view release on metacpan or search on metacpan
Amethyst/Brain/Infobot/Module/Excuse.pm view on Meta::CPAN
pizeo-electric interference
(l)user error
working as designed
dynamic software linking table corrupted
heavy gravity fluctuation, move computer to floor rapidly
secretary plugged hairdryer into UPS
terrorist activities
not enough memory, go get system upgrade
interrupt configuration error
spaghetti cable cause packet failure
boss forgot system password
bank holiday - system operating credits not recharged
virus attack, luser responsible
waste water tank overflowed onto computer
Complete Transient Lockout
bad ether in the cables
Bogon emissions
Change in Earth's rotational speed
Cosmic ray particles crashed through the hard disk platter
Smell from unhygenic janitorial staff wrecked the tape heads
Little hamster in running wheel had coronary; waiting for replacement to be Fedexed from Wyoming
Evil dogs hypnotized the night shift
Plumber mistook routing panel for decorative wall fixture
Electricians made popcorn in the power supply
Groundskeepers stole the root password
high pressure system failure
failed trials, system needs redesigned
system has been recalled
not approved by the FCC
need to wrap system in aluminum foil to fix problem
not properly grounded, please bury computer
CPU needs recalibration
system needs to be rebooted
bit bucket overflow
descramble code needed from software company
my %anarres = (
# Amethyst variables
Name => 'anarres',
Brains => [ qw(infobot eliza) ], # barwench markov
Alias => 'anarres', # For CNN module
# Object specific variables
Host => 'mudlib.anarres.org',
Port => 5000,
Login => q[(some valid login)],
Password => q[(the password)],
# Debug => 3,
Channel => 'spam', # Force output to one channel
);
unless ($ENV{HOSTNAME} =~ /^pink/) {
$anarres{Host} = 'localhost';
}
my %cnnchat = (
# Amethyst variables
Name => 'cnnchat',
Brains => [ qw(cnn) ],
factpacks/Linux.fact view on Meta::CPAN
AudioMixer => <reply> $who, Xforms based audiomixer. URL: http://www.ne.jp/asahi/linux/timecop/
Audiopy => <reply> $who, Solaris audio device controller. URL: http://www.python.org/~bwarsaw/software/pyware.html
audit => <reply> $who, Check files in home directory for strange permission, ownership, etc.. URL: http://www.pobox.com/~tranter/audit.html
Audit Daemon => <reply> $who, Captures auditing trails, filters them, and saves them in specific log files. URL: http://www.hert.org/projects/linux/auditd/
August => <reply> $who, A free html editor for Linux/Unix.. URL: http://august.seul.org/
aumix => <reply> $who, Color text mode sound mixer with GPM support. URL: http://jpj.net/~trevor/aumix.html
Aurora => <reply> $who, Graphical init controller for Linux. URL: http://aurora.mini.dhs.org/
Authen::Smb => <reply> $who, Perl module to authenticate against NT domain servers from UNIX. URL: http://www.perl.com/CPAN/modules/by-module/Authen/
Authenticated User Community for Education => <reply> $who, CGI-based intranet system intended for K-12 settings. URL: http://library.advanced.org/27155/
authlocal => <reply> $who, Automatic authentication of connections from localhost. URL: http://shadowlands.org/authlocal/
auth_ipc_module => <reply> $who, Shadow password authentication module for Apache. URL: http://sb.123.org/mod_auth_ipc.html
auth_ldap => <reply> $who, LDAP authentication for Apache. URL: http://www.rudedog.org/auth_ldap/
Auto DynDns => <reply> $who, Perl Frontend to DDUP, a dyndns updater. URL: http://www.iol7.com/funtaff/autodyndns/
Auto Redialer => <reply> $who, Auto Redialer for ppp-go and ppp-on scripts. URL: http://members.xoom.com/jengelbr/
auto-upload => <reply> $who, program that uploads files to an FTP account non-interactively. URL: http://cryogen.com/ror4/work/
Autobuse => <reply> $who, Log monitoring and reporting tool. URL: http://www.picante.com/~gtaylor/autobuse/
AutoCD => <reply> $who, Autostarts audio/data/mixed CDs when they're inserted.. URL: http://www.linuxstart.com/~igloo/download/autocd/
Autoclose => <reply> $who, This utility automatically closes one app when another is finished. URL: http://www.crosswinds.net/~pkrishnan/
autoconf => <reply> $who, Package of m4 macros to produce scripts that automatically configures sourcecode. URL: http://sourceware.cygnus.com/autoconf/
autoconf-sectest => <reply> $who, GNU autoconf macros to test for various common secure holes at configure time. URL: http://checkps.alcom.co.uk/
AutoConvert => <reply> $who, Chinese GB/HZ/BIG5 encoding auto convert. URL: http://banyan.dlut.edu.cn/~ygh/
factpacks/Linux.fact view on Meta::CPAN
Checklinks => <reply> $who, HTML link checker that supports SSI, many Apache options, and more (in Perl 5). URL: http://www.jmarshall.com/tools/cl/
Checkmail => <reply> $who, A POP3 email checking tcl script.. URL: http://www.icehouse.net/kevinl
checkmails => <reply> $who, Very simple pop3 mail biff with GUI setup. URL: http://www.image.dk/~jessth/checkmail.html
CheckURL => <reply> $who, Sends notification e-mails for changed URLs. URL: http://anders.fix.no/software/#unix
ChemApp => <reply> $who, A thermochemistry library for your software. URL: http://gttserv.lth.rwth-aachen.de/gtt/
Cheops => <reply> $who, Network User Interface. URL: http://www.marko.net/cheops/
ZMech => <reply> $who, State machine development tool. URL: http://www.demon.co.uk/titan/ZMECH/
Chester => <reply> $who, Newsgroup article-downloader. URL: http://www.io.com/~brettw/Chester/Chester.html
Chinese Lyx Patch => <reply> $who, patch to make lyx a Chinese writing tool.. URL:
chord2html => <reply> $who, A Perl script to convert CHORD input files to HTML. URL: http://helllabs.org/~claudio/chord/
chpasswd => <reply> $who, change user password by WWW. URL: http://sic.popnet.pl/~mlody/chpasswd
chpp => <reply> $who, General purpose preprocessor. URL: http://chakotay.ist.org/
chrony => <reply> $who, Network time protocol client/server tailored for dial-up client use. URL: http://www.rrbcurnow.freeserve.co.uk/chrony/
cicq => <reply> $who, A command-line based icq client. URL: http://uhura.cc.rochester.edu/~ab012f/cicq/
cid => <reply> $who, TCP client/server Caller-ID system, including server and Tk GUI client.. URL: http://www.tummy.com/cid
Cinderella => <reply> $who, Interactive Geometry Software (like Geometers' Sketchpad or Cabri). URL: http://www.cinderella.de/
CINQ => <reply> $who, Portable BASIC Compiler. URL: http://shell.flite.net/~rmann/index.html
CINT => <reply> $who, C/C++ Interpreter. URL: http://root.cern.ch/root/Cint.html
CIPE => <reply> $who, Crypto IP Encapsulation. URL: http://sites.inka.de/~W1011/devel/cipe.html
cipherczar => <reply> $who, ncurses environment that helps solve simple substitution ciphers. URL: http://wil.langford.net/cipherczar/
CircleMUD => <reply> $who, Multi User Dungeon for Linux. URL: http://www.circlemud.org/
factpacks/Linux.fact view on Meta::CPAN
Golgotha Forever => <reply> $who, 3D FPS/strategy game that will be available on nearly platform/OS.. URL: http://golgotha.opengames.org/
gomenu => <reply> $who, Menu script (bash/ksh) allows dynamic menu and help editing.. URL: http://www.digizen.net/members/geoffm/
Gomoku Apprentice => <reply> $who, A gomoku player learning from its own mistakes. URL: http://www.student.nada.kth.se/~d92-jwa/code/
Gone => <reply> $who, Newsreader for the Gnome Desktop Environment. URL: http://www.mvdstreek.cistron.nl/gone/
good-dog => <reply> $who, better than cat. URL: http://jl.photodex.com/dog/
Goose => <reply> $who, Statistical library.. URL: http://www.gnu.org/software/goose/
got_it => <reply> $who, Simple URL grabber. URL: http://www.roger.samond.ru/
gpak => <reply> $who, GPak is a utility to extract files contained in Quake II PAK-files.. URL: http://www.engren.org/quake2/gpak/
gPalmDoc => <reply> $who, GUI web page to AportisDoc converter.. URL: http://users.linuxbox.com/~jiva/index.html
gpart => <reply> $who, A utility which guesses PC-type hard disk partitions. URL: http://www.stud.uni-hannover.de/user/76201/gpart/
Gpasman => <reply> $who, Keeps track of all your passwords in a secure way. URL: http://gpasman.nl.linux.org/
GPC => <reply> $who, . URL: http://agnes.dida.physik.uni-essen.de/~gnu-pascal/
GPCL => <reply> $who, Creates images to use as textures using repeatable paramaterized patterns.. URL: http://www.geocities.com/CollegePark/4206/gpcl.html
GPeriodic => <reply> $who, Periodic Table Reference and Browser. URL: http://gperiodic.seul.org/
gPhoto => <reply> $who, GNU Digital Camera download software. URL: http://www.gphoto.org/
GPhysics => <reply> $who, Simple game physics lib, planning on becoming large complex physics lib. URL: http://members.tripod.com/CrescentGraphics/gphysics.html
GPI => <reply> $who, A user friendly networked database management system generator. URL: http://www.ldh.org/gpi/
GPL Argument Analyser => <reply> $who, Utility to manage the arguments of your programs. URL: http://wwwetu.utc.fr/~maillejo/
GPLAboutDialog.java => <reply> $who, Generic Java About Dialog generator for GPL'd programs. URL: http://www.eldritch.org/erskin/GPLAboutDialog/
GPlayCD => <reply> $who, A simple Gtk+ based music CD playing program.. URL: http://cs.alfred.edu/~lansdoct/linux/gplaycd/
GPM => <reply> $who, A mouse server for the console and xterm.. URL: ftp://animal.unipv.it/pub/gpm/gpm-1.18.0.tar.gz
factpacks/Linux.fact view on Meta::CPAN
JMap => <reply> $who, Creates HTML image map source. URL: http://www.users.globalnet.co.uk/~poggy/
jmatrix => <reply> $who, Matrix the movie eye candy thingy. URL: http://www.net-link.net/~jettero/matrix/
jmk-x11-fonts => <reply> $who, Jim's character-cell fonts for the X Window System. URL: http://www.pobox.com/~jmknoble/fonts/
Jmol => <reply> $who, Java/Swing-based molecular dynamics viewer. URL: http://www.openscience.org/jmol/
jMon => <reply> $who, Distributed Resource Monitor. URL: http://www.dsp.sun.ac.za/~jjb/jmon/
JMR 0.7.25 => <reply> $who, Offline Mail Reader for BBS QWK packets. URL: http://www.cs.Helsinki.FI/~jvuokko/jmr/
JMud => <reply> $who, An experimental MUD server written in Java(TM).. URL: http://www.dcc.unicamp.br/~evertonm/jmud/
Job Control System => <reply> $who, A Web-based Helpdesk application. URL: http://members.xoom.com/prozach/
job manager => <reply> $who, Beowulf job manager. URL: http://bond.imm.dtu.dk/jobd/
joe => <reply> $who, A Free ASCII-Text Screen Editor for UNIX. URL: ftp://ftp.std.com/src/editors/
John the Ripper => <reply> $who, Password cracker to detect weak UNIX passwords. URL: http://www.openwall.com/john/
Johnson Keyboard => <reply> $who, Hacker's keyboard layout for X-Windows. URL: http://www.boswa.com/johnson.html
jonama => <reply> $who, SSL proxy. URL: http://www.multimania.com/jonama/
Jons Simple Server => <reply> $who, A TCL interpreter for creating simple server applications. URL: http://uv.net/~jon/
Jooky => <reply> $who, MP3 controller with a foreground curses client, or background client/server.. URL: http://soomka.com/
Journal => <reply> $who, A text-based journal/diary.. URL: http://soapbox.fissure.org/journal/journal.html
journyx Timesheet => <reply> $who, Timesheet software via the web. URL: http://www.journyx.com/
Joy2Key => <reply> $who, Translate joystick movements into keyboard events (X and console). URL: http://www-unix.oit.umass.edu/~tetron/joy2key/
Joydesk => <reply> $who, Web-based Groupware. URL: http://joydesk.com/
jpilot => <reply> $who, Palm pilot desktop software for Linux. URL: http://jpilot.linuxbox.com/
jPOS => <reply> $who, 100% java ISO-8583/ANSI X9.2 implementation. URL: http://www.cs.com.uy/jPOS/
factpacks/Linux.fact view on Meta::CPAN
Kodometer => <reply> $who, . URL: http://yawara.anime.net/kodo/
KOffice => <reply> $who, An integrated Office suite for KDE. URL: http://koffice.kde.org/
koffle => <reply> $who, wwwoffle cache-browser. URL: http://david.ghb.fh-furtwangen.de/~joe/koffle/
Komba => <reply> $who, Samba share browser. URL: http://zeus.fh-brandenburg.de/~schwanz/komba.html
Konstellation => <reply> $who, Star Catalogue Viewer for KDE. URL: http://homepages.tesco.net/~grawlfang/Konst/konst.tar.gz
kooBase => <reply> $who, Extendable music application. URL: http://lienhard.desy.de/mackag/homepages/jan/Brahms/home.shtml
KOPI => <reply> $who, A completely open-source Java compiler and development environment. URL: http://www.dms.at/kopi/
KOra => <reply> $who, Powerfull frontend to Oracle databases. URL: http://members.xoom.com/uwagner/kora/
Korfe => <reply> $who, Fast GUI Builder for Java that supports Swing as well as custom components. URL: http://www.javalobby.com/jfa/projects/korfe.html
KOrganizer => <reply> $who, Personal Information Manager for the KDE Desktop Environment. URL: http://www.redhat.com/~pbrown/korganizer/
KOSd => <reply> $who, Ascend RADIUS daemon that can use alternate password files. URL: http://www.rumour.com/projects.html
Kosima => <reply> $who, Kodi's Simple Animator. URL: http://www.object-factory.com/~kosima/
koules => <reply> $who, . URL: http://www.paru.cas.cz/~hubicka/koules/English/koules.html
KOutline => <reply> $who, KDE2 outliner and todo manager.. URL: http://www.iac.net/~crawford/programming/koutline.html
Kova Adom => <reply> $who, Collection of Hebrew support RPM packages. URL: http://www.pf1.co.il/kova/
Kover => <reply> $who, An easy to use WYSIWYG cd cover printer for KDE. URL: http://www.fischlustig.de/kover/
KPackage => <reply> $who, GUI interface to the RPM and the Debianpackage manager. URL: http://www.general.uwa.edu.au/u/toivo/kpackage/
KPackViewer => <reply> $who, Package viewer to ease package administration. URL: http://www.momentus.com.br/users/hook/kpackviewer.html
Kpasman => <reply> $who, A small password manager for KDE. URL: http://kpasman.sourceforge.net/
Kpc => <reply> $who, KDE Printer Configuration Wizard. URL: http://kpc.linuxatwork.at/
KPGPKeys => <reply> $who, Shell for PGP 5.0. URL: http://pages.whowhere.com/computers/crossi/index.html
KPGsql => <reply> $who, A simple KDE postgres-frontend. URL: http://home.primusnetz.de/mgeisler/kpgsql/
KPilot => <reply> $who, Hot sync software for Unix. URL: http://www.slac.com/pilone/kpilot_home/
kpl => <reply> $who, Program for two-dimensional graphical presentation of data sets and functions.. URL: http://frsl06.physik.uni-freiburg.de/privat/stille/kpl/
