view release on metacpan or search on metacpan
Amethyst/Brain/Infobot/Module/Zippy.pm view on Meta::CPAN
Awright, which one of you hid my PENIS ENVY?
BARBARA STANWYCK makes me nervous!!
Barbie says, Take quaaludes in gin and go to a disco right away!
But Ken says, WOO-WOO!! No credit at "Mr. Liquor"!!
BARRY ... That was the most HEART-WARMING rendition of "I DID IT MY WAY" I've ever heard!!
Being a BALD HERO is almost as FESTIVE as a TATTOOED KNOCKWURST.
BELA LUGOSI is my co-pilot ...
BI-BI-BI-BI-BI-BI-BI-BI-BI-BI-BI-BI-BI-BI-BI-BI-BI-BI-BI-BI-BI-BI-BI-BI- ... bleakness ... desolation ... plastic forks ...
Bo Derek ruined my life!
Boy, am I glad it's only 1971...
Boys, you have ALL been selected to LEAVE th' PLANET in 15 minutes!!
But they went to MARS around 1953!!
But was he mature enough last night at the lesbian masquerade?
Can I have an IMPULSE ITEM instead?
Can you MAIL a BEAN CAKE?
Catsup and Mustard all over the place! It's the Human Hamburger!
CHUBBY CHECKER just had a CHICKEN SANDWICH in downtown DULUTH!
Civilization is fun! Anyway, it keeps me busy!!
Clear the laundromat!! This whirl-o-matic just had a nuclear meltdown!!
Concentrate on th'cute, li'l CARTOON GUYS! Remember the SERIAL NUMBERS!! Follow the WHIPPLE AVE. EXIT!! Have a FREE PEPSI!! Turn LEFT at th'HOLIDAY INN!! JOIN the CREDIT WORLD!! MAKE me an OFFER!!!
CONGRATULATIONS! Now should I make thinly veiled comments about DIGNITY, self-esteem and finding TRUE FUN in your RIGHT VENTRICLE??
Amethyst/Brain/Infobot/Module/Zippy.pm view on Meta::CPAN
I like your SNOOPY POSTER!!
-- I love KATRINKA because she drives a PONTIAC. We're going away now. I fed the cat.
I love ROCK 'N ROLL! I memorized the all WORDS to "WIPE-OUT" in 1965!!
I need to discuss BUY-BACK PROVISIONS with at least six studio SLEAZEBALLS!!
I once decorated my apartment entirely in ten foot salad forks!!
I own seven-eighths of all the artists in downtown Burbank!
I put aside my copy of "BOWLING WORLD" and think about GUN CONTROL legislation...
I represent a sardine!!
I request a weekend in Havana with Phil Silvers!
... I see TOILET SEATS ...
I selected E5 ... but I didn't hear "Sam the Sham and the Pharoahs"!
I smell a RANCID CORN DOG!
I smell like a wet reducing clinic on Columbus Day!
I think I am an overnight sensation right now!!
... I think I'd better go back to my DESK and toy with a few common MISAPPREHENSIONS ...
I think I'll KILL myself by leaping out of this 14th STORY WINDOW while reading ERICA JONG'S poetry!!
I think my career is ruined!
I used to be a FUNDAMENTALIST, but then I heard about the HIGH RADIATION LEVELS and bought an ENCYCLOPEDIA!!
... I want a COLOR T.V. and a VIBRATING BED!!!
I want a VEGETARIAN BURRITO to go ... with EXTRA MSG!!
I want a WESSON OIL lease!!
Amethyst/Brain/Infobot/Module/Zippy.pm view on Meta::CPAN
Oh my GOD -- the SUN just fell into YANKEE STADIUM!!
Oh, I get it!! "The BEACH goes on", huh, SONNY??
Okay ... I'm going home to write the "I HATE RUBIK's CUBE HANDBOOK FOR DEAD CAT LOVERS" ...
OKAY!! Turn on the sound ONLY for TRYNEL CARPETING, FULLY-EQUIPPED R.V.'S and FLOATATION SYSTEMS!!
OMNIVERSAL AWARENESS?? Oh, YEH!! First you need four GALLONS of JELL-O and a BIG WRENCH!! ... I think you drop th'WRENCH in the JELL-O as if it was a FLAVOR, or an INGREDIENT ... ... or ... I ... um ... WHERE'S the WASHING MACHINES?
On SECOND thought, maybe I'll heat up some BAKED BEANS and watch REGIS PHILBIN ... It's GREAT to be ALIVE!!
On the other hand, life can be an endless parade of TRANSSEXUAL
QUILTING BEES aboard a cruise ship to DISNEYWORLD if only we let it!!
On the road, ZIPPY is a pinhead without a purpose, but never without a POINT.
Once upon a time, four AMPHIBIOUS HOG CALLERS attacked a family of DEFENSELESS, SENSITIVE COIN COLLECTORS and brought DOWN their PROPERTY VALUES!!
Once, there was NO fun ... This was before MENU planning, FASHION statements or NAUTILUS equipment ... Then, in 1985 ... FUN was completely encoded in this tiny MICROCHIP ... It contain 14,768 vaguely amusing SIT-COM pilots!! We had to wait FOUR BIL...
One FISHWICH coming up!!
ONE LIFE TO LIVE for ALL MY CHILDREN in ANOTHER WORLD all THE DAYS OF OUR LIVES.
ONE: I will donate my entire "BABY HUEY" comic book collection to the downtown PLASMA CENTER ... TWO: I won't START a BAND called "KHADAFY & THE HIT SQUAD" ... THREE: I won't ever TUMBLE DRY my FOX TERRIER again!!
... or were you driving the PONTIAC that HONKED at me in MIAMI last Tuesday?
Our father who art in heaven ... I sincerely pray that SOMEBODY at this table will PAY for my SHREDDED WHAT and ENGLISH MUFFIN ... and also leave a GENEROUS TIP ....
over in west Philadelphia a puppy is vomiting ...
OVER the underpass! UNDER the overpass! Around the FUTURE and BEYOND REPAIR!!
PARDON me, am I speaking ENGLISH?
Pardon me, but do you know what it means to be TRULY ONE with your BOOTH!
PEGGY FLEMMING is stealing BASKET BALLS to feed the babies in VERMONT.
# Object specific variables
Server => 'london.rhizomatic.net',
Nick => 'Amethyst', # Replace this
# Channels => [ qw(bblug) ], # Put your channels here
);
my %infobot = (
# Amethyst variables
Name => 'infobot',
# Object specific variables
# You can put any valid selection of
# Amethyst::Brain::Infobot::Module names in this list. I have
# taken some out as my personal preference.
Modules => [ qw(
Statement
Google Nslookup
Karma
Fortune Excuse Insult
Zippy Zappa
Help Time Math
BabyTime
factpacks/Linux.fact view on Meta::CPAN
CDJ => <reply> $who, CD player for DJs. URL: http://you.genie.co.uk/fjd/cdj/index.html
cdlabelgen => <reply> $who, Generates frontcards and traycards for CDs. URL: http://www.red-bean.com/~bwf/software/cdlabelgen/
CDlib => <reply> $who, Graphical tool to search for files in your CD-ROMs. URL: http://www.multimania.com/cdlib/
CDM => <reply> $who, Offers copying, mastering and manipulation of CD tracks. URL: http://cdm.squidge.nu
CDPlayer.app => <reply> $who, CD player with CDDB support.. URL: http://www.linuxstart.com/~cassio/omnicd/
zlibc => <reply> $who, Zlibc - transparently access compressed files. URL: http://zlibc.linux.lu/
CDR-Toaster => <reply> $who, Tk frontend for cd-burning. URL: http://www.jump.net/~brooke/cdrtoast/
CDRDAO => <reply> $who, Disk-At-Once Recording of Audio CD-Rs. URL: http://www.ping.de/sites/daneb/cdrdao.html
cdrecord => <reply> $who, Allows the creation of both audio and data CDs. URL: http://www.fokus.gmd.de/research/cc/glone/employees/joerg.schilling/private/cdrecord.html
cdrecord-filters => <reply> $who, A patch for cdrecord to allow it to accept user-created modules.. URL: http://www.multimania.com/pixels/cdrecord-filters.html
cdrom_speed => <reply> $who, Small program to select cdrom drive speed. URL: http://dmpc.dbp.fmph.uniba.sk/~krivanek/cdrom_speed/
cdsetspd => <reply> $who, allows setting the reading speed of Plextor CDROM drives. URL: http://ourworld.compuserve.com/homepages/mjm5
CDXA => <reply> $who, Play Audio from Playstation CDROM XA files. URL: http://solaris1.mysolution.com/~jcatki/cdxa/
Celebrat => <reply> $who, Very simple non-interactive command-line calendar. URL: http://www.nada.kth.se/~d92-jwa/code/
cell.pl => <reply> $who, Cellular One Text Message Email. URL: http://eric.superblock.net/
centerICQ => <reply> $who, a textmode-based ICQ clone for Linux. URL: http://konst.org.ua/software.centericq.html
Cervisia => <reply> $who, KDE CVS frontend. URL: http://pauli.uni-muenster.de/~gehrmab/cervisia/cervisia.html
CFCC Video Algorithm => <reply> $who, Video coding and compression algorithm for low bit rate channels. URL: http://www.linuxtel.com/
ZMailer => <reply> $who, . URL: http://www.zmailer.org/
CfgTie => <reply> $who, Perl modules to access system configuration information. URL: http://www.geocities.com/CapeCanaveral/Lab/1862/script/CfgTie_1.html
cfingerd => <reply> $who, The Configurable Finger Daemon. URL: http://www.infodrom.north.de/cfingerd/
factpacks/Linux.fact view on Meta::CPAN
ecg2png => <reply> $who, Utility to convert high-res ECGs to Web-friendly PNG format. URL: http://www.cardiothink.com/downloads/ecg2png/
ECLiPt Mirroring Tool => <reply> $who, Full-featured mirroring script. URL: http://eclipt.uni-klu.ac.at/
ECLiPt Roaster => <reply> $who, GTK Interface to MkIsoFs and CDRecord for writing CDs on the fly. URL: http://eclipt.uni-klu.ac.at
ECLiPt Secure Tunnel => <reply> $who, TCP Secure Tunneling System. URL: http://eclipt.uni-klu.ac.at
ECLiPt Virtual Gallery Creator => <reply> $who, Create nice WWW Image Galleries and index pages. URL: http://eclipt.uni-klu.ac.at/projects/evg/
Ecology-HOWTO => <reply> $who, Linux as a mean to protect our environment.. URL: http://www.snafu.de/~wehe/eco_linux.html
eCos => <reply> $who, Real Time Operating System. URL: http://sourceware.cygnus.com/ecos/
Edcom => <reply> $who, An easy to administer, multiuser, story posting system, written in perl5.. URL: http://edseek.com/developers.shtml
Eddie => <reply> $who, Robust, clustering, load balancing, high availability, web server tool.. URL: http://www.eddieware.org/
editek => <reply> $who, Colorizer for /etc/issue, /etc/issue.net and /etc/motd. URL: http://www.xnot.com/editek/
edna => <reply> $who, tiny HTTP server for selecting and streaming MP3 files. URL:
eEMU => <reply> $who, Enterprise Event Management and Monitoring Utility. URL: http://www.jarrix.com.au/
efingerd => <reply> $who, Another finger daemon for linux. URL: http://melkor.dnp.fmph.uniba.sk/~garabik/efingerd.html
EFMC => <reply> $who, EFMC (Element's Formula Mass Calculator) calculates Formula Mass. URL: http://emu.simplenet.com/misc/efmc-0.1.tar.gz
efs => <reply> $who, Extent File System support (read-only). URL: http://aeschi.ch.eu.org/efs/
Efsane => <reply> $who, Turkish Window Manager for X. URL: http://efsane.sitebest.com/
efsmod => <reply> $who, Read EFS (Silicon Graphic's own Filesystem) Media on a Linux Platform. URL: http://wwwcip.informatik.uni-erlangen.de/user/cnvogelg/proj.html
egcs => <reply> $who, Experimental set of enhancements for the GNU tools. URL: http://www.cygnus.com/egcs/
Egg => <reply> $who, Interpreter for the language in Dijkstra's Discipline of Computer Programming. URL: http://www.andrewcooke.free-online.co.uk/jara/egg/index.html
ZNibbles => <reply> $who, Networked multiplayer nibbles/snake game for X11/Motif. URL: http://www.stud.enst.fr/~vmallet/ZNibbles.html
eggdrop2 => <reply> $who, IRC bot, written in C. URL: http://www.eggdrop.net/
factpacks/Linux.fact view on Meta::CPAN
Gamora => <reply> $who, Java based server construction, hosting, and adminstration architecture.. URL: http://gamora.org/
gamtv => <reply> $who, A free MPEG player with a nice GTK interface. URL: http://andrej.co.ru/programs/gamtv/
ganesha => <reply> $who, GTK program to locates multiple download sites for ftp.. URL: http://www.frontiernet.net/~pani/downloads.html
GannonChat => <reply> $who, Web-Based Chat using PERL and MySQL. URL: http://chat.nitco.com/
Ganymede => <reply> $who, GPL'ed Network Directory Management System. URL: http://www.arlut.utexas.edu/gash2/
GAP => <reply> $who, A new approach to distributed administration. URL: http://www.gsyc.inf.uc3m.es/~assman/gap/
garbmail => <reply> $who, Delete old messages from mailboxes in /var/spool/mail. URL: ftp://ftp.signum.se/pub/misc/garbmail/garbmail-1.0.tar.gz
Garou Chase => <reply> $who, Game without long lasting interest.. URL: http://rocloiso.planet-d.net/
GASM => <reply> $who, Freeware Assembler. URL: http://gaztek.tpu.org
Gaspell => <reply> $who, A Gnome Frontend to Aspell. URL: http://metalab.unc.edu/kevina/aspell/
gatelogin => <reply> $who, Allows a user to login to a gateway and select a server behind the firewall. URL: http://www.stat.auckland.ac.nz/~blom001/gatelogin/
GATOS => <reply> $who, ATI-TV software for Linux.. URL: http://www.core.binghamton.edu/~insomnia/gatos/
GazOS => <reply> $who, Protected mode OS kernel with source code, all drivers built in.. URL: http://www.gaztek.co.uk/gazos/index.html
gbase => <reply> $who, A GTK program for converting between bases.. URL: http://www.hibernaculum.demon.co.uk/
gbasm => <reply> $who, gameboy assembler. URL: http://emu.simplenet.com/misc/gbasm-0.0.5.tar.gz
gbe => <reply> $who, gbe is a gameboy emulator for X and SVGAlib. URL: http://emu.simplenet.com/gb/gbe/
gbeta => <reply> $who, Advanced OO language. URL: http://www.daimi.au.dk/~eernst/gbeta/
GBlippie => <reply> $who, User interface functionality extension to Gtk/GNOME.. URL: http://GBlippie.mini.dhs.org/
gbox_applet => <reply> $who, mbox watcher. URL: http://www.informatik.uni-bremen.de/~crunchy/linux/gbox_applet.html
GBuffy => <reply> $who, A GTK+ multiple mailbox monitor program. URL: http://www.fiction.net/blong/programs/gbuffy/
gbuild => <reply> $who, build tool to automate cvs update, compilation, and packaging. URL: http://www.cryon.com/gbuild/
GCache => <reply> $who, Generic cache class for Python. URL: ftp://minkirri.apana.org.au/pub/python/GCache-0.1.tar.bz2
gcc => <reply> $who, . URL: http://egcs.cygnus.com/
GCD => <reply> $who, A cd-player with a gtk+ interface. URL: http://www.nostatic.org/grip/
Gcdplay => <reply> $who, GPL'ed CD player with local and server-based cddb support.. URL: http://www.korax.net/~mglisic/gcdplay/index.html
gchbkgrd => <reply> $who, Program to constantly change the desktop's background. URL: http://www.bitdaddy.com/~mono/gchbkgrd/
GChip8 => <reply> $who, An interpreter/emulator for the CHIP8 virtual machine.. URL: http://cerealbox.angel.nu/gchip8.html
GClipper => <reply> $who, A multiple buffer clipboard that automatically fetches new selections.. URL: http://thunderstorms.org/gclipper/gclipper-1.1.tar.gz
GCO => <reply> $who, A database for keeping track of your comic collection.. URL: http://www.daimi.au.dk/~maxx/html/maxximum-linux.html
gcombust => <reply> $who, gtk+ frontend for mkisofs and cdrecord. URL: http://www.iki.fi/jmunsin/gcombust
GCompte => <reply> $who, A program to keep track of your finances. URL: http://www.linux-france.org/prj/gcompte/
GConf => <reply> $who, Configuration storage library, like libproplist or the Windows Registry. URL: ftp://ftp.gnome.org:/pub/GNOME/sources/GConf/GConf-0.1.tar.gz
Gconfig => <reply> $who, A router configuration tool. URL: http://www.employees.org/~stannous/gconfig.html
gd => <reply> $who, A library used to create PNG images. URL: http://www.boutell.com/gd/
GDB => <reply> $who, GDB, The GNU Debugger. URL: http://sourceware.cygnus.com/gdb/
gdbm => <reply> $who, GNU database library for C. URL: http://www.gnu.org/software/gdbm/gdbm.html
gdcd => <reply> $who, GTK CD player with Cover Art Index and CDDB support. URL: http://gdcd.undergrid.net/
Gdchart module => <reply> $who, A perl port of an excellent graphing package.. URL: http://www.aestus.net/gdchart/
factpacks/Linux.fact view on Meta::CPAN
HTMaiL => <reply> $who, Perl5 mail to HTML utility, for mailing list archives, etc.. URL: http://www.chaotika.net/code/HTMaiL/
HTML PLAIN => <reply> $who, A revolutionary HTML precompiler. URL: http://artho.com/webtools/plain/
HTML Tidy => <reply> $who, Cleans up HTML source and formats it nicely.. URL: http://www.w3.org/People/Raggett/tidy/
HTML-Tree => <reply> $who, Generates HTML Tree Diagram of Web Site HTML Web Pages. URL: http://pagesz.net/~scotty/perlscripts/html-tree-desc.html
html2c => <reply> $who, HTML - CGI-BIN C development tool. URL: http://www.gate.net/~ddata/utilities
Html2PHax => <reply> $who, Webclient to Hylafax for a PHP enabled Apache webserver. URL: http://www.xs4all.be/~mosaic/html2phax/
html2texi => <reply> $who, Converts HTML to texinfo.. URL: http://www.uncg.edu/~wlestes/software/
HTML::DynamicTemplate => <reply> $who, Flexible and dynamic HTML template class. URL: http://perl.m80.org/HTML/HTML-DynamicTemplate-0.94.tar.gz
HTML::Embperl => <reply> $who, Embed Perl into HTML Pages with a lot of features especialy for dynamic webpage. URL: http://perl.apache.org/embperl/
HTML::EP => <reply> $who, PHP-like system based on Perl. URL: ftp://ftp.funet.fi/pub/languages/perl/CPAN/authors/id/JWIED/
HTML::EP::Explorer => <reply> $who, Web interface for selecting and printing files on your web server. URL: ftp://ftp.funet.fi/pub/languages/perl/CPAN/authors/id/JWIED/
HTML::EP::Glimpse => <reply> $who, Simple search engine based on Glimpse. URL: ftp://ftp.funet.fi/pub/languages/perl/CPAN/authors/id/JWIED/
HTML::Mason => <reply> $who, A component-based perl web development environment. URL: http://www.masonhq.com/
HTML::Pager => <reply> $who, Perl module to handle CGI HTML paging of arbitary data. URL: http://www.cpan.org/authors/id/S/SA/SAMTREGAR/
HTML::Template => <reply> $who, A simple and fast HTML Template module for Perl. URL: http://www.cpan.org/authors/id/S/SA/SAMTREGAR/
htmlcrunch => <reply> $who, a simple HTML-compressor. URL: http://mstengel.home.dhs.org/
HTMLDOC => <reply> $who, Converts HTML to indexed HTML, PostScript, and PDF. URL: http://www.easysw.com/htmldoc/
HtmlLayout => <reply> $who, A Java LayoutManager, uses an HTML-like syntax. URL: http://braindamage.org/HtmlLayout/
htmlPARSER => <reply> $who, htmlPARSER is a set of python classes which parse HTML templates. URL: http://heimat.de/mrtopf/htmlparser/
HTMLPerlSETI => <reply> $who, Display SETI@home client statistics in an HTML table.. URL: http://www.mobius-soft.com/htmlperlseti.htm
htmlpp => <reply> $who, Perl-based Preprocessor for HTML documents. URL: http://www.imatix.com/html/htmlpp/index.htm
factpacks/Linux.fact view on Meta::CPAN
ISCA BBS Client => <reply> $who, Client program for ISCA BBS and DOC-style BBS systems. URL: http://blackout.net/~error/client/
ISDK => <reply> $who, Information System Development Kit. URL: http://www.revai.hu/isdk/
isdn4net => <reply> $who, Scripts for operating and configuring isdn4linux. URL: http://www.terminator.net/isdn4net/
isdnadmin => <reply> $who, Linuxconf module for administration and operation of isdn4linux. URL: http://www.terminator.net/isdnadmin/
ISDNCALL => <reply> $who, Pops up an X message if someone is calling via ISDN. URL: http://www.fuzzys.org/isdncall/
isdnpack => <reply> $who, An ISDN under Linux all-in-one package.. URL: http://server.ownedtech.org/
isdn_scripts => <reply> $who, ISDN configuration tool. URL: http://www.titulaer.de/isdn/
ISE EiffelBench => <reply> $who, Seamless object oriented development environment. URL: http://eiffel.com/
Isearch => <reply> $who, . URL: http://www.etymon.com/Isearch/
isectd => <reply> $who, middleware daemon for client/server, dist. URL: http://home.netcom.com/~tgagne/
iSelect => <reply> $who, Interactive Selection Tool. URL: http://www.engelschall.com/sw/iselect/
Ishmail => <reply> $who, Very powerful GUI e-mail tool. URL: http://ishmail.linuxbox.com
ISIC => <reply> $who, Sends controlled, semi-random packets to test IP Stacks and Firewalls. URL: http://expert.cc.purdue.edu/~frantzen/
IsinGlass => <reply> $who, Firewall setup script designed to protect dial-up users.. URL: http://www.tummy.com/isinglass
isinglass-hzd => <reply> $who, Firewall script designed to protect dial-up users. URL: http://www.hazard.maks.net/~hazard
Islamic Timer => <reply> $who, Calculates Islamic Prayer times, Hijri calender, calender converter. URL: http://www.cob.ohio-state.edu/~wmuhanna/IslamicTimer.html
ISO8211Lib => <reply> $who, ISO/IEC 8211 library. URL: http://gdal.velocet.ca/projects/iso8211/
isp-watcher => <reply> $who, A perl script which monitors lines at an ISP for disconnects.. URL: http://cyberpunks.org/holograph/darkewolf.phtml
ISPd => <reply> $who, Billing/user management software for ISPs. URL: http://ispd.eburg.com
isreal => <reply> $who, Tells if an image is real, computer generated, or not real.. URL: http://www.striker.ottawa.on.ca/~aland/isreal/
ITISSL => <reply> $who, A Java 2 implementation of Sun' SSL Reference API based on SSLeay/OpenSSL. URL: http://www-sp.iti.informatik.tu-darmstadt.de/itissl/
factpacks/Linux.fact view on Meta::CPAN
Kazlib => <reply> $who, Robust ANSI C data structure library.. URL: http://users.footprints.net/~kaz/kazlib.html
KBackup => <reply> $who, . URL: http://www.phy.hw.ac.uk/~karsten/KBackup/
kBag => <reply> $who, Synchronizes your documents between one computer and another.. URL: http://members.tripod.com/Kir_Smirnov/kBag/index.html
kbd => <reply> $who, Keytable files and keyboard utilities. URL: ftp://ftp.win.tue.nl/pub/linux/utils/kbd/
kBeroFTPD => <reply> $who, KDE Front-End for BeroFTPD configuration. URL: ftp://beroftpd.unix.eu.org/pub/BeroFTPD/kBeroFTPD/
