civilian sites mil U.S. military sites Note that most of the sites in the com and edu domains are in...
Internet address5 is the U.S. outside the functional domains su sites in the Soviet Union (see {kremvax}). uk sites in the United Kingdom Within the us domain, there are subdomains for the fifty states, each generally w...
Internet address6 is abbreviation. Within the uk domain, there is an ac subdomain for academic sites and a co domain for commercial ones. Other top-level domains may be divided up in similar ways.
interrupt is 1. [techspeak] n. On a computer, an event that interrupts normal processing and temporarily diverts flow-of-control through an "interrupt handler" routine. See also {trap}. 2. interj. A request for attention from a hacker. Oft...
interrupt2 is seen Joe recently?" See {priority interrupt}. 3. Under MS-DOS, the term `interrupt' is nearly synonymous with `system call', because the OS and BIOS routines are both called using the INT instruction (see {{interrupt list, th...
interrupt3 is bypass the OS (going directly to a BIOS interrupt) to get reasonable performance.
interrupt list, the is [MS-DOS] n. The list of all known software interrupt calls (both documented and undocumented) for IBM PCs and compatibles, maintained and made available for free redistribution by Ralf Brown (ralf@cs.cmu.edu). As of ear...
interrupts locked out is When someone is ignoring you. In a restaurant, after several fruitless attempts to get the waitress's attention, a hacker might well observe "She must have interrupts locked out". The synonym `interrupts disabled' is...
interrupts locked out2 is have one's interrupt mask bit set" or "interrupts masked out" is also heard. See also {spl}.
iron is n. Hardware, especially older and larger hardware of {mainframe} class with big metal cabinets housing relatively low-density electronics (but the term is also used of modern supercomputers). Often in the phrase {big iron}. Oppose ...
Iron Age is n. In the history of computing, 1961--1971 --- the formative era of commercial {mainframe} technology, when {big iron} {dinosaur}s ruled the earth. These began with the delivery of the first PDP-1, coincided with the dominance of ...
Iron Age2 is introduction of the first commercial microprocessor (the Intel 4004) in 1971. See also {Stone Age}; compare {elder days}.
iron box is [UNIX/Internet] n. A special environment set up to trap a {cracker} logging in over remote connections long enough to be traced. May include a modified {shell} restricting the hacker's movements in unobvious ways, and `bait' files...
iron box2 is on. See also {back door}, {firewall machine}, {Venus flytrap}, and Clifford Stoll's account in `The Cuckoo's Egg' of how he made and used one (see the Bibliography). Compare {padded cell}.
ironmonger is [IBM] n. Derogatory. A hardware specialist. Compare {sandbender}, {polygon pusher}.
ITS is /I-T-S/ n. 1. Incompatible Time-sharing System, an influential but highly idiosyncratic operating system written for PDP-6s and PDP-10s at MIT and long used at the MIT AI Lab. Much AI-hacker jargon derives from ITS folklore, and to hav...
ITS2 is instantly as an old-timer of the most venerable sort. ITS pioneered many important innovations, including transparent file sharing between machines and terminal-independent I/O. After about 1982, most actual work was shifted to new...
ITS3 is essentially as a hobby and service to the hacker community. The shutdown of the lab's last ITS machine in May 1990 marked the end of an era and sent old-time hackers into mourning nationwide (see {high moby}). The Royal Institute of ...
ITS4 is `live' ITS site at its computer museum (right next to the only TOPS-10 system still on the Internet), so ITS is still alleged to hold the record for OS in longest continuous use (however, {{WAITS}} is a credible rival for this palm). ...
factpacks/jargon-split.fact view on Meta::CPAN
little-endian2 is and networking hardware are little-endian. See {big-endian}, {middle-endian}, {NUXI problem}. The term is sometimes used to describe the ordering of units other than bytes; most often these are bits within a byte.
live data is n. 1. Data that is written to be interpreted and takes over program flow when triggered by some un-obvious operation, such as viewing it. One use of such hacks is to break security. For example, some smart terminals have command...
live data2 is program keys; this can be used to write live data that, when listed to the terminal, infects it with a security-breaking {virus} that is triggered the next time a hapless user strikes that key. For another, there are some well...
live data3 is send arbitrary commands back to the machine when they are simply viewed. 2. In C code, data that includes pointers to function {hook}s (executable code). 3. An object, such as a {trampoline}, that is constructed on the fly by ...
live data4 is code. 4. Actual real-world data, as opposed to `test data'. For example, "I think I have the record deletion module finished." "Have you tried it out on live data?" It usually carries the connotation that live data is more frag...
live data5 is things will happen. So a possible alternate response to the above claim might be "Well, make sure it works perfectly before we throw live data at it." The implication here is that record deletion is something pretty significant...
live data6 is running amok on live data would cause great harm and probably require restoring from backups.
Live Free Or Die! is imp. 1. The state motto of New Hampshire, which appears on that state's automobile license plates. 2. A slogan associated with UNIX in the romantic days when UNIX aficionados saw themselves as a tiny, beleaguered undergro...
Live Free Or Die!2 is industry. The "free" referred specifically to freedom from the {fascist} design philosophies and crufty misfeatures common on commercial operating systems. Armando Stettner, one of the early UNIX developers, used to giv...
Live Free Or Die!3 is under a large UNIX, all in New Hampshire colors of green and white. These are now valued collector's items.
livelock is /liv'lok/ n. A situation in which some critical stage of a task is unable to finish because its clients perpetually create more work for it to do after they have been serviced but before it can clear its queue. Differs from {deadl...
livelock2 is waiting for anything, but has a virtually infinite amount of work to do and can never catch up.
liveware is /liv'weir/ n. 1. Synonym for {wetware}. Less common. 2. [Cambridge] Vermin. "Waiter, there's some liveware in my salad..."
lobotomy is n. 1. What a hacker subjected to formal management training is said to have undergone. At IBM and elsewhere this term is used by both hackers and low-level management; the latter doubtless intend it as a joke. 2. The act of remov...
lobotomy2 is order to replace or upgrade it. Some very cheap {clone} systems are sold in `lobotomized' form --- everything but the brain.
locked and loaded is [from military slang for an M-16 rifle with magazine inserted and prepared for firing] adj. Said of a removable disk volume properly prepared for use --- that is, locked into the drive and with the heads loaded. Ironicall...
locked and loaded2 is the power is up, this description is never used of {{Winchester}} drives (which are named after a rifle).
locked up is adj. Syn. for {hung}, {wedged}.
logic bomb is n. Code surreptitiously inserted in an application or OS that causes it to perform some destructive or security-compromising activity whenever specified conditions are met. Compare {back door}.
logical is [from the technical term `logical device', wherein a physical device is referred to by an arbitrary `logical' name] adj. Having the role of. If a person (say, Les Earnest at SAIL) who had long held a certain post left and were rep...
logical2 is known as the `logical' Les Earnest. (This does not imply any judgment on the replacement.) Compare {virtual}. At Stanford, `logical' compass directions denote a coordinate system in which `logical north' is toward San Francisco,...
logical3 is even though logical north varies between physical (true) north near San Francisco and physical west near San Jose. (The best rule of thumb here is that, by definition, El Camino Real always runs logical north-and-south.) In givi...
logical4 is Tarasco restaurant, get onto {El Camino Bignum} going logical north." Using the word `logical' helps to prevent the recipient from worrying about that the fact that the sun is setting almost directly in front of him. The concept...
logical5 is which are almost, but not quite, consistently labeled with logical rather than physical directions. A similar situation exists at MIT. Route 128 (famous for the electronics industry that has grown up along it) is a 3-quarters cir...
logical6 is miles, terminating near the coastline at each end. It would be most precise to describe the two directions along this highway as `clockwise' and `counterclockwise', but the road signs all say "north" and "south", respectively. ...
logical7 is `logical north' and `logical south', to indicate that they are conventional directions not corresponding to the usual denotation for those words. (If you went logical south along the entire length of route 128, you would start out...
logical8 is and finish headed due east!)
loop through is vt. To process each element of a list of things. "Hold on, I've got to loop through my paper mail." Derives from the computer-language notion of an iterative loop; compare `cdr down' (under {cdr}), which is less common among C...
factpacks/jargon-split.fact view on Meta::CPAN
NeWS2 is is a lesson here that too many software vendors haven't yet heeded. Many hackers insist on the two-syllable pronunciations above as a way of distinguishing NeWS from {news} (the {netnews} software).
news is n. See {netnews}.
newsfroup is // [USENET] n. Silly synonym for {newsgroup}, originally a typo but now in regular use on USENET's talk.bizarre and other lunatic-fringe groups.
newsgroup is [USENET] n. One of {USENET}'s huge collection of topic groups or {fora}. Usenet groups can be `unmoderated' (anyone can post) or `moderated' (submissions are automatically directed to a moderator, who edits or filters and then po...
newsgroup2 is parallel {mailing list}s for Internet people with no netnews access, with postings to the group automatically propagated to the list and vice versa. Some moderated groups (especially those which are actually gatewayed Internet...
newsgroup3 is with groups of postings periodically collected into a single large posting with an index. Among the best-known are comp.lang.c (the C-language forum), comp.arch (on computer architectures), comp.unix.wizards (for UNIX wizards...
newsgroup4 is fans), and talk.politics.misc (miscellaneous political discussions and {flamage}).
nickle is /ni'kl/ [from `nickel', common name for the U.S. 5-cent coin] n. A {nybble} + 1; 5 bits. Reported among developers for Mattel's GI 1600 (the Intellivision games processor), a chip with 16-bit-wide RAM but 10-bit-wide ROM. See als...
night mode is n. See {phase} (of people).