KPlot3d => <reply> $who, Tool for ploting 3d function z = f(x,y) for KDE. URL: http://members.xoom.com/kplot3d/
kplotw => <reply> $who, A user-friendly 2D plotting widget for KDE. URL: http://www.chaos.umd.edu/~dsweet/KDE/KPlotW/
KPooka => <reply> $who, Logic game for KDE. URL: http://www.ucs.co.za/~pgr/kpooka/
Kpp => <reply> $who, An RPM SPEC file utility.. URL: http://www.msoe.edu/~geiseri/projects.phtml?project=Kpp
Kppp => <reply> $who, KDE dialer and front end for pppd. URL: http://devel-home.kde.org/~kppp/index.html
factpacks/Linux.fact view on Meta::CPAN
proxy => <reply> $who, Simple Proxy Server. URL: http://www.mindstorm.com/~sparlin/projects.shtml
proxyarp => <reply> $who, A proxyarp daemon for linux.. URL: ftp://guido.dhs.org:50021/proxyarp-0.7.3.tar.gz
prwhod => <reply> $who, An extended rwhod daemon. URL: ftp://ftp.lysator.liu.se/pub/unix/prwhod
pscal => <reply> $who, shell script to create PostScript calendars. URL: ftp://ftp.netcom.com/pub/mb/mbh/pscal-1.7.tar.gz
psgplay => <reply> $who, Music player for all the old Atari tunes.. URL: http://www.nocrew.org/software/psgplay/
psh => <reply> $who, Tooltips for the UNIX shell. URL: http://users.gtn.net/fraserm/psh.html
psiconv => <reply> $who, Psion 5 file conversion utilities and file format documentation. URL: http://huizen.dds.nl/~frodol/psiconv/
psiko => <reply> $who, Boot Manager. URL: http://iaeste.cie.uma.es/lima/
PsiLin => <reply> $who, Graphical interface to connect and convert files between a Psion and Linux. URL: http://www.medsyn.fr/perso/g.delafond/psiolinu.htm
psntools => <reply> $who, Administrative tools for large numbers of accounts. URL: http://www.psn.ie/users/ad/psntools/
PSPG => <reply> $who, Pretty simple password generator. URL: http://members.xoom.com/miscreants/
PSSlides => <reply> $who, Package for generating PostScript presentation slides. URL: http://www.cs.berkeley.edu/~mdw/proj/psslides/
pstack => <reply> $who, Dump call stacks of active processes. URL: http://www.whatsis.com/pstack/
pstill => <reply> $who, . URL: http://www.this.net/~frank/pstill.html
PSUtils => <reply> $who, Manipulate PostScript files. URL: http://www.dcs.ed.ac.uk/~ajcd/psutils/index.html
PSXDEV => <reply> $who, A free GPL'd development environment for thePlayStation. URL: http://math-www.uni-paderborn.de/~dbalster/psxdev/index.html
PTax98 => <reply> $who, Computes most of the 1998 Federal 1040EZ.. URL: http://www.arborway.net/koch/
Ptester => <reply> $who, HTTP Benchmarking tool. URL: ftp://ftp.lysator.liu.se/pub/unix/ptester
ptf => <reply> $who, A TCP forwarder written in Python. URL: http://www.tuts.net/~klausman/english/linux.html
ptk-phone => <reply> $who, Phonebook application in Perl/Tk. URL: http://tcfreenet.org/~schewe/ptk-phone/phone.html
ptkfonted => <reply> $who, Perl/Tk BDF Font Editor. URL: http://cantor.res.cmu.edu/gutenberg/
factpacks/Linux.fact view on Meta::CPAN
purl => <reply> $who, A tool to check if web-pages have been modified. URL: http://homer.isoe.ch/~lanzm/purl/
PURP => <reply> $who, An ncurses-based RPM-manager. URL: http://www.lysator.liu.se/purp/
pushsite => <reply> $who, Utility to update remote site. URL: http://www.dyer.demon.co.uk/slug/tipscrip.htm
PVCj => <reply> $who, Client side installation of JARs within Sun's Java Plugin. URL: http://granitepeaks.com/pvcj/
PVFS => <reply> $who, A parallel file system for clusters of PCs. URL: http://www.parl.clemson.edu/pvfs/
PVM => <reply> $who, A portable message-passingprogramming system. URL: http://www.epm.ornl.gov/pvm/
PVM Gmake => <reply> $who, Distributed gmake. URL: http://www.crosswinds.net/~jlabrous/GNU/PVMGmake/
PVM++ => <reply> $who, A C++-Library for PVM. URL: http://goethe.ira.uka.de/~wilhelmi/pvm++/
pvmpov => <reply> $who, POV-Ray raytracing in a parallel environment. URL: http://www.luga.de/~flierl/pvmpov/
pvmsync => <reply> $who, Extends POSIX-like synchronization mechanisms to a Linux Beowulf cluster. URL: http://torch.rowan.edu/pvmsync/
pwcheck => <reply> $who, MySQL password authentication for the Cyrus IMAP server.. URL: http://earth.alsland.com/anewsome/pwcheck_mysql-0.7.tar.gz
pwcheck_pgsql => <reply> $who, pwcheck_pgsql is a an authentication module for the Cyrus IMAP server.. URL: ftp://ftp.kstu.edu.ru/pub/unix/cyrus/pwcheck_pgsql-0.1.tgz
pxtools => <reply> $who, Collection of tools to convert a Paradox-database. URL: http://www.kneschke.de/projekte/pxtools/
Pybliographer => <reply> $who, tool for bibliographic databases manipulation. URL: http://www.gnome.org/pybliographer/
PyBot => <reply> $who, An IRC bot written in Python.. URL: ftp://205.238.164.201/pub/pybot/pybot-latest.tar.gz
pyCA => <reply> $who, A project to create Certification Authority in Python. URL: http://sites.inka.de/ms/python/pyca/
pyCDAudio => <reply> $who, Python wrapperes for libcdaudio. URL: http://www.michigannet.com/~rbb/pycdaudio/
pyChing => <reply> $who, Cast and interpret I Ching hexagrams. URL: http://www.essemgee.xnot.com/pyching/
pydb => <reply> $who, A modified version of the standard Python debugger. URL: http://daikon.tuc.noao.edu/python/
pyDE => <reply> $who, Programmers editor for Python. URL: http://www.spirito.de/pyde/
pydf => <reply> $who, colourised df(1)-clone. URL: http://melkor.dnp.fmph.uniba.sk/~garabik/pydf/
factpacks/Linux.fact view on Meta::CPAN
Qial => <reply> $who, DTMF tone generation program. URL: http://ucsub.colorado.edu/~kominek/qial/
QIPchains => <reply> $who, A shell script which helps you to quickly add/remove Linux FW rules.. URL: http://www.vano.odessa.net/software/
qmail => <reply> $who, . URL: http://www.qmail.org/
QmailAdmin => <reply> $who, Web based interface for Qmail Administration. URL: http://www.inter7.com/qmailadmin/
qmail_regex => <reply> $who, Permits usage of regular expressions in qmail's control/locals. URL: http://beteigeuze.cs.tu-berlin.de/linux/qmail/
qmHandle => <reply> $who, A tool to manage the qmail message queue. URL: http://www.io.com/~mick/soft/qmhandle.html
qml => <reply> $who, Quick Markup to HTML language translator. URL: http://www.qml.org
qmp3 => <reply> $who, Quick MPG123 frontend to support m3u playlists. URL: http://www.linuxsupportline.com/~kost/qmp3/
QMySql => <reply> $who, A little client for MySql using Qt.. URL: http://www.etu.info.unicaen.fr/~fbilhaut/frames.software.html
qotdd => <reply> $who, Quote of the Day daemon. URL: http://www.zevils.com/linux/qotdd/qotdd.html
qpasswd => <reply> $who, POP3 password changing utility for qmail+poppasswd. URL: ftp://games.online.bg/pub/unix/net/qpasswd/qpasswd-1.1pl1.tar.gz
Qpopper => <reply> $who, POP3 server. URL: http://eudora.qualcomm.com/freeware/qpop.html
qpopper-mysql => <reply> $who, A patch to add a decent set of MySQL capabilities to qpopper 2.53. URL: http://www.riverstyx.net/qpopmysql/
qps => <reply> $who, Displays processes in an X11 window. URL: http://www.nada.kth.se/~f91-men/qps/
QpThread Library for C++ => <reply> $who, Thread library for C++ with support for signals, exceptions, timer etc.. URL: http://www.gncz.cz/kra/index.html
qrend => <reply> $who, Minimalist raytracer. URL: http://esh.netpedia.net/qrend/
QScheme => <reply> $who, Really fast, small and easy to interface Scheme interpreter. URL: http://www.sof.ch/dan/qscheme/index-e.html
Qstat => <reply> $who, A command-line program that displays the status of Internet Quake servers. URL: http://www.activesw.com/people/steve/qstat.html
Qt => <reply> $who, GUI software toolkit. URL: http://www.troll.no/products/qt.html
Qt Architect => <reply> $who, GUI dialog designer for the Qt widget set.. URL: http://www.qtarch.intranova.net/
QT Font Dialog => <reply> $who, QT Font Dialog box that doesnt require KDE. URL: http://polywog.navpoint.com/qt/download.html
factpacks/Linux.fact view on Meta::CPAN
Runlevel.app => <reply> $who, Allows system administrators to add, delete, edit and execute services. URL: http://windowmaker.mezaway.org/runlevelapp.html
runmaint => <reply> $who, wrapper for cron jobs. URL: http://www.zip.com.au/~cs/runmaint.html
Rush ircd => <reply> $who, An amazing ircd. URL: http://www.extremerush.dhs.org/
rview => <reply> $who, Game resource data exlorer and ripper tool. URL: http://pluto.spaceports.com/~rview/
RXP => <reply> $who, Validating XML parser in C. URL: http://www.cogsci.ed.ac.uk/~richard/rxp.html
rxtx => <reply> $who, rxtx is a native serial library for linux supporting CommAPI. URL: http://www.frii.com/~jarvi/rxtx/
rxvt => <reply> $who, A VT102 emulator for the X window system. URL: http://www.rxvt.org/
rz/sz => <reply> $who, ZMODEM, YMODEM or XMODEM error correcting protocol send and receive. URL: http://www.rdrop.com/users/caf/rzsz3.html
rzMail => <reply> $who, A wxPython-based e-mail client.. URL: http://rozzin.homepage.com/
s-news => <reply> $who, Small news server using suck for news transport.. URL: http://www.sylph.u-net.com/snews.html
S/key => <reply> $who, One time password system. URL: ftp://thumper.bellcore.com/pub/nmh/
S1000 => <reply> $who, Device driver for Ocean Optics's spectrometer S1000 with A/D card ADC500.. URL: http://dmpc.dbp.fmph.uniba.sk/~rybar/programming/programming.html
S3 Trio64 frame buffer driver for Linux/x86 => <reply> $who, Linux framebuffer driver for S3 Trio64-based cards on Intel. URL: http://www.hut.fi/~hmallat/linux/s3.html
Sabre Flight Plane Simulator => <reply> $who, Fligh simulator. URL: http://sabre.cobite.com/
SAC => <reply> $who, System Accounting Tool. URL: http://mama.indstate.edu/users/ice/sac/
safecat => <reply> $who, Copies stdin to a qmail-style maildir. URL: http://www.pobox.com/~lbudney/linux/software/safecat.html
SafeGossip => <reply> $who, SSL support for FTP, IMAP, POP, SMTP and telnet. URL: http://www.skygate.co.uk/safegossip/
Sailor Mars => <reply> $who, Anime desktopmate. URL: http://home.rmci.net/fiachra/
Saint => <reply> $who, Security Administrator's Integrated Network Tool. URL: http://www.wwdsi.com/saint/
sam => <reply> $who, Rob Pike's sam editor for Unix, using 9libs for Plan 9 support.. URL: ftp://netlib.bell-labs.com/netlib/research/9libs/sam-9libs.tar.gz
Samba => <reply> $who, Allows clients to access to a server's filespace and printers via SMB. URL: http://www.samba.org/
factpacks/Linux.fact view on Meta::CPAN
sdragon => <reply> $who, configuration utility for Hagenuk's DataBox Speed Dragon. URL: http://www.dillingen.baynet.de/~jdorner/linux/sdragon.htm
sdts++ => <reply> $who, C++ toolkit for reading and writing Spatial Data Transfer Standard (SDTS) files. URL: http://www.clark.net/~mcoletti/sdts/
seahaven => <reply> $who, Classic Unix solitaire game. URL: http://www.cinenet.net/users/spitzak/seahaven/
seatris => <reply> $who, ncurses-based tetris game.. URL: http://www.earth.li/projectpurple/progs/seatris.html
secret-share => <reply> $who, Cryptographically split a file into multiple pieces. URL: http://www.mindrot.org/code/secret-share.php3
Secure 2.0.37 Kernel Mod => <reply> $who, Secure 2.0.37 Kernel mod is a patch that adds tons of security features.. URL: http://www.resentment.org/~j-dog/2.0.37-secure.html
yarec => <reply> $who, Console based sample recorder/player. URL: http://www.tmt.de/~stephan/yarec.html
secure delete => <reply> $who, secure deletion of files, secure overwriting of swap and unused diskspace.. URL: http://thc.pimmel.com/files/thc/secure_delete-2.1.tar.gz
Secure FTP => <reply> $who, FTP replacement over ssh/rsh. URL: http://www.xbill.org/sftp/
Secure Locate => <reply> $who, Secure version of the GNU locate program. URL: http://pep.stormix.com/slocate/
Secure Remote Password Protocol => <reply> $who, Zero-knowledge password-based authentication and key exchange protocol. URL: http://srp.stanford.edu/srp/
Secure Shell => <reply> $who, Shell script for secure logins using encryption and dual authorization. URL: http://www.leenux.com/scripts/
Secure Sockets Agent Client => <reply> $who, A system for securing the insecure communications between existing applications.. URL: http://www.cyber.ee/ssa/
Secure Sockets Agent Server => <reply> $who, A system for securing the insecure communications between existing applications.. URL: http://www.cyber.ee/ssa/
Secure Syslog => <reply> $who, Cryptographically secure system logging tool for UNIXsystems. URL: http://www.core-sdi.com/english/slogging/ssyslog.html
Secure-Linux Patch => <reply> $who, Linux kernel patch to block most stack overflow exploits. URL: http://www.openwall.com/linux/
sed => <reply> $who, GNU Stream Editor. URL: ftp://ftp.gnu.org/pub/gnu/
SeeR => <reply> $who, C/C++ scripting engine. URL: http://home.elka.pw.edu.pl/~ppodsiad/seer/
segfault.php3 => <reply> $who, segfault.php3 retrieves the latest segfault news for a webpage.. URL: http://swamp.chl.chalmers.se/backends/
Selathco => <reply> $who, LaTeX To HTML Converter. URL: http://dione.zcu.cz/~toman40/selathco/
selectwm => <reply> $who, A window manager selector. URL: http://www.altern.org/ldufresne/selectwm/
factpacks/Linux.fact view on Meta::CPAN
SFG => <reply> $who, Simple Find & Grep application with a GTK interface. URL: http://www.geocities.com/ResearchTriangle/3651/sfg.html
SFI Director => <reply> $who, System Management Tool For Heterogeneous UNIX Networks. URL: http://www.sfi.ch
sfront => <reply> $who, Translates MPEG 4 Structured Audio to C. URL: http://www.cs.berkeley.edu/~lazzaro/sa/index.html
sfspatch => <reply> $who, The Steganographic File System Kernel Patch. URL: http://www.linux-security.org/sfs/
sfstools => <reply> $who, Tools for the Steganographic File System. URL: http://www.linux-security.org/sfs/
sFTP => <reply> $who, Screen-oriented FTP client, based on the curses library.. URL: http://www.concentric.net/~mrsam/sftp/index.html
SGMLtools => <reply> $who, Package made fortechnical/software documentation. URL: http://www.sgmltools.org/
sgrab => <reply> $who, Allows web-users to get a real-time snapshot of your screen.. URL: http://endor.clark.net/~hillie/sgrab.zip
Sgraph => <reply> $who, Stock chart creation utility. URL: http://www.d.umn.edu/~rhankins/sgraph/
sh-utils => <reply> $who, GNU shell programming utilities. URL: http://www.gnu.org/software/shellutils/shellutils.html
Shadow => <reply> $who, Shadow password file utilities. URL: ftp://piast.t19.ds.pwr.wroc.pl/pub/linux/shadow/shadow-current.tar.gz
Shadowlands Forum => <reply> $who, Low-resource, robust, friendly telnet chat server with authentication. URL: http://shadowlands.org/forum/