KBiff => <reply> $who, New mail notification utility for KDE. URL: http://www.pobox.com/~kurt_granroth/kbiff/index.html
KBind => <reply> $who, KDE front-end to configure the Bind nameserver.. URL: http://asimov.unitec.edu/~cgcorea/kbind.html
KBlade => <reply> $who, KBlade is a frontend to BladeEnc (mp3 encoder) for KDE. URL: http://www.multimania.com/linzeus/kblade/
KBlinsel => <reply> $who, Simple stereogram generator for KDE.. URL: http://www.eisscholle.de/
KBML => <reply> $who, JavaBeans serialization using XML. URL: http://www.inria.fr/koala/kbml/
KBootSelector => <reply> $who, KDE Boot option selector. URL: http://myplace.to.be/Pantoffel/kbootsel/index.html
kbquery => <reply> $who, Command-line search util for the linux knowledge base. URL: http://linuxkb.cheek.com/
KBriefcase => <reply> $who, Briefcase for KDE similar to Windows briefcase.. URL: http://netnow.micron.net/~mrolig/kbriefcase/
KBshare => <reply> $who, Web based knowledge manager. URL: http://www.snipes.org/bspages/projects/
KCdCd => <reply> $who, KDE frontend for the cdcd cd player.. URL: http://ultra7.unl.edu.ar
kcdwrite => <reply> $who, KDE frontend for cd-writing tools. URL: http://harmony.ruhr.de/~core/kcdwrite
kchess => <reply> $who, KDE frontend for chess programs. URL: http://sharmas.dhs.org/~adsharma/projects/kchess.html
Kclock => <reply> $who, . URL: http://www.geocities.com/SiliconValley/Vista/2964/kclock.html
kcmbind => <reply> $who, A KDE front-end to configure bind. URL: http://www.100webstreet.com/kcmbind/
kcmdhcpd => <reply> $who, A configure program for the ISC DHCP-Server for the KDE-project.. URL: http://www.100webstreet.com/kcmbind/dhcp.html
Kcmjoy => <reply> $who, Configure your joystick via kcontrol. URL: http://www.geocities.com/SiliconValley/Vista/2964/applications.html
factpacks/Linux.fact view on Meta::CPAN
Ptester => <reply> $who, HTTP Benchmarking tool. URL: ftp://ftp.lysator.liu.se/pub/unix/ptester
ptf => <reply> $who, A TCP forwarder written in Python. URL: http://www.tuts.net/~klausman/english/linux.html
ptk-phone => <reply> $who, Phonebook application in Perl/Tk. URL: http://tcfreenet.org/~schewe/ptk-phone/phone.html
ptkfonted => <reply> $who, Perl/Tk BDF Font Editor. URL: http://cantor.res.cmu.edu/gutenberg/
ptkrip => <reply> $who, Perl/Tk frontend to cdparanoia and bladeenc. URL: http://www.red-bean.com/~lefty/ptkrip.html
PTlink ircd => <reply> $who, New featured ircd with a great services integration. URL: http://www.ptlink.net/
PTlink Services => <reply> $who, IRC Registration Services. URL: http://www.ptlink.net/
ptrans => <reply> $who, Convert UTF-8 to plain text. URL: http://www.whizkidtech.net/i18n/
ptris => <reply> $who, Pike GTK Tetris. URL: http://www.pike-community.org/code/show_single.html?id=20
PTSPACE => <reply> $who, Patrol in Space X11 arcade game. URL: http://www.ezmo.com/jason/projects.html
Public Bookmark Generator => <reply> $who, Generate a public bookmark (selected items) out of your bookmarks. URL: http://www.loria.fr/~michel/PBM/
PulseTLM => <reply> $who, A full featured 3D Transmission Line Matrix (TLM) simulator. URL: http://cemtach.org/
pup => <reply> $who, Printer Cartridge Utility. URL: http://pup.hypermart.net/
purl => <reply> $who, A tool to check if web-pages have been modified. URL: http://homer.isoe.ch/~lanzm/purl/
PURP => <reply> $who, An ncurses-based RPM-manager. URL: http://www.lysator.liu.se/purp/
pushsite => <reply> $who, Utility to update remote site. URL: http://www.dyer.demon.co.uk/slug/tipscrip.htm
PVCj => <reply> $who, Client side installation of JARs within Sun's Java Plugin. URL: http://granitepeaks.com/pvcj/
PVFS => <reply> $who, A parallel file system for clusters of PCs. URL: http://www.parl.clemson.edu/pvfs/
PVM => <reply> $who, A portable message-passingprogramming system. URL: http://www.epm.ornl.gov/pvm/
PVM Gmake => <reply> $who, Distributed gmake. URL: http://www.crosswinds.net/~jlabrous/GNU/PVMGmake/
PVM++ => <reply> $who, A C++-Library for PVM. URL: http://goethe.ira.uka.de/~wilhelmi/pvm++/
factpacks/Linux.fact view on Meta::CPAN
quotatool => <reply> $who, Command line utility for setting Linux filesystem quotas. URL: http://devel.duluoz.net/quotatool/
Quotes => <reply> $who, Financial Quotations and Linux headlines. URL: http://www.iae.nl/users/grimaldo/OpenSoft/quotes.shtml
Quotesaq => <reply> $who, A quote script with a web interface for Eggdrop IRC bots. URL: http://rad.capecod.net/quote/
Qutar => <reply> $who, QT interface for tar. URL: http://home.sol.no/~geirerni/qutar/
QVocab => <reply> $who, A program to learn the vocabulary of a foreign language. URL: http://www.qvocab.seul.org/
Qvwm => <reply> $who, Windows 95 like window manager for the X Window System. URL: http://www.qvwm.org/
QW/Q2 MasterBrowser => <reply> $who, QuakeWorld and Quake2 Master Server. URL: http://www.thegrid.net/smiller/MasterBrowser/Linux/
R => <reply> $who, A language and environment for statistical computing.. URL: http://www.r-project.org
R2D2 => <reply> $who, Tool for developing applications that require run-time symbolic data access.. URL: http://www.zentropix.com/
RabbIT => <reply> $who, Mutating, caching webproxy to speed up surfing over slow links. URL: http://www.nada.kth.se/projects/prup98/web_proxy/
Rabbit Selector => <reply> $who, A happy restaurant selector. URL: http://eclipse.knight-rider.org/rabbit/
Rabid Squirrel Linux => <reply> $who, A Linux distribution for power users and sysadmins. URL: http://www.rabid.de
Raceway => <reply> $who, Embedded interface for ZENamp. URL: http://www.zenamp.net/sections/raceway
Radio Jockey => <reply> $who, Random multi-format player for mp3's, au's, wav's and pictures. URL: http://www.acorn.net/~ajalics/
radio-spase => <reply> $who, SPASE PCRadio V4L device driver. URL: http://www.elis.rug.ac.be/~ronsse/mr/radio-spase.c
RadioActive => <reply> $who, Radio tuner for X11 and Video4Linux. URL: http://cactus.rulez.org/radioactive/
Radius => <reply> $who, Remote Authentication Dial In User Service. URL: http://www.livingston.com/tech/docs/radius/
radiusclient => <reply> $who, framework and library for writing RADIUS clients. URL: http://www.cityline.net/~lf/radius/
radiusContext => <reply> $who, A RADIUS accounting log analysis package. URL: http://www.tummy.com/radiusContext/
radiusd-sql => <reply> $who, RADIUS server modified to store accounting in a MySQL database. URL: http://www.mindrot.org/code/radiusd-sql.php3
radkill => <reply> $who, BASH script for ISP's that wish to guarantee no busy signals. URL: ftp://ftp.nmo.net/pub/radkill/
Rael's Binary Grabber => <reply> $who, Automated tool for downloading binaries from UseNet newsgroups.. URL: http://thelamb.dhs.org/~rael/bgrab/
Rain's PPP scripts => <reply> $who, Scripts to simplify the use and setup of pppd. URL: http://www.bluecherry.net/~rain/rppp-2.9.fix.tar.gz
rainbow => <reply> $who, OpenGL visualization plugin for xmms, based on pulsating rainbows. URL: http://horizon.pair.com/linux/
Ramp Music Player => <reply> $who, A front end to mpg123 with next-generation playlist capabilities. URL: http://www.brilligsys.com/ramp/
Ranalis => <reply> $who, A MOO2-like strategy game. URL: http://antaran.dhs.org/
rand => <reply> $who, random pipe. URL: http://math.smsu.edu/~br0ke/rand.html
Random line selector => <reply> $who, Selects random line from STDIN. URL: http://artho.com/randline.html
Random TagLine => <reply> $who, Pick a random line from a text file and output it to a HTML page. URL: http://kspoon.tsx.org/
Randsig => <reply> $who, Small random signature generator using taglines.. URL: http://www.ctv.es/USERS/sromero/prog/randsig.html
randtype => <reply> $who, Displays text at random intervals.. URL: http://cutlet.linuxbox.com/utilities/
RAPID => <reply> $who, Commodity and stock graphing for technical analysis trading decisions. URL: http://www.daveware.com
RAR For Linux => <reply> $who, A general purpose archiving and compression program. URL: http://www.softwareblast.com/entries/00001673.sml
rarpd => <reply> $who, Portable user-mode RARP daemon. URL: ftp://ftp.dementia.org/pub/net-tools/
Rasca => <reply> $who, Extended MP3 Player.. URL: http://www.penultima.org/~rasca/
Raven SSL Module => <reply> $who, RSA licensed 128-bit strong cryptography SSL module for the Apache web server.. URL: http://www.covalent.net/
raw2s => <reply> $who, This changes a binary file into GNU ASM. URL: http://www.dextrose.com/info/0309raw2s.htm
RawSnif => <reply> $who, Easily configurable Perl based network sniffer written using Net::RawIP modules.. URL: http://www.nfsg.org/downloads/rawsnif.html
factpacks/Linux.fact view on Meta::CPAN
Secure Remote Password Protocol => <reply> $who, Zero-knowledge password-based authentication and key exchange protocol. URL: http://srp.stanford.edu/srp/
Secure Shell => <reply> $who, Shell script for secure logins using encryption and dual authorization. URL: http://www.leenux.com/scripts/
Secure Sockets Agent Client => <reply> $who, A system for securing the insecure communications between existing applications.. URL: http://www.cyber.ee/ssa/
Secure Sockets Agent Server => <reply> $who, A system for securing the insecure communications between existing applications.. URL: http://www.cyber.ee/ssa/
Secure Syslog => <reply> $who, Cryptographically secure system logging tool for UNIXsystems. URL: http://www.core-sdi.com/english/slogging/ssyslog.html
Secure-Linux Patch => <reply> $who, Linux kernel patch to block most stack overflow exploits. URL: http://www.openwall.com/linux/
sed => <reply> $who, GNU Stream Editor. URL: ftp://ftp.gnu.org/pub/gnu/
SeeR => <reply> $who, C/C++ scripting engine. URL: http://home.elka.pw.edu.pl/~ppodsiad/seer/
segfault.php3 => <reply> $who, segfault.php3 retrieves the latest segfault news for a webpage.. URL: http://swamp.chl.chalmers.se/backends/
Selathco => <reply> $who, LaTeX To HTML Converter. URL: http://dione.zcu.cz/~toman40/selathco/
selectwm => <reply> $who, A window manager selector. URL: http://www.altern.org/ldufresne/selectwm/
Self Serve FAQ => <reply> $who, PHP scripts for Web-based FAQs. URL: http://lcg.org/ssfaq/
semu => <reply> $who, Sega Saturn Emulator. URL: http://emu.simplenet.com/semu/
Send Packet => <reply> $who, Network administration tool. URL: http://redirect.to/mg/
SendDay => <reply> $who, A daemon to email a new URL every day.. URL: http://www3.cybercities.com/s/suneatshours/sendday/
Sendmail => <reply> $who, Powerful and flexible Mail Transport Agent. URL: http://www.sendmail.org/
sendmail-tls => <reply> $who, SSL/TLS Wrapper for sendmail (and other MTAs). URL: http://opensource.3gi.com/sendmail-tls/
SendPage => <reply> $who, Utility for sending alphanumeric pages using the IXO protocol.. URL: http://www.cpoint.net/projects/sendpage/
SENSE => <reply> $who, Distributed Shared Memory system. URL: http://hjem.get2net.dk/dduck/sense.html
Sentinel => <reply> $who, Fast system file scanner. URL: http://zurk.netpedia.net/zfile.html
sersniff => <reply> $who, Program for tunnelling/sniffing for between 2 serial ports.. URL: http://www.earth.li/projectpurple/progs/sersniff.html
factpacks/Linux.fact view on Meta::CPAN
sherpa => <reply> $who, A system security configuration and maintenance tool. URL: http://www.nbank.net/~rick/sherpa/
Shopping Cart => <reply> $who, A very simple shopping cart solution for PHP and MySQL. URL: http://www.montana.com/ethan/shop.html
shout => <reply> $who, A supplying and a receiving client for the shoutcast streaming mp3 system.. URL: http://sargasso.flum.org/shout/
Shout plugins => <reply> $who, Netscape helper scripts to listen to Shoutcast in mpg123 or x11amp. URL: http://www.negia.net/~timeburn/index.html
ShoutPlug => <reply> $who, SMiaB plug-in for ShoutCast MP3 audio servers. URL: http://www.vaxxine.com/pegasoft/
shout_tools => <reply> $who, CGI suite for icecast/shout song status/requesting. URL: http://www.andrew.cmu.edu/~nstrom/shout_tools/index.html
show-host => <reply> $who, Lets a website always point to a DHCP'd or dialup computer.. URL: http://www.core.binghamton.edu/~burner/show-host/
shredder => <reply> $who, Punishes users who have too many processes running. URL: http://www3.cybercities.com/s/sylex/index.html
shsmod => <reply> $who, enable High Speed mode on some SMC/NS/Winbond Multi-I/O chips Serial. URL: http://www.os.rim.or.jp/~gigo/over115K/index_e.html
shstat => <reply> $who, Designed to give stat() info to shell scripts. URL: http://www.gormand.com.au/tools/shstat/
shThemes => <reply> $who, GTK theme selector. URL: http://home.earthlink.net/~ntnunk/shthemes/
shuffle => <reply> $who, Write lines of concatenated file(s) in random order. URL: http://cscw1.ifs.uni-linz.ac.at/alba/shuffle/
Shutdown Commander => <reply> $who, Curses-based console shutdown utility. URL: http://www.duskglow.com/software.shtml
shViewer => <reply> $who, GTK+/Imlib image viewer. URL: http://home.earthlink.net/~ntnunk/shviewer/
si => <reply> $who, /proc system information viewer. URL: http://si.netpedia.net/
Siag Office => <reply> $who, Free office package for Unix. URL: http://siag.nu/
sickday.pl => <reply> $who, Gives you an occasional day off from work.. URL: http://9mm.com/philez.html
sidentd => <reply> $who, Secure identd written in perl, allows per-user fake replys. URL: http://insecurity.net/
SIDPLAY => <reply> $who, C64 music player and SID sound chip emulator. URL: http://www.geocities.com/SiliconValley/Lakes/5147/
sifi => <reply> $who, Stateful TCP/IP packet filter for Linux.. URL: http://www.ifi.unizh.ch/ikm/SINUS/firewall/
sigd/motdd => <reply> $who, A .signature file generator daemon. URL: http://thunder.temple.edu/~mjasner/sigquote/sigd.html
factpacks/Linux.fact view on Meta::CPAN
Winux => <reply> $who, Graphical configuration interface for LOADLIN. URL: http://www.linux-france.org/prj/winux/
Wipe => <reply> $who, Secure deletion of files from magnetic media.. URL: http://gsu.linux.org.tr/wipe/
WipeOut => <reply> $who, IDE for C++, Java, Eiffel, and Fortran. URL: http://www.softwarebuero.de/wipeout-eng.html
WiredX => <reply> $who, pure Java X Window System server. URL: http://www.jcraft.com/wiredx/
Wireless Tools/Howto => <reply> $who, Generic tools to setup some Wireless LAN drivers + exhaustive web ressources. URL: http://www.hpl.hp.com/personal/Jean_Tourrilhes/Linux/
Wisio => <reply> $who, An experimental project for a graphical windowing system. URL: http://personal.eunet.fi/pp/wisio/
Wizard => <reply> $who, Component to add a Windows 95-like Wizard to an application.. URL: http://www.bigfoot.com/~teras/wizard/
wm2 => <reply> $who, Minimal, elegant and unusual window manager. URL: http://www.all-day-breakfast.com/wm2/
wmakerconf => <reply> $who, GTK based configuration tool for WindowMaker window manager. URL: http://ulli.linuxbox.com/wmakerconf/
WMAmpMenu => <reply> $who, A simple utility that inserts MP3 playlists in your WM root menu.. URL: http://www.snowman.sgic.fi/ssl/wmampmenu/
wmanager => <reply> $who, X11 window manager selector. URL: http://heuss.techfak.uni-bielefeld.de/www/mtessmer/wmanager/
wmapm => <reply> $who, Small dock-app that shows continually-updated APMstatistics. URL: http://nis-www.lanl.gov/~mgh/WindowMaker/DockApps.shtml
wmappl => <reply> $who, Window Maker Application Launcher. URL: http://www.pobox.com/~charkins/wmappl.html
wmbattery => <reply> $who, APM status dock app. URL: http://kitenet.net/programs/wmbattery/
WMBeats => <reply> $who, InternetTime Clock .. URL: http://shadowmere.student.utwente.nl
wmbiff => <reply> $who, A new mail notifier for WindowMaker.. URL: http://www.elect.ru/wmbiff/
wmbored => <reply> $who, Displays the time between a past date and a future date.. URL: http://www.worldnet.net/~labayle/bored/
wmbp6 => <reply> $who, DockApp monitoring sensors for temperatures and fans speed.. URL: http://goupil.linuxfr.org/downloads/
WmBreakOut => <reply> $who, A breakout clone for the WindowMaker dock. URL: http://vizzini.cs.jhu.edu/~fezzik/wmbreak.html
wmCalClock => <reply> $who, Calendar clock with anti-aliased text. URL: http://nis-www.lanl.gov/~mgh/WindowMaker/DockApps.shtml
wmcdplay => <reply> $who, A CD player designed for WindowMaker.. URL: http://www.geocities.com/SiliconValley/Vista/2471/wmcdplay.htm
factpacks/Linux.fact view on Meta::CPAN
wmlm78 => <reply> $who, WindowMaker utility to display system monitor information from a lm78 chip. URL: http://users.ox.ac.uk/~kebl0850/wmlm78/
WMLmMon => <reply> $who, Lm78/75 monitor applet for WindowMaker. URL: http://www.ne.jp/asahi/linux/timecop/
wmlmon.app => <reply> $who, A Window Maker dock app displays information gathered by lm7x chips.. URL: http://www.comphardware.com/downloads/
WMM => <reply> $who, A clock and filesystem mounter in a single Window Maker dockapp.. URL: http://www.chez.com/stell/progs/
WMMail => <reply> $who, Xbiff-like mail-checker for WindowMaker. URL: http://earth.gaianet.net/~scorpio/
wmMand => <reply> $who, A mandelbrot set explorer.. URL: http://nis-www.lanl.gov/~mgh/WindowMaker/DockApps.shtml
wmMatrix => <reply> $who, Early beta version of a cpu monitor built around the display from the movie.. URL: http://nis-www.lanl.gov/~mgh/WindowMaker/DockApps.shtml
WMmhcheck => <reply> $who, Window Maker applet to display number of messages in your mailboxes. URL: http://www.flinet.com/~peabrain/wmmhcheck/index.html
WMMixer => <reply> $who, A WindowMaker mixer.. URL: http://www.hta.nl/php/Arnoud.van.Riessen/
wmmixer-alsa => <reply> $who, A hack of wmmixer to make it use ALSA (Advanced Linux Sound Architecture). URL: http://iznogood.bohemians.org/
wmmmnn => <reply> $who, wm-mail-mon-net-netselect combined in one compact app.. URL: http://www.utanet.fi/~sniff/
WMmnt => <reply> $who, a mount.app-like dockapp, that uses LEDs and big icons. URL: http://wmaker.strlen.net/stuff.shtml
WMMon => <reply> $who, . URL: http://windowmaker.mezaway.org/dockapps/wmmon.html
WMMon+SMP => <reply> $who, WMMon modified to work on Dual-Processor systems. URL: http://www.ne.jp/asahi/linux/timecop/
wmMoonClock => <reply> $who, Displays the current phase and ephemeris of the Moon.. URL: http://nis-www.lanl.gov/~mgh/WindowMaker/DockApps.shtml
wmmp3 => <reply> $who, mpg123 front end for Window Maker. URL: http://www.dotfiles.com/software/wmmp3/
WMmpg123 => <reply> $who, Menu generator for WindowMaker and mpg123. URL: http://hub.org/~jeff/
wmMuezzin => <reply> $who, Computes time and direction for a prayer to Mecca. URL: http://www.worldnet.net/~labayle/
wmnet => <reply> $who, Provides network statistics for the Window Maker desktop. URL: http://www.digitalkaos.net/linux/wmnet/
WMNetMon => <reply> $who, A WindowMaker dockable network host monitoring tool using ICMP pings.. URL: http://neubula.utad.pt/~alvieboy/new/wmaker.html
wmphoto => <reply> $who, Put your favorites pictures on your desktop. URL: http://www.dcc.uchile.cl/~amartoq/wmphoto
factpacks/Linux.fact view on Meta::CPAN
TkHeadlines => <reply> $who, TkHeadlines is a headline viewer for some news and software sites. URL: http://loki.dhs.org/~rick/tkheadlines_0.68.tgz
gnome-8ball => <reply> $who, gnome-8ball is a simple magic 8-ball GNOME-panel application.. URL: http://mocat.qpt.com/gnome-8ball/gnome-8ball-0.1.tar.gz
dhcp-conf => <reply> $who, dhcpd-conf helps with creating and maintaning a DHCPd configuration file for small- to medium- sized LANs. URL: http://members.xoom.com/vschade/dhcp-conf/dhcp-conf.tgz
wwsympa => <reply> $who, WWSympa is a Web interface to the Sympa mailling list manager. URL: http://listes.cru.fr/sympa/distribution/contrib/wwsympa/
JSwat => <reply> $who, JSwat is an extensible, standalone, graphical Java debugger front-end. URL: http://home.earthlink.net/~nfiedler/java/jswat/download.html
LUCI => <reply> $who, LUCI is an Universal Configuration Interface. URL: http://www.multimania.com/zubro/luci/luci-0.1.0.tar.gz
Blade-- => <reply> $who, Blade-- is a C++ wrapper/interface to the BLADE web-based environment. URL: http://www.thestuff.net/bob/file/blade/libblade---0.1.0.tar.gz
gendns => <reply> $who, With a site config file, a domain script, and gendns.pl you can create everything you need to manage lots of domains quickly and easily. URL: http://wildgear.com/gendns/gendns.tar.gz
ANTLR => <reply> $who, ANTLR (ANother Tool for Language Recognition) is a language tool that provides a framework for constructing recognizers, compilers, and translators from grammatical descriptions containing C++ or Java actions. URL: http://www.a...