Nightmare File System is n. Pejorative hackerism for Sun's Network File System (NFS). In any nontrivial network of Suns where there is a lot of NFS cross-mounting, when one Sun goes down, the others often freeze up. Some machine tries to acc...
Nightmare File System2 is repeats indefinitely. This causes it to appear dead to some messages (what is actually happening is that it is locked up in what should have been a brief excursion to a higher {spl} level). Then another machine trie...
Nightmare File System3 is pseudo-down machine, and itself becomes pseudo-down. The first machine to discover the down one is now trying both to access the down one and to respond to the pseudo-down one, so it is even harder to reach. This sn...
Nightmare File System4 is network of machines is frozen --- the user can't even abort the file access that started the problem! (ITS partisans are apt to cite this as proof of UNIX's alleged bogosity; ITS had a working NFS-like shared file sy...
Nightmare File System5 is 1970s.) See also {broadcast storm}.
NIL is /nil/ [from LISP terminology for `false'] No. Used in reply to a question, particularly one asked using the `-P' convention. See {T}.
NMI is /N-M-I/ n. Non-Maskable Interrupt. An IRQ 7 on the PDP-11 or 680[01234]0; the NMI line on an 80{88,[1234]}86. In contrast with a {priority interrupt} (which might be ignored, although that is unlikely), an NMI is *never* ignored.
no-op is /noh'op/ alt. NOP /nop/ [no operation] n. 1. (also v.) A machine instruction that does nothing (sometimes used in assembler-level programming as filler for data or patch areas, or to overwrite code to be removed in binaries). See als...
no-op2 is nothing to a project, or has nothing going on upstairs, or both. As in "He's a no-op." 3. Any operation or sequence of operations with no effect, such as circling the block without finding a parking space, or putting money into a ...
no-op3 is into the coin-return box, or asking someone for help and being told to go away. "Oh, well, that was a no-op." Hot-and-sour soup (see {great-wall}) that is insufficiently either is `no-op soup'; so is wonton soup if everybody else...
noddy is /nod'ee/ [UK: from the children's books] adj. 1. Small and un-useful, but demonstrating a point. Noddy programs are often written by people learning a new language or system. The archetypal noddy program is {hello, world}. Noddy co...
noddy2 is bug of a compiler. May be used of real hardware or software to imply that it isn't worth using. "This editor's a bit noddy." 2. A program that is more or less instant to produce. In this use, the term does not necessarily connot...
factpacks/jargon-split.fact view on Meta::CPAN
proglet2 is any editing, and that runs correctly the first time (this amount varies significantly according to the language one is using). Compare {toy program}, {noddy}, {one-liner wars}.
program is n. 1. A magic spell cast over a computer allowing it to turn one's input into error messages. 2. An exercise in experimental epistemology. 3. A form of art, ostensibly intended for the instruction of computers, which is neverthele...
program2 is programmers can't understand it.
Programmer's Cheer is "Shift to the left! Shift to the right! Pop up, push down! Byte! Byte! Byte!" A joke so old it has hair on it.
programming is n. 1. The art of debugging a blank sheet of paper (or, in these days of on-line editing, the art of debugging an empty file). 2. n. A pastime similar to banging one's head against a wall, but with fewer opportunities for reward...
programming2 is clothes on (although clothes are not mandatory).
propeller head is n. Used by hackers, this is syn. with {computer geek}. Non-hackers sometimes use it to describe all techies. Prob. derives from SF fandom's tradition (originally invented by old-time fan Ray Faraday Nelson) of propeller bean...
propeller head2 is actually wears them except as a joke).
propeller key is [Mac users] n. See {command key}.
proprietary is adj. 1. In {marketroid}-speak, superior; implies a product imbued with exclusive magic by the unmatched brilliance of the company's hardware or software designers. 2. In the language of hackers and users, inferior; implies a pr...
proprietary2 is standards, and thus one that puts the customer at the mercy of a vendor able to gouge freely on service and upgrade charges after the initial sale has locked the customer in (that's assuming it wasn't too expensive in the first...
protocol is n. As used by hackers, this never refers to niceties about the proper form for addressing letters to the Papal Nuncio or the order in which one should use the forks in a Russian-style place setting; hackers don't care about such th...
protocol2 is set of rules that allow different machines or pieces of software to coordinate with each other without ambiguity. So, for example, it does include niceties about the proper form for addressing packets on a network or the order in...
protocol3 is Philosophers Problem. It implies that there is some common message format and an accepted set of primitives or commands that all parties involved understand, and that transactions among them follow predictable logical sequences. ...
provocative maintenance is [common ironic mutation of `preventive maintenance'] n. Actions performed upon a machine at regularly scheduled intervals to ensure that the system remains in a usable state. So called because it is all too often pe...
provocative maintenance2 is know what he is doing; this results in the machine's remaining in an *un*usable state for an indeterminate amount of time. See also {scratch monkey}.
prowler is [UNIX] n. A {daemon} that is run periodically (typically once a week) to seek out and erase {core} files, truncate administrative logfiles, nuke `lost+found' directories, and otherwise clean up the {cruft} that tends to pile up in t...
prowler2 is {GFR}, {reaper}, {skulker}.
pseudo is /soo'doh/ [USENET truncation of `pseudonym'] n. 1. An electronic-mail or {USENET} persona adopted by a human for amusement value or as a means of avoiding negative repercussions of one's net.behavior; a `nom de USENET', often associa...
pseudo2 is message origins. Perhaps the best-known and funniest hoax of this type is {BIFF}. 2. Notionally, a {flamage}-generating AI program simulating a USENET user. Many flamers have been accused of actually being such entities, despite...
pseudo3 is sophistication yet exists. However, in 1989 there was a famous series of forged postings that used a phrase-frequency-based travesty generator to simulate the styles of several well-known flamers; it was based on large samples of t...
factpacks/jargon-split.fact view on Meta::CPAN
special-case is vt. To write unique code to handle input to or situations arising in program that are somehow distinguished from normal processing. This would be used for processing of mode switches or interrupt characters in an interactive i...
special-case2 is normal commands), or for processing of {hidden flag}s in the input of a batch program or {filter}.
speedometer is n. A pattern of lights displayed on a linear set of LEDs (today) or nixie tubes (yesterday, on ancient mainframes). The pattern is shifted left every N times the software goes through its main loop. A swiftly moving pattern in...
speedometer2 is speedometer slows down as the system becomes overloaded. The speedometer on Sun Microsystems hardware bounces back and forth like the eyes on one of the Cylons from the wretched "Battlestar Galactica" TV series. Historical n...
speedometer3 is 600) actually had an *analog* speedometer on the front panel, calibrated in instructions executed per second.
spell is n. Syn. {incantation}.
spiffy is /spi'fee/ adj. 1. Said of programs having a pretty, clever, or exceptionally well-designed interface. "Have you seen the spiffy {X} version of {empire} yet?" 2. Said sarcastically of a program that is perceived to have little more ...
spiffy2 is meaning should be drawn depends delicately on tone of voice and context. This word was common mainstream slang during the 1940s, in a sense close to #1.
spin is vi. Equivalent to {buzz}. More common among C and UNIX programmers.
spl is /S-P-L/ [abbrev, from Set Priority Level] The way traditional UNIX kernels implement mutual exclusion by running code at high interrupt levels. Used in jargon to describe the act of tuning in or tuning out ordinary communication. Clas...
spl2 is at spl 6 today." would mean that he is very hard to interrupt. "Wait till I finish this; I'll spl down then." See also {interrupts locked out}.