Shadows Over Longhaven => <reply> $who, . URL: http://www.chronozon.demon.co.uk
SharedArray => <reply> $who, A templated C++ class representing an array in Linux IPC shared memory. URL: http://www.pressenter.com/~3nelsons/joecode/
ShareTheNet => <reply> $who, Linux router on a floppy with a Windows based setup.. URL: http://www.sharethenet.com/
Sharity => <reply> $who, Unix client for the Windows network file system. URL: http://www.obdev.at/Products/Sharity.html
Sharity-Light => <reply> $who, CIFS (formerly SMB) to NFS converter, formerly known as rumba. URL: http://www.obdev.at/Products/shlight.html
Sharky's Lava Rocks => <reply> $who, Java class library including advanced printf support.. URL: http://sharkysoft.com/software/lava/
shash => <reply> $who, Produces message digests for files.. URL: http://hq.hellug.gr/~mcrypt/shash/
shasum => <reply> $who, Generates SHA1 hashes. URL: ftp://ftp.gamora.org/pub/gamora/shasum/
ShellSecure => <reply> $who, ShellSecure shell scripts. URL: http://sync.llost.com/ss/
factpacks/Linux.fact view on Meta::CPAN
SNES9x => <reply> $who, Portable, freeware Super Nintendo Entertainment System(SNES) emulator. URL: http://www.snes9x.com
SNiFF+ => <reply> $who, An open, extensible and scalable cross-platform programming environment. URL: http://www.takefive.com/
SNiFF+ LinuxLand => <reply> $who, Integrated development environment on Linux. URL: http://www.linuxland.de
SNiFF+ Penguin IDE => <reply> $who, Free professional IDE for Linux C/C++ developers. URL: http://www.takefive.com/
Sniffit => <reply> $who, Full-featured packet sniffer. URL: http://reptile.rug.ac.be/~coder/sniffit/sniffit.html
SNMP Monitor (Ex) => <reply> $who, SNMP critical values monitoring. URL: http://geekcorp.com/snmpmonitor/
SNMP Sniff => <reply> $who, A promiscuous SNMP Sniffer/Decoder that allows you to look inside SNMP PDU's. URL: http://users.linuxbox.com/~nunol/snmpsniff/
SNMP Sniffer => <reply> $who, SNMP promiscuous packet sniffer/decoder.. URL: http://elektra.porto.ucp.pt/snmpsniff
SNMP with Source => <reply> $who, SNMP provides network management framework for enabling and monitoring a network. URL: http://www.alphaworks.ibm.com/
Snmpd (Scotty) => <reply> $who, SNMP daemon-based network management program. URL: http://geekcorp.com/snmpd/
snmpscan => <reply> $who, Scan hosts or routers running SNMPD for common communities (passwords).. URL: http://www.phunc.com/tools/snmpscan/
Snoopy => <reply> $who, Snoopy is a PHP class that implements web client functionality.. URL: http://www.phpinsider.com
Snort => <reply> $who, Libpcap packet sniffer/logger/lightweight IDS. URL: http://www.clark.net/~roesch/security.html
Snow* => <reply> $who, Tcl/Tk GUI for Snowblind CLI rio tools. URL: http://www.daft.com/~armadilo/projects/snowstar/snowstar.html
Snoweb => <reply> $who, hypertext literate programming mode for xemacs. URL: http://www.pobox.com/~graydon/snoweb.html
snowflake => <reply> $who, An interactive snowflake image generator. URL: http://www.infomatch.com/~donaldj/
snplog => <reply> $who, . URL: http://www.franken.de/users/gauss/snplog/
snpp2web => <reply> $who, Simple network paging protocol to Web page gateway. URL: http://www.novia.net/~rexracer/snpp2web/
sock => <reply> $who, Shell interface for network sockets. URL: http://atrey.karlin.mff.cuni.cz/~mj/linux.html
Socker => <reply> $who, Turns any stdin/stdout based program into a TCP server process. URL: http://www-ug.eecg.toronto.edu/~doylep/socker/
Socket Script => <reply> $who, . URL: http://devplanet.fastethernet.net/sscript.html
factpacks/Linux.fact view on Meta::CPAN
Squij => <reply> $who, Squid logfile analyzer. URL: http://www.pobox.com/~mnot/squij/
squint => <reply> $who, Extracts files directly from a squid cache.. URL: http://www.lavalink.com.au/~mjf/software/squint/
Squirm => <reply> $who, A fast & configurable redirector for the Squid Internet Object Cache.. URL: http://www.senet.com.au/squirm/
squishdot => <reply> $who, Zope-based weblog (Slashdot-like forum). URL: http://squishdot.org/
Squishy Bugs => <reply> $who, Mindless terminal game where hapless bugs are squished. URL: http://vergenet.net/linux/squishy_bugs/
srecord => <reply> $who, A collection of powerful tools for manipulating EPROM load files. URL: http://www.canb.auug.org.au/~millerp/srecord.html
sredird => <reply> $who, RFC 2217 compliant serial port redirector. URL: ftp://metalab.unc.edu/pub/Linux/system/serial/
ss5136dn 1.2 => <reply> $who, Driver and Utilities for SST 5136-DN family of DeviceNet interfaces.. URL: http://www.gnofn.org/~marksu/dn5136man.html
ssct => <reply> $who, Spell checks a word, then translates the result(s). URL: http://www.progsoc.uts.edu.au/~jedd/ssct/
ssh => <reply> $who, Remote Login Program. URL: http://www.ssh.fi/
SSH Buddy => <reply> $who, Expectk Wrapper for secure shell, saves connections and passwords. URL: http://www.sundilla.net/sshbuddy/
ssh2 => <reply> $who, Remote Login Program. URL: http://www.ssh.fi/
SSLeay => <reply> $who, free implementation of Netscape's Secure Socket Layer. URL: http://www.psy.uq.oz.au/~ftp/Crypto/
ssystem => <reply> $who, OpenGL Solar System Simulator. URL: http://www1.las.es/~amil/ssystem
St. Alphonso's finger daemon => <reply> $who, A more featureful, hopefully more secure version of fingerd for unix. URL: http://www.stalphonsos.com/sw/fingerd/
StackGuard => <reply> $who, Helps to prevent buffer overflows in subsequently compiled binaries. URL: http://immunix.org/
stalk => <reply> $who, Secure talk client. URL: http://www.cwb.matrix.com.br/jungmann/
STAMOS => <reply> $who, Gathers several information about the computer and generates an HTML file. URL: http://privat.schlund.de/Knut_Grahlmann/index_en.html
stamp => <reply> $who, Adds a graphical timestamp to a jpeg image. URL: http://stamp.netpedia.net
Stampede GNU/Linux => <reply> $who, PGCC/Glibc optimized distribution. URL: http://www.stampede.org/
star => <reply> $who, The fastest known implementation of a tar archiver.. URL: http://www.fokus.gmd.de/research/cc/glone/employees/joerg.schilling/private/star.html
factpacks/Linux.fact view on Meta::CPAN
stk-mysql => <reply> $who, STk interface to MySQL databases.. URL: ftp://cliffs.ucsd.edu/pub/terry/stk-mysql.tar.gz
stock-simulator => <reply> $who, A stock-trading simulator and game. URL: http://members.tripod.com/viralbs/
stoic => <reply> $who, Freeware web server log analysis tool. URL: http://www.censor.com/harrison/code/
StompBoxes => <reply> $who, Realtime guitar audio effects for Linux. URL: http://www.cs.unr.edu/~urtubia/stompboxes/
Stones of Asterind => <reply> $who, Single-player game. URL: http://www.proaxis.com/~mgelhaus/linux/software/stones/stones.html
STonX => <reply> $who, . URL: http://www.complang.tuwien.ac.at/nino/stonx.html
STPP => <reply> $who, Versatile tool to include tabular-data into TeX/LaTeX documents.. URL: http://www.informatik.tu-muenchen.de/~jahn/tools/stpp/
strace => <reply> $who, System call tracing utility (like trace, truss, etc). URL: http://www.wi.leidenuniv.nl/~wichert/strace/
stracker => <reply> $who, Console-based MOD music player/tracker. URL: http://stracker.home.dhs.org/
Strawpoll => <reply> $who, Web-based voting booth written using Tcl/Aolserver. URL: http://www.alexium.com/strawpoll/
Strip => <reply> $who, Secure password and account manager for Palm Pilots.. URL: http://www.zetetic.net/products.html#strip
StripCmt => <reply> $who, Strips comments from C, C++, and Java source code. URL: http://www.bdc.cx/software/stripcmt/
strobe-classb => <reply> $who, Compact network scanner, Linux-specific, for scanning large networks.. URL: http://www.luyer.net/software/strobe-classb/
stump3 => <reply> $who, A cute little perl script for a car mp3 system.. URL: http://theonline.org/linux/stump3.phtml
stunnel => <reply> $who, Universal SSL tunnel. URL: http://mike.daewoo.com.pl/computer/stunnel/
STV500 => <reply> $who, SVGALib app for watching TV with Accuview TV/Video Capture cards and its clones. URL: http://home.sprynet.com/sprynet/cbagwell/accuview.html
suck => <reply> $who, Grabs news from a remote NNTP news server. URL: http://home.att.net/~bobyetman/
YAX Graphics System API => <reply> $who, The Application Program Interface for the YAX Graphics System.. URL: http://yax.netpedia.net
sugarplum => <reply> $who, Automated, secure perl spambot poisoner with many features. URL: http://www.devin.com/sugarplum/
sula => <reply> $who, Programmable multiple-server IRC Client for X with Guile extension. URL: http://members.xoom.com/fotang/sula/
YAX Window System => <reply> $who, A small window system for Unix.. URL: http://yax.netpedia.net/
factpacks/Linux.fact view on Meta::CPAN
TuxTime => <reply> $who, Control power-saving options on Toshiba laptops. URL: http://www2.prestel.co.uk/hex/tuxtime.html
tux_aqfh => <reply> $who, Tux the Penguin - A Quest for Herring. URL: http://www.woodsoup.org/projs/tux_aqfh/
TV Soup => <reply> $who, A Web application for viewing and discussing Internet videos.. URL: http://tvsoup.com/
tv.app => <reply> $who, tv.app is a wharf dockable applet that acts as a remote control for XawTV.. URL: http://www.erols.com/imoore/tvapp/
TVListing.sh => <reply> $who, Fetches today's TV listings and emails them to you.. URL: http://www.users.globalnet.co.uk/~kermit/myc/frame/tvguide.html
TWIG => <reply> $who, A web-based IMAP client written with PHP3. URL: http://twig.screwdriver.net/
TWiki => <reply> $who, Web based collaboration tool. URL: http://www.mindspring.com/~peterthoeny/twiki/index.html
TwinTRIS => <reply> $who, Multiplayer tetris clone for all Unix boxes. URL: http://membres.tripod.fr/twintris/
Twist => <reply> $who, Embedded Python text processor. URL: http://pyrite.linuxbox.com/twist/twist.html
Twisted Reality => <reply> $who, A fully buzzword-compliant roleplaying system.. URL: http://www.twistedmatrix.com/
twonz => <reply> $who, secure hash calculator for password management. URL: http://www.pobox.com/~graydon/twonz/twonz.html
twz1jdbcForMysql => <reply> $who, A type 4 JDBC driver for MySQL. URL: http://www.voicenet.com/~zellert/tjFM/
txt2html => <reply> $who, Converts plain text to HTML. URL: http://www.thehouse.org/txt2html/
txt2pdf => <reply> $who, A very flexible and powerful PERL5 converter from text files to PDF. URL: http://www.sanface.com/
txt2pdf.cgi => <reply> $who, a very flexible PERL cgi-bin application based on the powerful txt2pdf script. URL: http://www.sanface.com/
Tya => <reply> $who, JIT-compiler. URL: ftp://gonzalez.cyberus.ca/pub/Linux/java/
Type decomposition library => <reply> $who, C++ library for discovering compile-time type information.. URL: http://lazy.ton.tut.fi/type_decomposition/index.html
typespeed => <reply> $who, Type speed testing program, gives your fingers' CPS. URL: http://www.sicom.fi/~bestis/typespeed.html
Typhoon RDBMS => <reply> $who, Relational database library.. URL: http://users.footprints.net/~kaz/typhoon.html
TZO Internet Naming System => <reply> $who, Dynamic DNS Software client. URL: http://www.tzo.com/
U.S. Street Map database => <reply> $who, Complete digital street map of the U.S.. URL: http://perens.com/FreeSoftware/
factpacks/Linux.fact view on Meta::CPAN
World Engine => <reply> $who, Java Search Engine Front End. URL: http://home.gelrevision.nl/~h.wolter/
World Foundry => <reply> $who, 3D level game engine and asset production pathway. URL: http://www.worldfoundry.org/
WorldEd => <reply> $who, 3D Modeller for KDE. URL: http://www.geocities.com/Pentagon/Quarters/2865
WorldForge => <reply> $who, Massively multiplayer online roleplaying game framework/system. URL: http://www.worldforge.org/
WORM => <reply> $who, ncurses based console game similar to nibbles. URL: http://www.localhost.nu/apps/worm/worm-0.3.tar.gz
Worm Zone => <reply> $who, Worm Zone is a multi-player worm game with Linux, win32 and DOS ports available.. URL: http://www.saunalahti.fi/~hydron/wormz.html
Wormz => <reply> $who, Multiplayer game, similar to 'worm'. URL: http://lide.punknet.cz/miri/wormz.html
WOTS => <reply> $who, Logfile monitoring program, generates action reports based on patterns. URL: http://www.vcpc.univie.ac.at/%7Etc/tools/
wpage => <reply> $who, Perl script to page PageMart pagers.. URL: http://209.164.99.100/will/page/
WPAM => <reply> $who, A simple set of routines to handle login/session managment for web applications.. URL: http://epsilon3.mcc.ac.uk/WPAM/
WPC => <reply> $who, web password security checker. URL: http://members.xoom.com/g1soft/
WPeople => <reply> $who, Contact Manager written in WINGs. URL: http://lemur.uvm.edu/~kelvin/WPeople/
WPM => <reply> $who, Web-based Proxy Manager. URL: http://www.chmd.edu.mx/~gwolf/wpm/
WPP => <reply> $who, Small perl5 script that allows preprocessing of HTML files. URL: http://www.geocities.com/Tokyo/1474/wpp/
WRMF => <reply> $who, WhiteBarn Reliable Multicast Framework. URL: http://www.whitebarn.com/links/software.html
WRMF-PGM => <reply> $who, Reliable Multicast Protocol framework and Cisco PGM implementation. URL: http://www.whitebarn.com/
Wroonian => <reply> $who, A script which will help you create and maintain knowledge, information and FAQs. URL: http://www.edlund.org/hacks/wroonian/index.html
wscr => <reply> $who, A program to solve word jumbles and permute strings.. URL: http://hood.sjfn.nb.ca/~eddie/wscr.html
wsmake => <reply> $who, Website make tool written in C++. URL: http://wsmake.org/
wsmap => <reply> $who, Fully configurable sitemap generator. URL: http://kyd.net/vaga/
WSoundPrefs => <reply> $who, WMSound Server Configuration Utility. URL: ftp://shadowmere.student.utwente.nl/pub/WindowMaker/
WSoundServer => <reply> $who, Sound Server for Window Maker. URL: http://shadowmere.student.utwente.nl/
wterm => <reply> $who, Bitching X11 terminal emulator. URL: http://wm.current.nu/files/wterm-6.2.6.tar.bz2
WTEST => <reply> $who, Web application testing tool. URL: http://www.interlog.com/~bibhas/
wu-ftpd => <reply> $who, FTP Daemon for UNIX systems. URL: http://www.wu-ftpd.org/
WU-IMAP/Linuxconf VDM => <reply> $who, WU-IMAP with support for Linuxconf Virtual Domain Mail. URL: http://phall.kdsoft.fi/~phall/vimap/
wui-mod_postgresql => <reply> $who, PostgreSQL administration module for HDE-WUI. URL: http://www.yamanasi.net/~kenji/