Apprentice => <reply> $who, Apprentice is an HTTP daemon written in Perl, based on HTML::Mason and libwww-perl.. URL: http://www.halyava.ru/do/Apprentice-0.1.tar.gz
XCounter => <reply> $who, XCounter is a X11-based traffic monitoring program for Linux that displays information about IP traffic on a selected interface. URL: http://www.fortunecity.com/skyscraper/romrow/935/XCounter-1.0.1.tar.gz
ttm => <reply> $who, ttm is a simple but flexible command-line based Perl program for managing lists of tasks. URL: http://www.new.ox.ac.uk/~adam/computing/ttm/ttm
EXG => <reply> $who, EXG is an extension to the eiffel-gtk wrapping library which provides almost complete Gdk wrapping (this was a minus of eiffel-gtk), Imlib wrapping, simple wizard support, trivial turtle graphics, and modal dialogs for file selec...
Craft: The Viscious Vikings => <reply> $who, The Viscious Vikings is a Warcraft-style strategy game with Vikings fighting each other for national survival.. URL: http://borneo.gmd.de/AS/janus/craft/craftcc35.html
ec64 => <reply> $who, ec64 (emulated C64) is an emulator for the Commodore 64 written in x86 assembly.. URL: http://mars.wiwi.uni-halle.de/ec64/download/
nb++ => <reply> $who, nb++ is a nuts-and-bolts C++ toolkit. URL: http://www.sourceforge.net/download.php?fileid=850
Empire Linux => <reply> $who, Empire Linux is a mini-distribution that fits on a floppy. URL: http://home.c2i.net/buddha9/empire/
dash => <reply> $who, dash is a shell to help make the V2 operating system easier to use. URL: http://v2dash.hypermart.net/downloads.html
FoSaT => <reply> $who, Friend of Snails and Turtles (FoSaT, pronounced "faucet") is a method to slowly read text files. URL: http://www.blackant.net/fosat/fosat-current.tar.gz
xfrisk-launcher => <reply> $who, xfrisk-launcher is a launcher for the X11 game XFrisk.. URL: http://www.r56o.f9.co.uk/xfrisk/versions/
loadmon.epplet => <reply> $who, loadmon.epplet is a simple load monitor for Enlightenment.. URL: http://entropy.atlantic.net/epplets/loadmon-0.1.tar.gz
TIP => <reply> $who, TIP (TIP Isn't Pico) is a Pico clone for *NIX. URL: http://faculty.plattsburgh.edu/astyanax/tip/dist/
AutoRelease Library => <reply> $who, The AutoRelease Library is a simple reference counting garbage collector for C++.. URL: http://www.fukt.hk-r.se/~per/autorelease/autorelease-0.5.tar.gz
factpacks/Linux.fact view on Meta::CPAN
Java Napster => <reply> $who, JNapster is a Java implementation of the Napster client which allows you to download and share MP3s over the Internet. URL: http://www.tux.org/~daneel/content/projects/10.shtml
Site Studio => <reply> $who, Site Studio is an online template-based Web site creation tool. URL:
RSync Manager => <reply> $who, RSync Manager (RSM) is a set of Python scripts to add and update packages for rsync-based mirror sites, and also create some nice HTML statistics from the logs. URL: http://www.softlab.ece.ntua.gr/~ckotso/RSM/RSM-0.2.0....
lispreader => <reply> $who, lispreader is a small library for reading expressions in Lisp syntax. URL: http://www.complang.tuwien.ac.at/~schani/lispreader/lispreader-0.1.tar.gz
KIrcPoker => <reply> $who, KIrcPoker is a graphical interface client to the on-line poker games that are played on the popular IRC (Internet Relay Chat) server at irc.poker.net.. URL: http://www.geocities.com/~engstad/kircpoker/kircpoker-0.3.tar.gz
Euro Converter => <reply> $who, Euro Converter is a little calculator which automagically converts Euro amounts into other equivalent currency values. URL: http://www.jedi.claranet.fr/euroconvert.tar.gz
PHP File Upload Class => <reply> $who, fileupload.class extends PHP's native support for uploading image and text files through a Web browser. URL: http://dave.imarc.net/downloads/fileupload.tar.gz
ixj => <reply> $who, Device drivers for Quicknet's Internet LineJACK and Internet PhoneJACK telephony/VoIP cards.. URL: http://www.quicknet.net/develop.htm
RDX => <reply> $who, RDX (Reverse Distributed Cron-like System) is a set of clients to connect to a server, and identify themselves via a string, and get a job list with schedules. URL: http://www.nobis.com/~ora/CS.tar.gz
dnscvsutil => <reply> $who, dnscvsutil maintains your DNS zone files under CVS control, and automatically updates reverse zones.. URL: http://hq.yok.utu.fi/download/
Moe Music => <reply> $who, Moe Music is a Web front end to mpg123 that contains a list of songs that can be queued and selected.. URL: http://www.users.bigpond.com/jwrennie/moe_music.0.1.0.tar.gz
RandGen => <reply> $who, RandGen is a small applet that can generate random data in CSV format which can be imported into postgresql or other DBMs.. URL:
POPNow => <reply> $who, POPNow allows you to provide a Web-based POP3 email front-end to your users with a browser interface in a secure environment.. URL:
Space Plumber => <reply> $who, Space Plumber is a 3D game, where you must find and activate the water extraction pumps from a maze of corridors before water level increases, swamping everything. URL: http://www.geocities.com/ResearchTriangle/Lab/9961...
E-Wireless => <reply> $who, E-Wireless is an Enlightenment epplet that will monitor the signal quality of an 802.11-compliant wireless networking card. URL: http://www.bitshift.org/E-Wireless.tar.gz
UTIS => <reply> $who, UTIS is a graphical application that helps you find the shortest route between two stations in the Metro of Paris. URL: http://www.jedi.claranet.fr/utis-1.0.tar.gz
Directory Lister => <reply> $who, Directory Lister is a tool which will recurse through subdirectories in order to produce a detailled listing of their contents. URL: http://www.jedi.claranet.fr/dlister-1.0.tar.gz
odbcisql => <reply> $who, Odbcisql is a windowing SQL processor for TCL/Tk, using the Tclodbc extension.. URL: http://www.neosoft.com/tcl/ftparchive/sorted/databases/odbcisql/1.0/
TclTicker => <reply> $who, TCLTicker is a simple stock tickertape, using HTTP requests to fetch quotes. URL: http://www.neosoft.com/tcl/ftparchive/sorted/apps/tclticker/1.1/
YakYak => <reply> $who, YakYak is a preprocessor for the parser generator Bison. URL: http://www.brics.dk/~damgaard/YakYak/download.html
Text::Template => <reply> $who, Text::Template is a module for doing dynamic content generation in Perl. URL: http://www.plover.com/~mjd/perl/Template/Text-Template-1.23.tar.gz
factpacks/Linux.fact view on Meta::CPAN
cpp1 => <reply> $who, Cpp1 is an experimental chess program written in C++. URL: http://www.keetweej.demon.nl/cpp1.tgz
rdial => <reply> $who, rdial is an extremely simple RPC server for Linux. URL: http://colorfullife.com/~manfreds/rdial/rdial.tar.gz
dclock => <reply> $who, dclock is an X11 desktop clock with a realistic LED-style display of the current time. URL: http://bach.ece.jhu.edu/~tim/programs/archive/dclock.tar.gz
gatO => <reply> $who, gatO is an interface to the UNIX command 'at'.. URL: http://www.arquired.es/users/aldelgado/proy/gato/gato-0.6.2.tgz
g3DSE => <reply> $who, g3DSE is a little tool to set the 3D Stereo Enhancement of your SoundBlaster card (if supported).. URL: http://studwww.rug.ac.be/~fcorneli/g3dse/download/g3dse-0.1.tar.gz
CAFire => <reply> $who, CAFire is a small toy that displays a burning trace after the mouse pointer in X. URL: http://home.zcu.cz/~cimrman3/cafire-latest.tgz
GPPP-Dialer => <reply> $who, GPPP-Dialer runs a connection script and shows the contents of a PPP log, and can run other programs after connecting. URL: http://www.pobox.com/~epg/software/gppp-dialer-0.1.0.tar.gz
Perlmclient => <reply> $who, Perlmclient is a Masqdialler client written in Perl. URL: http://www.vicnet.net.au/~jeremyl/perlmclient/perlmclient-0.2.tar.gz
Address Book => <reply> $who, Address Book is an extremely simple address database with search, edit, insert, drop, etc.. URL: http://ps-ax.com/address/
GTool => <reply> $who, GTool is a program to draw and analyze graphs (as in Graph Theory, not data analysis).. URL: http://erwin.math.lakeheadu.ca/gtool/index.php3?topic=download
gbgrand => <reply> $who, gbgrand is a small shell script that uses a list of directories to select a random background for the GNOME desktop. URL: http://www.chameleon.net/daf/gbgrand.tgz
The Bookexchange => <reply> $who, Bookexchange is a book exchange for the Web, allowing users to search, add, and edit books. URL: http://cs.uiowa.edu/~bdeitte/bookexchange.zip
WMFstatus => <reply> $who, WMFstatus is a general purpose 8x5 LCD screen dockapp for WindowMaker and other managers. URL: http://www.finik.net/files/wmfstatus-0.1.tar.gz
Metapixel => <reply> $who, Metapixel is a program for generating photomosaics. URL: http://www.complang.tuwien.ac.at/~schani/metapixel/metapixel-0.1.tar.gz
oracledump => <reply> $who, oracledump is a command-line tool that dumps Oracle data and table setup information as SQL. URL: http://www.bennyvision.com/~ddkilzer/projects/oracledump/
GNU Standard C++ Library v3 => <reply> $who, The Standard C++ Library v3, or libstc++-2.90.x, is an ongoing project to implement the ISO 14882 Standard C++ library as described in chapters 17 through 27 and annex D, as a drop-in replacement for the c...
GOOPS => <reply> $who, GOOPS is the object-oriented extension to Guile. URL: ftp://ftp.gnu.org/gnu/guile/guile-oops-0.1.6.tar.gz
PHP*Star => <reply> $who, PHP*Star makes CGI mailto forms and creates PHP scripts.. URL: http://www.xtremegroup.com/phpstar.html
Relayer => <reply> $who, Relayer allows for dynamic sendmail relay authentication.. URL: http://ps-ax.com/Relay/
rlwrap => <reply> $who, rlwrap is a readline wrapper, a small utility that uses the GNU readline library to allow the editing of keyboard input for any other command. URL: http://utopia.knoware.nl/~hlub/uck/rlwrap/rlwrap-0.01.tgz
PlottGUI => <reply> $who, PlottGUI is a program to create worksheets with an HP/GL plotter. URL: http://www.fh-wilhelmshaven.de/~akcaagaa/plottgui/files/dynamic-bin.tar.gz
factpacks/MacErrorCodes.fact view on Meta::CPAN
Mac Error -451 => ( badSectionErr ) Not a valid section type **Edition Manager Errors**
Mac Error -452 => ( notRegisteredSectionErr ) Not registered **Edition Manager Errors**
Mac Error -454 => ( badSubPartErr ) Bad edition container spec or invalid edition container **Edition Manager Errors**
Mac Error -460 => ( multiplePublisherWrn ) Already is a publisher **Edition Manager Errors**
Mac Error -461 => ( containerNotFoundWrn ) Alias was not resolved **Edition Manager Errors**
Mac Error -463 => ( notThePublisherWrn ) Not the publisher **Edition Manager Errors**
Mac Error -470 => ( scsiBadPBErr ) invalid field(s) in the parameter block **SCSI Manager Errors**
Mac Error -471 => ( scsiOverrunErr ) attempted to transfer too many bytes **SCSI Manager Errors**
Mac Error -472 => ( scsiTransferErr ) write flag conflicts with data transfer phase **SCSI Manager Errors**
Mac Error -473 => ( scsiBusTOErr ) bus error during transfer **SCSI Manager Errors**
Mac Error -474 => ( scsiSelectTOErr ) scsiSelTO exceeded (selection failed) **SCSI Manager Errors**
Mac Error -475 => ( scsiTimeOutErr ) scsiReqTO exceeded **SCSI Manager Errors**
Mac Error -476 => ( scsiBusResetErr ) the bus was reset, so your request was aborted **SCSI Manager Errors**
Mac Error -477 => ( scsiBadStatus ) non-zero (not "Good") status returned **SCSI Manager Errors**
Mac Error -478 => ( scsiNoStatusErr ) device did not go through a status phase **SCSI Manager Errors**
Mac Error -479 => ( scsiLinkFailErr ) linked command never executed **SCSI Manager Errors**
Mac Error -489 => ( scsiUnimpVctErr ) unimplemented routine was called **SCSI Manager Errors**
Mac Error -490 => ( userBreak ) user debugger break **SysErrs used instead of inline $A9FF & $ABFF**
Mac Error -491 => ( strUserBreak ) user debugger break - display string on stack **SysErrs used instead of inline $A9FF & $ABFF**
Mac Error -492 => ( exUserBreak ) user debugger break - execute commands on stack **SysErrs used instead of inline $A9FF & $ABFF**
Mac Error -500 => ( rgnTooBigErr ) Bitmap would convert into a region greater than 64 KB **QuickDraw Error**
Mac Error -501 => ( teScrapSizeErr ) scrap item too big for text edit record **Text Edit Error**
Mac Error -502 => ( hwParamrErr ) bad selector for _HWPriv **O/S Error**
Mac Error -600 => ( procNotFound ) No eligible process with specified process serial number **Processes Errors**
Mac Error -601 => ( memFragErr ) Not enough room to launch application with special requirements **Processes Errors**
Mac Error -602 => ( appModeErr ) Memory mode is 32-bit, but application is not 32-bit clean **Processes Errors**
Mac Error -603 => ( protocolErr ) app made module calls in improper order **Processes Errors**
Mac Error -604 => ( hardwareConfigErr ) hardware configuration not correct for call **Processes Errors**
Mac Error -605 => ( appMemFullErr ) Partition size specified in 'SIZE' resource is not big enough for launch **Processes Errors**
Mac Error -606 => ( appIsDaemon ) Application is background-only **Processes Errors**
Mac Error -607 => ( bufferIsSmall ) Buffer is too small **Processes Errors**
Mac Error -608 => ( noOutstandingHLE ) No outstanding high-level event **Processes Errors**
Mac Error -609 => ( connectionInvalid ) Connection is invalid **Processes Errors**
factpacks/dos.fact view on Meta::CPAN
JOIN => (External) JOIN d: [d:path] JOIN d: [/D] Allows access to the directory structure and files of a drive through a directory on a different drive.
KEYB => (External) KEYB [xx][,][yyy][,][d:][path]filename [/E][/ID:(number)] Loads a program that replaces the support program for U. S. keyboards.
LABEL => (External) LABEL [d:][volume label] Creates or changes or deletes a volume label for a disk.
LASTDRIVE => (Internal) LASTDRIVE=(drive letter) Used in the CONFIG.SYS file to set the maximum number of drives that can be accessed.
LOADFIX => (Internal) LOADFIX [d:][path]filename [parameters] Ensures that a program is loaded above the first 64K of conventional memory, and runs the program.
LOADHIGH => (Internal) LOADHIGH (LH) [d:][path]filename [parameters] Loads memory resident application into reserved area of memory (between 640K-1M).
MEM => (External) MEM [/program|/debug|/classify|/free|/module(name)] [/page] Displays amount of installed and available memory, including extended, expanded, and upper memory.
MEMMAKER => (External) MEMMAKER [/B][/batch][/session][/swap:d] [/T][/undo][/W:size1,size2] Starts the MemMaker program, a program that lets you optimize your computer's memory.
MENUCOLOR => (Internal) MENUCOLOR=textcolor,[background] Used in the CONFIG.SYS file to set the colors that will be used by DOS to display text on the screen.
MENUDEFAULT => (Internal) MENUDEFAULT=blockname, [timeout] Used in the CONFIG.SYS file to set the startup configuration that will be used by DOS if no key is pressed within the specified timeout period.
MENUITEM => (Internal)MENUITEM=blockname, [menutext] Used in the CONFIG.SYS file to create a start-up menu from which you can select a group of CONFIG.SYS commands to be processed upon reboot.
MIRROR => (External) MIRROR [d:]path [d:] path [...] IRROR [d1:][d2:][...] [/T(drive)(files)] [/partn][/U][/1] Saves disk storage information that can be used to recover accidentally erased files.
MKDIR => (MD) (Internal) MKDIR (MD) [d:]path Creates a new subdirectory.
MODE => (External) Sets mode of operation for devices or communications.
MORE => (External) MORE < (filename or command) (name)MORE Sends output to console, one screen at a time.
MOVE => (Internal) MOVE [/Y|/-Y] [d:][path]filename[,[d:][path]filename[...]] destination Moves one or more files to the location you specify. Can also be used to rename directories.
MSAV => (External) MSAV [d:] [/S|/C][/R][/A][/L][/N][/P][/F][/video][/mouse] SAV /video Scans your computer for known viruses.
MSBACKUP => External) MSBACKUP [setupfile] [/BW|/LCD|/MDA] Used to backup or restore one or more files from one disk to another.
MSCDEX => (External) MSCDEX /D:driver [/D:driver2. . .] [/E][/K][/S][/V][/L:letter] [/M:number] Used to gain access to CD-ROM drives (new with DOS Version 6).
MSD => (External) MSD [/B][/I] BSD [/I] [/F[d:][path]filename [/P[d:][path]filename [/S[d:][path]filename Provides detailed technical information about your computer.
NLSFUNC => (External) NLSFUNC [d:][path]filename Used to load a file with country-specific information.
factpacks/dos.fact view on Meta::CPAN
RMDIR => (RD) (Internal) RMDIR (RD) [d:]path Removes a subdirectory.
SCANDISK => (External) Starts the Microsoft ScanDisk program which is a disk analysis and repair tool used to check a drive for errors and correct any problems that it finds.
SELECT => (External) SELECT [d:] [d:][path] [country code][keyboard code] Formats a disk and installs country-specific information and keyboard codes (starting with DOS Version 6, this command is no longer available).
SET => (Internal) SET (string1)=(string2) Inserts strings into the command environment. The set values can be used later by programs.
SETVER => (External) SETVER [d:]:path][filename (number)][/delete][/quiet] Displays the version table and sets the version of DOS that is reported to programs.
SHARE => (External) SHARE [/F:space] [/L:locks] Installs support for file sharing and file locking.
SHELL => (Internal) SHELL=[d:][path]filename [parameters] Used in the CONFIG.SYS file to specify the command interpreter that DOS should use.
SHIFT => (Internal) SHIFT Increases number of replaceable parameters to more than the standard ten for use in batch files.
SORT => (External) SORT [/R][/+n] < (filename) SORT [/R][/+n] > (filename2) Sorts input and sends it to the screen or to a file.
STACKS => (Internal) STACKS=(number),(size) Used in the CONFIG.SYS file to set the number of stack frames and the size of each stack frame.
SUBMENU => (Internal) SUBMENU=blockname, [menutext] Used in the CONFIG.SYS file to create a multilevel menu from which you can select start-up options.
SUBST => (External) SUBST d: d:path SUBST d: /D Substitutes a virtual drive letter for a path designation.
SWITCHES => (Internal) SWITCHES= [/K][/F][/N][/W] Used in the CONFIG.SYS file to configure DOS in a special way; for example, to tell DOS to emulate different hardware configurations.
SYS => (External) SYS [source] d: Transfers the operating system files to another disk.
TIME => (Internal) TIME hh:mm[:ss][.cc][A|P] Displays current time setting of system clock and provides a way for you to reset the time.
TREE => (External) TREE [d:][path] [/A][/F] Displays directory paths and (optionally) files in each subdirectory.
TYPE => (Internal) TYPE [d:][path]filename Displays the contents of a file.