splat is n. 1. Name used in many places (DEC, IBM, and others) for the asterisk (`*') character (ASCII 0101010). This may derive from the `squashed-bug' appearance of the asterisk on many early line printers. 2. [MIT] Name used by some peopl...
splat2 is [Rochester Institute of Technology] The {command key} on a Mac (same as {ALT}, sense 2). 4. [Stanford] Name used by some people for the Stanford/ITS extended ASCII circle-x character. This character is also called `blobby' and ...
splat3 is used by mathematicians as a notation for `tensor product'. 5. [Stanford] Name for the semi-mythical extended ASCII circle-plus character. 6. Canonical name for an output routine that outputs whatever the local interpretation of...
splat4 is 4--6 are now nearly obsolete. See also {{ASCII}}.
sponge is [UNIX] n. A special case of a {filter} that reads its entire input before writing any output; the canonical example is a sort utility. Unlike most filters, a sponge can conveniently overwrite the input file with the output data stre...
sponge2 is ITS did and VMS does now) the sponge/filter distinction loses its usefulness, because directing filter output would just write a new version. See also {slurp}.
spooge is /spooj/ 1. n. Inexplicable or arcane code, or random and probably incorrect output from a computer program. 2. vi. To generate spooge (sense 1).
spool is [from early IBM `Simultaneous Peripheral Operation Off-Line', but this acronym is widely thought to have been contrived for effect] vt. To send files to some device or program (a `spooler') that queues them up and does something usefu...
spool2 is understood is the `print spooler' controlling output of jobs to a printer, but the term has been used in connection with other peripherals (especially plotters and graphics devices). See also {demon}.
stack is n. A person's stack is the set of things he or she has to do in the future. One speaks of the next project to be attacked as having risen to the top of the stack. "I'm afraid I've got real work to do, so this'll have to be pushed wa...
factpacks/jargon-split.fact view on Meta::CPAN
wart is n. A small, {crock}y {feature} that sticks out of an otherwise {clean} design. Something conspicuous for localized ugliness, especially a special-case exception to a general rule. For example, in some versions of `csh(1)', single quot...
wart2 is except `!'. In ANSI C, the `??' syntax used obtaining ASCII characters in a foreign environment is a wart. See also {miswart}.
washing machine is n. Old-style 14-inch hard disks in floor-standing cabinets. So called because of the size of the cabinet and the `top-loading' access to the media packs --- and, of course, they were always set on `spin cycle'. The washing...
washing machine2 is it is even used in Russian hacker jargon. See also {walking drives}. The thick channel cables connecting these were called `bit hoses' (see {hose}).
water MIPS is n. (see {MIPS}, sense 2) Large, water-cooled machines of either today's ECL-supercomputer flavor or yesterday's traditional {mainframe} type.
wave a dead chicken is v. To perform a ritual in the direction of crashed software or hardware that one believes to be futile but is nevertheless necessary so that others are satisfied that an appropriate degree of effort has been expended. "...
wave a dead chicken2 is code, but I really think we've run into an OS bug." Compare {voodoo programming}, {rain dance}.
weasel is n. [Cambridge] A na"ive user, one who deliberately or accidentally does things that are stupid or ill-advised. Roughly synonymous with {loser}.
wedged is [from a common description of recto-cranial inversion] adj. 1. To be stuck, incapable of proceeding without help. This is different from having crashed. If the system has crashed, then it has become totally non-functioning. If the...
wedged2 is something but cannot make progress; it may be capable of doing a few things, but not be fully operational. For example, a process may become wedged if it {deadlock}s with another (but not all instances of wedging are deadlocks). B...
wedged3 is {hung}. See also {gronk}, {locked up}, {hosed}. Describes a {deadlock}ed condition. 2. Often refers to humans suffering misconceptions. "He's totally wedged --- he's convinced that he can levitate through meditation." 3. [UNIX...
wedged4 is TTY left in a losing state by abort of a screen-oriented program or one that has messed with the line discipline in some obscure way.
wedgie is [Fairchild] n. A bug. Prob. related to {wedged}.
wedgitude is /wedj'i-t[y]ood/ n. The quality or state of being {wedged}.
weeble is /weeb'l/ [Cambridge] interj. Used to denote frustration, usually at amazing stupidity. "I stuck the disk in upside down." "Weeble...." Compare {gurfle}.
weeds is n. 1. Refers to development projects or algorithms that have no possible relevance or practical application. Comes from `off in the weeds'. Used in phrases like "lexical analysis for microcode is serious weeds...." 2. At CDC/ETA be...
weeds2 is weeds' was equivalent to IBM's {branch to Fishkill} and mainstream hackerdom's {jump off into never-never land}.
weenie is n. 1. When used with a qualifier (for example, as in {UNIX weenie}, VMS weenie, IBM weenie) this can be either an insult or a term of praise, depending on context, tone of voice, and whether or not it is applied by a person who consi...
weenie2 is weenie. Implies that the weenie has put a major investment of time, effort, and concentration into the area indicated; whether this is positive or negative depends on the hearer's judgment of how the speaker feels about that area. ...
weenie3 is character, `;' (ASCII 0111011).
Weenix is /wee'niks/ [ITS] n. A derogatory term for {{UNIX}}, derived from {UNIX weenie}. According to one noted ex-ITSer, it is "the operating system preferred by Unix Weenies typified by poor modularity, poor reliability, hard file deletion...
factpacks/jargon.fact view on Meta::CPAN
black hole2 => site foovax has been dropping a lot of stuff on the floor lately (see {drop on the floor}). The implied metaphor of email as interstellar travel is interesting in itself. Compare {bit bucket}.
black magic => n. A technique that works, though nobody really understands why. More obscure than {voodoo programming}, which may be done by cookbook. Compare also {black art}, {deep magic}, and {magic number} (sense 2).
blast => 1. vt.,n. Synonym for BLT, used esp. for large data sends over a network or comm line. Opposite of snarf. Usage uncommon. The variant `blat' has been reported. 2. vt. [HP/Apollo] Synonymous with nuke (sense 3). Sometimes the message `Unable ...
blat => n. 1. Syn. blast, sense 1. 2. See thud.
bletch => /blech/ [from Yiddish/German `brechen', to vomit, poss. via comic-strip exclamation `blech'] interj. Term of disgust. Often used in "Ugh, bletch". Compare barf.
bletcherous => /blech'*-r*s/ adj. Disgusting in design or function; esthetically unappealing. This word is seldom used of people. "This keyboard is bletcherous!" (Perhaps the keys don't work very well, or are misplaced.) See losing, cretinous, bagbit...
blinkenlights => /blink'*n-litz/ n. Front-panel diagnostic lights on a computer, esp. a dinosaur. Derives from the last word of the famous blackletter-Gothic sign in mangled pseudo-German that once graced about half the computer rooms in the English-...
blit => /blit/ vt. 1. To copy a large array of bits from one part of a computer's memory to another part, particularly when the memory is being used to determine what is shown on a display screen. "The storage allocator picks through the table and co...
blitter => /blit'r/ n. A special-purpose chip or hardware system built to perform blit operations, esp. used for fast implementation of bit-mapped graphics. The Commodore Amiga and a few other micros have these, but in 1991 the trend is away from the...
blivet => /bliv'*t/ [allegedly from a World War II military term meaning "ten pounds of manure in a five-pound bag"] n. 1. An intractable problem. 2. A crucial piece of hardware that can't be fixed or replaced if it breaks. 3. A tool that has been ha...
block => [from process scheduling terminology in OS theory] 1. vi. To delay or sit idle while waiting for something. "We're blocking until everyone gets here." Compare busy-wait. 2. `block on' vt. To block, waiting for (something). "Lunch is blocked ...
block transfer computations => n. From the television series "Dr. Who", in which it referred to computations so fiendishly subtle and complex that they could not be performed by machines. Used to refer to any task that should be expressible as an alg...
blow an EPROM => /bloh *n ee'prom/ v. (alt. `blast an EPROM', `burn an EPROM') To program a read-only memory, e.g. for use with an embedded system. This term arises because the programming process for the Programmable Read-Only Memories (PROMs) that ...
blow an EPROM2 => Programmable Read-Only Memories (EPROMs) involved intentionally blowing tiny electrical fuses on the chip. Thus, one was said to `blow' (or `blast') a PROM, and the terminology carried over even though the write process on EPROMs is...
blow away => vt. To remove (files and directories) from permanent storage, generally by accident. "He reformatted the wrong partition and blew away last night's netnews." Oppose nuke.
blow out => vi. Of software, to fail spectacularly; almost as serious as {crash and burn}. See {blow past}, {blow up}.
blow past => vt. To {blow out} despite a safeguard. "The server blew past the 5K reserve buffer."
blow up => vi. 1. [scientific computation] To become unstable. Suggests that the computation is diverging so rapidly that it will soon overflow or at least go nonlinear. 2. Syn. {blow out}.