wv => <reply> $who, Microsoft Word 8 document viewer. URL: http://www.wvWare.com/
wvDecrypt => <reply> $who, microsoft word 97 password validator and *almost* decrypter. URL: http://www.csn.ul.ie/~caolan/docs/wvDecrypt.html
WvDial => <reply> $who, Intelligent Internet Dialer. URL: http://www.worldvisions.ca/wvdial/
WWIV/X => <reply> $who, WWIV Bulletin Board Software for Linux. URL: http://wwiv-x.2y.net/
WWR => <reply> $who, . URL: http://wwr.bln.de/
www-sql => <reply> $who, Displays information from MySQL or PostgreSQL databases in web pages. URL: http://www.daa.com.au/~james/www-sql/
WWW2Popup => <reply> $who, A simple web interface to send Winpopup Messages to groups or individuals.. URL: http://www.stsi.net/~bakins/files/www2popup.tar.gz
WWW::Poll => <reply> $who, Perl module for generating Polls.. URL: http://temple.stickydata.com/~mgammon/poll/
WWWatson => <reply> $who, Sherlock-compatible extensible metasearch engine. URL: http://www.molehill.org/~jtl/wwwatson/
WWWdb => <reply> $who, Database-access over HTTP with consistency-check. URL: http://linux.twc.de/WWWdb/
WWWOFFLE => <reply> $who, Simple proxy server with special features for use with dial-up internet links. URL: http://www.gedanken.demon.co.uk/wwwoffle/
WWWThreads => <reply> $who, WWW based discussion forums. URL: http://www.wwwthreads.org
factpacks/Linux.fact view on Meta::CPAN
ZENamp => <reply> $who, Embedded MP3 audio engine. URL: http://www.zenamp.net
Zfm => <reply> $who, A new, very extensive and portable filemanager. URL: http://zfm.xdev.org/
Zgv => <reply> $who, graphic file viewer for VGA and SVGA displays. URL: ftp://metalab.unc.edu/pub/Linux/apps/graphics/viewers/svga/
zh-sgmltools => <reply> $who, A wrapper for SGMLtools to process Chinese. URL: http://www.linux.org.tw/CLDP/zh-sgmltools.html
zICQ => <reply> $who, A console ICQ clone based on mICQ.. URL: http://www.asenteck.com/~zicq/
Zigzag => <reply> $who, A unique hyperstructure kit for Linux. URL: http://www.xanadu.net/zigzag/
ZIM => <reply> $who, A perl/tk instant-messenger client wrapper for the Zephyr Notification Service. URL: http://www.duke.edu/~gac3/zim.html
zimg => <reply> $who, zimg - Display 2-D data of arbitrary format. URL: http://krisal.physik.uni-karlsruhe.de/zimg/
zip => <reply> $who, Creates PKZIP(tm)-compatible .zip files. URL: ftp://ftp.cdrom.com/pub/infozip/Info-ZIP.html
zip08x => <reply> $who, library to extract stored/deflated files in a zip archive. URL: http://www.iki.fi/too/sw/zip08x.readme
ZipCracker => <reply> $who, Cracks password protected zip archives with brute force(TM). URL: http://home1.2.sbbs.se/jonas.borgstrom/zipcracker/
Zipper! => <reply> $who, Linux X/TCL/Tk based IRC client. URL: http://mandw.dyndns.org:24080/zipper/
ziptool => <reply> $who, ziptool/jaztool with added functionality. URL: http://www.novia.net/~segura/ziptool/
Zircon => <reply> $who, An IRC client written in tcl/tk. URL: http://catless.ncl.ac.uk/Programs/Zircon/
zJSP => <reply> $who, JavaServer Pages translator which produces Java servlets.. URL: http://www.zachary.com/creemer/zjsp.html
pmidi => <reply> $who, pmidi is a straightforward command line program to play Midi files through the ALSA sequencer.. URL: http://www.parabola.demon.co.uk/alsa/pmidi-1.2.4.tar.gz
CSpotRun => <reply> $who, CSpotRun is a reader for documents in the Pilot DOC format. URL:
Exegetical Fish Monkey => <reply> $who, You can connect to the Exegetical Fish Monkey over TCP/IP and ask it if words are in the dictionary.. URL: http://uts.cc.utexas.edu/~blanu/efm/efm.tar.gz
PHP Color Scheme Demonstration => <reply> $who, The PHP Color Scheme Demonstration is a set of files that gives a petty fair demonstration of how to implement a simple color scheme system in PHP.. URL: http://2bit.dhs.org/files/php-colorschemes-0.0.0...
Gnapster => <reply> $who, Gnapster is a simple client to the napster online MP3 community. URL: http://www.gotlinux.org/~jasta/gnapster.html
xzgv => <reply> $who, xzgv is a GTK+/Imlib-based picture viewer for X, which supports most popular image formats. URL: ftp://metalab.unc.edu/pub/Linux/apps/graphics/viewers/X/
factpacks/Linux.fact view on Meta::CPAN
GameTrakker => <reply> $who, GameTrakker is a Perl application which allows communication to flow between QStat and MRTG for displaying game server status on a Web server. URL: ftp://games.gci.net/pub/Utils/GameTrakker/
gProjectGenerator => <reply> $who, GPrjGen is a tool to generate GNOME source trees.. URL: http://www.linuxstart.com/~linuxsite/gPrjGen-0.1.1.tar.gz
StatistX => <reply> $who, StatistX wraps the small statistics program 'statist' into a graphical user interface. URL: http://www.usf.uni-osnabrueck.de/~abeyer/private/StatistX/download/
iPlanet Web Server, Enterprise Edition => <reply> $who, The iPlanet Web Server, Enterprise Edition is a multi-process, multi-threaded HTTP1.1 compliant web server that delivers a high-performance Java application platform with support for Java Servle...
MeterMaid => <reply> $who, MeterMaid is a troubleticket system written in Perl which uses an SQL database for a backend. URL: http://world.std.com/~durist/perl/metermaid/MeterMaid-1.0.tar.gz
GTS => <reply> $who, The GNU Triangulated Surface Library (GTS) provides a set of useful functions to deal with 3D surfaces meshed with interconnected triangles. URL: ftp://marangoni.lmm.jussieu.fr/pub/gts/
wml-tools => <reply> $who, wml-tools is small suite of tools related to WAP WML development. URL:
loadlib => <reply> $who, loadlib.c is a program to load shared libraries via dlopen() and hold them in memory until the user types 'q' and hits enter. URL: http://ns2.cnsnet.net/~spirilis/loadlib.c
teapop => <reply> $who, Teapop is another RFC1939 compliant POP3-server, however Teapop takes a step further. URL: http://www.val-axs.net/~ibo/teapop/teapop-latest.tar.gz
mailshift => <reply> $who, mailshift is a utility that reads a user's UNIX mailbox and writes the messages in a form readable by Infradig's Inframail Windows POP3 (and other protocols) server. URL: http://www.tranchant.freeserve.co.uk/software/mailsh...
BRINK => <reply> $who, Bad Risky Insanely Noodleriffic Kludge (BRINK) is a perl cgi that lets users change their current password via a web page. URL: http://brink.linuxguru.net/brink-1.2.tar.gz
Performance Co-Pilot => <reply> $who, Performance Co-Pilot (PCP) is a framework and set of services for supporting system-level performance monitoring and performance management. URL: http://oss.sgi.com/projects/pcp/download/
timofometro => <reply> $who, timofometro can help you know your telephone expenses in your connections to the Internet. URL: http://members.xoom.com/rvmsoft/download/timos/timofometro_0.14.tar.gz
MPAC => <reply> $who, MPAC (Microstrip Patch Antenna Calculator) was designed out of a need for a low cost, fast, and easy to use program to calculate critical design parameters of a rectangular microstrip patch antenna. URL: http://antenna.linuxbox....
tiny cobol => <reply> $who, Tiny Cobol is an effort to bring a free cobol compiler to Linux. URL: http://tiny-cobol.sourceforge.net/snapshots/
upgrade => <reply> $who, upgrade updates the HP49's ROM. URL: http://www.hpcalc.org/hp49/pc/rom/hp49fl02.tgz
gCatalog => <reply> $who, gCatalog is an inventory program to keep track of just about anything. URL: http://gCatalog.sourceforge.net/downloads/
QPOV => <reply> $who, QPOV is a simple Qt-based front-end to the Persistence of Vision Ray-Tracer (POV). URL: http://members.home.net/krobillard/qpov/qpov-0.1.0.tar.gz
CoreLinux++ => <reply> $who, CoreLinux++ is an initiative to normalize methods and conventions for OOA/OOD/C++ development for Linux, materialized in a set of Open Source C++ class libraries (libcorelinux++ and libcoreframework++) to support common p...
Zen => <reply> $who, Zen is a Web browser for the Linux framebuffer, although a modular design allows different user interfaces. URL: ftp://ftp.nocrew.org/pub/nocrew/linux/zen-0.0.1.tar.gz
wmSu => <reply> $who, wmSu is an su-like program that runs some other executable with different user and group IDs, and uses WINGs for its UI.. URL: http://student.dei.uc.pt/~mtavares/wmSu/wmSu-latest.tgz
factpacks/Linux.fact view on Meta::CPAN
anpa => <reply> $who, A newswire digester. URL: http://www.lns.com/papers/anpa/
Bluer Skies MP3 Lister => <reply> $who, This set of scripts indexes your collection of Mp3 CDs, and formats the index into a nice and organized HTML file. URL: http://chron-ack.sparechange.com/programs/mp3list-0.99a.tar.gz
psyBNC => <reply> $who, psyBNC is an easy-to-use, multi-user, permanent IRC-Bouncer with many features. URL: http://www.psychoid.lam3rz.de/psybnc.html
lame-rtp => <reply> $who, lame-rtp is a small patch to lame which will make it output the mp3 stream not only as file but also as an RTP multicast stream. URL: http://www.fefe.de/rtp/lame-3.58-rtp.diff
waterfall spectrum analyzer => <reply> $who, Waterfall is a visualization plugin for XMMS. URL: http://www.aigeek.com/geek/audio/latest.cgi
SoLinger Java Sdbm => <reply> $who, Java Sdbm is a Java port of Sdbm, the default disk hash that is distributed with Perl. URL: https://sourceforge.net/download.php?fileid=931
Tcl-To-Go => <reply> $who, TCL-to-go is an add-on floppy for muLinux to add a healthy mix of application programs written in TCL/Tk. URL: http://home.worldnet.att.net/~tpoindex/
tprint => <reply> $who, tprint is a configuration utility for Canon BJC printers. URL: http://www.crosswinds.net/~trazor/tprint/tprint-0.1.tar.gz
MailNow => <reply> $who, MailNow provides Web-based email for unlimited addresses on multiple domains using a single catchall POP account per domain.. URL:
Solinger Java Sdbm => <reply> $who, Java Sdbm is a Java port of Sdbm, the default disk hash that is distributed with Perl. URL: https://sourceforge.net/project/?form_grp=357
SoLinger Java CrackLib => <reply> $who, Solinger Java Cracklib is the initial Java port of the CrackLib password checker library. URL: http://www.sourceforge.net/project/?form_grp=357
Java Napster => <reply> $who, JNapster is a Java implementation of the Napster client which allows you to download and share MP3s over the Internet. URL: http://www.tux.org/~daneel/content/projects/10.shtml
Site Studio => <reply> $who, Site Studio is an online template-based Web site creation tool. URL:
RSync Manager => <reply> $who, RSync Manager (RSM) is a set of Python scripts to add and update packages for rsync-based mirror sites, and also create some nice HTML statistics from the logs. URL: http://www.softlab.ece.ntua.gr/~ckotso/RSM/RSM-0.2.0....
lispreader => <reply> $who, lispreader is a small library for reading expressions in Lisp syntax. URL: http://www.complang.tuwien.ac.at/~schani/lispreader/lispreader-0.1.tar.gz
KIrcPoker => <reply> $who, KIrcPoker is a graphical interface client to the on-line poker games that are played on the popular IRC (Internet Relay Chat) server at irc.poker.net.. URL: http://www.geocities.com/~engstad/kircpoker/kircpoker-0.3.tar.gz
Euro Converter => <reply> $who, Euro Converter is a little calculator which automagically converts Euro amounts into other equivalent currency values. URL: http://www.jedi.claranet.fr/euroconvert.tar.gz
PHP File Upload Class => <reply> $who, fileupload.class extends PHP's native support for uploading image and text files through a Web browser. URL: http://dave.imarc.net/downloads/fileupload.tar.gz
ixj => <reply> $who, Device drivers for Quicknet's Internet LineJACK and Internet PhoneJACK telephony/VoIP cards.. URL: http://www.quicknet.net/develop.htm
RDX => <reply> $who, RDX (Reverse Distributed Cron-like System) is a set of clients to connect to a server, and identify themselves via a string, and get a job list with schedules. URL: http://www.nobis.com/~ora/CS.tar.gz
dnscvsutil => <reply> $who, dnscvsutil maintains your DNS zone files under CVS control, and automatically updates reverse zones.. URL: http://hq.yok.utu.fi/download/
factpacks/MacErrorCodes.fact view on Meta::CPAN
Mac Error -912 => ( userRejectErr ) Destination rejected the session request **AppleTalk Ñ PPC Toolbox Errors**
Mac Error -915 => ( noResponseErr ) Unable to contact application **AppleTalk Ñ PPC Toolbox Errors**
Mac Error -916 => ( portClosedErr ) The port was closed **AppleTalk Ñ PPC Toolbox Errors**
Mac Error -917 => ( sessClosedErr ) The session has closed **AppleTalk Ñ PPC Toolbox Errors**
Mac Error -919 => ( badPortNameErr ) PPC port record is invalid **AppleTalk Ñ PPC Toolbox Errors**
Mac Error -922 => ( noDefaultUserErr ) User has not specified owner name in Sharing Setup control panel **AppleTalk Ñ PPC Toolbox Errors**
Mac Error -923 => ( notLoggedInErr ) Default user reference number does not yet exist **AppleTalk Ñ PPC Toolbox Errors**
Mac Error -924 => ( noUserRefErr ) Unable to create a new user reference number **AppleTalk Ñ PPC Toolbox Errors**
Mac Error -925 => ( networkErr ) An error has occurred in the network **AppleTalk Ñ PPC Toolbox Errors**
Mac Error -926 => ( noInformErr ) PPCStart failed because target application did not have an inform pending **AppleTalk Ñ PPC Toolbox Errors**
Mac Error -927 => ( authFailErr ) User's password is wrong **AppleTalk Ñ PPC Toolbox Errors**
Mac Error -928 => ( noUserRecErr ) Invalid user reference number **AppleTalk Ñ PPC Toolbox Errors**
Mac Error -930 => ( badServiceMethodErr ) Service method is other than ppcServiceRealTime **AppleTalk Ñ PPC Toolbox Errors**
Mac Error -931 => ( badLocNameErr ) Location name is invalid **AppleTalk Ñ PPC Toolbox Errors**
Mac Error -932 => ( guestNotAllowedErr ) Destination port requires authentication **AppleTalk Ñ PPC Toolbox Errors**
Mac Error -1024 => ( nbpBuffOvr ) Buffer overflow in LookupName **AppleTalk - NBP Errors**
Mac Error -1025 => ( nbpNoConfirm ) Name not confirmed on ConfirmName **AppleTalk - NBP Errors**
Mac Error -1026 => ( nbpConfDiff ) Name confirmed at different socket **AppleTalk - NBP Errors**
Mac Error -1027 => ( nbpDuplicate ) Duplicate name exists already **AppleTalk - NBP Errors**
Mac Error -1028 => ( nbpNotFound ) Name not found on remove **AppleTalk - NBP Errors**
Mac Error -1029 => ( nbpNISErr ) Error trying to open the NIS **AppleTalk - NBP Errors**
factpacks/jargon-split.fact view on Meta::CPAN
autobogotiphobia is /aw'to-boh-got`*-foh'bee-*/ n. See {bogotify}.