UNDELETE => (External) UNDELETE [d:][path][filename] [/DT|/DS|/DOS] Restores files deleted with the DELETE command.
UNFORMAT => (External) UNFORMAT d: [/J][/L][/test][/partn][/P][/U] Used to undo the effects of formatting a disk.
VER => (Internal) VER Displays the DOS version number.
VERIFY => (Internal) VERIFY on|off Turns on the verify mode; the program checks all copying operations to assure that files are copied correctly.
factpacks/jargon-split.fact view on Meta::CPAN
arc wars2 is and speed while largely retaining compatibility (it introduced a new compression type that could be disabled for backward-compatibility). PKWare settled out of court to avoid enormous legal costs (both SEA and PKWare are small ...
arc wars3 is of PKARC was changed to PKPAK. The public backlash against SEA for bringing suit helped to hasten the demise of ARC as a standard when PKWare and others introduced new, incompatible archivers with better compression algorithms....
archive is n. 1. A collection of several files bundled into one file by a program such as `ar(1)', `tar(1)', `cpio(1)', or {arc} for shipment or archiving (sense 2). See also {tar and feather}. 2. A collection of files or archives (sense 1) ...
archive2 is {FTP} or an email server.
arena is [UNIX] n. The area of memory attached to a process by `brk(2)' and `sbrk(2)' and used by `malloc(3)' as dynamic storage. So named from a semi-mythical `malloc corrupt arena' message supposedly emitted when some early versions becam...
arena2 is {aliasing bug}, {memory leak}, {smash the stack}.
arg is /arg/ n. Abbreviation for `argument' (to a function), used so often as to have become a new word (like `piano' from `pianoforte'). "The sine function takes 1 arg, but the arc-tangent function can take either 1 or 2 args." Compare {p...
armor-plated is n. Syn. for {bulletproof}.
asbestos is adj. Used as a modifier to anything intended to protect one from {flame}s. Important cases of this include {asbestos longjohns} and {asbestos cork award}, but it is used more generally.
asbestos cork award is n. Once, long ago at MIT, there was a {flamer} so consistently obnoxious that another hacker designed, had made, and distributed posters announcing that said flamer had been nominated for the `asbestos cork award'. Pers...
asbestos cork award2 is application of the cork should consult the etymology under {flame}. Since then, it is agreed that only a select few have risen to the heights of bombast required to earn this dubious dignity --- but there is no agreeme...
asbestos longjohns is n. Notional garments often donned by {USENET} posters just before emitting a remark they expect will elicit {flamage}. This is the most common of the {asbestos} coinages. Also `asbestos underwear', `asbestos overcoat', e...
attoparsec is n. `atto-' is the standard SI prefix for multiplication by 10^{-18}. A parsec (parallax-second) is 3.26 light-years; an attoparsec is thus 3.26 * 10^{-18} light years, or about 3.1 cm (thus, 1 attoparsec/{microfortnight} equal...
attoparsec2 is be in use (though probably not very seriously) among hackers in the U.K. See {micro-}.
autobogotiphobia is /aw'to-boh-got`*-foh'bee-*/ n. See {bogotify}.
automagically is /aw-toh-maj'i-klee/ or /aw-toh-maj'i-k*l-ee/ adv. Automatically, but in a way that, for some reason (typically because it is too complicated, or too ugly, or perhaps even too trivial), the speaker doesn't feel like explaining ...
automagically2 is compiler generates C, then automagically invokes `cc(1)' to produce an executable."
avatar is [CMU, Tektronix] n. Syn. {root}, {superuser}. There are quite a few UNIX machines on which the name of the superuser account is `avatar' rather than `root'. This quirk was originated by a CMU hacker who disliked the term `superuser...
avatar2 is hacker at Tektronix.
awk is 1. n. [UNIX techspeak] An interpreted language for massaging text data developed by Alfred Aho, Peter Weinberger, and Brian Kernighan (the name is from their initials). It is characterized by C-like syntax, a declaration-free approach ...
awk2 is associative arrays, and field-oriented text processing. See also {Perl}. 2. n. Editing term for an expression awkward to manipulate through normal {regexp} facilities (for example, one containing a {newline}). 3. vt. To process d...
factpacks/jargon-split.fact view on Meta::CPAN
backward combatability2 is making the transition between major releases. When the change is so drastic that the old formats are not retained in the new version, it is said to be `backward combatable'. See {flag day}.
BAD is /B-A-D/ [IBM acronym, `Broken As Designed'] adj. Said of a program that is {bogus} because of bad design and misfeatures rather than because of bugginess. See {working as designed}.
Bad Thing is [from the 1930 Sellar & Yeatman parody `1066 And All That'] n. Something that can't possibly result in improvement of the subject. This term is always capitalized, as in "Replacing all of the 9600-baud modems with bicycle courier...
Bad Thing2 is Thing}. British correspondents confirm that {Bad Thing} and {Good Thing} (and prob. therefore {Right Thing} and {Wrong Thing}) come from the book referenced in the etymology, which discusses rulers who were Good Kings but Bad ...
Bad Thing3 is mainstream idiom on the British side of the pond.
bag on the side is n. An extension to an established hack that is supposed to add some functionality to the original. Usually derogatory, implying that the original was being overextended and should have been thrown away, and the new product ...
bag on the side2 is phrase, `to hang a bag on the side [of]'. "C++? That's just a bag on the side of C ...." "They want me to hang a bag on the side of the accounting system."
bagbiter is /bag'bit-*r/ n. 1. Something, such as a program or a computer, that fails to work, or works in a remarkably clumsy manner. "This text editor won't let me make a file with a line longer than 80 characters! What a bagbiter!" 2. A ...
bagbiter2 is inadvertently or otherwise, typically by failing to program the computer properly. Synonyms {loser}, {cretin}, {chomper}. 3. adj. `bagbiting' Having the quality of a bagbiter. "This bagbiting system won't let me compute the f...
bagbiter3 is {losing}, {cretinous}, {bletcherous}, `barfucious' (under {barfulous}) and `chomping' (under {chomp}). 4. `bite the bag' vi. To fail in some manner. "The computer keeps crashing every 5 minutes." "Yes, the disk controller is ...
bagbiter4 is of these terms was almost undoubtedly obscene, possibly referring to the scrotum, but in their current usage they have become almost completely sanitized. A program called Lexiphage on the old MIT AI PDP-10 would draw on a selec...
bagbiter5 is BAG" in ornate letters, and then a pair of jaws biting pieces of it off. This is the first and to date only known example of a program *intended* to be a bagbiter.
bamf is /bamf/ 1. [from old X-Men comics] interj. Notional sound made by a person or object teleporting in or out of the hearer's vicinity. Often used in {virtual reality} (esp. {MUD}) electronic {fora} when a character wishes to make a drama...
bamf2 is magical transformation, used in virtual reality {fora} like sense 1. 3. [from `Don Washington's Survival Guide'] n. Acronym for `Bad-Ass Mother Fucker', used to refer to one of the handful of nastiest monsters on an LPMUD or other ...
banana label is n. The labels often used on the sides of {macrotape} reels, so called because they are shaped roughly like blunt-ended bananas. This term, like macrotapes themselves, is still current but visibly headed for obsolescence.
banana problem is n. [from the story of the little girl who said "I know how to spell `banana', but I don't know when to stop"]. Not knowing where or when to bring a production to a close (compare {fencepost error}). One may say `there is a ...
banana problem2 is defined or incorrect termination conditions, or in discussing the evolution of a design that may be succumbing to featuritis (see also {creeping elegance}, {creeping featuritis}). See item 176 under {HAKMEM}, which describe...
banana problem3 is implementation.bandwidth n. 1. Used by hackers in a generalization of its technical meaning as the volume of information per unit time that a computer, person, or transmission medium can handle. "Those are amazing graphics,...
banana problem4 is bandwidth, I guess." Compare {low-bandwidth}. 2. Attention span. 3. On {USENET}, a measure of network capacity that is often wasted by people complaining about how items posted by others are a waste of bandwidth.
bang is 1. n. Common spoken name for `!' (ASCII 0100001), especially when used in pronouncing a {bang path} in spoken hackish. In {elder days} this was considered a CMUish usage, with MIT and Stanford hackers preferring {excl} or {shriek}; ...
bang2 is it (esp. via the term {bang path}) and it is now certainly the most common spoken name for `!'. Note that it is used exclusively for non-emphatic written `!'; one would not say "Congratulations bang" (except possibly for humorous p...
bang3 is exact characters `foo!' one would speak "Eff oh oh bang". See {shriek}, {{ASCII}}. 2. interj. An exclamation signifying roughly "I have achieved enlightenment!", or "The dynamite has cleared out my brain!" Often used to acknowledge...
bang4 is immediately after one has been called on it.
bang on is vt. To stress-test a piece of hardware or software "I banged on the new version of the simulator all day yesterday and it didn't crash once. I guess it is ready to release." The term {pound on} is synonymous.
bang path is n. An old-style UUCP electronic-mail address specifying hops to get from some assumed-reachable location to the addressee, so called because each {hop} is signified by a {bang} sign. Thus, for example, the path ...!bigsite!foovax!...
bang path2 is to machine bigsite (presumably a well-known location accessible to everybody) and from there through the machine foovax to the account of user me on barbox. In the bad old days of not so long ago, before autorouting mailers b...
bang path3 is compound bang addresses using the { } convention (see {glob}) to give paths from *several* big machines, in the hopes that one's correspondent might be able to get mail to one of them reliably (example ...!{seismo, ut-sally, ih...
bang path4 is 10 hops were not uncommon in 1981. Late-night dial-up UUCP links would cause week-long transmission times. Bang paths were often selected by both transmission time and reliability, as messages would often get lost. See {{Inter...
banner is n. 1. The title page added to printouts by most print spoolers (see {spool}). Typically includes user or account ID information in very large character-graphics capitals. Also called a `burst page', because it indicates where to bu...
banner2 is one user's printout from the next. 2. A similar printout generated (typically on multiple pages of fan-fold paper) from user-specified text, e.g., by a program such as UNIX's `banner({1,6})'. 3. On interactive software, a first sc...
banner3 is and/or a copyright notice.
bar is /bar/ n. 1. The second metasyntactic variable, after {foo} and before {baz}. "Suppose we have two functions FOO and BAR. FOO calls BAR...." 2. Often appended to {foo} to produce {foobar}.
bare metal is n. 1. New computer hardware, unadorned with such snares and delusions as an {operating system}, an {HLL}, or even assembler. Commonly used in the phrase `programming on the bare metal', which refers to the arduous work of {bit b...
bare metal2 is for a new machine. Real bare-metal programming involves things like building boot proms and BIOS chips, implementing basic monitors used to test device drivers, and writing the assemblers that will be used to write the compil...
bare metal3 is real development environment. 2. `Programming on the bare metal' is also used to describe a style of {hand-hacking} that relies on bit-level peculiarities of a particular hardware design, esp. tricks for speed and space optim...
bare metal4 is overlapping instructions (or, as in the famous case described in appendix A, interleaving of opcodes on a magnetic drum to minimize fetch delays due to the device's rotational latency). This sort of thing has become less common...
bare metal5 is and machine resources have changed, but is still found in heavily constrained environments such as industrial embedded systems. See {real programmer}. In the world of personal computing, bare metal programming (especially in s...
bare metal6 is considered a {Good Thing}, or at least a necessary thing (because these machines have often been sufficiently slow and poorly designed to make it necessary; see {ill-behaved}). There, the term usually refers to bypassing the ...
factpacks/jargon-split.fact view on Meta::CPAN
Berkeley Quality Software is adj. (often abbreviated `BQS') Term used in a pejorative sense to refer to software that was apparently created by rather spaced-out hackers late at night to solve some unique problem. It usually has nonexistent, ...
Berkeley Quality Software2 is been tested on at least two examples, and core dumps when anyone else attempts to use it. This term was frequently applied to early versions of the `dbx(1)' debugger. See also {Berzerkeley}.
berklix is /berk'liks/ n.,adj. [contraction of `Berkeley UNIX'] See {BSD}. Not used at Berkeley itself. May be more common among {suit}s attempting to sound like cognoscenti than among hackers, who usually just say `BSD'.
berserking is vi. A {MUD} term meaning to gain points *only* by killing other players and mobiles (non-player characters). Hence, a Berserker-Wizard is a player character that has achieved enough points to become a wizard, but only by killing ...
berserking2 is frowned upon because of its inherently antisocial nature, but some MUDs have a `berserker mode' in which a player becomes *permanently* berserk, can never flee from a fight, cannot use magic, gets no score for treasure, but do...
berserking3 is wizards can seriously damage your elf!"
Berzerkeley is /b*r-zer'klee/ [from `berserk', via the name of a now-deceased record label] n. Humorous distortion of `Berkeley' used esp. to refer to the practices or products of the {BSD} UNIX hackers. See {software bloat}, {Missed'em-five}...
Berzerkeley2 is use of this term in reference to the cultural and political peculiarities of UC Berkeley as a whole has been reported from as far back as the 1960s.
beta is /bay't*/, /be't*/ or (Commonwealth) /bee't*/ n. 1. In the {Real World}, software often goes through two stages of testing Alpha (in-house) and Beta (out-house?). Software is said to be `in beta'. 2. Anything that is new and experimen...
beta2 is means that he is still testing for compatibility and reserving judgment. 3. Beta software is notoriously buggy, so `in beta' connotes flakiness. Historical note More formally, to beta-test is to test a pre-release (potentially unre...
beta3 is making it available to selected customers and users. This term derives from early 1960s terminology for product cycle checkpoints, first used at IBM but later standard throughout the industry. `Alpha Test' was the unit, module, or co...
beta4 is system test. These themselves came from earlier A- and B-tests for hardware. The A-test was a feasibility and manufacturability evaluation done before any commitment to design and development. The B-test was a demonstration that th...
beta5 is The C-test (corresponding to today's beta) was the B-test performed on early samples of the production design.
BFI is /B-F-I/ n. See {brute force and ignorance}. Also encountered in the variant `BFMI', `brute force and *massive* ignorance'.
bible is n. 1. One of a small number of fundamental source books such as {Knuth} and {K&R}. 2. The most detailed and authoritative reference for a particular language, operating system, or other complex software system.
BiCapitalization is n. The act said to have been performed on trademarks (such as NeXT, {NeWS}, VisiCalc, FrameMaker, TK!solver, EasyWriter) that have been raised above the ruck of common coinage by nonstandard capitalization. Too many {mar...
BiCapitalization2 is really cute, even the 2,317th time they do it. Compare {studlycaps}.
BIFF is /bif/ [USENET] n. The most famous {pseudo}, and the prototypical {newbie}. Articles from BIFF are characterized by all uppercase letters sprinkled liberally with bangs, typos, `cute' misspellings (EVRY BUDY LUVS GOOD OLD BIFF CUZ HE"S...
BIFF2 is IN CAPITULL LETTRS LIKE THIS!!!), use (and often misuse) of fragments of {talk mode} abbreviations, a long {sig block} (sometimes even a {doubled sig}), and unbounded na"ivet'e. BIFF posts articles using his elder brother's VIC-20....
BIFF3 is appear to come from a variety of sites. However, {BITNET} seems to be the most frequent origin. The theory that BIFF is a denizen of BITNET is supported by BIFF's (unfortunately invalid) electronic mail address BIFF@BIT.NET.
biff is /bif/ vt. To notify someone of incoming mail. From the BSD utility `biff(1)', which was in turn named after the implementor's dog (it barked whenever the mailman came). No relation to {BIFF}.
factpacks/jargon-split.fact view on Meta::CPAN
bit3 is of belief. "I have a bit set that says that you were the last guy to hack on EMACS." (Meaning "I think you were the last guy to hack on EMACS, and what I am about to say is predicated on this, so please stop me if this isn't true.")...
bit4 is way of indicating that you intend only a short interruption for a question that can presumably be answered yes or no. A bit is said to be `set' if its value is true or 1, and `reset' or `clear' if its value is false or 0. One spea...
bit5 is or `invert' a bit is to change it, either from 0 to 1 or from 1 to 0. See also {flag}, {trit}, {mode bit}.
bit bang is n. Transmission of data on a serial line, when accomplished by rapidly tweaking a single output bit at the appropriate times. The technique is a simple loop with eight OUT and SHIFT instruction pairs for each byte. Input is more...
bit bang2 is and output at the same time) is one way to separate the real hackers from the {wannabee}s. Bit bang was used on certain early models of Prime computers, presumably when UARTs were too expensive, and on archaic Z80 micros with ...
bit bang3 is instance of the {cycle of reincarnation}, this technique is now (1991) coming back into use on some RISC architectures because it consumes such an infinitesimal part of the processor that it actually makes sense not to have a UA...
bit bashing is n. (alt. `bit diddling' or {bit twiddling}) Term used to describe any of several kinds of low-level programming characterized by manipulation of {bit}, {flag}, {nybble}, and other smaller-than-character-sized pieces of data; the...
bit bashing2 is encryption algorithms, checksum and error-correcting codes, hash functions, some flavors of graphics programming (see {bitblt}), and assembler/compiler code generation. May connote either tedium or a real technical challenge...
bit bashing3 is decoding for the new tape driver looks pretty solid but the bit-bashing for the control registers still has bugs." See also {bit bang}, {mode bit}.
bit bucket is n. 1. The universal data sink (originally, the mythical receptacle used to catch bits when they fall off the end of a register during a shift instruction). Discarded, lost, or destroyed data is said to have `gone to the bit buck...
bit bucket2 is {/dev/null}. Sometimes amplified as `the Great Bit Bucket in the Sky'. 2. The place where all lost mail and news messages eventually go. The selection is performed according to {Finagle's Law}; important mail is much more lik...
bit bucket3 is mail, which has an almost 100% probability of getting delivered. Routing to the bit bucket is automatically performed by mail-transfer agents, news systems, and the lower layers of the network. 3. The ideal location for all un...
bit bucket4 is article to the bit bucket." Such a request is guaranteed to overflow one's mailbox with flames. 4. Excuse for all mail that has not been sent. "I mailed you those figures last week; they must have ended in the bit bucket." Co...
bit bucket5 is in jest. It is based on the fanciful notion that bits are objects that are not destroyed but only misplaced. This appears to have been a mutation of an earlier term `bit box', about which the same legend was current; old-time ...
bit bucket6 is told that when the CPU stored bits into memory it was actually pulling them `out of the bit box'. See also {chad box}. Another variant of this legend has it that, as a consequence of the `parity preservation law', the number ...
bit bucket7 is equal the number of 0 bits. Any imbalance results in bits filling up the bit bucket. A qualified computer technician can empty a full bit bucket as part of scheduled maintenance.
bit decay is n. See {bit rot}. People with a physics background tend to prefer this one for the analogy with particle decay. See also {computron}, {quantum bogodynamics}.
bit rot is n. Also {bit decay}. Hypothetical disease the existence of which has been deduced from the observation that unused programs or features will often stop working after sufficient time has passed, even if `nothing has changed'. The t...
bit rot2 is were radioactive. As time passes, the contents of a file or the code in a program will become increasingly garbled. There actually are physical processes that produce such effects (alpha particles generated by trace radionuclide...
bit rot3 is change the contents of a computer memory unpredictably, and various kinds of subtle media failures can corrupt files in mass storage), but they are quite rare (and computers are built with error-detecting circuitry to compensate ...
bit rot4 is hackers that cosmic rays are among the causes of such events turns out to be a myth; see the {cosmic rays} entry for details. The term {software rot} is almost synonymous. Software rot is the effect, bit rot the notional cause.
factpacks/jargon-split.fact view on Meta::CPAN
canonical8 is this term with a playfulness that makes an ironic contrast with its historical meaning. A true story One Bob Sjoberg, new at the MIT AI Lab, expressed some annoyance at the use of jargon. Over his loud objections, GLS and RMS m...
canonical9 is in his presence, and eventually it began to sink in. Finally, in one conversation, he used the word `canonical' in jargon-like fashion without thinking. Steele "Aha! We've finally got you talking jargon too!" Stallman "What...
canonical10 is `canonical' in the canonical way." Of course, canonicality depends on context, but it is implicitly defined as the way *hackers* normally expect things to be. Thus, a hacker may claim with a straight face that `according to ...
card is n. 1. An electronic printed-circuit board (see also {tall card}, {short card}. 2. obs. Syn. {{punched card}}.
card walloper is n. An EDP programmer who grinds out batch programs that do stupid things like print people's paychecks. Compare {code grinder}. See also {{punched card}}, {eighty-column mind}.
careware is /keir'weir/ n. {Shareware} for which either the author suggests that some payment be made to a nominated charity or a levy directed to charity is included on top of the distribution charge. Syn. {charityware}; compare {cripplewa...
cargo cult programming is n. A style of (incompetent) programming dominated by ritual inclusion of code or program structures that serve no real purpose. A cargo cult programmer will usually explain the extra code as a way of working around s...
cargo cult programming2 is neither the bug nor the reason the code apparently avoided the bug was ever fully understood (compare {shotgun debugging}, {voodoo programming}). The term `cargo cult' is a reference to aboriginal religions that gr...
cargo cult programming3 is The practices of these cults center on building elaborate mockups of airplanes and military style landing strips in the hope of bringing the return of the god-like airplanes that brought such marvelous cargo during t...
cargo cult programming4 is Richard Feynman's characterization of certain practices as "cargo cult science" in his book `Surely You're Joking, Mr. Feynman' (W. W. Norton & Co, New York 1985, ISBN 0-393-01921-7).
case and paste is [from `cut and paste'] n. 1. The addition of a new {feature} to an existing system by selecting the code from an existing feature and pasting it in with minor changes. Common in telephony circles because most operations in a...
case and paste2 is statements. Leads to {software bloat}. In some circles of EMACS users this is called `programming by Meta-W', because Meta-W is the EMACS command for copying a block of text to a kill buffer in preparation to pasting it in ...
case and paste3 is implying that the programmer is acting mindlessly rather than thinking carefully about what is required to integrate the code for two similar cases.
casters-up mode is [IBM] n. Yet another synonym for `broken' or `down'.
casting the runes is n. What a {guru} does when you ask him or her to run a particular program and type at it because it never works for anyone else; esp. used when nobody can ever see what the guru is doing different from what J. Random Luser...
casting the runes2 is {examining the entrails}; also see the AI koan about Tom Knight in appendix A.
cat is [from `catenate' via {{UNIX}} `cat(1)'] vt. 1. [techspeak] To spew an entire file to the screen or some other output sink without pause. 2. By extension, to dump large amounts of data at an unprepared target or with no intention of bro...
cat2 is Rare outside UNIX sites. See also {dd}, {BLT}. Among UNIX fans, `cat(1)' is considered an excellent example of user-interface design, because it outputs the file contents without such verbosity as spacing or headers between the fil...
cat3 is to consist of lines of text, but works with any sort of data. Among UNIX-haters, `cat(1)' is considered the {canonical} example of *bad* user-interface design. This because it is more often used to {blast} a file to standard output ...
cat4 is `cat' for the former operation is just as unintuitive as, say, LISP's {cdr}. Of such oppositions are {holy wars} made....
catatonic is adj. Describes a condition of suspended animation in which something is so {wedged} or {hung} that it makes no response. If you are typing on a terminal and suddenly the computer doesn't even echo the letters back to the screen a...
factpacks/jargon-split.fact view on Meta::CPAN
golf-ball printer2 is font by swapping in a different golf ball. This was the technology that enabled APL to use a non-EBCDIC, non-ASCII, and in fact completely non-standard character set. This put it 10 years ahead of its time --- where it ...
golf-ball printer3 is character displays gave way to programmable bit-mapped devices with the flexibility to support other character sets.
gonk is /gonk/ vt.,n. 1. To prevaricate or to embellish the truth beyond any reasonable recognition. It is alleged that in German the term is (mythically) `gonken'; in Spanish the verb becomes `gonkar'. "You're gonking me. That story you ju...
gonk2 is for example, "Du gonkst mir" (You're pulling my leg). See also {gonkulator}. 2. [British] To grab some sleep at an odd time; compare {gronk out}.
gonkulator is /gon'kyoo-lay-tr/ [from the old "Hogan's Heroes" TV series] n. A pretentious piece of equipment that actually serves no useful purpose. Usually used to describe one's least favorite piece of computer hardware. See {gonk}.
gonzo is /gon'zoh/ [from Hunter S. Thompson] adj. Overwhelming; outrageous; over the top; very large, esp. used of collections of source code, source files, or individual functions. Has some of the connotations of {moby} and {hairy}, but with...