BLT => /B-L-T/, /bl*t/ or (rarely) /belt/ n.,vt. Synonym for blit. This is the original form of blit and the ancestor of bitblt. It referred to any large bit-field copy or move operation (one resource-intensive memory-shuffling operation done on pre-...
Blue Book => n. 1. Informal name for one of the three standard references on the page-layout and graphics-control language PostScript (`PostScript Language Tutorial and Cookbook', Adobe Systems, Addison-Wesley 1985, QA76.73.P67P68, ISBN 0-201-10179-3...
Blue Book2 => known as the {Green Book} and {Red Book}. 2. Informal name for one of the three standard references on Smalltalk `Smalltalk-80 The Language and its Implementation', David Robson, Addison-Wesley 1983, QA76.8.S635G64, ISBN 0-201-11371-63 ...
factpacks/jargon.fact view on Meta::CPAN
bogometer => /boh-gom'-*t-er/ n. See bogosity. Compare the `wankometer' described in the wank entry; see also bogus.
bogon => /boh'gon/ [by analogy with proton/electron/neutron, but doubtless reinforced after 1980 by the similarity to Douglas Adams's `Vogons'; see the Bibliography] n. 1. The elementary particle of bogosity (see {quantum bogodynamics}). For instance...
bogon filter => /boh'gon fil'tr/ n. Any device, software or hardware, that limits or suppresses the flow and/or emission of bogons. "Engineering hacked a bogon filter between the Cray and the VAXen, and now we're getting fewer dropped packets." See a...
bogon flux => /boh'gon fluhks/ n. A measure of a supposed field of bogosity emitted by a speaker, measured by a bogometer; as a speaker starts to wander into increasing bogosity a listener might say "Warning, warning, bogon flux is rising". See {quan...
bogosity => /boh-go's*-tee/ n. 1. The degree to which something is bogus. At CMU, bogosity is measured with a bogometer; in a seminar, when a speaker says something bogus, a listener might raise his hand and say "My bogometer just triggered". More ex...
bogotify => /boh-go't*-fi/ vt. To make or become bogus. A program that has been changed so many times as to become completely disorganized has become bogotified. If you tighten a nut too hard and strip the threads on the bolt, the bolt has become bog...
bogue out => /bohg owt/ vi. To become bogus, suddenly and unexpectedly. "His talk was relatively sane until somebody asked him a trick question; then he bogued out and did nothing but flame afterwards." See also bogosity, bogus.
bogus => adj. 1. Non-functional. "Your patches are bogus." 2. Useless. "OPCON is a bogus program." 3. False. "Your arguments are bogus." 4. Incorrect. "That algorithm is bogus." 5. Unbelievable. "You claim to have solved the halting problem for Turin...
Bohr bug => /bohr buhg/ [from quantum physics] n. A repeatable bug; one that manifests reliably under a possibly unknown but well-defined set of conditions. Antonym of heisenbug; see also mandelbug.
boink => /boynk/ [USENET ascribed there to the TV series "Cheers" and "Moonlighting"] 1. To have sex with; compare bounce, sense 3. (This is mainstream slang.) In Commonwealth hackish the variant `bonk' is more common. 2. After the original Peter Kor...
bomb => 1. v. General synonym for crash (sense 1) except that it is not used as a noun; esp. used of software or OS failures. "Don't run Empire with less than 32K stack, it'll bomb." 2. n.,v. Atari ST and Macintosh equivalents of a UNIX `panic' or Am...
bondage-and-discipline language => A language (such as Pascal, Ada, APL, or Prolog) that, though ostensibly general-purpose, is designed so as to enforce an author's theory of `right programming' even though said theory is demonstrably inadequate for...
bondage-and-discipline language2 => general-purpose programming. Often abbreviated `B&D'; thus, one may speak of things "having the B&D nature". See {Pascal}; oppose {languages of choice}.
bonk/oif => /bonk/, /oyf/ interj. In the MUD community, it has become traditional to express pique or censure by `bonking' the offending person. There is a convention that one should acknowledge a bonk by saying `oif!' and a myth to the effect that f...
book titles => There is a tradition in hackerdom of informally tagging important textbooks and standards documents with the dominant color of their covers or with some other conspicuous feature of the cover. Many of these are described in this lexico...
book titles2 => {Aluminum Book}, {Blue Book}, {Cinderella Book}, {Devil Book}, {Dragon Book}, {Green Book}, {Orange Book}, {Pink-Shirt Book}, {Purple Book}, {Red Book}, {Silver Book}, {White Book}, {Wizard Book}, {Yellow Book}, and bible.boot [techsp...
book titles3 => v.,n. To load and initialize the operating system on a machine. This usage is no longer jargon (having passed into techspeak) but has given rise to some derivatives that are still jargon. The derivative `reboot' implies that the machi...
book titles4 => that the boot is a bounce intended to clear some state of wedgitude. This is sometimes used of human thought processes, as in the following exchange "You've lost me." "OK, reboot. Here's the theory...." This term is also found in the ...
book titles5 => power-off condition) and `warm boot' (with the CPU and all devices already powered up, as after a hardware reset or software crash). Another variant `soft boot', reinitialization of only part of a system, under control of other softwa...
book titles6 => the mess-dos emulator, control-alt-insert will cause a soft-boot of the emulator, while leaving the rest of the system running." Opposed to this there is `hard boot', which connotes hostility towards or frustration with the machine be...
book titles7 => hard-boot this losing Sun." "I recommend booting it hard." Historical note this term derives from `bootstrap loader', a short program that was read in from cards or paper tape, or toggled in from the front panel switches. This program...
factpacks/jargon.fact view on Meta::CPAN
compress => [UNIX] vt. When used without a qualifier, generally refers to crunching of a file using a particular C implementation of Lempel-Ziv compression by James A. Woods et al. and widely circulated via USENET. Use of crunch itself in this sense ...
Compu$erve => n. See CI$.
computer confetti => n. Syn. chad. Though this term is common, this use of the punched-card chad is not a good idea, as the pieces are stiff and have sharp corners that could injure the eyes. GLS reports that he once attended a wedding at MIT during ...
computer confetti2 => enthusiastically threw chad instead of rice. The groom later grumbled that he and his bride had spent most of the evening trying to get the stuff out of their hair.
computer geek => n. One who eats (computer) bugs for a living. One who fulfills all the dreariest negative stereotypes about hackers an asocial, malodorous, pasty-faced monomaniac with all the personality of a cheese grater. Cannot be used by outside...
computer geek2 => hackers; compare black-on-black usage of `nigger'. A computer geek may be either a fundamentally clueless individual or a proto-hacker in {larval stage}. Also called `turbo nerd', `turbo geek'. See also clustergeeking, {geek out}, w...
computron => /kom'pyoo-tron`/ n. 1. A notional unit of computing power combining instruction speed and storage capacity, dimensioned roughly in instructions-per-second times megabytes-of-main-store times megabytes-of-mass-storage. "That machine can't...
condition out => vt. To prevent a section of code from being compiled by surrounding it with a conditional-compilation directive whose condition is always false. The canonical examples are `#if 0' (or `#ifdef notdef', though some find this bletcherou...
condom => n. 1. The protective plastic bag that accompanies 3.5-inch microfloppy diskettes. Rarely, also used of (paper) disk envelopes. Unlike the write protect tab, the condom (when left on) not only impedes the practice of SEX but has also been sh...
connector conspiracy => [probably came into prominence with the appearance of the KL-10 (one model of the PDP-10), none of whose connectors matched anything else] n. The tendency of manufacturers (or, by extension, programmers or purveyors of anythin...
connector conspiracy2 => that don't fit together with the old stuff, thereby making you buy either all new stuff or expensive interface devices. The KL-10 Massbus connector was actually *patented* by DEC, which reputedly refused to license the design...
connector conspiracy3 => parties out of competition for the lucrative Massbus peripherals market. This is a source of never-ending frustration for the diehards who maintain older PDP-10 or VAX systems. Their CPUs work fine, but they are stuck with dy...
connector conspiracy4 => drives with low capacity and high power requirements. In these latter days of open-systems computing this term has fallen somewhat into disuse, to be replaced by the observation that "Standards are great! There are so *many* ...
cons => /konz/ or /kons/ [from LISP] 1. vt. To add a new element to a specified list, esp. at the top. "OK, cons picking a replacement for the console TTY onto the agenda." 2. `cons up' vt. To synthesize from smaller pieces "to cons up an example". I...