automagically is /aw-toh-maj'i-klee/ or /aw-toh-maj'i-k*l-ee/ adv. Automatically, but in a way that, for some reason (typically because it is too complicated, or too ugly, or perhaps even too trivial), the speaker doesn't feel like explaining ...
automagically2 is compiler generates C, then automagically invokes `cc(1)' to produce an executable."
avatar is [CMU, Tektronix] n. Syn. {root}, {superuser}. There are quite a few UNIX machines on which the name of the superuser account is `avatar' rather than `root'. This quirk was originated by a CMU hacker who disliked the term `superuser...
avatar2 is hacker at Tektronix.
awk is 1. n. [UNIX techspeak] An interpreted language for massaging text data developed by Alfred Aho, Peter Weinberger, and Brian Kernighan (the name is from their initials). It is characterized by C-like syntax, a declaration-free approach ...
awk2 is associative arrays, and field-oriented text processing. See also {Perl}. 2. n. Editing term for an expression awkward to manipulate through normal {regexp} facilities (for example, one containing a {newline}). 3. vt. To process d...
awk3 is security of a system deliberately left in place by designers or maintainers. The motivation for this is not always sinister; some operating systems, for example, come out of the box with privileged accounts intended for use by field ...
awk4 is maintenance programmers. Historically, back doors have often lurked in systems longer than anyone expected or planned, and a few have become widely known. The infamous {RTM} worm of late 1988, for example, used a back door in the {BS...
awk5 is 1983 Turing Award lecture to the ACM revealed the existence of a back door in early UNIX versions that may have qualified as the most fiendishly clever security hack of all time. The C compiler contained code that would recognize when ...
awk6 is insert some code recognizing a password chosen by Thompson, giving him entry to the system whether or not an account had been created for him. Normally such a back door could be removed by removing it from the source code for the com...
awk7 is recompile the compiler, you have to *use* the compiler --- so Thompson also arranged that the compiler would *recognize when it was compiling a version of itself*, and insert into the recompiled compiler the code to insert into the rec...
awk8 is entry --- and, of course, the code to recognize itself and do the whole thing again the next time around! And having done this once, he was then able to recompile the compiler from the original sources, leaving his back door in place ...
awk9 is The talk that revealed this truly moby hack was published as "Reflections on Trusting Trust", `Communications of the ACM 27', 8 (August 1984), pp. 761--763. Syn. {trap door}; may also be called a `wormhole'. See also {iron box}, {cr...
backbone cabal is n. A group of large-site administrators who pushed through the {Great Renaming} and reined in the chaos of {USENET} during most of the 1980s. The cabal {mailing list} disbanded in late 1988 after a bitter internal catfight, ...
backbone site is n. A key USENET and email site; one that processes a large amount of third-party traffic, especially if it is the home site of any of the regional coordinators for the USENET maps. Notable backbone sites as of early 1991 inclu...
backbone site2 is University, UC Berkeley, DEC's Western Research Laboratories, Ohio State University, and the University of Texas. Compare {rib site}, {leaf site}.
backgammon is See {bignum}, {moby}, and {pseudoprime}.
background is n.,adj.,vt. To do a task `in background' is to do it whenever {foreground} matters are not claiming your undivided attention, and `to background' something means to relegate it to a lower priority. "For now, we'll just print a ...
background2 is graph-printing problem in background." Note that this implies ongoing activity but at a reduced level or in spare time, in contrast to mainstream `back burner' (which connotes benign neglect until some future resumption of activ...
background3 is processing that they have queued up for their unconscious minds (a tack that one can often fruitfully take upon encountering an obstacle in creative work). Compare {amp off}, {slopsucker}. Technically, a task running in backgr...
factpacks/jargon-split.fact view on Meta::CPAN
connector conspiracy is [probably came into prominence with the appearance of the KL-10 (one model of the {PDP-10}), none of whose connectors matched anything else] n. The tendency of manufacturers (or, by extension, programmers or purveyors o...
connector conspiracy2 is that don't fit together with the old stuff, thereby making you buy either all new stuff or expensive interface devices. The KL-10 Massbus connector was actually *patented* by DEC, which reputedly refused to license ...
connector conspiracy3 is parties out of competition for the lucrative Massbus peripherals market. This is a source of never-ending frustration for the diehards who maintain older PDP-10 or VAX systems. Their CPUs work fine, but they are st...
connector conspiracy4 is drives with low capacity and high power requirements. In these latter days of open-systems computing this term has fallen somewhat into disuse, to be replaced by the observation that "Standards are great! There are ...
cons is /konz/ or /kons/ [from LISP] 1. vt. To add a new element to a specified list, esp. at the top. "OK, cons picking a replacement for the console TTY onto the agenda." 2. `cons up' vt. To synthesize from smaller pieces "to cons up an ex...
cons2 is fundamental operation for building structures. It takes any two objects and returns a `dot-pair' or two-branched tree with one object hanging from each branch. Because the result of a cons is an object, it can be used to build bin...
cons3 is think of it as a sort of universal constructor, and that is where the jargon meanings spring from.
considered harmful is adj. Edsger W. Dijkstra's note in the March 1968 `Communications of the ACM', "Goto Statement Considered Harmful", fired the first salvo in the structured programming wars. Amusingly, the ACM considered the resulting a...
considered harmful2 is policy) no longer print an article taking so assertive a position against a coding practice. In the ensuing decades, a large number of both serious papers and parodies have borne titles of the form "X considered Y". ...
considered harmful3 is over with the realization that both sides were wrong, but use of such titles has remained as a persistent minor in-joke (the `considered silly' found at various places in this lexicon is related).
console is n. 1. The operator's station of a {mainframe}. In times past, this was a privileged location that conveyed godlike powers to anyone with fingers on its keys. Under UNIX and other modern timesharing OSes, such privileges are guarde...
console2 is just the {tty} the system was booted from. Some of the mystique remains, however, and it is traditional for sysadmins to post urgent messages to all users from the console (on UNIX, /dev/console). 2. On microcomputer UNIX boxes, ...
console3 is character-only terminals talking to a serial port). Typically only the console can do real graphics or run {X}. See also {CTY}.
console jockey is n. See {terminal junkie}.
content-free is [by analogy with techspeak `context-free'] adj. Used of a message that adds nothing to the recipient's knowledge. Though this adjective is sometimes applied to {flamage}, it more usually connotes derision for communication styl...
content-free2 is centered on concerns irrelevant to the subject ostensibly at hand. Perhaps most used with reference to speeches by company presidents and other professional manipulators. "Content-free? Uh...that's anything printed on glossy...
content-free3 is "He gave a talk on the implications of electronic networks for postmodernism and the fin-de-siecle aesthetic. It was content-free."
control-C is vi. 1. "Stop whatever you are doing." From the interrupt character used on many operating systems to abort a running program. Considered silly. 2. interj. Among BSD UNIX hackers, the canonical humorous response to "Give me a br...
control-O is vi. "Stop talking." From the character used on some operating systems to abort output but allow the program to keep on running. Generally means that you are not interested in hearing anything more from that person, at least on t...
control-O2 is who is flaming. Considered silly.
control-Q is vi. "Resume." From the ASCII XON character used to undo a previous control-S (in fact it is also pronounced XON /X-on/).
factpacks/jargon-split.fact view on Meta::CPAN
hack value2 is See {display hack} for one method of computing hack value, but this cannot really be explained. As a great artist once said of jazz "If you hafta ask, you ain't never goin' to find out."
hack-and-slay is v. (also `hack-and-slash') 1. To play a {MUD} or go mudding, especially with the intention of {berserking} for pleasure. 2. To undertake an all-night programming/hacking session, interspersed with stints of mudding as a chang...
hack-and-slay2 is academic network amongst students who worked nights and logged onto Essex University's MUDs during public-access hours (2 A.M. to 7 A.M.). Usually more mudding than work was done in these sessions.
hacked off is [analogous to `pissed off'] adj. Said of system administrators who have become annoyed, upset, or touchy owing to suspicions that their sites have been or are going to be victimized by crackers, or used for inappropriate, technic...
hacked off2 is activities. For example, having unreadable files in your home directory called `worm', `lockpick', or `goroot' would probably be an effective (as well as impressively obvious and stupid) way to get your sysadmin hacked off at y...
hacked up is adj. Sufficiently patched, kluged, and tweaked that the surgical scars are beginning to crowd out normal tissue (compare {critical mass}). Not all programs that are hacked become `hacked up'; if modifications are done with some e...
hacked up2 is maintainability, the software may emerge better for the experience. Contrast {hack up}.
hacker is [originally, someone who makes furniture with an axe] n. 1. A person who enjoys exploring the details of programmable systems and how to stretch their capabilities, as opposed to most users, who prefer to learn only the minimum neces...
hacker2 is (even obsessively) or who enjoys programming rather than just theorizing about programming. 3. A person capable of appreciating {hack value}. 4. A person who is good at programming quickly. 5. An expert at a particular program, ...
hacker3 is it; as in `a UNIX hacker'. (Definitions 1 through 5 are correlated, and people who fit them congregate.) 6. An expert or enthusiast of any kind. One might be an astronomy hacker, for example. 7. One who enjoys the intellectual...
hacker4 is circumventing limitations. 8. [deprecated] A malicious meddler who tries to discover sensitive information by poking around. Hence `password hacker', `network hacker'. See {cracker}. It is better to be described as a hacker by ...
hacker5 is Hackers consider themselves something of an elite (a meritocracy based on ability), though one to which new members are gladly welcome. There is thus a certain ego satisfaction to be had in identifying yourself as a hacker (but if ...
hacker6 is quickly be labeled {bogus}).
hacking run is [analogy with `bombing run' or `speed run'] n. A hack session extended long outside normal working times, especially one longer than 12 hours. May cause you to `change phase the hard way' (see {phase}).
Hacking X for Y is [ITS] n. The information ITS made publicly available about each user (the INQUIR record) was a sort of form in which the user could fill out fields. On display, two of these fields were combined into a project description o...
Hacking X for Y2 is `"Hacking perceptrons for Minsky"'). This form of description became traditional and has since been carried over to other systems with more general facilities for self-advertisement (such as UNIX {plan file}s).
Hackintosh is n. 1. An Apple Lisa that has been hacked into emulating a Macintosh (also called a `Mac XL'). 2. A Macintosh assembled from parts theoretically belonging to different models in the line.
hackish is /hak'ish/ adj. (also {hackishness} n.) 1. Said of something that is or involves a hack. 2. Of or pertaining to hackers or the hacker subculture. See also {true-hacker}.
hackishness is n. The quality of being or involving a hack. This term is considered mildly silly. Syn. {hackitude}.
hackitude is n. Syn. {hackishness}; this word is considered sillier.
hair is [back-formation from {hairy}] n. The complications that make something hairy. "Decoding {TECO} commands requires a certain amount of hair." Often seen in the phrase `infinite hair', which connotes extreme complexity. Also in `hairif...
factpacks/jargon-split.fact view on Meta::CPAN
IBM discount is n. A price increase. Outside IBM, this derives from the common perception that IBM products are generally overpriced (see {clone}); inside, it is said to spring from a belief that large numbers of IBM employees living in an ar...
ice is [coined by USENETter Tom Maddox, popularized by William Gibson's cyberpunk SF novels acronym for `Intrusion Countermeasure Electronics'] Security software (in Gibson's novels, software that responds to intrusion by attempting to literal...
ice2 is program designed for cracking security on a system. Neither term is in serious use yet as of mid-1991, but many hackers find the metaphor attractive, and each may develop a denotation in the future.
ifdef out is /if'def owt/ v. Syn. for {condition out}, specific to {C}.
ill-behaved is adj. 1. [numerical analysis] Said of an algorithm or computational method that tends to blow up because of accumulated roundoff error or poor convergence properties. 2. Software that bypasses the defined {OS} interfaces to do t...
ill-behaved2 is itself, often in a way that depends on the hardware of the machine it is running on or which is nonportable or incompatible with other pieces of software. In the IBM PC/MS-DOS world, there is a folk theorem (nearly true) to th...
ill-behaved3 is and performance penalties in the OS interface) all interesting applications are ill-behaved. See also {bare metal}. Oppose {well-behaved}, compare {PC-ism}. See {mess-dos}.
IMHO is // [from SF fandom via USENET; acronym for `In My Humble Opinion'] "IMHO, mixed-case C names should be avoided, as mistyping something in the wrong case can cause hard-to-detect errors --- and they look too Pascalish anyhow." Also se...