Good Thing is n.,adj. Often capitalized; always pronounced as if capitalized. 1. Self-evidently wonderful to anyone in a position to notice "The Trailblazer's 19.2Kbaud PEP mode with on-the-fly Lempel-Ziv compression is a Good Thing for sites...
Good Thing2 is possibly have any ill side-effects and may save considerable grief later "Removing the self-modifying code from that shared library would be a Good Thing." 3. When said of software tools or libraries, as in "YACC is a Good Th...
Good Thing3 is drastically reduced a programmer's work load. Oppose {Bad Thing}.
gorilla arm is n. The side-effect that destroyed touch-screens as a mainstream input technology despite a promising start in the early 1980s. It seems the designers of all those {spiffy} touch-menu systems failed to notice that humans aren't ...
gorilla arm2 is their faces making small motions. After more than a very few selections, the arm begins to feel sore, cramped, and oversized; hence `gorilla arm'. This is now considered a classic cautionary tale to human-factors designers; "...
gorilla arm3 is "How is this going to fly in *real* use?".
gorp is /gorp/ [CMU perhaps from the canonical hiker's food, Good Old Raisins and Peanuts] Another metasyntactic variable, like {foo} and {bar}.
GOSMACS is /goz'maks/ [contraction of `Gosling EMACS'] n. The first {EMACS}-in-C implementation, predating but now largely eclipsed by {GNUMACS}. Originally freeware; a commercial version is now modestly popular as `UniPress EMACS'. The auth...
Gosperism is /gos'p*r-izm/ A hack, invention, or saying by arch-hacker R. William (Bill) Gosper. This notion merits its own term because there are so many of them. Many of the entries in {HAKMEM} are Gosperisms; see also {life}.
gotcha is n. A {misfeature} of a system, especially a programming language or environment, that tends to breed bugs or mistakes because it behaves in an unexpected way. For example, a classic gotcha in {C} is the fact that `if (a=b) {code;}' ...
gotcha2 is correct. It puts the value of `b' into `a' and then executes `code' if `a' is non-zero. What the programmer probably meant was `if (a==b) {code;}', which executes `code' if `a' and `b' are equal.
GPL is /G-P-L/ n. Abbrev. for `General Public License' in widespread use; see {copyleft}.
GPV is /G-P-V/ n. Abbrev. for {General Public Virus} in widespread use.
grault is /grawlt/ n. Yet another meta-syntactic variable, invented by Mike Gallaher and propagated by the {GOSMACS} documentation. See {corge}.
gray goo is n. A hypothetical substance composed of {sagan}s of sub-micron-sized self-replicating robots programmed to make copies of themselves out of whatever is available. The image that goes with the term is one of the entire biosphere of...
factpacks/jargon-split.fact view on Meta::CPAN
insanely great is adj. [Mac community, from Steve Jobs; also BSD UNIX people via Bill Joy] Something so incredibly {elegant} that it is imaginable only to someone possessing the most puissant of {hacker}-natures.
INTERCAL is /in't*r-kal/ [said by the authors to stand for `Compiler Language With No Pronounceable Acronym'] n. A computer language designed by Don Woods and James Lyon in 1972. INTERCAL is purposely different from all other computer langua...
INTERCAL2 is written language, being totally unspeakable. An excerpt from the INTERCAL Reference Manual will make the style of the language clear It is a well-known and oft-demonstrated fact that a person whose work is incomprehen...
INTERCAL3 is one were to state that the simplest way to store a value of 65536 in a 32-bit INTERCAL variable is DO 1 <- #0$#256 any sensible programmer would say that that was absurd. Since this is indeed the sim...
INTERCAL4 is look foolish in front of his boss, who would of course have happened to turn up, as bosses are wont to do. The effect would be no less devastating for the programmer having been correct. INTERCAL has many other p...
INTERCAL5 is more unspeakable. The Woods-Lyons implementation was actually used by many (well, at least several) people at Princeton. The language has been recently reimplemented as C-INTERCAL and is consequently enjoying an unprecedented le...
INTERCAL6 is alt.lang.intercal newsgroup devoted to the study and ... appreciation of the language on USENET.
interesting is adj. In hacker parlance, this word has strong connotations of `annoying', or `difficult', or both. Hackers relish a challenge, and enjoy wringing all the irony possible out of the ancient Chinese curse "May you live in interest...
Internet address is n. 1. [techspeak] An absolute network address of the form foo@bar.baz, where foo is a user name, bar is a {sitename}, and baz is a `domain' name, possibly including periods itself. Contrast with {bang path}; see also {netw...
Internet address2 is Internet machines and most UUCP sites can now resolve these addresses, thanks to a large amount of behind-the-scenes magic and PD software written since 1980 or so. See also {bang path}, {domainist}. 2. More loosely, any ...
Internet address3 is this includes {bang path} addresses and some internal corporate and government networks. Reading Internet addresses is something of an art. Here are the four most important top-level functional Internet domains followed...
Internet address4 is com commercial organizations edu educational institutions gov U.S. government civilian sites mil U.S. military sites Note that most of the sites in the com and edu domains are in...
Internet address5 is the U.S. outside the functional domains su sites in the Soviet Union (see {kremvax}). uk sites in the United Kingdom Within the us domain, there are subdomains for the fifty states, each generally w...
Internet address6 is abbreviation. Within the uk domain, there is an ac subdomain for academic sites and a co domain for commercial ones. Other top-level domains may be divided up in similar ways.
interrupt is 1. [techspeak] n. On a computer, an event that interrupts normal processing and temporarily diverts flow-of-control through an "interrupt handler" routine. See also {trap}. 2. interj. A request for attention from a hacker. Oft...
interrupt2 is seen Joe recently?" See {priority interrupt}. 3. Under MS-DOS, the term `interrupt' is nearly synonymous with `system call', because the OS and BIOS routines are both called using the INT instruction (see {{interrupt list, th...
interrupt3 is bypass the OS (going directly to a BIOS interrupt) to get reasonable performance.
interrupt list, the is [MS-DOS] n. The list of all known software interrupt calls (both documented and undocumented) for IBM PCs and compatibles, maintained and made available for free redistribution by Ralf Brown (ralf@cs.cmu.edu). As of ear...
interrupts locked out is When someone is ignoring you. In a restaurant, after several fruitless attempts to get the waitress's attention, a hacker might well observe "She must have interrupts locked out". The synonym `interrupts disabled' is...
interrupts locked out2 is have one's interrupt mask bit set" or "interrupts masked out" is also heard. See also {spl}.
iron is n. Hardware, especially older and larger hardware of {mainframe} class with big metal cabinets housing relatively low-density electronics (but the term is also used of modern supercomputers). Often in the phrase {big iron}. Oppose ...
factpacks/jargon-split.fact view on Meta::CPAN
meeces is /mees'*z/ [TMRC] n. Occasional furry visitors who are not {urchin}s. [That is, mice. This may no longer be in live use; it clearly derives from the refrain of the early-1960s cartoon character Mr. Jinx: "I hate meeces to *pieces*!" ...
meg is /meg/ n. See {{quantifiers}}.
mega- is /me'g*/ [SI] pref. See {{quantifiers}}.
megapenny is /meg'*-pen`ee/ n. $10,000 (1 cent * 10^6). Used semi-humorously as a unit in comparing computer cost and performance figures.
MEGO is /me'goh/ or /mee'goh/ [`My Eyes Glaze Over', often `Mine Eyes Glazeth (sic) Over', attributed to the futurologist Herman Kahn] Also `MEGO factor'. 1. n. A {handwave} intended to confuse the listener and hopefully induce agreement beca...
MEGO2 is not understanding what is going on. MEGO is usually directed at senior management by engineers and contains a high proportion of {TLA}s. 2. excl. An appropriate response to MEGO tactics. 3. Among non-hackers this term often refers ...
MEGO3 is glaze, but to the eye-glazing reaction itself, which may be triggered by the mere threat of technical detail as effectively as by an actual excess of it.
meltdown, network is n. See {network meltdown}.
meme is /meem/ [coined on analogy with `gene' by Richard Dawkins] n. An idea considered as a {replicator}, esp. with the connotation that memes parasitize people into propagating them much as viruses do. Used esp. in the phrase `meme complex'...
meme2 is memes that form an organized belief system, such as a religion. This lexicon is an (epidemiological) vector of the `hacker subculture' meme complex; each entry might be considered a meme. However, `meme' is often misused to mean `...
meme3 is acceptance of the idea that in humans (and presumably other tool- and language-using sophonts) cultural evolution by selection of adaptive ideas has superseded biological evolution by selection of hereditary traits. Hackers find this...
meme plague is n. The spread of a successful but pernicious {meme}, esp. one that parasitizes the victims into giving their all to propagate it. Astrology, BASIC, and the other guy's religion are often considered to be examples. This usage i...
meme plague2 is `joiner' ideologies like Naziism or various forms of millennarian Christianity have exhibited plague-like cycles of exponential growth followed by collapses to small reservoir populations.
memetics is /me-met'iks/ [from {meme}] The study of memes. As of mid-1991, this is still an extremely informal and speculative endeavor, though the first steps towards at least statistical rigor have been made by H. Keith Henson and others. ...
memetics2 is among hackers, who like to see themselves as the architects of the new information ecologies in which memes live and replicate.
memory leak is n. An error in a program's dynamic-store allocation logic that causes it to fail to reclaim discarded memory, leading to eventual collapse due to memory exhaustion. Also (esp. at CMU) called {core leak}. See {aliasing bug}, {f...
memory leak2 is {precedence lossage}, {overrun screw}, {leaky heap}, {leak}.
menuitis is /men`yoo-i:'tis/ n. Notional disease suffered by software with an obsessively simple-minded menu interface and no escape. Hackers find this intensely irritating and much prefer the flexibility of command-line or language-style inte...
menuitis2 is macros or a special-purpose language in which one can encode useful hacks. See {user-obsequious}, {drool-proof paper}, {WIMP environment}, {for the rest of us}.
mess-dos is /mes-dos/ n. Derisory term for MS-DOS. Often followed by the ritual banishing "Just say No!" See {{MS-DOS}}. Most hackers (even many MS-DOS hackers) loathe MS-DOS for its single-tasking nature, its limits on application size, it...
mess-dos2 is IBMness (see {fear and loathing}). Also `mess-loss', `messy-dos', `mess-dog', `mess-dross', `mush-dos', and various combinations thereof. In Ireland and the U.K. it is even sometimes called `Domestos' after a brand of toilet c...
factpacks/jargon-split.fact view on Meta::CPAN
misfeature4 is parameters subsequently changed (possibly only in the judgment of the implementors). "Well, yeah, it is kind of a misfeature that file names are limited to 6 characters, but the original implementors wanted to save directory ...
Missed'em-five is n. Pejorative hackerism for AT&T System V UNIX, generally used by {BSD} partisans in a bigoted mood. (The synonym `SysVile' is also encountered.) See {software bloat}, {Berzerkeley}.
miswart is /mis-wort/ [from {wart} by analogy with {misbug}] n. A {feature} that superficially appears to be a {wart} but has been determined to be the {Right Thing}. For example, in some versions of the {EMACS} text editor, the `transpose ch...
miswart2 is characters on either side of the cursor on the screen, *except* when the cursor is at the end of a line, in which case the two characters before the cursor are exchanged. While this behavior is perhaps surprising, and certainly i...
miswart3 is extensive experimentation to be what most users want. This feature is a miswart.
mod is vt.,n. 1. Short for `modify' or `modification'. Very commonly used --- in fact the full terms are considered markers that one is being formal. The plural `mods' is used esp. with reference to bug fixes or minor design changes in hardw...
mod2 is {patch} sets or a {diff}. 2. Short for {modulo} but used *only* for its techspeak sense.
mode is n. A general state, usually used with an adjective describing the state. Use of the word `mode' rather than `state' implies that the state is extended over time, and probably also that some activity characteristic of that state is b...
mode2 is thesis mode." In its jargon sense, `mode' is most often attributed to people, though it is sometimes applied to programs and inanimate objects. In particular, see {hack mode}, {day mode}, {night mode}, {demo mode}, {fireworks mode}...
mode3 is also often hears the verbs `enable' and `disable' used in connection with jargon modes. Thus, for example, a sillier way of saying "I'm going to crash" is "I'm going to enable crash mode now". One might also hear a request to "disab...
mode bit is n. A {flag}, usually in hardware, that selects between two (usually quite different) modes of operation. The connotations are different from {flag} bit in that mode bits are mainly written during a boot or set-up phase, are seldom...
mode bit2 is lifetime of an ordinary program. The classic example was the EBCDIC-vs.-ASCII bit (#12) of the Program Status Word of the IBM 360. Another was the bit on a PDP-12 that controlled whether it ran the PDP-8 or the LINC instruction ...
modulo is /mo'dyu-loh/ prep. Except for. From mathematical terminology; one can consider saying that 4 = 22 except for the 9s (4 = 22 mod 9). "Well, LISP seems to work okay now, modulo that {GC} bug." "I feel fine today modulo a slight he...
molly-guard is /mol'ee-gard/ [University of Illinois] n. A shield to prevent tripping of some {Big Red Switch} by clumsy or ignorant hands. Originally used of some plexiglass covers improvised for the BRS on an IBM 4341 after a programmer's t...
molly-guard2 is twice in one day. Later generalized to covers over stop/reset switches on disk drives and networking equipment.
Mongolian Hordes technique is n. Development by {gang bang} (poss. from the Sixties counterculture expression `Mongolian clusterfuck' for a public orgy). Implies that large numbers of inexperienced programmers are being put on a job better pe...
Mongolian Hordes technique2 is `Chinese Army technique'; see also {Brooks's Law}.
monkey up is vt. To hack together hardware for a particular task, especially a one-shot job. Connotes an extremely {crufty} and consciously temporary solution. Compare {hack up}, {kluge up}, {cruft together}, {cruft together}.
monkey, scratch is n. See {scratch monkey}.
monstrosity is 1. n. A ridiculously {elephantine} program or system, esp. one that is buggy or only marginally functional. 2. The quality of being monstrous (see `Overgeneralization' in the discussion of jargonification). See also {baroque}.
Moof is /moof/ [MAC users] n. The Moof or `dogcow' is a semi-legendary creature that lurks in the depths of the Macintosh Technical Notes Hypercard stack V3.1; specifically, the full story of the dogcow is told in technical note #31 (the parti...
Moof2 is `Clarus'). Option-shift-click will cause it to emit a characteristic `Moof!' or `!fooM' sound. *Getting* to tech note 31 is the hard part; to discover how to do that, one must needs examine the stack script with a hackerly eye. Cl...
Moof3 is if you choose `Page Setup...' with a LaserWriter selected and click on the `Options' button.
Moore's Law is /morz law/ prov. The observation that the logic density of silicon integrated circuits has closely followed the curve (bits per square inch) = 2^{(n - 1962)}; that is, the amount of information storable in one square inch of si...
Moore's Law2 is since the technology was invented. See also {Parkinson's Law of Data}.
moria is /mor'ee-*/ n. Like {nethack} and {rogue}, one of the large PD Dungeons-and-Dragons-like simulation games, available for a wide range of machines and operating systems. Extremely addictive and a major consumer of time better used for ...
MOTAS is /moh-toz/ [USENET: Member Of The Appropriate Sex, after {MOTOS} and {MOTSS}] n. A potential or (less often) actual sex partner. See also {SO}.
MOTOS is /moh-tohs/ [acronym from the 1970 U.S. census forms via USENET: Member Of The Opposite Sex] n. A potential or (less often) actual sex partner. See {MOTAS}, {MOTSS}, {SO}. Less common than MOTSS or {MOTAS}, which have largely displac...
MOTSS is /mots/ or /M-O-T-S-S/ [from the 1970 U.S. census forms via USENET, Member Of The Same Sex] n. Esp. one considered as a possible sexual partner. The gay-issues newsgroup on USENET is called soc.motss. See {MOTOS} and {MOTAS}, which d...
mouse ahead is vi. Point-and-click analog of `type ahead'. To manipulate a computer's pointing device (almost always a mouse in this usage, but not necessarily) and its selection or command buttons before a computer program is ready to accept...
mouse ahead2 is accepting the input. Handling this properly is rare, but it can help make a {WIMP environment} much more usable, assuming the users are familiar with the behavior of the user interface.
mouse around is vi. To explore public portions of a large system, esp. a network such as Internet via {FTP} or {TELNET}, looking for interesting stuff to {snarf}.
mouse belt is n. See {rat belt}.
mouse droppings is [MS-DOS] n. Pixels (usually single) that are not properly restored when the mouse pointer moves away from a particular location on the screen, producing the appearance that the mouse pointer has left droppings behind. The m...
mouse droppings2 is that write to the screen memory corresponding to the mouse pointer's current location without hiding the mouse pointer first, and mouse drivers that do not quite support the graphics mode in use.
mouse elbow is n. A tennis-elbow-like fatigue syndrome resulting from excessive use of a {WIMP environment}. Similarly, `mouse shoulder'; GLS reports that he used to get this a lot before he taught himself to be ambimoustrous.
mouso is /mow'soh/ n. [by analogy with `typo'] An error in mouse usage resulting in an inappropriate selection or graphic garbage on the screen. Compare {thinko}, {braino}.
MS-DOS is /M-S-dos/ [MicroSoft Disk Operating System] n. A {clone} of {{CP/M}} for the 8088 crufted together in 6 weeks by hacker Tim Paterson, who is said to have regretted it ever since. Numerous features, including vaguely UNIX-like but rat...
MS-DOS2 is redirection, and pipelines, were hacked into 2.0 and subsequent versions; as a result, there are two or more incompatible versions of many system calls, and MS-DOS programmers can never agree on basic things like what character to ...
MS-DOS3 is case-sensitive. The resulting mess is now the highest-unit-volume OS in history. Often known simply as DOS, which annoys people familiar with other similarly abbreviated operating systems (the name goes back to the mid-1960s, wh...
MS-DOS4 is operating system for the 360). Some people like to pronounce DOS like "dose", as in "I don't work on dose, man!", or to compare it to a dose of brain-damaging drugs (a slogan button in wide circulation among hackers exhorts: "MS-...
mu is /moo/ The correct answer to the classic trick question "Have you stopped beating your wife yet?". Assuming that you have no wife or you have never beaten your wife, the answer "yes" is wrong because it implies that you used to beat your...
mu2 is because it suggests that you have one and are still beating her. According to various Discordians and Douglas Hofstadter (see the Bibliography), the correct answer is usually "mu", a Japanese word alleged to mean "Your question canno...
mu3 is assumptions". Hackers tend to be sensitive to logical inadequacies in language, and many have adopted this suggestion with enthusiasm. The word `mu' is actually from Chinese, meaning `nothing'; it is used in mainstream Japanese in tha...
mu4 is the Discordian question-denying use. It almost certainly derives from overgeneralization of the answer in the following well-known Rinzei Zen teaching riddle: A monk asked Joshu, "Does a dog have the Buddha nature?" Joshu retorte...
mu5 is Koans}, and Douglas Hofstadter's `G"odel, Escher, Bach' (pointer in the Bibliography).
mudhead is n. Commonly used to refer to a {MUD} player who sleeps, breathes, and eats MUD. Mudheads have been known to fail their degrees, drop out, etc., with the consolation, however, that they made wizard level. When encountered in person...
factpacks/jargon-split.fact view on Meta::CPAN
rusty iron is n. Syn. {tired iron}. It has been claimed that this is the inevitable fate of {water MIPS}.
rusty memory is n. Mass-storage that uses iron-oxide-based magnetic media (esp. tape and the pre-Winchester removable disk packs used in {washing machine}s). Compare {donuts}.*S/N ratio // n. (also `s/n ratio', `sn ratio'). Syn. {signal-to-n...
sacred is adj. Reserved for the exclusive use of something (an extension of the standard meaning). Often means that anyone may look at the sacred object, but clobbering it will screw whatever it is sacred to. The comment "Register 7 is sacre...
sacred2 is program would be interpreted by a hacker to mean that if any *other* part of the program changes the contents of register 7, dire consequences are likely to ensue.
saga is [WPI] n. A cuspy but bogus raving story about N random broken people.
sagan is /say'gn/ [from Carl Sagan's TV series "Cosmos"; think "billions and billions"] n. A large quantity of anything. "There's a sagan different ways to tweak EMACS." "The U.S. Government spends sagans on bombs and welfare --- hard to say ...