considered harmful => adj. Edsger W. Dijkstra's note in the March 1968 `Communications of the ACM', "Goto Statement Considered Harmful", fired the first salvo in the structured programming wars. Amusingly, the ACM considered the resulting acrimony su...
considered harmful2 => policy) no longer print an article taking so assertive a position against a coding practice. In the ensuing decades, a large number of both serious papers and parodies have borne titles of the form "X considered Y". The structu...
considered harmful3 => over with the realization that both sides were wrong, but use of such titles has remained as a persistent minor in-joke (the `considered silly' found at various places in this lexicon is related).
console => n. 1. The operator's station of a mainframe. In times past, this was a privileged location that conveyed godlike powers to anyone with fingers on its keys. Under UNIX and other modern timesharing OSes, such privileges are guarded by passwo...
console jockey => n. See {terminal junkie}.
content-free => [by analogy with techspeak `context-free'] adj. Used of a message that adds nothing to the recipient's knowledge. Though this adjective is sometimes applied to flamage, it more usually connotes derision for communication styles that e...
control-C => vi. 1. "Stop whatever you are doing." From the interrupt character used on many operating systems to abort a running program. Considered silly. 2. interj. Among BSD UNIX hackers, the canonical humorous response to "Give me a break!"
factpacks/jargon.fact view on Meta::CPAN
HP-SUX => /H-P suhks/ n. Unflattering hackerism for HP-UX, Hewlett-Packard's UNIX port. Features some truly unique bogosities in the filesystem internals and elsewhere which occasionally create portability problems. HP-UX is often referred to as `hoc...
huff => v. To compress data using a Huffman code. Various programs that use such methods have been called `HUFF' or some variant thereof. Oppose puff. Compare crunch, compress.
humma => // excl. A filler word used on various `chat' and `talk' programs when you had nothing to say but felt that it was important to say something. The word apparently originated (at least with this definition) on the MECC Timeshare System (MTS, ...
Humor, Hacker => n. A distinctive style of shared intellectual humor found among hackers, having the following distinctive characteristics 1. Fascination with form-vs.-content jokes, paradoxes, and humor having to do with confusion of metalevels (see...
Humor, Hacker2 => laugh hold a red index card in front of him/her with "GREEN" written on it, or vice-versa (note, however, that this is funny only the first time). 2. Elaborate deadpan parodies of large intellectual constructs, such as specification...
Humor, Hacker3 => documents, language descriptions (see INTERCAL), and even entire scientific theories (see {quantum bogodynamics}, computron). 3. Jokes that involve screwily precise reasoning from bizarre, ludicrous, or just grossly counter-intuitiv...
Humor, Hacker4 => puns and wordplay. 5. A fondness for apparently mindless humor with subversive currents of intelligence in it --- for example, old Warner Brothers and Rocky & Bullwinkle cartoons, the Marx brothers, the early B-52s, and Monty Python...
Humor, Hacker5 => this trait with elements of high camp and slapstick is especially favored. 6. References to the symbol-object antinomies and associated ideas in Zen Buddhism and (less often) Taoism. See {has the X nature}, Discordianism, zen, {ha h...
Humor, Hacker6 => See also filk, retrocomputing, and appendix B. If you have an itchy feeling that all 6 of these traits are really aspects of one thing that is incredibly difficult to talk about exactly, you are (a) correct and (b) responding like a...
Humor, Hacker7 => recognizable (though in a less marked form) throughout {{science-fiction fandom}}.
hung => [from `hung up'] adj. Equivalent to wedged, but more common at UNIX/C sites. Not generally used of people. Syn. with {locked up}, wedged; compare hosed. See also hang. A hung state is distinguished from crashed or down, where the program or s...
hungry puppy => n. Syn. slopsucker.
hungus => /huhng'g*s/ [perhaps related to slang `humongous'] adj. Large, unwieldy, usually unmanageable. "TCP is a hungus piece of code." "This is a hungus set of modifications."
hyperspace => /hi'per-spays/ n. A memory location that is *far* away from where the program counter should be pointing, often inaccessible because it is not even mapped in. "Another core dump --- looks like the program jumped off to hyperspace someho...
I see no X here. => Hackers (and the interactive computer games they write) traditionally favor this slightly marked usage over other possible equivalents such as "There's no X here!" or "X is missing." or "Where's the X?". This goes back to the orig...
I see no X here.2 => respond in this wise if you asked it to do something involving an object not present at your location in the game.
i14y => // n. Abbrev. for `interoperability', with the `14' replacing fourteen letters. Used in the X (windows) community. Refers to portability and compatibility of data formats (even binary ones) between different programs or implementations of the...
i18n => // n. Abbrev. for `internationaliz,sation', with the 18 replacing 18 letters. Used in the X (windows) community.
IBM => /I-B-M/ Inferior But Marketable; It's Better Manually; Insidious Black Magic; It's Been Malfunctioning; Incontinent Bowel Movement; and a near-infinite number of even less complimentary expansions, including `International Business Machines'. ...
IBM discount => n. A price increase. Outside IBM, this derives from the common perception that IBM products are generally overpriced (see clone); inside, it is said to spring from a belief that large numbers of IBM employees living in an area cause p...
ice => [coined by USENETter Tom Maddox, popularized by William Gibson's cyberpunk SF novels acronym for `Intrusion Countermeasure Electronics'] Security software (in Gibson's novels, software that responds to intrusion by attempting to literally kill...
ifdef out => /if'def owt/ v. Syn. for {condition out}, specific to C.
ill-behaved => adj. 1. [numerical analysis] Said of an algorithm or computational method that tends to blow up because of accumulated roundoff error or poor convergence properties. 2. Software that bypasses the defined OS interfaces to do things (lik...
IMHO => // [from SF fandom via USENET; acronym for `In My Humble Opinion'] "IMHO, mixed-case C names should be avoided, as mistyping something in the wrong case can cause hard-to-detect errors --- and they look too Pascalish anyhow." Also seen in var...
in the extreme => adj. A preferred superlative suffix for many hackish terms. See, for example, `obscure in the extreme' under obscure, and compare highly.
incantation => n. Any particularly arbitrary or obscure command that one must mutter at a system to attain a desired result. Not used of passwords or other explicit security features. Especially used of tricks that are so poorly documented they must ...
include => vt. [USENET] 1. To duplicate a portion (or whole) of another's message (typically with attribution to the source) in a reply or followup, for clarifying the context of one's response. See the the discussion of inclusion styles under "Hacke...
include war => n. Excessive multi-leveled including within a discussion thread, a practice that tends to annoy readers. In a forum with high-traffic newsgroups, such as USENET, this can lead to flames and the urge to start a {kill file}.
indent style => [C programmers] n. The rules one uses to indent code in a readable fashion; a subject of {holy wars}. There are four major C indent styles, described below; all have the aim of making it easier for the reader to visually track the sco...
factpacks/jargon.fact view on Meta::CPAN
INTERCAL => /in't*r-kal/ [said by the authors to stand for `Compiler Language With No Pronounceable Acronym'] n. A computer language designed by Don Woods and James Lyon in 1972. INTERCAL is purposely different from all other computer languages in al...
interesting => adj. In hacker parlance, this word has strong connotations of `annoying', or `difficult', or both. Hackers relish a challenge, and enjoy wringing all the irony possible out of the ancient Chinese curse "May you live in interesting time...
Internet address => n. 1. [techspeak] An absolute network address of the form foo@bar.baz, where foo is a user name, bar is a sitename, and baz is a `domain' name, possibly including periods itself. Contrast with {bang path}; see also {network, the} ...
Internet address2 => Internet machines and most UUCP sites can now resolve these addresses, thanks to a large amount of behind-the-scenes magic and PD software written since 1980 or so. See also {bang path}, domainist. 2. More loosely, any network ad...
Internet address3 => this includes {bang path} addresses and some internal corporate and government networks. Reading Internet addresses is something of an art. Here are the four most important top-level functional Internet domains followed by a sele...
Internet address4 => com commercial organizations edu educational institutions gov U.S. government civilian sites mil U.S. military sites Note that most of the sites in the com and edu domains are in the U.S. or Canada. us sites in See: Internet addr...
Internet address5 => the U.S. outside the functional domains su sites in the Soviet Union (see kremvax). uk sites in the United Kingdom Within the us domain, there are subdomains for the fifty states, each generally with a name identical to the state...