IMHO2 is Not-So-Humble Opinion) and IMAO (In My Arrogant Opinion).
in the extreme is adj. A preferred superlative suffix for many hackish terms. See, for example, `obscure in the extreme' under {obscure}, and compare {highly}.
incantation is n. Any particularly arbitrary or obscure command that one must mutter at a system to attain a desired result. Not used of passwords or other explicit security features. Especially used of tricks that are so poorly documented t...
incantation2 is compiler normally locates initialized data in the data segment, but if you {mutter} the right incantation they will be forced into text space."
include is vt. [USENET] 1. To duplicate a portion (or whole) of another's message (typically with attribution to the source) in a reply or followup, for clarifying the context of one's response. See the the discussion of inclusion styles under...
include2 is `#include <disclaimer.h>' has appeared in {sig block}s to refer to a notional `standard disclaimer file'.
include war is n. Excessive multi-leveled including within a discussion {thread}, a practice that tends to annoy readers. In a forum with high-traffic newsgroups, such as USENET, this can lead to {flame}s and the urge to start a {kill file}.
indent style is [C programmers] n. The rules one uses to indent code in a readable fashion; a subject of {holy wars}. There are four major C indent styles, described below; all have the aim of making it easier for the reader to visually track...
indent style2 is significant variable is the placement of `{' and `}' with respect to the statement(s) they enclose and the guard or controlling statement (`if', `else', `for', `while', or `do') on the block, if any. `K&R style' --- Named ...
indent style3 is examples in {K&R} are formatted this way. Also called `kernel style' because the UNIX kernel is written in it, and the `One True Brace Style' (abbrev. 1TBS) by its partisans. The basic indent shown here is eight spaces (or o...
indent style4 is seen, but are much less common. if (cond) { <body> } `Allman style' --- Named for Eric Allman, a Berkeley hacker who wrote a lot of the BSD utilities in it (it is sometimes called `BSD style'). Resembles n...
indent style5 is indent per level shown here is eight spaces, but four is just as common (esp. in C++ code). if (cond) { <body> } `Whitesmiths style' --- popularized by the examples that came with Whitesmiths C, an earl...
indent style6 is level shown here is eight spaces, but four is occasionally seen. if (cond) { <body> } `GNU style' --- Used throughout GNU EMACS and the Free Software Foundation code, and just about nowher...
factpacks/jargon-split.fact view on Meta::CPAN
mu is /moo/ The correct answer to the classic trick question "Have you stopped beating your wife yet?". Assuming that you have no wife or you have never beaten your wife, the answer "yes" is wrong because it implies that you used to beat your...
mu2 is because it suggests that you have one and are still beating her. According to various Discordians and Douglas Hofstadter (see the Bibliography), the correct answer is usually "mu", a Japanese word alleged to mean "Your question canno...
mu3 is assumptions". Hackers tend to be sensitive to logical inadequacies in language, and many have adopted this suggestion with enthusiasm. The word `mu' is actually from Chinese, meaning `nothing'; it is used in mainstream Japanese in tha...
mu4 is the Discordian question-denying use. It almost certainly derives from overgeneralization of the answer in the following well-known Rinzei Zen teaching riddle: A monk asked Joshu, "Does a dog have the Buddha nature?" Joshu retorte...
mu5 is Koans}, and Douglas Hofstadter's `G"odel, Escher, Bach' (pointer in the Bibliography).
mudhead is n. Commonly used to refer to a {MUD} player who sleeps, breathes, and eats MUD. Mudheads have been known to fail their degrees, drop out, etc., with the consolation, however, that they made wizard level. When encountered in person...
mudhead2 is topics: the tactic, character, or wizard that is supposedly always unfairly stopping him/her from becoming a wizard or beating a favorite MUD, and the MUD he or she is writing or going to write because all existing MUDs are so drea...
multician is /muhl-ti'shn/ [coined at Honeywell, ca. 1970] n. Competent user of {{Multics}}. Perhaps oddly, no one has ever promoted the analogous `Unician'.
Multics is /muhl'tiks/ n. [from "MULTiplexed Information and Computing Service"] An early (late 1960s) timesharing operating system co-designed by a consortium including MIT, GE, and Bell Laboratories. Very innovative for its time --- among o...
Multics2 is treating all devices uniformly as special files. All the members but GE eventually pulled out after determining that {second-system effect} had bloated Multics to the point of practical unusability (the `lean' predecessor in que...
Multics3 is Multics after buying out GE's computer group, but it was never very successful (among other things, on some versions one was commonly required to enter a password to log out). One of the developers left in the lurch by the proje...
Multics4 is which led directly to the birth of {{UNIX}}. For this and other reasons, aspects of the Multics design remain a topic of occasional debate among hackers. See also {brain-damaged} and {GCOS}.
multitask is n. Often used of humans in the same meaning it has for computers, to describe a person doing several things at once (but see {thrash}). The term `multiplex', from communications technology (meaning to handle more than one channel...
mumblage is /muhm'bl*j/ n. The topic of one's mumbling (see {mumble}). "All that mumblage" is used like "all that stuff" when it is not quite clear how the subject of discussion works, or like "all that crap" when `mumble' is being used as an ...
mumble is interj. 1. Said when the correct response is too complicated to enunciate, or the speaker has not thought it out. Often prefaces a longer answer, or indicates a general reluctance to get into a long discussion. "Don't you think that...
mumble2 is a hybrid reference-count transaction garbage collector, if the cache is big enough and there are some extra cache bits for the microcode to use?" "Well, mumble ... I'll have to think about it." 2. Sometimes used as an expression...
mumble3 is {VAX}." "Mumble!" Common variant: `mumble frotz' (see {frotz}; interestingly, one does not say `mumble frobnitz' even though `frotz' is short for `frobnitz'). 3. Yet another metasyntactic variable, like {foo}. 4. When used as a ...
mumble4 is understand you". 5. Sometimes used in `public' contexts on-line as a placefiller for things one is barred from giving details about. For example, a poster with pre-released hardware in his machine might say "Yup, my machine now ...
mumble5 is I'm testing for Mumbleco."
munch is [often confused with {mung}, q.v.] vt. To transform information in a serial fashion, often requiring large amounts of computation. To trace down a data structure. Related to {crunch} and nearly synonymous with {grovel}, but connotes...
munching is n. Exploration of security holes of someone else's computer for thrills, notoriety, or to annoy the system manager. Compare {cracker}. See also {hacked off}.
factpacks/jargon-split.fact view on Meta::CPAN
wish list is n. A list of desired features or bug fixes that probably won't get done for a long time, usually because the person responsible for the code is too busy or can't think of a clean way to do it. "OK, I'll add automatic filename com...
wish list2 is interface." Compare {tick-list features}.
within delta of is adj. See {delta}.
within epsilon of is adj. See {epsilon}.
wizard is n. 1. A person who knows how a complex piece of software or hardware works (that is, who {grok}s it); esp. someone who can find and fix bugs quickly in an emergency. Someone is a {hacker} if he or she has general hacking ability, bu...
wizard2 is if he or she has specific detailed knowledge of that thing. A good hacker could become a wizard for something given the time to study it. 2. A person who is permitted to do things forbidden to ordinary people; one who has {wheel} ...
wizard3 is esp. a UNIX systems programmer. This usage is well enough established that `UNIX Wizard' is a recognized job title at some corporations and to most headhunters. See {guru}, {lord high fixer}. See also {deep magic}, {heavy wizar...
wizard4 is dance}, {voodoo programming}, {wave a dead chicken}.
Wizard Book is n. Hal Abelson and Jerry Sussman's `Structure and Interpretation of Computer Programs' (MIT Press, 1984; ISBN 0-262-01077-1, an excellent computer science text used in introductory courses at MIT. So called because of the wizar...
Wizard Book2 is LISP/Scheme world.
wizard mode is [from {rogue}] n. A special access mode of a program or system, usually passworded, that permits some users godlike privileges. Generally not used for operating systems themselves (`root mode' or `wheel mode' would be used inst...
wizardly is adj. Pertaining to wizards. A wizardly {feature} is one that only a wizard could understand or use properly.
womb box is n. 1. [TMRC] Storage space for equipment. 2. [proposed] A variety of hard-shell equipment case with heavy interior padding and/or shaped carrier cutouts in a foam-rubber matrix; mundanely called a `flight case'. Used for delicate...
WOMBAT is [Waste Of Money, Brains, And Time] adj. Applied to problems which are both profoundly {uninteresting} in themselves and unlikely to benefit anyone interesting even if solved. Often used in fanciful constructions such as `wrestling w...
WOMBAT2 is {SMOP}. Also note the rather different usage as a meta-syntactic variable in {{Commonwealth Hackish}}.
wonky is /wong'kee/ [from Australian slang] adj. Yet another approximate synonym for {broken}. Specifically connotes a malfunction that produces behavior seen as crazy, humorous, or amusingly perverse. "That was the day the printer's font lo...
wonky2 is out in Tengwar." Also in `wonked out'. See {funky}, {demented}, {bozotic}.
workaround is n. A temporary {kluge} inserted in a system under development or test in order to avoid the effects of a {bug} or {misfeature} so that work can continue. Theoretically, workarounds are always replaced by {fix}es; in practice, ...
workaround2 is workarounds in the first couple of releases. "The code died on NUL characters in the input, so I fixed it to interpret them as spaces." "That's not a fix, that's a workaround!"
working as designed is [IBM] adj. 1. In conformance to a wrong or inappropriate specification; useful, but misdesigned. 2. Frequently used as a sardonic comment on a program's utility. 3. Unfortunately also used as a bogus reason for not accep...
working as designed2 is this sense is used in official documents! See {BAD}.
factpacks/jargon.fact view on Meta::CPAN
arg => /arg/ n. Abbreviation for `argument' (to a function), used so often as to have become a new word (like `piano' from `pianoforte'). "The sine function takes 1 arg, but the arc-tangent function can take either 1 or 2 args." Compare param, parm, ...
armor-plated => n. Syn. for bulletproof.
asbestos => adj. Used as a modifier to anything intended to protect one from flames. Important cases of this include {asbestos longjohns} and {asbestos cork award}, but it is used more generally.
asbestos cork award => n. Once, long ago at MIT, there was a flamer so consistently obnoxious that another hacker designed, had made, and distributed posters announcing that said flamer had been nominated for the `asbestos cork award'. Persons in any...
asbestos cork award2 => application of the cork should consult the etymology under flame. Since then, it is agreed that only a select few have risen to the heights of bombast required to earn this dubious dignity --- but there is no agreement on *whi...
asbestos longjohns => n. Notional garments often donned by USENET posters just before emitting a remark they expect will elicit flamage. This is the most common of the asbestos coinages. Also `asbestos underwear', `asbestos overcoat', etc.
attoparsec => n. `atto-' is the standard SI prefix for multiplication by 10^-18. A parsec (parallax-second) is 3.26 light-years; an attoparsec is thus 3.26 * 10^-18 light years, or about 3.1 cm (thus, 1 attoparsec/microfortnight equals about 1 inch/s...
autobogotiphobia => /aw'to-boh-got`*-foh'bee-*/ n. See bogotify.
automagically => /aw-toh-maj'i-klee/ or /aw-toh-maj'i-k*l-ee/ adv. Automatically, but in a way that, for some reason (typically because it is too complicated, or too ugly, or perhaps even too trivial), the speaker doesn't feel like explaining to you....
avatar => [CMU, Tektronix] n. Syn. root, superuser. There are quite a few UNIX machines on which the name of the superuser account is `avatar' rather than `root'. This quirk was originated by a CMU hacker who disliked the term `superuser', and was pr...
awk => 1. n. [UNIX techspeak] An interpreted language for massaging text data developed by Alfred Aho, Peter Weinberger, and Brian Kernighan (the name is from their initials). It is characterized by C-like syntax, a declaration-free approach to varia...
backbone cabal => n. A group of large-site administrators who pushed through the {Great Renaming} and reined in the chaos of USENET during most of the 1980s. The cabal {mailing list} disbanded in late 1988 after a bitter internal catfight, but the ne...
backbone site => n. A key USENET and email site; one that processes a large amount of third-party traffic, especially if it is the home site of any of the regional coordinators for the USENET maps. Notable backbone sites as of early 1991 include uune...
backbone site2 => University, UC Berkeley, DEC's Western Research Laboratories, Ohio State University, and the University of Texas. Compare {rib site}, {leaf site}.
backgammon => See bignum, moby, and pseudoprime.
background => n.,adj.,vt. To do a task `in background' is to do it whenever foreground matters are not claiming your undivided attention, and `to background' something means to relegate it to a lower priority. "For now, we'll just print a list of nod...
backspace and overstrike => interj. Whoa! Back up. Used to suggest that someone just said or did something wrong. Common among APL programmers.
backward combatability => /bak'w*rd k*m-bat'*-bil'*-tee/ [from `backward compatibility'] n. A property of hardware or software revisions in which previous protocols, formats, and layouts are discarded in favor of `new and improved' protocols, formats...
backward combatability2 => making the transition between major releases. When the change is so drastic that the old formats are not retained in the new version, it is said to be `backward combatable'. See {flag day}.
BAD => /B-A-D/ [IBM acronym, `Broken As Designed'] adj. Said of a program that is bogus because of bad design and misfeatures rather than because of bugginess. See {working as designed}.
Bad Thing => [from the 1930 Sellar & Yeatman parody `1066 And All That'] n. Something that can't possibly result in improvement of the subject. This term is always capitalized, as in "Replacing all of the 9600-baud modems with bicycle couriers would ...
factpacks/jargon.fact view on Meta::CPAN
condition out => vt. To prevent a section of code from being compiled by surrounding it with a conditional-compilation directive whose condition is always false. The canonical examples are `#if 0' (or `#ifdef notdef', though some find this bletcherou...
condom => n. 1. The protective plastic bag that accompanies 3.5-inch microfloppy diskettes. Rarely, also used of (paper) disk envelopes. Unlike the write protect tab, the condom (when left on) not only impedes the practice of SEX but has also been sh...
connector conspiracy => [probably came into prominence with the appearance of the KL-10 (one model of the PDP-10), none of whose connectors matched anything else] n. The tendency of manufacturers (or, by extension, programmers or purveyors of anythin...
connector conspiracy2 => that don't fit together with the old stuff, thereby making you buy either all new stuff or expensive interface devices. The KL-10 Massbus connector was actually *patented* by DEC, which reputedly refused to license the design...
connector conspiracy3 => parties out of competition for the lucrative Massbus peripherals market. This is a source of never-ending frustration for the diehards who maintain older PDP-10 or VAX systems. Their CPUs work fine, but they are stuck with dy...
connector conspiracy4 => drives with low capacity and high power requirements. In these latter days of open-systems computing this term has fallen somewhat into disuse, to be replaced by the observation that "Standards are great! There are so *many* ...
cons => /konz/ or /kons/ [from LISP] 1. vt. To add a new element to a specified list, esp. at the top. "OK, cons picking a replacement for the console TTY onto the agenda." 2. `cons up' vt. To synthesize from smaller pieces "to cons up an example". I...
considered harmful => adj. Edsger W. Dijkstra's note in the March 1968 `Communications of the ACM', "Goto Statement Considered Harmful", fired the first salvo in the structured programming wars. Amusingly, the ACM considered the resulting acrimony su...
considered harmful2 => policy) no longer print an article taking so assertive a position against a coding practice. In the ensuing decades, a large number of both serious papers and parodies have borne titles of the form "X considered Y". The structu...
considered harmful3 => over with the realization that both sides were wrong, but use of such titles has remained as a persistent minor in-joke (the `considered silly' found at various places in this lexicon is related).
console => n. 1. The operator's station of a mainframe. In times past, this was a privileged location that conveyed godlike powers to anyone with fingers on its keys. Under UNIX and other modern timesharing OSes, such privileges are guarded by passwo...
console jockey => n. See {terminal junkie}.
content-free => [by analogy with techspeak `context-free'] adj. Used of a message that adds nothing to the recipient's knowledge. Though this adjective is sometimes applied to flamage, it more usually connotes derision for communication styles that e...
control-C => vi. 1. "Stop whatever you are doing." From the interrupt character used on many operating systems to abort a running program. Considered silly. 2. interj. Among BSD UNIX hackers, the canonical humorous response to "Give me a break!"
control-O => vi. "Stop talking." From the character used on some operating systems to abort output but allow the program to keep on running. Generally means that you are not interested in hearing anything more from that person, at least on that topic...
control-Q => vi. "Resume." From the ASCII XON character used to undo a previous control-S (in fact it is also pronounced XON /X-on/).
control-S => vi. "Stop talking for a second." From the ASCII XOFF character (this is also pronounced XOFF /X-of/). Control-S differs from control-O in that the person is asked to stop talking (perhaps because you are on the phone) but will be allowed...
Conway's Law => prov. The rule that the organization of the software and the organization of the software team will be congruent; originally stated as "If you have four groups working on a compiler, you'll get a 4-pass compiler". This was originally ...