SAIL is /sayl/, not /S-A-I-L/ n. 1. Stanford Artificial Intelligence Lab. An important site in the early development of LISP; with the MIT AI Lab, BBN, CMU, and the UNIX community, one of the major wellsprings of technical innovation and hack...
SAIL2 is entry for details). The SAIL machines were officially shut down in late May 1990, scant weeks after the MIT AI Lab's ITS cluster was officially decommissioned. 2. The Stanford Artificial Intelligence Language used at SAIL (sense 1)...
SAIL3 is coroutining facility and some new data types intended for building search trees and association lists.
salescritter is /sayls'kri`tr/ n. Pejorative hackerism for a computer salesperson. Hackers tell the following joke Q. What's the difference between a used-car dealer and a computer salesman? A. The used-car dealer knows he's lying....
salescritter2 is that salescritters are self-selected for stupidity (after all, if they had brains and the inclination to use them, they'd be in programming). The terms `salesthing' and `salesdroid' are also common. Compare {marketroid}, {...
salsman is /salz'm*n/ v. To flood a mailing list or newsgroup with huge amounts of useless, trivial or redundant information. From the name of a hacker who has frequently done this on some widely distributed mailing lists.
salt mines is n. Dense quarters housing large numbers of programmers working long hours on grungy projects, with some hope of seeing the end of the tunnel in N years. Noted for their absence of sunshine. Compare {playpen}, {sandbox}.
salt substrate is [MIT] n. Collective noun used to refer to potato chips, pretzels, saltines, or any other form of snack food designed primarily as a carrier for sodium chloride. From the technical term `chip substrate', used to refer to the ...
salt substrate2 is of integrated circuits are deposited.
same-day service is n. Ironic term used to describe long response time, particularly with respect to {{MS-DOS}} system calls (which ought to require only a tiny fraction of a second to execute). Such response time is a major incentive for prog...
same-day service2 is {well-behaved}. See also {PC-ism}.
sandbender is [IBM] n. A person involved with silicon lithography and the physical design of chips. Compare {ironmonger}, {polygon pusher}.
sandbox is n. (or `sandbox, the') Common term for the R&D department at many software and computer companies (where hackers in commercial environments are likely to be found). Half-derisive, but reflects the truth that research is a form of c...
sanity check is n. 1. The act of checking a piece of code (or anything else, e.g., a USENET posting) for completely stupid mistakes. Implies that the check is to make sure the author was sane when it was written; e.g., if a piece of scientific...
sanity check2 is was giving unexpected results, one might first look at the nesting of parentheses or the coding of the formula, as a {sanity check}, before looking at the more complex I/O or data structure manipulation routines, much less the...
factpacks/jargon-split.fact view on Meta::CPAN
toy problem is [AI] n. A deliberately oversimplified case of a challenging problem used to investigate, prototype, or test algorithms for a real problem. Sometimes used pejoratively. See also {gedanken}, {toy program}.
toy program is n. 1. One that can be readily comprehended; hence, a trivial program (compare {noddy}). 2. One for which the effort of initial coding dominates the costs through its life cycle. See also {noddy}.
trampoline is n. An incredibly {hairy} technique, found in some {HLL} and program-overlay implementations (e.g., on the Macintosh), that involves on-the-fly generation of small executable (and, likely as not, self-modifying) code objects to do...
trampoline2 is pieces of {live data} are called `trampolines. Trampolines are notoriously difficult to understand in action; in fact, it is said by those who use this term that the trampoline that doesnt bend your brain is not the true tram...
trap is 1. n. A program interrupt, usually an interrupt caused by some exceptional situation in the user program. In most cases, the OS performs some action, then returns control to the program. 2. vi. To cause a trap. "These instructions tr...
trap2 is to indicate the cause of the trap. "The monitor traps all input/output instructions." This term is associated with assembler programming (`interrupt or `exception is more common among {HLL} programmers) and appears to be fading int...
trap3 is assembler continues to shrink. However, it is still important to computer architects and systems hackers (see {system}, sense 1), who use it to distinguish deterministically repeatable exceptions from timing-dependent ones (such as I...
trap door is alt. `trapdoor n. 1. Syn. {back door}. 2. [techspeak] A `trap-door function is one which is easy to compute but very difficult to compute the inverse of. Such functions have important applications in cryptography, specifically ...
trash is vt. To destroy the contents of (said of a data structure). The most common of the family of near-synonyms including {mung}, {mangle}, and {scribble}.
tree-killer is [Sun] n. 1. A printer. 2. A person who wastes paper. This should be interpreted in a broad sense; `wasting paper includes the production of {spiffy} but {content-free} documents. Thus, most {suit}s are tree-killers.
trit is /trit/ [by analogy with `bit] n. One base-3 digit; the amount of information conveyed by a selection among one of three equally likely outcomes (see also {bit}). These arise, for example, in the context of a {flag} that should actuall...
trit2 is as yes, no, or unknown. Trits are sometimes jokingly called `3-state bits. A trit may be semi-seriously referred to as `a bit and a half, although it is linearly equivalent to 1.5849625 bits (that is, log2(3) bits).
trivial is adj. 1. Too simple to bother detailing. 2. Not worth the speakers time. 3. Complex, but solvable by methods so well known that anyone not utterly {cretinous} would have thought of them already. 4. Any problem one has already solv...
trivial2 is evaluates to `Ive seen it before). Hackers notions of triviality may be quite at variance with those of non-hackers. See {nontrivial}, {uninteresting}.
troglodyte is [Commodore] n. 1. A hacker who never leaves his cubicle. The term `Gnoll (from Dungeons & Dragons) is also reported. 2. A curmudgeon attached to an obsolescent computing environment. The combination `ITS troglodyte was flung a...
troglodyte2 is wringle-wrangle attending the 2.x.x revision of the Jargon File; at least one of the people it was intended to describe adopted it with pride.
troglodyte mode is [Rice University] n. Programming with the lights turned off, sunglasses on, and the terminal inverted (black on white) because youve been up for so many days straight that your eyes hurt (see {raster burn}). Loud music blar...
troglodyte mode2 is optional but recommended. See {larval stage}, {hack mode}.
Trojan horse is [coined by MIT-hacker-turned-NSA-spook Dan Edwards] n. A program designed to break security or damage a system that is disguised as something else benign, such as a directory lister, archiver, a game, or (in one notorious 1990 ...
Trojan horse2 is destroy viruses! See {back door}, {virus}, {worm}.
true-hacker is [analogy with `trufan from SF fandom] n. One who exemplifies the primary values of hacker culture, esp. competence and helpfulness to other hackers. A high compliment. "He spent 6 hours helping me bring up UUCP and netnews on ...
factpacks/jargon.fact view on Meta::CPAN
arc => [primarily MSDOS] vt. To create a compressed archive from a group of files using SEA ARC, PKWare PKARC, or a compatible program. Rapidly becoming obsolete as the ARC compression method is falling into disuse, having been replaced by newer comp...
arc wars => [primarily MSDOS] n. {holy wars} over which archiving program one should use. The first arc war was sparked when System Enhancement Associates (SEA) sued PKWare for copyright and trademark infringement on its ARC program. PKWare's PKARC o...
arc wars2 => and speed while largely retaining compatibility (it introduced a new compression type that could be disabled for backward-compatibility). PKWare settled out of court to avoid enormous legal costs (both SEA and PKWare are small companies)...
arc wars3 => of PKARC was changed to PKPAK. The public backlash against SEA for bringing suit helped to hasten the demise of ARC as a standard when PKWare and others introduced new, incompatible archivers with better compression algorithms.
archive => n. 1. A collection of several files bundled into one file by a program such as `ar(1)', `tar(1)', `cpio(1)', or arc for shipment or archiving (sense 2). See also {tar and feather}. 2. A collection of files or archives (sense 1) made availa...
arena => [UNIX] n. The area of memory attached to a process by `brk(2)' and `sbrk(2)' and used by `malloc(3)' as dynamic storage. So named from a semi-mythical `malloc corrupt arena' message supposedly emitted when some early versions became terminal...
arg => /arg/ n. Abbreviation for `argument' (to a function), used so often as to have become a new word (like `piano' from `pianoforte'). "The sine function takes 1 arg, but the arc-tangent function can take either 1 or 2 args." Compare param, parm, ...
armor-plated => n. Syn. for bulletproof.
asbestos => adj. Used as a modifier to anything intended to protect one from flames. Important cases of this include {asbestos longjohns} and {asbestos cork award}, but it is used more generally.
asbestos cork award => n. Once, long ago at MIT, there was a flamer so consistently obnoxious that another hacker designed, had made, and distributed posters announcing that said flamer had been nominated for the `asbestos cork award'. Persons in any...
asbestos cork award2 => application of the cork should consult the etymology under flame. Since then, it is agreed that only a select few have risen to the heights of bombast required to earn this dubious dignity --- but there is no agreement on *whi...
asbestos longjohns => n. Notional garments often donned by USENET posters just before emitting a remark they expect will elicit flamage. This is the most common of the asbestos coinages. Also `asbestos underwear', `asbestos overcoat', etc.
attoparsec => n. `atto-' is the standard SI prefix for multiplication by 10^-18. A parsec (parallax-second) is 3.26 light-years; an attoparsec is thus 3.26 * 10^-18 light years, or about 3.1 cm (thus, 1 attoparsec/microfortnight equals about 1 inch/s...
autobogotiphobia => /aw'to-boh-got`*-foh'bee-*/ n. See bogotify.
automagically => /aw-toh-maj'i-klee/ or /aw-toh-maj'i-k*l-ee/ adv. Automatically, but in a way that, for some reason (typically because it is too complicated, or too ugly, or perhaps even too trivial), the speaker doesn't feel like explaining to you....
avatar => [CMU, Tektronix] n. Syn. root, superuser. There are quite a few UNIX machines on which the name of the superuser account is `avatar' rather than `root'. This quirk was originated by a CMU hacker who disliked the term `superuser', and was pr...
awk => 1. n. [UNIX techspeak] An interpreted language for massaging text data developed by Alfred Aho, Peter Weinberger, and Brian Kernighan (the name is from their initials). It is characterized by C-like syntax, a declaration-free approach to varia...
backbone cabal => n. A group of large-site administrators who pushed through the {Great Renaming} and reined in the chaos of USENET during most of the 1980s. The cabal {mailing list} disbanded in late 1988 after a bitter internal catfight, but the ne...
backbone site => n. A key USENET and email site; one that processes a large amount of third-party traffic, especially if it is the home site of any of the regional coordinators for the USENET maps. Notable backbone sites as of early 1991 include uune...
backbone site2 => University, UC Berkeley, DEC's Western Research Laboratories, Ohio State University, and the University of Texas. Compare {rib site}, {leaf site}.
backgammon => See bignum, moby, and pseudoprime.
background => n.,adj.,vt. To do a task `in background' is to do it whenever foreground matters are not claiming your undivided attention, and `to background' something means to relegate it to a lower priority. "For now, we'll just print a list of nod...
backspace and overstrike => interj. Whoa! Back up. Used to suggest that someone just said or did something wrong. Common among APL programmers.
backward combatability => /bak'w*rd k*m-bat'*-bil'*-tee/ [from `backward compatibility'] n. A property of hardware or software revisions in which previous protocols, formats, and layouts are discarded in favor of `new and improved' protocols, formats...
backward combatability2 => making the transition between major releases. When the change is so drastic that the old formats are not retained in the new version, it is said to be `backward combatable'. See {flag day}.
BAD => /B-A-D/ [IBM acronym, `Broken As Designed'] adj. Said of a program that is bogus because of bad design and misfeatures rather than because of bugginess. See {working as designed}.
Bad Thing => [from the 1930 Sellar & Yeatman parody `1066 And All That'] n. Something that can't possibly result in improvement of the subject. This term is always capitalized, as in "Replacing all of the 9600-baud modems with bicycle couriers would ...
Bad Thing2 => Thing}. British correspondents confirm that {Bad Thing} and {Good Thing} (and prob. therefore {Right Thing} and {Wrong Thing}) come from the book referenced in the etymology, which discusses rulers who were Good Kings but Bad Things. Th...
Bad Thing3 => mainstream idiom on the British side of the pond.
bag on the side => n. An extension to an established hack that is supposed to add some functionality to the original. Usually derogatory, implying that the original was being overextended and should have been thrown away, and the new product is ugly,...
bag on the side2 => phrase, `to hang a bag on the side [of]'. "C++? That's just a bag on the side of C ...." "They want me to hang a bag on the side of the accounting system."
bagbiter => /bag'bit-*r/ n. 1. Something, such as a program or a computer, that fails to work, or works in a remarkably clumsy manner. "This text editor won't let me make a file with a line longer than 80 characters! What a bagbiter!" 2. A person who...
bamf => /bamf/ 1. [from old X-Men comics] interj. Notional sound made by a person or object teleporting in or out of the hearer's vicinity. Often used in {virtual reality} (esp. MUD) electronic fora when a character wishes to make a dramatic entrance...
banana label => n. The labels often used on the sides of macrotape reels, so called because they are shaped roughly like blunt-ended bananas. This term, like macrotapes themselves, is still current but visibly headed for obsolescence.
banana problem => n. [from the story of the little girl who said "I know how to spell `banana', but I don't know when to stop"]. Not knowing where or when to bring a production to a close (compare {fencepost error}). One may say `there is a banana pr...
banana problem2 => defined or incorrect termination conditions, or in discussing the evolution of a design that may be succumbing to featuritis (see also {creeping elegance}, {creeping featuritis}). See item 176 under HAKMEM, which describes a banana...
banana problem3 => implementation.bandwidth n. 1. Used by hackers in a generalization of its technical meaning as the volume of information per unit time that a computer, person, or transmission medium can handle. "Those are amazing graphics, but I m...
banana problem4 => bandwidth, I guess." Compare low-bandwidth. 2. Attention span. 3. On USENET, a measure of network capacity that is often wasted by people complaining about how items posted by others are a waste of bandwidth.
bang => 1. n. Common spoken name for `!' (ASCII 0100001), especially when used in pronouncing a {bang path} in spoken hackish. In {elder days} this was considered a CMUish usage, with MIT and Stanford hackers preferring excl or shriek; but the spread...
bang on => vt. To stress-test a piece of hardware or software "I banged on the new version of the simulator all day yesterday and it didn't crash once. I guess it is ready to release." The term {pound on} is synonymous.
bang path => n. An old-style UUCP electronic-mail address specifying hops to get from some assumed-reachable location to the addressee, so called because each hop is signified by a bang sign. Thus, for example, the path ...!bigsite!foovax!barbox!me d...
bang path2 => to machine bigsite (presumably a well-known location accessible to everybody) and from there through the machine foovax to the account of user me on barbox. In the bad old days of not so long ago, before autorouting mailers became commo...
bang path3 => compound bang addresses using the { } convention (see glob) to give paths from *several* big machines, in the hopes that one's correspondent might be able to get mail to one of them reliably (example ...!{seismo, ut-sally, ihnp4}!rice!b...
bang path4 => 10 hops were not uncommon in 1981. Late-night dial-up UUCP links would cause week-long transmission times. Bang paths were often selected by both transmission time and reliability, as messages would often get lost. See {{Internet addres...
banner => n. 1. The title page added to printouts by most print spoolers (see spool). Typically includes user or account ID information in very large character-graphics capitals. Also called a `burst page', because it indicates where to burst (tear a...
bar => /bar/ n. 1. The second metasyntactic variable, after foo and before baz. "Suppose we have two functions FOO and BAR. FOO calls BAR...." 2. Often appended to foo to produce foobar.
bare metal => n. 1. New computer hardware, unadorned with such snares and delusions as an {operating system}, an HLL, or even assembler. Commonly used in the phrase `programming on the bare metal', which refers to the arduous work of {bit bashing} ne...
bare metal2 => for a new machine. Real bare-metal programming involves things like building boot proms and BIOS chips, implementing basic monitors used to test device drivers, and writing the assemblers that will be used to write the compiler back en...
bare metal3 => real development environment. 2. `Programming on the bare metal' is also used to describe a style of hand-hacking that relies on bit-level peculiarities of a particular hardware design, esp. tricks for speed and space optimization that...
bare metal4 => overlapping instructions (or, as in the famous case described in appendix A, interleaving of opcodes on a magnetic drum to minimize fetch delays due to the device's rotational latency). This sort of thing has become less common as the ...
bare metal5 => and machine resources have changed, but is still found in heavily constrained environments such as industrial embedded systems. See {real programmer}. In the world of personal computing, bare metal programming (especially in sense 1 bu...
bare metal6 => considered a {Good Thing}, or at least a necessary thing (because these machines have often been sufficiently slow and poorly designed to make it necessary; see ill-behaved). There, the term usually refers to bypassing the BIOS or OS i...
bare metal7 => application to directly access device registers and machine addresses. "To get 19.2 kilobaud on the serial port, you need to get down to the bare metal." People who can do this sort of thing are held in high regard.
barf => /barf/ [from mainstream slang meaning `vomit'] 1. interj. Term of disgust. This is the closest hackish equivalent of the Val\-speak "gag me with a spoon". (Like, euwww!) See bletch. 2. vi. To say "Barf!" or emit some similar expression of dis...
factpacks/jargon.fact view on Meta::CPAN
beige toaster => n. A Macintosh. See toaster; compare Macintrash, maggotbox.
bells and whistles => [by analogy with the toyboxes on theater organs] n. Features added to a program or system to make it more flavorful from a hacker's point of view, without necessarily adding to its utility for its primary function. Distinguished...
bells and whistles2 => to attract users. "Now that we've got the basic program working, let's go back and add some bells and whistles." No one seems to know what distinguishes a bell from a whistle.
bells, whistles, and gongs => n. A standard elaborated form of {bells and whistles}; typically said with a pronounced and ironic accent on the `gongs'.
benchmark => [techspeak] n. An inaccurate measure of computer performance. "In the computer industry, there are three kinds of lies lies, damn lies, and benchmarks." Well-known ones include Whetstone, Dhrystone, Rhealstone (see h), the Gabriel LISP b...
Berkeley Quality Software => adj. (often abbreviated `BQS') Term used in a pejorative sense to refer to software that was apparently created by rather spaced-out hackers late at night to solve some unique problem. It usually has nonexistent, incomple...
Berkeley Quality Software2 => been tested on at least two examples, and core dumps when anyone else attempts to use it. This term was frequently applied to early versions of the `dbx(1)' debugger. See also Berzerkeley.
berklix => /berk'liks/ n.,adj. [contraction of `Berkeley UNIX'] See BSD. Not used at Berkeley itself. May be more common among suits attempting to sound like cognoscenti than among hackers, who usually just say `BSD'.
berserking => vi. A MUD term meaning to gain points *only* by killing other players and mobiles (non-player characters). Hence, a Berserker-Wizard is a player character that has achieved enough points to become a wizard, but only by killing other cha...
Berzerkeley => /b*r-zer'klee/ [from `berserk', via the name of a now-deceased record label] n. Humorous distortion of `Berkeley' used esp. to refer to the practices or products of the BSD UNIX hackers. See {software bloat}, Missed'em-five, {Berkeley ...
beta => /bay't*/, /be't*/ or (Commonwealth) /bee't*/ n. 1. In the {Real World}, software often goes through two stages of testing Alpha (in-house) and Beta (out-house?). Software is said to be `in beta'. 2. Anything that is new and experimental is in...
BFI => /B-F-I/ n. See {brute force and ignorance}. Also encountered in the variant `BFMI', `brute force and *massive* ignorance'.
bible => n. 1. One of a small number of fundamental source books such as Knuth and K&R. 2. The most detailed and authoritative reference for a particular language, operating system, or other complex software system.
BiCapitalization => n. The act said to have been performed on trademarks (such as NeXT, NeWS, VisiCalc, FrameMaker, TK!solver, EasyWriter) that have been raised above the ruck of common coinage by nonstandard capitalization. Too many marketroid types...
BIFF => /bif/ [USENET] n. The most famous pseudo, and the prototypical newbie. Articles from BIFF are characterized by all uppercase letters sprinkled liberally with bangs, typos, `cute' misspellings (EVRY BUDY LUVS GOOD OLD BIFF CUZ HE"S A K00L DOOD...
biff => /bif/ vt. To notify someone of incoming mail. From the BSD utility `biff(1)', which was in turn named after the implementor's dog (it barked whenever the mailman came). No relation to BIFF.
Big Gray Wall => n. What faces a VMS user searching for documentation. A full VMS kit comes on a pallet, the documentation taking up around 15 feet of shelf space before the addition of layered products such as compilers, databases, multivendor netwo...
Big Gray Wall2 => Recent (since VMS version 5) DEC documentation comes with gray binders; under VMS version 4 the binders were orange (`big orange wall'), and under version 3 they were blue. See VMS.
big iron => n. Large, expensive, ultra-fast computers. Used generally of number-crunching supercomputers such as Crays, but can include more conventional big commercial IBMish mainframes. Term of approval; compare {heavy metal}, oppose dinosaur.
Big Red Switch => [IBM] n. The power switch on a computer, esp. the `Emergency Pull' switch on an IBM mainframe or the power switch on an IBM PC where it really is large and red. "This !@%$% {bitty box} is hung again; time to hit the Big Red Switch."...