Internet address6 => abbreviation. Within the uk domain, there is an ac subdomain for academic sites and a co domain for commercial ones. Other top-level domains may be divided up in similar ways.
interrupt => 1. [techspeak] n. On a computer, an event that interrupts normal processing and temporarily diverts flow-of-control through an "interrupt handler" routine. See also trap. 2. interj. A request for attention from a hacker. Often explicitly...
interrupt list, the => [MS-DOS] n. The list of all known software interrupt calls (both documented and undocumented) for IBM PCs and compatibles, maintained and made available for free redistribution by Ralf Brown (ralf@cs.cmu.edu). As of early 1991,...
interrupts locked out => When someone is ignoring you. In a restaurant, after several fruitless attempts to get the waitress's attention, a hacker might well observe "She must have interrupts locked out". The synonym `interrupts disabled' is also com...
interrupts locked out2 => have one's interrupt mask bit set" or "interrupts masked out" is also heard. See also spl.
iron => n. Hardware, especially older and larger hardware of mainframe class with big metal cabinets housing relatively low-density electronics (but the term is also used of modern supercomputers). Often in the phrase {big iron}. Oppose silicon. See ...
Iron Age => n. In the history of computing, 1961--1971 --- the formative era of commercial mainframe technology, when {big iron} dinosaurs ruled the earth. These began with the delivery of the first PDP-1, coincided with the dominance of ferrite core...
Iron Age2 => introduction of the first commercial microprocessor (the Intel 4004) in 1971. See also {Stone Age}; compare {elder days}.
iron box => [UNIX/Internet] n. A special environment set up to trap a cracker logging in over remote connections long enough to be traced. May include a modified shell restricting the hacker's movements in unobvious ways, and `bait' files designed to...
iron box2 => on. See also {back door}, {firewall machine}, {Venus flytrap}, and Clifford Stoll's account in `The Cuckoo's Egg' of how he made and used one (see the Bibliography). Compare {padded cell}.
ironmonger => [IBM] n. Derogatory. A hardware specialist. Compare sandbender, {polygon pusher}.
ITS => /I-T-S/ n. 1. Incompatible Time-sharing System, an influential but highly idiosyncratic operating system written for PDP-6s and PDP-10s at MIT and long used at the MIT AI Lab. Much AI-hacker jargon derives from ITS folklore, and to have been `...
IWBNI => // [acronym] `It Would Be Nice If'. Compare WIBNI.
IYFEG => // [USENET] Abbreviation for `Insert Your Favorite Ethnic Group'. Used as a meta-name when telling racist jokes on the net to avoid offending anyone. See JEDR.*J. Random /J rand'm/ n. [generalized from {J. Random Hacker}] Arbitrary; ordinary...
J. Random Hacker => [MIT] /J rand'm hak'r/ n. A mythical figure like the Unknown Soldier; the archetypal hacker nerd. See random, {Suzie COBOL}. This may originally have been inspired or influenced by `J. Fred Muggs', a show-biz chimpanzee whose name...
factpacks/jargon.fact view on Meta::CPAN
little-endian => adj. Describes a computer architecture in which, within a given 16- or 32-bit word, bytes at lower addresses have lower significance (the word is stored `little-end-first'). The PDP-11 and VAX families of computers and Intel micropro...
live data => n. 1. Data that is written to be interpreted and takes over program flow when triggered by some un-obvious operation, such as viewing it. One use of such hacks is to break security. For example, some smart terminals have commands that al...
live data2 => program keys; this can be used to write live data that, when listed to the terminal, infects it with a security-breaking virus that is triggered the next time a hapless user strikes that key. For another, there are some well-known bugs ...
live data3 => send arbitrary commands back to the machine when they are simply viewed. 2. In C code, data that includes pointers to function hooks (executable code). 3. An object, such as a trampoline, that is constructed on the fly by a program and ...
live data4 => code. 4. Actual real-world data, as opposed to `test data'. For example, "I think I have the record deletion module finished." "Have you tried it out on live data?" It usually carries the connotation that live data is more fragile and m...
live data5 => things will happen. So a possible alternate response to the above claim might be "Well, make sure it works perfectly before we throw live data at it." The implication here is that record deletion is something pretty significant, and a h...
live data6 => running amok on live data would cause great harm and probably require restoring from backups.
Live Free Or Die! => imp. 1. The state motto of New Hampshire, which appears on that state's automobile license plates. 2. A slogan associated with UNIX in the romantic days when UNIX aficionados saw themselves as a tiny, beleaguered underground tilt...
Live Free Or Die!2 => industry. The "free" referred specifically to freedom from the fascist design philosophies and crufty misfeatures common on commercial operating systems. Armando Stettner, one of the early UNIX developers, used to give out fake ...
Live Free Or Die!3 => under a large UNIX, all in New Hampshire colors of green and white. These are now valued collector's items.
livelock => /liv'lok/ n. A situation in which some critical stage of a task is unable to finish because its clients perpetually create more work for it to do after they have been serviced but before it can clear its queue. Differs from deadlock in th...
liveware => /liv'weir/ n. 1. Synonym for wetware. Less common. 2. [Cambridge] Vermin. "Waiter, there's some liveware in my salad..."
lobotomy => n. 1. What a hacker subjected to formal management training is said to have undergone. At IBM and elsewhere this term is used by both hackers and low-level management; the latter doubtless intend it as a joke. 2. The act of removing the p...
locked and loaded => [from military slang for an M-16 rifle with magazine inserted and prepared for firing] adj. Said of a removable disk volume properly prepared for use --- that is, locked into the drive and with the heads loaded. Ironically, becau...
locked and loaded2 => the power is up, this description is never used of {Winchester} drives (which are named after a rifle).
locked up => adj. Syn. for hung, wedged.
logic bomb => n. Code surreptitiously inserted in an application or OS that causes it to perform some destructive or security-compromising activity whenever specified conditions are met. Compare {back door}.
logical => [from the technical term `logical device', wherein a physical device is referred to by an arbitrary `logical' name] adj. Having the role of. If a person (say, Les Earnest at SAIL) who had long held a certain post left and were replaced, th...
loop through => vt. To process each element of a list of things. "Hold on, I've got to loop through my paper mail." Derives from the computer-language notion of an iterative loop; compare `cdr down' (under cdr), which is less common among C and UNIX ...
loop through2 => say `IRP over' after an obscure pseudo-op in the MIDAS PDP-10 assembler.
lord high fixer => [primarily British, from Gilbert & Sullivan's `lord high executioner'] n. The person in an organization who knows the most about some aspect of a system. See wizard.
lose => [MIT] vi. 1. To fail. A program loses when it encounters an exceptional condition or fails to work in the expected manner. 2. To be exceptionally unesthetic or crocky. 3. Of people, to be obnoxious or unusually stupid (as opposed to ignorant)...
lose 2 => 4. n. Refers to something that is losing, especially in the phrases "That's a lose!" and "What a lose!"
lose lose => interj. A reply to or comment on an undesirable situation. "I accidentally deleted all my files!" "Lose, lose."
loser => n. An unexpectedly bad situation, program, programmer, or person. Someone who habitually loses. (Even winners can lose occasionally.) Someone who knows not and knows not that he knows not. Emphatic forms are `real loser', `total loser', and ...
losing => adj. Said of anything that is or causes a lose or lossage.
factpacks/jargon.fact view on Meta::CPAN
newgroup wars2 => clear whether the group has a natural constituency (usually, it doesn't). At times, especially in the completely anarchic alt hierarchy, the names of newsgroups themselves become a form of comment or humor; e.g., the spinoff of alt....
newgroup wars3 => alt.tv.muppets in early 1990, or any number of specialized abuse groups named after particularly notorious flamers, e.g., alt.weemba.
newline => /n[y]oo'li:n/ n. 1. [techspeak, primarily UNIX] The ASCII LF character (0001010), used under {UNIX} as a text line terminator. A Bell-Labs-ism rather than a Berkeleyism; interestingly (and unusually for UNIX jargon), it is said to have ori...
NeWS => /nee'wis/, /n[y]oo'is/ or /n[y]ooz/ [acronym; the `Network Window System'] n. The road not taken in window systems, an elegant PostScript-based environment that would almost certainly have won the standards war with X if it hadn't been propri...
news => n. See netnews.
newsfroup => // [USENET] n. Silly synonym for newsgroup, originally a typo but now in regular use on USENET's talk.bizarre and other lunatic-fringe groups.
newsgroup => [USENET] n. One of USENET's huge collection of topic groups or fora. Usenet groups can be `unmoderated' (anyone can post) or `moderated' (submissions are automatically directed to a moderator, who edits or filters and then posts the resu...
nickle => /ni'kl/ [from `nickel', common name for the U.S. 5-cent coin] n. A nybble + 1; 5 bits. Reported among developers for Mattel's GI 1600 (the Intellivision games processor), a chip with 16-bit-wide RAM but 10-bit-wide ROM. See also deckle.
night mode => n. See phase (of people).