Conway's Law2 => early proto-hacker who wrote an assembler for the Burroughs 220 called SAVE. The name `SAVE' didn't stand for anything; it was just that you lost fewer card decks and listings because they all had SAVE written on them.
cookbook => [from amateur electronics and radio] n. A book of small code segments that the reader can use to do various magic things in programs. One current example is the `PostScript Language Tutorial and Cookbook' by Adobe Systems, Inc (Addison-We...
cookie => n. A handle, transaction ID, or other token of agreement between cooperating programs. "I give him a packet, he gives me back a cookie." The claim check you get from a dry-cleaning shop is a perfect mundane example of a cookie; the only thi...
factpacks/jargon.fact view on Meta::CPAN
hack on => vt. To hack; implies that the subject is some pre-existing hunk of code that one is evolving, as opposed to something one might {hack up}.
hack together => vt. To throw something together so it will work. Unlike `kluge together' or {cruft together}, this does not necessarily have negative connotations.
hack up => vt. To hack, but generally implies that the result is a hack in sense 1 (a quick hack). Contrast this with {hack on}. To `hack up on' implies a quick-and-dirty modification to an existing system. Contrast {hacked up}; compare {kluge up}, {...
hack value => n. Often adduced as the reason or motivation for expending effort toward a seemingly useless goal, the point being that the accomplished goal is a hack. For example, MacLISP had features for reading and printing Roman numerals, which we...
hack value2 => See {display hack} for one method of computing hack value, but this cannot really be explained. As a great artist once said of jazz "If you hafta ask, you ain't never goin' to find out."
hack-and-slay => v. (also `hack-and-slash') 1. To play a MUD or go mudding, especially with the intention of berserking for pleasure. 2. To undertake an all-night programming/hacking session, interspersed with stints of mudding as a change of pace. T...
hacked off => [analogous to `pissed off'] adj. Said of system administrators who have become annoyed, upset, or touchy owing to suspicions that their sites have been or are going to be victimized by crackers, or used for inappropriate, technically il...
hacked off2 => activities. For example, having unreadable files in your home directory called `worm', `lockpick', or `goroot' would probably be an effective (as well as impressively obvious and stupid) way to get your sysadmin hacked off at you.
hacked up => adj. Sufficiently patched, kluged, and tweaked that the surgical scars are beginning to crowd out normal tissue (compare {critical mass}). Not all programs that are hacked become `hacked up'; if modifications are done with some eye to co...
hacked up2 => maintainability, the software may emerge better for the experience. Contrast {hack up}.
hacker => [originally, someone who makes furniture with an axe] n. 1. A person who enjoys exploring the details of programmable systems and how to stretch their capabilities, as opposed to most users, who prefer to learn only the minimum necessary. 2...
hacking run => [analogy with `bombing run' or `speed run'] n. A hack session extended long outside normal working times, especially one longer than 12 hours. May cause you to `change phase the hard way' (see phase).
Hacking X for Y => [ITS] n. The information ITS made publicly available about each user (the INQUIR record) was a sort of form in which the user could fill out fields. On display, two of these fields were combined into a project description of the fo...
Hacking X for Y2 => `"Hacking perceptrons for Minsky"'). This form of description became traditional and has since been carried over to other systems with more general facilities for self-advertisement (such as UNIX {plan file}s).
Hackintosh => n. 1. An Apple Lisa that has been hacked into emulating a Macintosh (also called a `Mac XL'). 2. A Macintosh assembled from parts theoretically belonging to different models in the line.
hackish => /hak'ish/ adj. (also hackishness n.) 1. Said of something that is or involves a hack. 2. Of or pertaining to hackers or the hacker subculture. See also true-hacker.
hackishness => n. The quality of being or involving a hack. This term is considered mildly silly. Syn. hackitude.
hackitude => n. Syn. hackishness; this word is considered sillier.
hair => [back-formation from hairy] n. The complications that make something hairy. "Decoding TECO commands requires a certain amount of hair." Often seen in the phrase `infinite hair', which connotes extreme complexity. Also in `hairiferous' (tendin...
hairy => adj. 1. Annoyingly complicated. "DWIM is incredibly hairy." 2. Incomprehensible. "DWIM is incredibly hairy." 3. Of people, high-powered, authoritative, rare, expert, and/or incomprehensible. Hard to explain except in context "He knows this h...
HAKMEM => /hak'mem/ n. MIT AI Memo 239 (February 1972). A legendary collection of neat mathematical and programming hacks contributed by many people at MIT and elsewhere. (The title of the memo really is "HAKMEM", which is a 6-letterism for `hacks me...
factpacks/jargon.fact view on Meta::CPAN
I see no X here.2 => respond in this wise if you asked it to do something involving an object not present at your location in the game.
i14y => // n. Abbrev. for `interoperability', with the `14' replacing fourteen letters. Used in the X (windows) community. Refers to portability and compatibility of data formats (even binary ones) between different programs or implementations of the...
i18n => // n. Abbrev. for `internationaliz,sation', with the 18 replacing 18 letters. Used in the X (windows) community.
IBM => /I-B-M/ Inferior But Marketable; It's Better Manually; Insidious Black Magic; It's Been Malfunctioning; Incontinent Bowel Movement; and a near-infinite number of even less complimentary expansions, including `International Business Machines'. ...
IBM discount => n. A price increase. Outside IBM, this derives from the common perception that IBM products are generally overpriced (see clone); inside, it is said to spring from a belief that large numbers of IBM employees living in an area cause p...
ice => [coined by USENETter Tom Maddox, popularized by William Gibson's cyberpunk SF novels acronym for `Intrusion Countermeasure Electronics'] Security software (in Gibson's novels, software that responds to intrusion by attempting to literally kill...
ifdef out => /if'def owt/ v. Syn. for {condition out}, specific to C.
ill-behaved => adj. 1. [numerical analysis] Said of an algorithm or computational method that tends to blow up because of accumulated roundoff error or poor convergence properties. 2. Software that bypasses the defined OS interfaces to do things (lik...
IMHO => // [from SF fandom via USENET; acronym for `In My Humble Opinion'] "IMHO, mixed-case C names should be avoided, as mistyping something in the wrong case can cause hard-to-detect errors --- and they look too Pascalish anyhow." Also seen in var...
in the extreme => adj. A preferred superlative suffix for many hackish terms. See, for example, `obscure in the extreme' under obscure, and compare highly.
incantation => n. Any particularly arbitrary or obscure command that one must mutter at a system to attain a desired result. Not used of passwords or other explicit security features. Especially used of tricks that are so poorly documented they must ...
include => vt. [USENET] 1. To duplicate a portion (or whole) of another's message (typically with attribution to the source) in a reply or followup, for clarifying the context of one's response. See the the discussion of inclusion styles under "Hacke...
include war => n. Excessive multi-leveled including within a discussion thread, a practice that tends to annoy readers. In a forum with high-traffic newsgroups, such as USENET, this can lead to flames and the urge to start a {kill file}.
indent style => [C programmers] n. The rules one uses to indent code in a readable fashion; a subject of {holy wars}. There are four major C indent styles, described below; all have the aim of making it easier for the reader to visually track the sco...
indent style2 => significant variable is the placement of `{' and `}' with respect to the statement(s) they enclose and the guard or controlling statement (`if', `else', `for', `while', or `do') on the block, if any. `K&R style' --- Named after Kerni...
indent style3 => examples in K&R are formatted this way. Also called `kernel style' because the UNIX kernel is written in it, and the `One True Brace Style' (abbrev. 1TBS) by its partisans. The basic indent shown here is eight spaces (or one tab) per...
indent style4 => seen, but are much less common. if (cond) { <body> } `Allman style' --- Named for Eric Allman, a Berkeley hacker who wrote a lot of the BSD utilities in it (it is sometimes called `BSD style'). Resembles normal indent style in Pascal...
indent style5 => indent per level shown here is eight spaces, but four is just as common (esp. in C++ code). if (cond) { <body> } `Whitesmiths style' --- popularized by the examples that came with Whitesmiths C, an early commercial C compiler. Basic ...
indent style6 => level shown here is eight spaces, but four is occasionally seen. if (cond) { <body> } `GNU style' --- Used throughout GNU EMACS and the Free Software Foundation code, and just about nowhere else. Indents are always four spaces per Se...
indent style7 => level, with `{' and `}' halfway between the outer and inner indent levels. if (cond) { <body> } Surveys have shown the Allman and Whitesmiths styles to be the most common, with about equal mind shares. K&R/1TBS used to be nearly univ...
indent style8 => now much less common (the opening brace tends to get lost against the right paren of the guard part in an `if' or `while', which is a {Bad Thing}). Defenders of 1TBS argue that any putative gain in readability is less important than ...
factpacks/jargon.fact view on Meta::CPAN
mouse around => vi. To explore public portions of a large system, esp. a network such as Internet via FTP or TELNET, looking for interesting stuff to snarf.
mouse belt => n. See {rat belt}.
mouse droppings => [MS-DOS] n. Pixels (usually single) that are not properly restored when the mouse pointer moves away from a particular location on the screen, producing the appearance that the mouse pointer has left droppings behind. The major cau...
mouse droppings2 => that write to the screen memory corresponding to the mouse pointer's current location without hiding the mouse pointer first, and mouse drivers that do not quite support the graphics mode in use.
mouse elbow => n. A tennis-elbow-like fatigue syndrome resulting from excessive use of a {WIMP environment}. Similarly, `mouse shoulder'; GLS reports that he used to get this a lot before he taught himself to be ambimoustrous.
mouso => /mow'soh/ n. [by analogy with `typo'] An error in mouse usage resulting in an inappropriate selection or graphic garbage on the screen. Compare thinko, braino.
MS-DOS => /M-S-dos/ [MicroSoft Disk Operating System] n. A clone of {CP/M} for the 8088 crufted together in 6 weeks by hacker Tim Paterson, who is said to have regretted it ever since. Numerous features, including vaguely UNIX-like but rather broken ...
mu => /moo/ The correct answer to the classic trick question "Have you stopped beating your wife yet?". Assuming that you have no wife or you have never beaten your wife, the answer "yes" is wrong because it implies that you used to beat your wife an...
mudhead => n. Commonly used to refer to a MUD player who sleeps, breathes, and eats MUD. Mudheads have been known to fail their degrees, drop out, etc., with the consolation, however, that they made wizard level. When encountered in person, all a mud...
multician => /muhl-ti'shn/ [coined at Honeywell, ca. 1970] n. Competent user of {Multics}. Perhaps oddly, no one has ever promoted the analogous `Unician'.
Multics => /muhl'tiks/ n. [from "MULTiplexed Information and Computing Service"] An early (late 1960s) timesharing operating system co-designed by a consortium including MIT, GE, and Bell Laboratories. Very innovative for its time --- among other thi...
multitask => n. Often used of humans in the same meaning it has for computers, to describe a person doing several things at once (but see thrash). The term `multiplex', from communications technology (meaning to handle more than one channel at the sa...
mumblage => /muhm'bl*j/ n. The topic of one's mumbling (see mumble). "All that mumblage" is used like "all that stuff" when it is not quite clear how the subject of discussion works, or like "all that crap" when `mumble' is being used as an implicit ...
mumble => interj. 1. Said when the correct response is too complicated to enunciate, or the speaker has not thought it out. Often prefaces a longer answer, or indicates a general reluctance to get into a long discussion. "Don't you think that we coul...
munch => [often confused with mung, q.v.] vt. To transform information in a serial fashion, often requiring large amounts of computation. To trace down a data structure. Related to crunch and nearly synonymous with grovel, but connotes less pain.
munching => n. Exploration of security holes of someone else's computer for thrills, notoriety, or to annoy the system manager. Compare cracker. See also {hacked off}.
munching squares => n. A {display hack} dating back to the PDP-1 (ca. 1962, reportedly discovered by Jackson Wright), which employs a trivial computation (repeatedly plotting the graph Y = X XOR T for successive values of T --- see HAKMEM items 146--...
munching squares2 => display of moving and growing squares that devour the screen. The initial value of T is treated as a parameter, which, when well-chosen, can produce amazing effects. Some of these, later (re)discovered on the LISP machine, have b...
munching squares3 => (try AND for XOR and toggling points instead of plotting them), `munching w's', and `munching mazes'. More generally, suppose a graphics program produces an impressive and ever-changing display of some basic form, foo, on a displ...
munching squares4 => relatively simple program; then the program (or the resulting display) is likely to be referred to as `munching foos' (this is a good example of the use of the word foo as a metasyntactic variable).
munchkin => /muhnch'kin/ [from the squeaky-voiced little people in L. Frank Baum's `The Wizard of Oz'] n. A teenage-or-younger micro enthusiast hacking BASIC or something else equally constricted. A term of mild derision --- munchkins are annoying bu...
factpacks/jargon.fact view on Meta::CPAN
winnitude => /win'*-t[y]ood/ n. The quality of winning (as opposed to winnage, which is the result of winning). "Guess what? They tweaked the microcode and now the LISP interpreter runs twice as fast as it used to." "That's really great! Boy, what wi...
wired => n. See hardwired.
wirehead => /wir'hed/ n. [prob. from SF slang for an electrical-brain-stimulation addict] 1. A hardware hacker, especially one who concentrates on communications hardware. 2. An expert in local-area networks. A wirehead can be a network software wiza...
wish list => n. A list of desired features or bug fixes that probably won't get done for a long time, usually because the person responsible for the code is too busy or can't think of a clean way to do it. "OK, I'll add automatic filename completion ...
wish list2 => interface." Compare {tick-list features}.
within delta of => adj. See delta.
within epsilon of => adj. See epsilon.
wizard => n. 1. A person who knows how a complex piece of software or hardware works (that is, who groks it); esp. someone who can find and fix bugs quickly in an emergency. Someone is a hacker if he or she has general hacking ability, but is a wizar...
Wizard Book => n. Hal Abelson and Jerry Sussman's `Structure and Interpretation of Computer Programs' (MIT Press, 1984; ISBN 0-262-01077-1, an excellent computer science text used in introductory courses at MIT. So called because of the wizard on the...
Wizard Book2 => LISP/Scheme world.
wizard mode => [from rogue] n. A special access mode of a program or system, usually passworded, that permits some users godlike privileges. Generally not used for operating systems themselves (`root mode' or `wheel mode' would be used instead).
wizardly => adj. Pertaining to wizards. A wizardly feature is one that only a wizard could understand or use properly.
womb box => n. 1. [TMRC] Storage space for equipment. 2. [proposed] A variety of hard-shell equipment case with heavy interior padding and/or shaped carrier cutouts in a foam-rubber matrix; mundanely called a `flight case'. Used for delicate test equ...