Big Red Switch2 => tune with the company's passion for TLAs, this is often acronymized as `BRS' (this has also become established on FidoNet and in the PC clone world). It is alleged that the emergency pull switch on an IBM 360/91 actually fired a no...
factpacks/jargon.fact view on Meta::CPAN
bignum => /big'nuhm/ [orig. from MIT MacLISP] n. 1. [techspeak] A multiple-precision computer representation for very large integers. More generally, any very large number. "Have you ever looked at the United States Budget? There's bignums for you!" ...
bigot => n. A person who is religiously attached to a particular computer, language, operating system, editor, or other tool (see {religious issues}). Usually found with a specifier; thus, `cray bigot', {ITS bigot}, `APL bigot', `VMS bigot', {Berkele...
bit => [from the mainstream meaning and `Binary digIT'] n. 1. [techspeak] The unit of information; the amount of information obtained by asking a yes-or-no question for which the two outcomes are equally probable. 2. [techspeak] A computational quant...
bit bang => n. Transmission of data on a serial line, when accomplished by rapidly tweaking a single output bit at the appropriate times. The technique is a simple loop with eight OUT and SHIFT instruction pairs for each byte. Input is more interesti...
bit bang2 => and output at the same time) is one way to separate the real hackers from the wannabees. Bit bang was used on certain early models of Prime computers, presumably when UARTs were too expensive, and on archaic Z80 micros with a Zilog PIO b...
bit bang3 => instance of the {cycle of reincarnation}, this technique is now (1991) coming back into use on some RISC architectures because it consumes such an infinitesimal part of the processor that it actually makes sense not to have a UART.
bit bashing => n. (alt. `bit diddling' or {bit twiddling}) Term used to describe any of several kinds of low-level programming characterized by manipulation of bit, flag, nybble, and other smaller-than-character-sized pieces of data; these include lo...
bit bashing2 => encryption algorithms, checksum and error-correcting codes, hash functions, some flavors of graphics programming (see bitblt), and assembler/compiler code generation. May connote either tedium or a real technical challenge (more usual...
bit bashing3 => decoding for the new tape driver looks pretty solid but the bit-bashing for the control registers still has bugs." See also {bit bang}, {mode bit}.
bit bucket => n. 1. The universal data sink (originally, the mythical receptacle used to catch bits when they fall off the end of a register during a shift instruction). Discarded, lost, or destroyed data is said to have `gone to the bit bucket'. On ...
bit bucket2 => /dev/null. Sometimes amplified as `the Great Bit Bucket in the Sky'. 2. The place where all lost mail and news messages eventually go. The selection is performed according to {Finagle's Law}; important mail is much more likely to end u...
bit bucket3 => mail, which has an almost 100% probability of getting delivered. Routing to the bit bucket is automatically performed by mail-transfer agents, news systems, and the lower layers of the network. 3. The ideal location for all unwanted ma...
bit bucket4 => article to the bit bucket." Such a request is guaranteed to overflow one's mailbox with flames. 4. Excuse for all mail that has not been sent. "I mailed you those figures last week; they must have ended in the bit bucket." Compare {bla...
bit bucket5 => in jest. It is based on the fanciful notion that bits are objects that are not destroyed but only misplaced. This appears to have been a mutation of an earlier term `bit box', about which the same legend was current; old-time hackers a...
bit bucket6 => told that when the CPU stored bits into memory it was actually pulling them `out of the bit box'. See also {chad box}. Another variant of this legend has it that, as a consequence of the `parity preservation law', the number of 1 bits ...
bit bucket7 => equal the number of 0 bits. Any imbalance results in bits filling up the bit bucket. A qualified computer technician can empty a full bit bucket as part of scheduled maintenance.
bit decay => n. See {bit rot}. People with a physics background tend to prefer this one for the analogy with particle decay. See also computron, {quantum bogodynamics}.
bit rot => n. Also {bit decay}. Hypothetical disease the existence of which has been deduced from the observation that unused programs or features will often stop working after sufficient time has passed, even if `nothing has changed'. The theory exp...
bit rot2 => were radioactive. As time passes, the contents of a file or the code in a program will become increasingly garbled. There actually are physical processes that produce such effects (alpha particles generated by trace radionuclides in ceram...
bit rot3 => change the contents of a computer memory unpredictably, and various kinds of subtle media failures can corrupt files in mass storage), but they are quite rare (and computers are built with error-detecting circuitry to compensate for them)...
bit rot4 => hackers that cosmic rays are among the causes of such events turns out to be a myth; see the {cosmic rays} entry for details. The term {software rot} is almost synonymous. Software rot is the effect, bit rot the notional cause.
factpacks/jargon.fact view on Meta::CPAN
calculator => [Cambridge] n. Syn. for {bitty box}.
can => vt. To abort a job on a time-sharing system. Used esp. when the person doing the deed is an operator, as in "canned from the {console}". Frequently used in an imperative sense, as in "Can that print job, the LPT just popped a sprocket!" Synony...
canonical => [historically, `according to religious law'] adj. The usual or standard state or manner of something. This word has a somewhat more technical meaning in mathematics. Two formulas such as 9 + x and x + 9 are said to be equivalent because ...
card => n. 1. An electronic printed-circuit board (see also {tall card}, {short card}. 2. obs. Syn. {{punched card}}.
card walloper => n. An EDP programmer who grinds out batch programs that do stupid things like print people's paychecks. Compare {code grinder}. See also {{punched card}}, {eighty-column mind}.
careware => /keir'weir/ n. Shareware for which either the author suggests that some payment be made to a nominated charity or a levy directed to charity is included on top of the distribution charge. Syn. charityware; compare crippleware, sense 2.
cargo cult programming => n. A style of (incompetent) programming dominated by ritual inclusion of code or program structures that serve no real purpose. A cargo cult programmer will usually explain the extra code as a way of working around some bug ...
cargo cult programming2 => neither the bug nor the reason the code apparently avoided the bug was ever fully understood (compare {shotgun debugging}, {voodoo programming}). The term `cargo cult' is a reference to aboriginal religions that grew up in ...
cargo cult programming3 => The practices of these cults center on building elaborate mockups of airplanes and military style landing strips in the hope of bringing the return of the god-like airplanes that brought such marvelous cargo during the war....
cargo cult programming4 => Richard Feynman's characterization of certain practices as "cargo cult science" in his book `Surely You're Joking, Mr. Feynman' (W. W. Norton & Co, New York 1985, ISBN 0-393-01921-7).
case and paste => [from `cut and paste'] n. 1. The addition of a new feature to an existing system by selecting the code from an existing feature and pasting it in with minor changes. Common in telephony circles because most operations in a telephone...
case and paste2 => statements. Leads to {software bloat}. In some circles of EMACS users this is called `programming by Meta-W', because Meta-W is the EMACS command for copying a block of text to a kill buffer in preparation to pasting it in elsewher...
case and paste3 => implying that the programmer is acting mindlessly rather than thinking carefully about what is required to integrate the code for two similar cases.
casters-up mode => [IBM] n. Yet another synonym for `broken' or `down'.
casting the runes => n. What a guru does when you ask him or her to run a particular program and type at it because it never works for anyone else; esp. used when nobody can ever see what the guru is doing different from what J. Random Luser does. Co...
casting the runes2 => {examining the entrails}; also see the AI koan about Tom Knight in appendix A.
cat => [from `catenate' via {UNIX} `cat(1)'] vt. 1. [techspeak] To spew an entire file to the screen or some other output sink without pause. 2. By extension, to dump large amounts of data at an unprepared target or with no intention of browsing it c...
catatonic => adj. Describes a condition of suspended animation in which something is so wedged or hung that it makes no response. If you are typing on a terminal and suddenly the computer doesn't even echo the letters back to the screen as you type, ...
cdr => /ku'dr/ or /kuh'dr/ [from LISP] vt. To skip past the first item from a list of things (generalized from the LISP operation on binary tree structures, which returns a list consisting of all but the first element of its argument). In the form `c...
chad => /chad/ n. 1. The perforated edge strips on printer paper, after they have been separated from the printed portion. Also called selvage and perf. 2. obs. The confetti-like paper bits punched out of cards or paper tape; this was also called `ch...
chad box => n. {Iron Age} card punches contained boxes inside them, about the size of a lunchbox (or in some models a large wastebasket), that held the chad (sense 2). You had to open the covers of the card punch periodically and empty the chad box. ...
factpacks/jargon.fact view on Meta::CPAN
golf-ball printer => n. The IBM 2741, a slow but letter-quality printing device and terminal based on the IBM Selectric typewriter. The `golf ball' was a round object bearing reversed embossed images of 88 different characters arranged on four meridi...
golf-ball printer2 => font by swapping in a different golf ball. This was the technology that enabled APL to use a non-EBCDIC, non-ASCII, and in fact completely non-standard character set. This put it 10 years ahead of its time --- where it stayed, f...
golf-ball printer3 => character displays gave way to programmable bit-mapped devices with the flexibility to support other character sets.
gonk => /gonk/ vt.,n. 1. To prevaricate or to embellish the truth beyond any reasonable recognition. It is alleged that in German the term is (mythically) `gonken'; in Spanish the verb becomes `gonkar'. "You're gonking me. That story you just told me...
gonkulator => /gon'kyoo-lay-tr/ [from the old "Hogan's Heroes" TV series] n. A pretentious piece of equipment that actually serves no useful purpose. Usually used to describe one's least favorite piece of computer hardware. See gonk.
gonzo => /gon'zoh/ [from Hunter S. Thompson] adj. Overwhelming; outrageous; over the top; very large, esp. used of collections of source code, source files, or individual functions. Has some of the connotations of moby and hairy, but without the impl...
Good Thing => n.,adj. Often capitalized; always pronounced as if capitalized. 1. Self-evidently wonderful to anyone in a position to notice "The Trailblazer's 19.2Kbaud PEP mode with on-the-fly Lempel-Ziv compression is a Good Thing for sites relayin...
Good Thing2 => possibly have any ill side-effects and may save considerable grief later "Removing the self-modifying code from that shared library would be a Good Thing." 3. When said of software tools or libraries, as in "YACC is a Good Thing", spec...
Good Thing3 => drastically reduced a programmer's work load. Oppose {Bad Thing}.
gorilla arm => n. The side-effect that destroyed touch-screens as a mainstream input technology despite a promising start in the early 1980s. It seems the designers of all those spiffy touch-menu systems failed to notice that humans aren't designed t...
gorilla arm2 => their faces making small motions. After more than a very few selections, the arm begins to feel sore, cramped, and oversized; hence `gorilla arm'. This is now considered a classic cautionary tale to human-factors designers; "Remember ...
gorilla arm3 => "How is this going to fly in *real* use?".
gorp => /gorp/ [CMU perhaps from the canonical hiker's food, Good Old Raisins and Peanuts] Another metasyntactic variable, like foo and bar.
GOSMACS => /goz'maks/ [contraction of `Gosling EMACS'] n. The first EMACS-in-C implementation, predating but now largely eclipsed by GNUMACS. Originally freeware; a commercial version is now modestly popular as `UniPress EMACS'. The author (James Gos...
Gosperism => /gos'p*r-izm/ A hack, invention, or saying by arch-hacker R. William (Bill) Gosper. This notion merits its own term because there are so many of them. Many of the entries in HAKMEM are Gosperisms; see also life.
gotcha => n. A misfeature of a system, especially a programming language or environment, that tends to breed bugs or mistakes because it behaves in an unexpected way. For example, a classic gotcha in C is the fact that `if (a=b) code;' is syntactical...
GPL => /G-P-L/ n. Abbrev. for `General Public License' in widespread use; see copyleft.
GPV => /G-P-V/ n. Abbrev. for {General Public Virus} in widespread use.
grault => /grawlt/ n. Yet another meta-syntactic variable, invented by Mike Gallaher and propagated by the GOSMACS documentation. See corge.
gray goo => n. A hypothetical substance composed of sagans of sub-micron-sized self-replicating robots programmed to make copies of themselves out of whatever is available. The image that goes with the term is one of the entire biosphere of Earth bei...
gray goo2 => goo. This is the simplest of the {nanotechnology} disaster scenarios, easily refuted by arguments from energy requirements and elemental abundances. Compare {blue goo}.
factpacks/jargon.fact view on Meta::CPAN
infant mortality3 => syndrome'). See {bathtub curve}, {burn-in period}.
infinite => adj. Consisting of a large number of objects; extreme. Used very loosely as in "This program produces infinite garbage." "He is an infinite loser." The word most likely to follow `infinite', though, is hair (it has been pointed out that f...
infinite loop => n. One that never terminates (that is, the machine spins or buzzes forever; the usual symptom is catatonia). There is a standard joke that has been made about each generation's exemplar of the ultra-fast machine "The Cray-3 is so fas...
infinite loop2 => loop in under 2 seconds!"
infinity => n. 1. The largest value that can be represented in a particular type of variable (register, memory location, data type, whatever). 2. `minus infinity' The smallest such value, not necessarily or even usually the simple negation of plus in...
insanely great => adj. [Mac community, from Steve Jobs; also BSD UNIX people via Bill Joy] Something so incredibly elegant that it is imaginable only to someone possessing the most puissant of hacker-natures.
INTERCAL => /in't*r-kal/ [said by the authors to stand for `Compiler Language With No Pronounceable Acronym'] n. A computer language designed by Don Woods and James Lyon in 1972. INTERCAL is purposely different from all other computer languages in al...
interesting => adj. In hacker parlance, this word has strong connotations of `annoying', or `difficult', or both. Hackers relish a challenge, and enjoy wringing all the irony possible out of the ancient Chinese curse "May you live in interesting time...
Internet address => n. 1. [techspeak] An absolute network address of the form foo@bar.baz, where foo is a user name, bar is a sitename, and baz is a `domain' name, possibly including periods itself. Contrast with {bang path}; see also {network, the} ...
Internet address2 => Internet machines and most UUCP sites can now resolve these addresses, thanks to a large amount of behind-the-scenes magic and PD software written since 1980 or so. See also {bang path}, domainist. 2. More loosely, any network ad...
Internet address3 => this includes {bang path} addresses and some internal corporate and government networks. Reading Internet addresses is something of an art. Here are the four most important top-level functional Internet domains followed by a sele...
Internet address4 => com commercial organizations edu educational institutions gov U.S. government civilian sites mil U.S. military sites Note that most of the sites in the com and edu domains are in the U.S. or Canada. us sites in See: Internet addr...
Internet address5 => the U.S. outside the functional domains su sites in the Soviet Union (see kremvax). uk sites in the United Kingdom Within the us domain, there are subdomains for the fifty states, each generally with a name identical to the state...
Internet address6 => abbreviation. Within the uk domain, there is an ac subdomain for academic sites and a co domain for commercial ones. Other top-level domains may be divided up in similar ways.
interrupt => 1. [techspeak] n. On a computer, an event that interrupts normal processing and temporarily diverts flow-of-control through an "interrupt handler" routine. See also trap. 2. interj. A request for attention from a hacker. Often explicitly...
interrupt list, the => [MS-DOS] n. The list of all known software interrupt calls (both documented and undocumented) for IBM PCs and compatibles, maintained and made available for free redistribution by Ralf Brown (ralf@cs.cmu.edu). As of early 1991,...
interrupts locked out => When someone is ignoring you. In a restaurant, after several fruitless attempts to get the waitress's attention, a hacker might well observe "She must have interrupts locked out". The synonym `interrupts disabled' is also com...
interrupts locked out2 => have one's interrupt mask bit set" or "interrupts masked out" is also heard. See also spl.
iron => n. Hardware, especially older and larger hardware of mainframe class with big metal cabinets housing relatively low-density electronics (but the term is also used of modern supercomputers). Often in the phrase {big iron}. Oppose silicon. See ...
Iron Age => n. In the history of computing, 1961--1971 --- the formative era of commercial mainframe technology, when {big iron} dinosaurs ruled the earth. These began with the delivery of the first PDP-1, coincided with the dominance of ferrite core...
Iron Age2 => introduction of the first commercial microprocessor (the Intel 4004) in 1971. See also {Stone Age}; compare {elder days}.
factpacks/jargon.fact view on Meta::CPAN
Matrix: [FidoNet] n. 1. What the Opus BBS software and sysops call => FidoNet. 2. Fanciful term for a cyberspace expected to emerge from current networking experiments (see {network, the}). Some people refer to the totality of present networks this w...
Mbogo, Dr. Fred: /*m-boh'goh, dok'tr fred/ [Stanford] n. The => archetypal man you don't want to see about a problem, esp. an incompetent professional; a shyster. "Do you know a good eye doctor?" "Sure, try Mbogo Eye Care and Professional Dry Cleanin...
Mbogo, Dr. Fred: /*m-boh'goh, dok'tr fred/ [Stanford] n. The2 => between bogus and the original Dr. Mbogo, a witch doctor who was Gomez Addams' physician on the old "Addams Family" TV show. See also fred.
meatware => n. Synonym for wetware. Less common.
meeces => /mees'*z/ [TMRC] n. Occasional furry visitors who are not urchins. [That is, mice. This may no longer be in live use; it clearly derives from the refrain of the early-1960s cartoon character Mr. Jinx: "I hate meeces to *pieces*!" --- ESR]
meg => /meg/ n. See {quantifiers}.
mega- => /me'g*/ [SI] pref. See {quantifiers}.
megapenny => /meg'*-pen`ee/ n. $10,000 (1 cent * 10^6). Used semi-humorously as a unit in comparing computer cost and performance figures.
MEGO => /me'goh/ or /mee'goh/ [`My Eyes Glaze Over', often `Mine Eyes Glazeth (sic) Over', attributed to the futurologist Herman Kahn] Also `MEGO factor'. 1. n. A handwave intended to confuse the listener and hopefully induce agreement because the li...
meltdown, network => n. See {network meltdown}.
meme => /meem/ [coined on analogy with `gene' by Richard Dawkins] n. An idea considered as a replicator, esp. with the connotation that memes parasitize people into propagating them much as viruses do. Used esp. in the phrase `meme complex' denoting ...
meme plague => n. The spread of a successful but pernicious meme, esp. one that parasitizes the victims into giving their all to propagate it. Astrology, BASIC, and the other guy's religion are often considered to be examples. This usage is given poi...
meme plague2 => `joiner' ideologies like Naziism or various forms of millennarian Christianity have exhibited plague-like cycles of exponential growth followed by collapses to small reservoir populations.
memetics => /me-met'iks/ [from meme] The study of memes. As of mid-1991, this is still an extremely informal and speculative endeavor, though the first steps towards at least statistical rigor have been made by H. Keith Henson and others. Memetics is...
memory leak => n. An error in a program's dynamic-store allocation logic that causes it to fail to reclaim discarded memory, leading to eventual collapse due to memory exhaustion. Also (esp. at CMU) called {core leak}. See {aliasing bug}, {fandango o...
memory leak2 => {precedence lossage}, {overrun screw}, {leaky heap}, leak.
menuitis => /men`yoo-i:'tis/ n. Notional disease suffered by software with an obsessively simple-minded menu interface and no escape. Hackers find this intensely irritating and much prefer the flexibility of command-line or language-style interfaces,...
mess-dos => /mes-dos/ n. Derisory term for MS-DOS. Often followed by the ritual banishing "Just say No!" See {MS-DOS}. Most hackers (even many MS-DOS hackers) loathe MS-DOS for its single-tasking nature, its limits on application size, its nasty prim...
meta => /me't*/ or /may't*/ or (Commonwealth) /mee't*/ [from analytic philosophy] adj.,pref. One level of description up. A meta-syntactic variable is a variable in notation used to describe syntax, and meta-language is language used to describe lang...
meta bit => n. The top bit of an 8-bit character, which is on in character values 128--255. Also called {high bit}, {alt bit}, or hobbit. Some terminals and consoles (see {space-cadet keyboard}) have a META shift key. Others (including, *mirabile dic...
meta bit2 => machines) have an ALT key. See also {bucky bits}.
factpacks/jargon.fact view on Meta::CPAN
middle-endian => adj. Not big-endian or little-endian. Used of perverse byte orders such as 3-4-1-2 or 2-1-4-3, occasionally found in the packed-decimal formats of minicomputer manufacturers who shall remain nameless. See {NUXI problem}.
milliLampson => /mil'*-lamp`sn/ n. A unit of talking speed, abbreviated mL. Most people run about 200 milliLampsons. Butler Lampson (a CS theorist and systems implementor highly regarded among hackers) goes at 1000. A few people speak faster. This un...
minifloppies => n. 5.25-inch vanilla floppy disks, as opposed to 3.5-inch or microfloppies and the now-obsolescent 8-inch variety. At one time, this term was a trademark of Shugart Associates for their SA-400 minifloppy drive. Nobody paid any attenti...
MIPS => /mips/ [acronym] n. 1. A measure of computing speed; formally, `Million Instructions Per Second' (that's 10^6 per second, not 2^20!); often rendered by hackers as `Meaningless Indication of Processor Speed' or in other unflattering ways. This...
misbug => /mis-buhg/ [MIT] n. An unintended property of a program that turns out to be useful; something that should have been a bug but turns out to be a feature. Usage: rare. Compare {green lightning}. See miswart.
misfeature => /mis-fee'chr/ or /mis'fee`chr/ n. A feature that eventually causes lossage, possibly because it is not adequate for a new situation which has evolved. It is not the same as a bug, because fixing it involves a substantial philosophical c...
Missed'em-five => n. Pejorative hackerism for AT&T System V UNIX, generally used by BSD partisans in a bigoted mood. (The synonym `SysVile' is also encountered.) See {software bloat}, Berzerkeley.
miswart => /mis-wort/ [from wart by analogy with misbug] n. A feature that superficially appears to be a wart but has been determined to be the {Right Thing}. For example, in some versions of the EMACS text editor, the `transpose characters' command ...
mod => vt.,n. 1. Short for `modify' or `modification'. Very commonly used --- in fact the full terms are considered markers that one is being formal. The plural `mods' is used esp. with reference to bug fixes or minor design changes in hardware or so...
mode => n. A general state, usually used with an adjective describing the state. Use of the word `mode' rather than `state' implies that the state is extended over time, and probably also that some activity characteristic of that state is being carri...
mode bit => n. A flag, usually in hardware, that selects between two (usually quite different) modes of operation. The connotations are different from flag bit in that mode bits are mainly written during a boot or set-up phase, are seldom explicitly ...
mode bit2 => lifetime of an ordinary program. The classic example was the EBCDIC-vs.-ASCII bit (#12) of the Program Status Word of the IBM 360. Another was the bit on a PDP-12 that controlled whether it ran the PDP-8 or the LINC instruction set.
modulo => /mo'dyu-loh/ prep. Except for. From mathematical terminology; one can consider saying that 4 = 22 except for the 9s (4 = 22 mod 9). "Well, LISP seems to work okay now, modulo that GC bug." "I feel fine today modulo a slight headache."
molly-guard => /mol'ee-gard/ [University of Illinois] n. A shield to prevent tripping of some {Big Red Switch} by clumsy or ignorant hands. Originally used of some plexiglass covers improvised for the BRS on an IBM 4341 after a programmer's toddler d...
Mongolian Hordes technique => n. Development by {gang bang} (poss. from the Sixties counterculture expression `Mongolian clusterfuck' for a public orgy). Implies that large numbers of inexperienced programmers are being put on a job better performed ...