Nightmare File System => n. Pejorative hackerism for Sun's Network File System (NFS). In any nontrivial network of Suns where there is a lot of NFS cross-mounting, when one Sun goes down, the others often freeze up. Some machine tries to access the d...
Nightmare File System2 => repeats indefinitely. This causes it to appear dead to some messages (what is actually happening is that it is locked up in what should have been a brief excursion to a higher spl level). Then another machine tries to reach ...
Nightmare File System3 => pseudo-down machine, and itself becomes pseudo-down. The first machine to discover the down one is now trying both to access the down one and to respond to the pseudo-down one, so it is even harder to reach. This snowballs v...
Nightmare File System4 => network of machines is frozen --- the user can't even abort the file access that started the problem! (ITS partisans are apt to cite this as proof of UNIX's alleged bogosity; ITS had a working NFS-like shared file system wit...
Nightmare File System5 => 1970s.) See also {broadcast storm}.
NIL => /nil/ [from LISP terminology for `false'] No. Used in reply to a question, particularly one asked using the `-P' convention. See T.
NMI => /N-M-I/ n. Non-Maskable Interrupt. An IRQ 7 on the PDP-11 or 680[01234]0; the NMI line on an 8088,[1234]86. In contrast with a {priority interrupt} (which might be ignored, although that is unlikely), an NMI is *never* ignored.
no-op => /noh'op/ alt. NOP /nop/ [no operation] n. 1. (also v.) A machine instruction that does nothing (sometimes used in assembler-level programming as filler for data or patch areas, or to overwrite code to be removed in binaries). See also JFCL. ...
noddy => /nod'ee/ [UK: from the children's books] adj. 1. Small and un-useful, but demonstrating a point. Noddy programs are often written by people learning a new language or system. The archetypal noddy program is {hello, world}. Noddy code may be ...
NOMEX underwear => /noh'meks uhn'-der-weir/ [USENET] n. Syn. {asbestos longjohns}, used mostly in auto-related mailing lists and newsgroups. NOMEX underwear is an actual product available on the racing equipment market, used as a fire resistance meas...
non-optimal solution => n. (also `sub-optimal solution') An astoundingly stupid way to do something. This term is generally used in deadpan sarcasm, as its impact is greatest when the person speaking looks completely serious. Compare stunning. See al...
nonlinear => adj. [scientific computation] 1. Behaving in an erratic and unpredictable fashion. When used to describe the behavior of a machine or program, it suggests that said machine or program is being forced to run far outside of design specific...
factpacks/jargon.fact view on Meta::CPAN
priority interrupt => [from the hardware term] n. Describes any stimulus compelling enough to yank one right out of {hack mode}. Classically used to describe being dragged away by an SO for immediate sex, but may also refer to more mundane interrupti...
priority interrupt2 => in the near vicinity. Also called an NMI (non-maskable interrupt), especially in PC-land.
profile => n. 1. A control file for a program, esp. a text file automatically read from each user's home directory and intended to be easily modified by the user in order to customize the program's behavior. Used to avoid hardcoded choices. 2. [techs...
proglet => /prog'let/ [UK] n. A short extempore program written to meet an immediate, transient need. Often written in BASIC, rarely more than a dozen lines long, and contains no subroutines. The largest amount of code that can be written off the top...
program => n. 1. A magic spell cast over a computer allowing it to turn one's input into error messages. 2. An exercise in experimental epistemology. 3. A form of art, ostensibly intended for the instruction of computers, which is nevertheless almost...
Programmer's Cheer => "Shift to the left! Shift to the right! Pop up, push down! Byte! Byte! Byte!" A joke so old it has hair on it.
programming => n. 1. The art of debugging a blank sheet of paper (or, in these days of on-line editing, the art of debugging an empty file). 2. n. A pastime similar to banging one's head against a wall, but with fewer opportunities for reward. 3. n. ...
propeller head => n. Used by hackers, this is syn. with {computer geek}. Non-hackers sometimes use it to describe all techies. Prob. derives from SF fandom's tradition (originally invented by old-time fan Ray Faraday Nelson) of propeller beanies as f...
propeller head2 => actually wears them except as a joke).
propeller key => [Mac users] n. See {command key}.
proprietary => adj. 1. In marketroid-speak, superior; implies a product imbued with exclusive magic by the unmatched brilliance of the company's hardware or software designers. 2. In the language of hackers and users, inferior; implies a product not ...
protocol => n. As used by hackers, this never refers to niceties about the proper form for addressing letters to the Papal Nuncio or the order in which one should use the forks in a Russian-style place setting; hackers don't care about such things. I...
provocative maintenance => [common ironic mutation of `preventive maintenance'] n. Actions performed upon a machine at regularly scheduled intervals to ensure that the system remains in a usable state. So called because it is all too often performed ...
provocative maintenance2 => know what he is doing; this results in the machine's remaining in an *un*usable state for an indeterminate amount of time. See also {scratch monkey}.
prowler => [UNIX] n. A daemon that is run periodically (typically once a week) to seek out and erase core files, truncate administrative logfiles, nuke `lost+found' directories, and otherwise clean up the cruft that tends to pile up in the corners of...
pseudo => /soo'doh/ [USENET truncation of `pseudonym'] n. 1. An electronic-mail or USENET persona adopted by a human for amusement value or as a means of avoiding negative repercussions of one's net.behavior; a `nom de USENET', often associated with ...
pseudoprime => n. A backgammon prime (six consecutive occupied points) with one point missing. This term is an esoteric pun derived from a mathematical method that, rather than determining precisely whether a number is prime (has no divisors), uses a...
pseudosuit => /soo'doh-s[y]oot`/ n. A suit wannabee; a hacker who has decided that he wants to be in management or administration and begins wearing ties, sport coats, and (shudder!) suits voluntarily. It's his funeral. See also lobotomy.
psychedelicware => /si`k*-del'-ik-weir/ [UK] n. Syn. {display hack}. See also {smoking clover}.
psyton => /si'ton/ [TMRC] n. The elementary particle carrying the sinister force. The probability of a process losing is proportional to the number of psytons falling on it. Psytons are generated by observers, which is why demos are more likely to fa...
pubic directory => [NYU] (also `pube directory' /pyoob' d*-rek't*-ree/) n. The `pub' (public) directory on a machine that allows FTP access. So called because it is the default location for SEX (sense 1). "I'll have the source in the pube directory b...
factpacks/jargon.fact view on Meta::CPAN
SPACEWAR => n. A space-combat simulation game, inspired by E. E. "Doc" Smith's "Lensman" books, in which two spaceships duel around a central sun, shooting torpedoes at each other and jumping through hyperspace. This game was first implemented on the...
spaghetti code => n. Code with a complex and tangled control structure, esp. one using many GOTOs, exceptions, or other `unstructured' branching constructs. Pejorative. The synonym `kangaroo code' has been reported, doubtless because such code has ma...
spaghetti inheritance => n. [encountered among users of object-oriented languages that use inheritance, such as Smalltalk] A convoluted class-subclass graph, often resulting from carelessly deriving subclasses from other classes just for the sake of ...
spaghetti inheritance2 => (successful) attempt to discourage such practice, through guilt-by-association with {spaghetti code}.
spam => [from the MUD community] vt. To crash a program by overrunning a fixed-size buffer with excessively large input data. See also {buffer overflow}, {overrun screw}, {smash the stack}.
special-case => vt. To write unique code to handle input to or situations arising in program that are somehow distinguished from normal processing. This would be used for processing of mode switches or interrupt characters in an interactive interface...
speedometer => n. A pattern of lights displayed on a linear set of LEDs (today) or nixie tubes (yesterday, on ancient mainframes). The pattern is shifted left every N times the software goes through its main loop. A swiftly moving pattern indicates t...
spell => n. Syn. incantation.
spiffy => /spi'fee/ adj. 1. Said of programs having a pretty, clever, or exceptionally well-designed interface. "Have you seen the spiffy X version of empire yet?" 2. Said sarcastically of a program that is perceived to have little more than a flashy...
spin => vi. Equivalent to buzz. More common among C and UNIX programmers.
spl => /S-P-L/ [abbrev, from Set Priority Level] The way traditional UNIX kernels implement mutual exclusion by running code at high interrupt levels. Used in jargon to describe the act of tuning in or tuning out ordinary communication. Classically, ...