WOMBAT => [Waste Of Money, Brains, And Time] adj. Applied to problems which are both profoundly uninteresting in themselves and unlikely to benefit anyone interesting even if solved. Often used in fanciful constructions such as `wrestling with a womb...
wonky => /wong'kee/ [from Australian slang] adj. Yet another approximate synonym for broken. Specifically connotes a malfunction that produces behavior seen as crazy, humorous, or amusingly perverse. "That was the day the printer's font logic went wo...
workaround => n. A temporary kluge inserted in a system under development or test in order to avoid the effects of a bug or misfeature so that work can continue. Theoretically, workarounds are always replaced by fixes; in practice, customers often fi...
working as designed => [IBM] adj. 1. In conformance to a wrong or inappropriate specification; useful, but misdesigned. 2. Frequently used as a sardonic comment on a program's utility. 3. Unfortunately also used as a bogus reason for not accepting a ...
working as designed2 => this sense is used in official documents! See BAD.
worm => [from `tapeworm' in John Brunner's novel `The Shockwave Rider', via XEROX PARC] n. A program that propagates itself over a network, reproducing itself as it goes. Compare virus. Nowadays the term has negative connotations, as it is assumed th...
wound around the axle => adj. In an infinite loop. Often used by older computer types.
wrap around => vi. (also n. `wraparound' and v. shorthand `wrap') 1. [techspeak] The action of a counter that starts over at zero or at `minus infinity' (see infinity) after its maximum value has been reached, and continues incrementing, either becau...
factpacks/ports.fact view on Meta::CPAN
port 502 => asa-appl-proto - asa-appl-proto
port 503 => intrinsa - Intrinsa
port 504 => citadel - citadel
port 505 => mailbox-lm - mailbox-lm
port 506 => ohimsrv - ohimsrv
port 507 => crs - crs
port 508 => xvttp - xvttp
port 509 => snare - snare
port 510 => fcp - FirstClass Protocol
port 511 => passgo - PassGo
port 512 => exec - remote process execution authentication performed using passwords and UNIX loppgin names
port 513 => login - remote login a la telnet; automatic authentication performed based on priviledged port numbers and distributed data bases which identify "authentication domains"
port 514 => shell - cmd like exec, but automatic authentication is performed as for login server
port 515 => printer - spooler
port 516 => videotex - videotex
port 517 => talk - like tenex link, but across machine - unfortunately, doesn't use link protocol (this is actually just a rendezvous port from which a tcp connection is established)
port 518 => ntalk - ntalk
port 519 => utime - unixtime
port 520 => efs - extended file name server
port 521 => ripng - ripng
port 522 => ulp - ULP
factpacks/ports.fact view on Meta::CPAN
port 576 => ipcd - ipcd
port 577 => vnas - vnas
port 578 => ipdd - ipdd
port 579 => decbsrv - decbsrv
port 580 => sntp-heartbeat - SNTP HEARTBEAT
port 581 => bdp - Bundle Discovery Protocol
port 582 => scc-security - SCC Security
port 583 => philips-vc - Philips Video-Conferencing
port 584 => keyserver - Key Server
port 585 => imap4-ssl - IMAP4+SSL (use 993 instead)
port 586 => password-chg - Password Change
port 587 => submission - Submission
port 588 => cal - CAL
port 589 => eyelink - EyeLink
port 590 => tns-cml - TNS CML
port 591 => http-alt - FileMaker, Inc. - HTTP Alternate (see Port 80)
port 592 => eudora-set - Eudora Set
port 593 => http-rpc-epmap - HTTP RPC Ep Map
port 594 => tpip - TPIP
port 595 => cab-protocol - CAB Protocol
port 596 => smsd - SMSD
factpacks/security.fact view on Meta::CPAN
IT System => A specific IT installation, with a particular purpose and operational environment.
key management => A method of electronically transmitting, in a secure fashion, a secret key for use with a secret key cryptographic system. Key management can be used to support communications privacy. This method can be accomplished most securely w...
key escrow system => An electronic means of reconstructing a secret key (for secret key encryption) or a private key (for public key encryption)=2E The reconstructed key can then be used in a process to decrypt a communication.
key => A long string of seemingly random bits used with cryptographic algorithms to create or verify digital signatures and encrypt or decrypt messages and conversations. The keys must be known or guessed to forge a digital signature or decrypt an en...
label => see Security Label and Sensitivity Label.
lattice => A partially ordered set for which every pair of elements has a greatest lower bound and a least upper bound.
least privilege => The principle that requires that each subject be granted the most restrictive set of privileges needed for the performance of authorized tasks. The application of this principle limits the damage that can result from accident, erro...
limited access => Synonymous with access control.
list oriented => A computer protection system in which each protected object has a list of all subjects authorized to access it. Compare ticket-oriented.
local requirements => Those for which separate analysis of the individual TCB (trusted computing base) subsets suffices to determine compliance for the composite TCB. (See the trusted database interpretation of the Trusted Computer System Evaluation ...
lock and key protection system => A protection system that involves matching a key or password with a specific access requirement.
logic bomb => A resident computer program that triggers the perpetration of an unauthorized act when particular states of the system are realized.
loophole => An error of omission or oversight in software or hardware that permits circumventing the system security policy.
*-property => (Star Property) - A Bell-LaPadula security model rule allowing a subject write access to an object only if the security level of the subject is dominated by the security level of the object. Also known as the Confinement Property.
star property => A Bell-LaPadula security model rule allowing a subject write access to an object only if the security level of the subject is dominated by the security level of the object. Also known as the Confinement Property.
machine user => A machine, group of machines or other logical entity outside of the TOE with interacts with the TOE.
magnetic remanence => A measure of the magnetic flux density remaining after removal of the applied magnetic force. Refers to any data remaining on magnetic storage media after removal of the power.
maintenance hook => Special instructions in software to allow easy maintenance and additional feature development. These are not clearly defined during access for design specification. Hooks frequently allow entry into the code at unusual points or...
malicious logic => Hardware, software, or firmware that is intentionally included in a system for an unauthorized purpose; e.g., a Trojan horse.
mandatory access control => A means of restricting access to objects based on the sensitivity (as represented by a label) of the information contained in the objects and the formal authorization (i.e., clearance) of subjects to access information of ...
masquerading => Synonymous with spoofing.
factpacks/security.fact view on Meta::CPAN
orange book => Alternate name for DoD Trusted Computer Security Evaluation Criteria.
OSI => The International Organization for Standardization provides a framework for defining the communications process between systems. This framework includes a network architecture, consisting of seven layers. The architecture is referred to as the...
output => Information that has been exported by a TCB.
overt channel => an overt channel is a path within a network which is designed for the authorized transfer of data.
overwrite procedure => A stimulation to change the state of a bit followed by a known pattern. See magnetic remanence.
owner => User granted privileges with respect to security attributes and privileges affecting specific subjects and objects.
package => A set of components combined together to satisfy a set of identified objectives.
partial order => A relation that is symmetric (a is related to a), transitive (if a is related to b and b is related to c, then a is related to c), and antisymmetric (if a is related to b and b is related to a, then a and b are identical.)
partitioned security mode => A mode of operation wherein all personnel have the clearance but not necessarily formal access approval and need-to-know for all information contained in the system. Not to be confused with compartmented security mode.
passive => (1) A property of an object or network object that it lacks logical or computational capability and is unable to change the information it contains. (2) Those threats to the confidentiality of data which, if realized, would not result in a...
password => Protected/private character string used to authenticate an identity or to authorize access to data.
penetration => the successful violation of a protected system.
penetration testing => tests performed by an evaluator on the Target of Evaluation in order to confirm whether or not known vulnerabilities are actually exploitable in practice.
penetration signature => The characteristics or identifying marks that may be produced by a penetration.
penetration study => A study to determine the feasibility and methods for defeating controls of a system.
periods processing => The processing of various levels of sensitive information at distinctly different times. Under periods processing, the system must be purged of all information from one processing period before transitioning to the next when th...
permissions => A description of the type of authorized interactions a subject can have with an object. Examples include: read, write, execute, add, modify, and delete.
personnel security => The procedures established to ensure that all personnel who have access to sensitive information have the required authority as well as appropriate clearances.
physical security => The application of physical barriers and control procedures as preventive measures or countermeasures against threats to resources and sensitive information.
piggyback => Gaining unauthorized access to a system via another user's legitimate connection. See between-the-lines entry.
plaintext => See cleartext.
PPL => Preferred Products List - A list of commercially produced equipments that meet TEMPEST and other requirements prescribed by the National Security Agency. This list is included in the NSA Information Systems Security Products and Services Catal...
primitive => An ordering relation between TCB subsets based on dependency (see "depends" above). A TCB subset B is more primitive than a second TCB subset A (and A is less primitive than B) if (a) A directly depends on B or (b) a chain of TCB subsets...
print suppression => Eliminating the displaying of characters in order to preserve their secrecy; e.g., not displaying the characters of a password as it is keyed at the input terminal.
privacy => (1) the ability of an individual or organization to control the collection, storage, sharing, and dissemination of personal and organizational information. (2) The right to insist on adequate security of, and to define authorized users of,...
private key => The undisclosed key in a matched key pair - private key and public key - that each party safeguards for public key cryptography.
privilege => Special authorization that is granted to particular users to perform security rel- evant operations.
privileged instructions => A set of instructions (e.g., interrupt handling or special computer instructions) to control features (such as storage protection features) that are generally executable only when the automated system is operating in the ex...
procedural security => Synonymous with administrative security.
process => a program in execution. It is completely characterized by a single current execution point (represented by the machine state) and address space.
producers => Providers of IT (information technology) product security (for example, product vendors, product developers, security analysts, and value-added resellers).
product => A package of IT software and/or hardware, providing functionality designed for use or incorporation within a multiplicity of systems.
product rationale => a description of the security capabilities of a product, giving the necessary information for a prospective purchaser to decide whether it will help to satisfy his system security objectives.
production => the process whereby copies of the Target of Evaluation are generated for distribution to customers.
factpacks/security.fact view on Meta::CPAN
TOE => Target of Evaluation - An IT system, product or component which is identified as requiring security evaluation.
TCB => (trusted computing base) subset: A set of software, firmware, and hardware (where any of these three could be absent) that mediates the access of a set S of subjects to a set O of objects on the basis of a stated access control policy P and sa...
technical attack => An attack that can be perpetrated by circumventing or nullifying hardware and software protection mechanisms, rather than by subverting system personnel or other users.
technical policy => (1) The set of rules regulating access of subjects to objects enforced by a TCB (trusted computing base) subset. (2) The set of rules regulating access of subjects to objects enforced by a computer system.
technical vulnerability => A hardware, firmware, communication, or software flaw that leaves a computer processing system open for potential exploitation, either externally or internally, thereby resulting in risk for the owner, user, or manager of t...
TEMPEST => The study and control of spurious electronic signals emitted by electrical equipment.
threat => Any circumstance or event with the potential to cause harm to a system in the form of destruction, disclosure, modification of data, and/or denial of service.
threat agent => A method used to exploit a vulnerability in a system, operation, or facility.
threat monitoring => The analysis, assessment, and review of audit trails and other data collected for the purpose of searching out system events that may constitute violations or attempted violations of system security.
ticket oriented => A computer protection system in which each subject maintainsa list of unforgeable bit patterns, called tickets, one for each object thesubject is authorized to access. Compare list-oriented.
time dependent password => A password that is valid only at a certain time of day or during a specified interval of time.
TSF => TOE Security Functions - All parts of the TOE which have to be relied upon for enforcement of the TOE Security Policy (TSP).
tool => a product used in the construction and/or documentation of a target of evaluation.
TLS => top-level specification - A nonprocedural description of system behavior at the most abstract level - typically, a functional specification that omits all implementation details.
tranquility => A security model rule stating that the security level of an object cannot change while the object is being processed by an AIS.
transaction => Set of subject actions and their associated data storage accesses.
trap door => (1) Hidden software or hardware mechanism that can be triggered to permit protection mechanisms in an automated information system to be circumvented. Note: A trap door is usually activated in some innocent-appearing manner (for example,...
trojan horse => A computer program with an apparently or actually useful function that contains additional (hidden) functions that surreptitiously exploit the legitimate authorizations of the invoking process to the detriment of security or integrity...
trusted channel => a mechanism by which two NTCB partitions can communicate directly. This mechanism can be activated by either of the NTCB partitions, cannot be imitated by untrusted software, and maintains the integrity of information that is sent ...
TCB => Trusted Computing Base - The totality of protection mechanisms within a computer system including hardware, firmware, and software the combination of which is responsible for enforcing a security policy. A TCB consists of one or more component...
trusted path => A mechanism by which a person at a terminal can communicate directly with the Trusted Computing Base. This mechanism can only be activated by the person or the Trusted Computing Base and cannot be imitated by untrusted software.
factpacks/techdict.fact view on Meta::CPAN
C++ => This is an extension of the C programming language that adds object-oriented concepts.
Cable Modem => Cable companies are working to provide Internet access over coaxial cable. That's right, the cable that you plug into your VCR or TV. A cable modem accepts this coaxial cable and can get data from the Internet at up to and above 1.5 Mb...
Cache memory => Generally a small chunk of fast memory that sits between either 1) a smaller, faster chunk of memory and a bigger, slower chunk of memory, or 2) a processor and a bigger, slower chunk of memory. This is to provide a bridge from someth...
Cat 3, 4, 5 => See Category 3, 4, or 5 cable standards.
Category 3 cable standard => Cat 3 cable is certified to run at up to 16 MHz. You can achieve speeds of up to 10 Mbps on Cat 3 cable. This cable maxes out with standard 10 Mbps Ethernet.
Category 4 cable standard => Cat 4 cable is certified to run at up to 20 MHz. You can achieve speeds of up to 16 Mbps, such as with the 16 Mbps token-ring standard.
Category 5 cable standard => This is the latest and greatest copper wire standard. It uses an RJ-45 plug like Cat 3, and 4, and 4-pair wire, but it is certified to run up to 100 MHz and is suitable for 100 Mbps wiring standards. The guys that wired u...
CAV => (Constant Angular Velocity) This refers to a spinning disk. As data is read from the disk, the drive motor spins at the same speed. For example, CD-drives that work at CAV will read data at 12x towards the center and 20x towards the edge, wher...
CD-R => (Compact Disk Recordable) CD-R drives will record up to 650 MB of data onto specialized CD-R media. The media is expensive compared to the mass-produced CDs that software is generally distributed on, but cheap for the amount of data you can s...
CD-ROM => (Compact Disk Read Only Media) CD-ROM media is read-only media that holds 650 MB of data. It's generally accepted as the easiest way to distribute software. CD-ROM drives can also read music CDs even though they are in a different format th...
CGI => (Common Gateway Interface) This interface allows scripts or programs to run on a Web server. All Web servers support CGI scripting. You can make a CGI script do pretty much anything a computer program can. Most commonly, they are implemented t...
Channel => This refers to the group of resellers that supply most companies with software, hardware, and support. The channel is a force to be reckoned with, and it competes directly against companies like Gateway 2000 and Dell. A channel can also be...
CIR => (Committed Information Rate) This term is used by ISPs to represent an amount of data that you should, on the average, be able to draw through your connection to them. This is measured in kilobits or megabits per second.
CISC => (Complex Instruction Set Computer) Intel x86 chips are CISC chips because of the complexity of the instruction set. On the other side of the coin, you have RISC chips that use a reduced instruction set. RISC chips split big operations into lo...
Client/Server => Client server technology came about when computers began to cost less. Mainframes are very expensive, and didn't give users much personal freedom. The client/server model promised to change that scenario and it's much more popular to...
Clock chipping => Synonym for over-clocking.
Clock Cycle => Think of a clock cycle as one tick of the second hand (but generally at a much higher speed). Computer clocks run voltage through a tiny crystal that oscillates at a predictable speed to give a meaningful timing method to the computer....
Clustering => Clustering is an up-and-coming technology using two or more computers that function together as a single entity for fault tolerance and load balancing. This increases reliability and up-time in a client/server environment. One computer ...
CLV => (Constant Linear Velocity) In terms of disk drives, it means that the rate of data being read off of the disk stays the same from center to outer edge. To accomplish this, the drive motor speeds up and slows down as data is read from different...
CMOS => (Complementary Metal-Oxide Semiconductor) This is the common reference for the BIOS preferences in your computer. Actually, it is a low power version of a chip. The low power comes into play because it is what commonly holds your BIOS prefere...
Coaxial cable => This is the original Ethernet cable. It consists of a single, insulated copper wire, surrounded by a copper braid or foil. The wire is then coated with plastic. Coaxial cable is used in bus topology.