splat => n. 1. Name used in many places (DEC, IBM, and others) for the asterisk (`*') character (ASCII 0101010). This may derive from the `squashed-bug' appearance of the asterisk on many early line printers. 2. [MIT] Name used by some people for the...
sponge => [UNIX] n. A special case of a filter that reads its entire input before writing any output; the canonical example is a sort utility. Unlike most filters, a sponge can conveniently overwrite the input file with the output data stream. If you...
spooge => /spooj/ 1. n. Inexplicable or arcane code, or random and probably incorrect output from a computer program. 2. vi. To generate spooge (sense 1).
spool => [from early IBM `Simultaneous Peripheral Operation Off-Line', but this acronym is widely thought to have been contrived for effect] vt. To send files to some device or program (a `spooler') that queues them up and does something useful with ...
stack => n. A person's stack is the set of things he or she has to do in the future. One speaks of the next project to be attacked as having risen to the top of the stack. "I'm afraid I've got real work to do, so this'll have to be pushed way down on...
stack puke => n. Some processor architectures are said to `puke their guts onto the stack' to save their internal state during exception processing. The Motorola 68020, for example, regurgitates up to 92 bytes on a bus fault. On a pipelined machine, ...
stale pointer bug => n. Synonym for {aliasing bug} used esp. among microcomputer hackers.
state => n. 1. Condition, situation. "What's the state of your latest hack?" "It's winning away." "The system tried to read and write the disk simultaneously and got into a totally wedged state." The standard question "What's your state?" means "What...
steam-powered => adj. Old-fashioned or underpowered; archaic. This term does not have a strong negative loading and may even be used semi-affectionately for something that clanks and wheezes a lot but hangs in there doing the job.
stiffy => [University of Lowell, Massachusetts.] n. 3.5-inch microfloppies, so called because their jackets are more firm than those of the 5.25-inch and the 8-inch floppy. Elsewhere this might be called a `firmy'.
factpacks/jargon.fact view on Meta::CPAN
wank => /wangk/ [Columbia University prob. by mutation from Commonwealth slang v. `wank', to masturbate] n.,v. Used much as hack is elsewhere, as a noun denoting a clever technique or person or the result of such cleverness. May describe (negatively)...
wannabee => /won'*-bee/ (also, more plausibly, spelled `wannabe') [from a term recently used to describe Madonna fans who dress, talk, and act like their idol; prob. originally from biker slang] n. A would-be hacker. The connotations of this term dif...
warm boot => n. See boot.
wart => n. A small, crocky feature that sticks out of an otherwise clean design. Something conspicuous for localized ugliness, especially a special-case exception to a general rule. For example, in some versions of `csh(1)', single quotes literalize ...
washing machine => n. Old-style 14-inch hard disks in floor-standing cabinets. So called because of the size of the cabinet and the `top-loading' access to the media packs --- and, of course, they were always set on `spin cycle'. The washing-machine ...
washing machine2 => it is even used in Russian hacker jargon. See also {walking drives}. The thick channel cables connecting these were called `bit hoses' (see hose).
water MIPS => n. (see MIPS, sense 2) Large, water-cooled machines of either today's ECL-supercomputer flavor or yesterday's traditional mainframe type.
wave a dead chicken => v. To perform a ritual in the direction of crashed software or hardware that one believes to be futile but is nevertheless necessary so that others are satisfied that an appropriate degree of effort has been expended. "I'll wav...
wave a dead chicken2 => code, but I really think we've run into an OS bug." Compare {voodoo programming}, {rain dance}.
weasel => n. [Cambridge] A na"ive user, one who deliberately or accidentally does things that are stupid or ill-advised. Roughly synonymous with loser.
wedged => [from a common description of recto-cranial inversion] adj. 1. To be stuck, incapable of proceeding without help. This is different from having crashed. If the system has crashed, then it has become totally non-functioning. If the system is...
wedgie => [Fairchild] n. A bug. Prob. related to wedged.
wedgitude => /wedj'i-t[y]ood/ n. The quality or state of being wedged.
weeble => /weeb'l/ [Cambridge] interj. Used to denote frustration, usually at amazing stupidity. "I stuck the disk in upside down." "Weeble...." Compare gurfle.
weeds => n. 1. Refers to development projects or algorithms that have no possible relevance or practical application. Comes from `off in the weeds'. Used in phrases like "lexical analysis for microcode is serious weeds...." 2. At CDC/ETA before its d...
weenie => n. 1. When used with a qualifier (for example, as in {UNIX weenie}, VMS weenie, IBM weenie) this can be either an insult or a term of praise, depending on context, tone of voice, and whether or not it is applied by a person who considers hi...
Weenix => /wee'niks/ [ITS] n. A derogatory term for {UNIX}, derived from {UNIX weenie}. According to one noted ex-ITSer, it is "the operating system preferred by Unix Weenies typified by poor modularity, poor reliability, hard file deletion, no file ...
well-behaved => adj. 1. [primarily {MS-DOS}] Said of software conforming to system interface guidelines and standards. Well-behaved software uses the operating system to do chores such as keyboard input, allocating memory and drawing graphics. Oppose...
well-connected => adj. Said of a computer installation, this means that it has reliable email links with {the network} and/or that it relays a large fraction of available USENET newsgroups. `Well-known' can be almost synonymous, but also implies that...
wetware => /wet'weir/ [prob. from the novels of Rudy Rucker] n. 1. The human nervous system, as opposed to computer hardware or software. "Wetware has 7 plus or minus 2 temporary registers." 2. Human beings (programmers, operators, administrators) at...
whacker => [University of Maryland from hacker] n. 1. A person, similar to a hacker, who enjoys exploring the details of programmable systems and how to stretch their capabilities. Whereas a hacker tends to produce great hacks, a whacker only ends up...
factpacks/techdict.fact view on Meta::CPAN
OEM => (Original Equipment Manufacturer) This acronym is used to denote equipment that is sold to other companies or resellers for integration into systems. For example, a hard drive manufacturer may sell an OEM hard drive in bulk quantities and no m...
Office Suite => The set of software products that are required by an office. Most often comprised of a spreadsheet program, a word processor, a scheduler, and a presentation manager. Sometimes they will include a financial package and a database prog...
OLE => (see Object Linking and Embedding) see Object Linking and Embedding
Online => The term refers to anything that's on the Internet, as in "I've got this great online magazine for you to check out at www.ugeek.com."
OpenGL => (Open Graphics Language) This is a 3D graphics language developed by Silicon Graphics. OpenGL support is built into Windows NT. You can see some examples by checking out the NT screen savers. Some 3D graphics accelerators have OpenGL accele...
Optical Carrier 12 => (OC-12) This stands for the 622 Mbps ATM protocol. Some large Internet providers are using OC-12 for their backbones.
Optical Carrier 3 => (OC-3) Synonym for the 155 Mbps ATM protocol.
Optical Drive => A storage device that uses light to store data instead of magnetism. To write it (usually) uses a laser to change a tiny portion of an optical disk so that it can be read later by checking the state of that portion.
OS => (Operating System) The program that allows you to access the basic functions of your computer. It is the minimum software required to run a program. The best one by far is the MacOS.
Output => Anything that comes out of a computer or system. As in, "Watch out for that pile of OUTPUT on the sidewalk."
Over-clocking => This is the act of running a chip at a higher clock speed than it was specified for. Very often, chips are capable of running faster than they are specified for, and can be safely over-clocked.
P54C => This is the official part number for the Pentium processor from Intel.
P55C => This is the official part number for the Pentium processor with MMX technology from Intel.
Packet => A collection of information. It's often used to refer to the chunks of information sent over computer networks.
Packet Filter => This is anything that filters out network traffic based on sender's address, receiver's address, and the type of protocol being sent. Some routers support packet filtering, all firewalls do, and some proxy servers will as well.
Packet InterNet Gopher => (PING) Part of the standard TCP/IP suite of protocols that allows you to check your connectivity with other devices, or to check whether your own TCP/IP stack is working properly. Normally, you type in something like "ping 2...
Page Fault => This is not an error. It means that the computer had to resort to using the swap file as memory.
Parallel => Meaning in unison, or many things at the same time. Most commonly refers to a computer with multiple processors that can execute multiple instructions at the same time.
Parallel Port => The parallel port is found on just about all PCs. It's a 25-pin interface cable (DB-25) that is designed for connection to a printer. Normally, it will take up IRQ 7. In addition to printers, you can connect many other devices such a...
Parity => Meaning that there is an equality. Usually for the purpose of safety, so that if one goes bad there is still the other.
Parity Memory => Not quite memory that has a twin, but instead, more like a summary. The parity does not exactly have a copy of the original, but rather enough information to verify the integrity of the original.