Mongolian Hordes technique2 => `Chinese Army technique'; see also {Brooks's Law}.
monkey up => vt. To hack together hardware for a particular task, especially a one-shot job. Connotes an extremely crufty and consciously temporary solution. Compare {hack up}, {kluge up}, {cruft together}, {cruft together}.
monkey, scratch => n. See {scratch monkey}.
monstrosity => 1. n. A ridiculously elephantine program or system, esp. one that is buggy or only marginally functional. 2. The quality of being monstrous (see `Overgeneralization' in the discussion of jargonification). See also baroque.
Moof => /moof/ [MAC users] n. The Moof or `dogcow' is a semi-legendary creature that lurks in the depths of the Macintosh Technical Notes Hypercard stack V3.1; specifically, the full story of the dogcow is told in technical note #31 (the particular M...
Moore's Law => /morz law/ prov. The observation that the logic density of silicon integrated circuits has closely followed the curve (bits per square inch) = 2^{(n - 1962)}; that is, the amount of information storable in one square inch of silicon ha...
Moore's Law2 => since the technology was invented. See also {Parkinson's Law of Data}.
moria => /mor'ee-*/ n. Like nethack and rogue, one of the large PD Dungeons-and-Dragons-like simulation games, available for a wide range of machines and operating systems. Extremely addictive and a major consumer of time better used for hacking.
MOTAS => /moh-toz/ [USENET: Member Of The Appropriate Sex, after MOTOS and MOTSS] n. A potential or (less often) actual sex partner. See also SO.
MOTOS => /moh-tohs/ [acronym from the 1970 U.S. census forms via USENET: Member Of The Opposite Sex] n. A potential or (less often) actual sex partner. See MOTAS, MOTSS, SO. Less common than MOTSS or MOTAS, which have largely displaced it.
MOTSS => /mots/ or /M-O-T-S-S/ [from the 1970 U.S. census forms via USENET, Member Of The Same Sex] n. Esp. one considered as a possible sexual partner. The gay-issues newsgroup on USENET is called soc.motss. See MOTOS and MOTAS, which derive from it...
mouse ahead => vi. Point-and-click analog of `type ahead'. To manipulate a computer's pointing device (almost always a mouse in this usage, but not necessarily) and its selection or command buttons before a computer program is ready to accept such in...
mouse ahead2 => accepting the input. Handling this properly is rare, but it can help make a {WIMP environment} much more usable, assuming the users are familiar with the behavior of the user interface.
mouse around => vi. To explore public portions of a large system, esp. a network such as Internet via FTP or TELNET, looking for interesting stuff to snarf.
mouse belt => n. See {rat belt}.
mouse droppings => [MS-DOS] n. Pixels (usually single) that are not properly restored when the mouse pointer moves away from a particular location on the screen, producing the appearance that the mouse pointer has left droppings behind. The major cau...
mouse droppings2 => that write to the screen memory corresponding to the mouse pointer's current location without hiding the mouse pointer first, and mouse drivers that do not quite support the graphics mode in use.
mouse elbow => n. A tennis-elbow-like fatigue syndrome resulting from excessive use of a {WIMP environment}. Similarly, `mouse shoulder'; GLS reports that he used to get this a lot before he taught himself to be ambimoustrous.
mouso => /mow'soh/ n. [by analogy with `typo'] An error in mouse usage resulting in an inappropriate selection or graphic garbage on the screen. Compare thinko, braino.
MS-DOS => /M-S-dos/ [MicroSoft Disk Operating System] n. A clone of {CP/M} for the 8088 crufted together in 6 weeks by hacker Tim Paterson, who is said to have regretted it ever since. Numerous features, including vaguely UNIX-like but rather broken ...
mu => /moo/ The correct answer to the classic trick question "Have you stopped beating your wife yet?". Assuming that you have no wife or you have never beaten your wife, the answer "yes" is wrong because it implies that you used to beat your wife an...
mudhead => n. Commonly used to refer to a MUD player who sleeps, breathes, and eats MUD. Mudheads have been known to fail their degrees, drop out, etc., with the consolation, however, that they made wizard level. When encountered in person, all a mud...
multician => /muhl-ti'shn/ [coined at Honeywell, ca. 1970] n. Competent user of {Multics}. Perhaps oddly, no one has ever promoted the analogous `Unician'.
Multics => /muhl'tiks/ n. [from "MULTiplexed Information and Computing Service"] An early (late 1960s) timesharing operating system co-designed by a consortium including MIT, GE, and Bell Laboratories. Very innovative for its time --- among other thi...
multitask => n. Often used of humans in the same meaning it has for computers, to describe a person doing several things at once (but see thrash). The term `multiplex', from communications technology (meaning to handle more than one channel at the sa...
mumblage => /muhm'bl*j/ n. The topic of one's mumbling (see mumble). "All that mumblage" is used like "all that stuff" when it is not quite clear how the subject of discussion works, or like "all that crap" when `mumble' is being used as an implicit ...
mumble => interj. 1. Said when the correct response is too complicated to enunciate, or the speaker has not thought it out. Often prefaces a longer answer, or indicates a general reluctance to get into a long discussion. "Don't you think that we coul...
munch => [often confused with mung, q.v.] vt. To transform information in a serial fashion, often requiring large amounts of computation. To trace down a data structure. Related to crunch and nearly synonymous with grovel, but connotes less pain.
munching => n. Exploration of security holes of someone else's computer for thrills, notoriety, or to annoy the system manager. Compare cracker. See also {hacked off}.
factpacks/jargon.fact view on Meta::CPAN
RTM => /R-T-M/ [USENET acronym for `Read The Manual'] 1. Politer variant of RTFM. 2. Robert T. Morris, perpetrator of the great Internet worm of 1988; villain to many, na"ive hacker gone wrong to a few. Morris claimed that the worm that brought the I...
rude => [WPI] adj. 1. (of a program) Badly written. 2. Functionally poor, e.g., a program that is very difficult to use because of gratuitously poor (random?) design decisions. See cuspy.
runes => pl.n. 1. Anything that requires {heavy wizardry} or {black art} to parse core dumps, JCL commands, APL, or code in a language you haven't a clue how to read. Compare {casting the runes}, {Great Runes}. 2. Special display characters (for exam...
runic => adj. Syn. obscure. VMS fans sometimes refer to UNIX as `Runix'; UNIX fans return the compliment by expanding VMS to `Very Messy Syntax' or `Vachement Mauvais Syst`eme' (French; lit. "Cowlike Bad System", idiomatically "Bitchy Bad System").
rusty iron => n. Syn. {tired iron}. It has been claimed that this is the inevitable fate of {water MIPS}.
rusty memory => n. Mass-storage that uses iron-oxide-based magnetic media (esp. tape and the pre-Winchester removable disk packs used in {washing machine}s). Compare donuts.*S/N ratio // n. (also `s/n ratio', `sn ratio'). Syn. {signal-to-noise ratio}...
sacred => adj. Reserved for the exclusive use of something (an extension of the standard meaning). Often means that anyone may look at the sacred object, but clobbering it will screw whatever it is sacred to. The comment "Register 7 is sacred to the ...
saga => [WPI] n. A cuspy but bogus raving story about N random broken people.
sagan => /say'gn/ [from Carl Sagan's TV series "Cosmos"; think "billions and billions"] n. A large quantity of anything. "There's a sagan different ways to tweak EMACS." "The U.S. Government spends sagans on bombs and welfare --- hard to say which is...
SAIL => /sayl/, not /S-A-I-L/ n. 1. Stanford Artificial Intelligence Lab. An important site in the early development of LISP; with the MIT AI Lab, BBN, CMU, and the UNIX community, one of the major wellsprings of technical innovation and hacker-cultu...
salescritter => /sayls'kri`tr/ n. Pejorative hackerism for a computer salesperson. Hackers tell the following joke Q. What's the difference between a used-car dealer and a computer salesman? A. The used-car dealer knows he's lying. This reflects the ...
salsman => /salz'm*n/ v. To flood a mailing list or newsgroup with huge amounts of useless, trivial or redundant information. From the name of a hacker who has frequently done this on some widely distributed mailing lists.
salt mines => n. Dense quarters housing large numbers of programmers working long hours on grungy projects, with some hope of seeing the end of the tunnel in N years. Noted for their absence of sunshine. Compare playpen, sandbox.
salt substrate => [MIT] n. Collective noun used to refer to potato chips, pretzels, saltines, or any other form of snack food designed primarily as a carrier for sodium chloride. From the technical term `chip substrate', used to refer to the silicon ...
salt substrate2 => of integrated circuits are deposited.
same-day service => n. Ironic term used to describe long response time, particularly with respect to {MS-DOS} system calls (which ought to require only a tiny fraction of a second to execute). Such response time is a major incentive for programmers t...
same-day service2 => well-behaved. See also PC-ism.
sandbender => [IBM] n. A person involved with silicon lithography and the physical design of chips. Compare ironmonger, {polygon pusher}.
sandbox => n. (or `sandbox, the') Common term for the R&D department at many software and computer companies (where hackers in commercial environments are likely to be found). Half-derisive, but reflects the truth that research is a form of creative ...
sanity check => n. 1. The act of checking a piece of code (or anything else, e.g., a USENET posting) for completely stupid mistakes. Implies that the check is to make sure the author was sane when it was written; e.g., if a piece of scientific softwa...
sanity check2 => was giving unexpected results, one might first look at the nesting of parentheses or the coding of the formula, as a {sanity check}, before looking at the more complex I/O or data structure manipulation routines, much less the algori...
factpacks/jargon.fact view on Meta::CPAN
toy => n. A computer system; always used with qualifiers. 1. `nice toy One that supports the speakers hacking style adequately. 2. `just a toy A machine that yields insufficient computrons for the speakers preferred uses. This is not condemnatory, as...
toy language => n. A language useful for instructional purposes or as a proof-of-concept for some aspect of computer-science theory, but inadequate for general-purpose programming. {Bad Thing}s can result when a toy language is promoted as a general ...
toy language2 => (see {bondage-and-discipline language}); the classic example is {Pascal}. Several moderately well-known formalisms for conceptual tasks such as programming Turing machines also qualify as toy languages in a less negative sense. See a...
toy problem => [AI] n. A deliberately oversimplified case of a challenging problem used to investigate, prototype, or test algorithms for a real problem. Sometimes used pejoratively. See also gedanken, {toy program}.
toy program => n. 1. One that can be readily comprehended; hence, a trivial program (compare noddy). 2. One for which the effort of initial coding dominates the costs through its life cycle. See also noddy.
trampoline => n. An incredibly hairy technique, found in some HLL and program-overlay implementations (e.g., on the Macintosh), that involves on-the-fly generation of small executable (and, likely as not, self-modifying) code objects to do indirectio...
trap => 1. n. A program interrupt, usually an interrupt caused by some exceptional situation in the user program. In most cases, the OS performs some action, then returns control to the program. 2. vi. To cause a trap. "These instructions trap to the...
trap door => alt. `trapdoor n. 1. Syn. {back door}. 2. [techspeak] A `trap-door function is one which is easy to compute but very difficult to compute the inverse of. Such functions have important applications in cryptography, specifically in the con...
trash => vt. To destroy the contents of (said of a data structure). The most common of the family of near-synonyms including mung, mangle, and scribble.
tree-killer => [Sun] n. 1. A printer. 2. A person who wastes paper. This should be interpreted in a broad sense; `wasting paper includes the production of spiffy but content-free documents. Thus, most suits are tree-killers.
trit => /trit/ [by analogy with `bit] n. One base-3 digit; the amount of information conveyed by a selection among one of three equally likely outcomes (see also bit). These arise, for example, in the context of a flag that should actually be able to...
trivial => adj. 1. Too simple to bother detailing. 2. Not worth the speakers time. 3. Complex, but solvable by methods so well known that anyone not utterly cretinous would have thought of them already. 4. Any problem one has already solved (some cla...
troglodyte => [Commodore] n. 1. A hacker who never leaves his cubicle. The term `Gnoll (from Dungeons & Dragons) is also reported. 2. A curmudgeon attached to an obsolescent computing environment. The combination `ITS troglodyte was flung around some...
troglodyte mode => [Rice University] n. Programming with the lights turned off, sunglasses on, and the terminal inverted (black on white) because youve been up for so many days straight that your eyes hurt (see {raster burn}). Loud music blaring from...
troglodyte mode2 => optional but recommended. See {larval stage}, {hack mode}.
Trojan horse => [coined by MIT-hacker-turned-NSA-spook Dan Edwards] n. A program designed to break security or damage a system that is disguised as something else benign, such as a directory lister, archiver, a game, or (in one notorious 1990 case on...
Trojan horse2 => destroy viruses! See {back door}, virus, worm.
true-hacker => [analogy with `trufan from SF fandom] n. One who exemplifies the primary values of hacker culture, esp. competence and helpfulness to other hackers. A high compliment. "He spent 6 hours helping me bring up UUCP and netnews on my FOOBAR...
tty => /T-T-Y/ [UNIX], /titee/ [ITS, but some UNIX people say it this way as well; this pronunciation is not considered to have sexual undertones] n. 1. A terminal of the teletype variety, characterized by a noisy mechanical printer, a very limited c...
tube => 1. n. A CRT terminal. Never used in the mainstream sense of TV; real hackers dont watch TV, except for Loony Toons, Rocky & Bullwinkle, Trek Classic, the Simpsons, and the occasional cheesy old swashbuckler movie (see appendix B). 2. [IBM] To...
tube time => n. Time spent at a terminal or console. More inclusive than hacking time; commonly used in discussions of what parts of ones environment one uses most heavily. "I find Im spending too much of my tube time reading mail since I started thi...
factpacks/pTkfunc.fact view on Meta::CPAN
pack => Geometry manager that packs around edges of cavity - TkGeometry Management
place => Geometry manager for fixed or rubber-sheet placement - TkGeometry Management
raise => Change a window's position in the stacking order - TkGeometry Management
bitmap => Images that display two colors - TkImage Classes
image => Create and manipulate images - TkImage Classes
photo => Full-color images - TkImage Classes
Tk_BackgroundError => report Tcl error that occurred in background processing - TkLibrary Procedures
Tk_CanvasPsY => utility procedures for generating Postscript for canvases - TkLibrary Procedures
Tk_CanvasTextInfo => additional information for managing text items in canvases - TkLibrary Procedures
Tk_CanvasTkwin => utility procedures for canvas type managers - TkLibrary Procedures
Tk_ClearSelection => Deselect a selection - TkLibrary Procedures
Tk_ClipboardClear => Manage the clipboard - TkLibrary Procedures
Tk_ConfigureWidget => process configuration options for widgets - TkLibrary Procedures
Tk_ConfigureWindow => change window configuration or attributes - TkLibrary Procedures
Tk_CoordsToWindow => Find window containing a point - TkLibrary Procedures
Tk_CreateBindingTable => invoke scripts in response to X events - TkLibrary Procedures
Tk_CreateErrorHandler => handle X protocol errors - TkLibrary Procedures
Tk_CreateEventHandler => associate procedure callback with an X event - TkLibrary Procedures
Tk_CreateFileHandler => associate procedure callbacks with files or devices - TkLibrary Procedures
Tk_CreateGenericHandler => associate procedure callback with all X events - TkLibrary Procedures
Tk_CreateImageType => define new kind of image - TkLibrary Procedures
Tk_CreateItemType => define new kind of canvas item - TkLibrary Procedures
Tk_CreateMainWindow => create or delete window - TkLibrary Procedures
Tk_CreatePhotoImageFormat => define new file format for photo images - TkLibrary Procedures
Tk_CreateSelHandler => arrange to handle requests for a selection - TkLibrary Procedures
Tk_CreateTimerHandler => call a procedure at a - TkLibrary Procedures
Tk_DeleteImage => Destroy an image. - TkLibrary Procedures
Tk_DoOneEvent => wait for events and - TkLibrary Procedures
Tk_DoWhenIdle => invoke a procedure when there are no pending events - TkLibrary Procedures
Tk_DrawFocusHighlight => draw the traversal highlight ring for a widget - TkLibrary Procedures
Tk_EventInit => Use the Tk event loop without the rest of Tk - TkLibrary Procedures
Tk_FindPhoto => manipulate the image data stored in a photo image. - TkLibrary Procedures
Tk_FreeXId => make X resource identifier available for reuse - TkLibrary Procedures
Tk_GeometryRequest => specify desired geometry or internal border for a window - TkLibrary Procedures
Tk_Get3DBorder => draw borders with three-dimensional appearance - TkLibrary Procedures
factpacks/pTkfunc.fact view on Meta::CPAN
Tk_GetGC => maintain database of read-only graphics contexts - TkLibrary Procedures
Tk_GetImage => use an image in a widget - TkLibrary Procedures
Tk_GetJoinStyle => translate between strings and join styles - TkLibrary Procedures
Tk_GetJustify => translate between strings and justification styles - TkLibrary Procedures
Tk_GetOption => retrieve an option from the option database - TkLibrary Procedures
Tk_GetPixels => translate between strings and screen units - TkLibrary Procedures
Tk_GetPixmap => allocate and free pixmaps - TkLibrary Procedures
Tk_GetRelief => translate between strings and relief values - TkLibrary Procedures
Tk_GetRootCoords => Compute root-window coordinates of window - TkLibrary Procedures
Tk_GetScrollInfo => parse arguments for scrolling commands - TkLibrary Procedures
Tk_GetSelection => retrieve the contents of a selection - TkLibrary Procedures
Tk_GetUid => convert from string to unique identifier - TkLibrary Procedures
Tk_GetVRootGeometry => Get location and size of virtual root for window - TkLibrary Procedures
Tk_GetVisual => translate from string to visual - TkLibrary Procedures
Tk_IdToWindow => Find Tk's window information for an X window - TkLibrary Procedures
Tk_ImageChanged => notify widgets that image needs to be redrawn - TkLibrary Procedures
Tk_InternAtom => manage cache of X atoms - TkLibrary Procedures
Tk_Main => main program for Tk-based applications - TkLibrary Procedures
Tk_MainWindow => find the main window for an application - TkLibrary Procedures
Tk_MaintainGeometry => maintain geometry of one window relative to another - TkLibrary Procedures
Tk_ManageGeometry => arrange to handle geometry requests for a window - TkLibrary Procedures
Tk_MapWindow => map or unmap a window - TkLibrary Procedures
Tk_MoveToplevelWindow => Adjust the position of a top-level window - TkLibrary Procedures
Tk_Name => convert between names and window tokens - TkLibrary Procedures
Tk_NameOfImage => Return name of image. - TkLibrary Procedures
Tk_OwnSelection => make a window the owner of the primary selection - TkLibrary Procedures
Tk_ParseArgv => process command-line options - TkLibrary Procedures
Tk_Preserve => avoid freeing storage while it's being used - TkLibrary Procedures
Tk_RestackWindow => Change a window's position in the stacking order - TkLibrary Procedures
Tk_RestrictEvents => filter and selectively delay X events - TkLibrary Procedures
Tk_SetAppName => Set the name of an application for ``send'' commands - TkLibrary Procedures
Tk_SetClass => set or retrieve a window's class - TkLibrary Procedures
Tk_SetGrid => control the grid for interactive resizing - TkLibrary Procedures
Tk_SetWindowVisual => change visual characteristics of window - TkLibrary Procedures
Tk_Sleep => delay execution for a given number of milliseconds - TkLibrary Procedures
Tk_StrictMotif => Return value of tk_strictMotif variable - TkLibrary Procedures
Tk_WindowId => retrieve information from Tk's local data structure - TkLibrary Procedures
clipboard => Manipulate Tk clipboard - TkSelection Handling
selection => Manipulate the X selection - TkSelection Handling
bell => Ring a display's bell - TkUser Interaction
focus => Manage the input focus - TkUser Interaction
focusNext => Utility methods for managing the input focus. - TkUser Interaction
grab => Confine pointer and keyboard events to a window sub-tree - TkUser Interaction
tkwait => Wait for variable to change or window to be destroyed - TkUser Interaction
AXIS => Canvas with Axes - perl/TkDocumentation
BLIB => Use MakeMaker's uninstalled version of a package - perl/TkDocumentation
DIAL => an alternative to the scale widget - perl/TkDocumentation
DRAGDROP/COMMON => private class used by Drag&Drop - perl/TkDocumentation
DRAGDROP/SUNCONST => Constants for Sun's Drag&Drop protocol - perl/TkDocumentation
factpacks/rfc_index.fact view on Meta::CPAN
rfc 1940 => Source Demand Routing: Packet Format and Forwarding Specification (Version 1). D. Estrin, T. Li, Y. Rekhter, K. Varadhan, D. Zappala. May 1996. (Format: TXT=60858 bytes) (Status: INFORMATIONAL)
rfc 1939 => Post Office Protocol - Version 3. J. Myers & M. Rose. May 1996. (Format: TXT=47018 bytes) (Obsoletes RFC1725) (Updated by RFC1957) (Also STD0053) (Status: STANDARD)
rfc 1938 => A One-Time Password System. N. Haller & C. Metz. May 1996. (Format: TXT=44844 bytes) (Obsoleted by RFC2289) (Status: PROPOSED STANDARD)
rfc 1937 => "Local/Remote" Forwarding Decision in Switched Data Link Subnetworks. Y. Rekhter & D. Kandlur. May 1996. (Format: TXT=18302 bytes) (Status: INFORMATIONAL)
rfc 1936 => Implementing the Internet Checksum in Hardware. J. Touch & B. Parham. April 1996. (Format: TXT=36618 bytes) (Status: INFORMATIONAL)
rfc 1935 => What is the Internet, Anyway?. J. Quarterman & S. Carl-Mitchell. April 1996. (Format: TXT=30369 bytes) (Status: INFORMATIONAL)
rfc 1934 => Ascend's Multilink Protocol Plus (MP+). K. Smith. April 1996. (Format: TXT=87072 bytes) (Status: INFORMATIONAL)
rfc 1933 => Transition Mechanisms for IPv6 Hosts and Routers. R. Gilligan & E. Nordmark. April 1996. (Format: TXT=47005 bytes) (Status: PROPOSED STANDARD)
rfc 1932 => IP over ATM: A Framework Document. R. Cole, D. Shur, & C. Villamizar. April 1996. (Format: TXT=68031 bytes) (Status: INFORMATIONAL)
rfc 1931 => Dynamic RARP Extensions for Automatic Network Address Acquisition. D. Brownell. April 1996. (Format: TXT=27544 bytes) (Status: INFORMATIONAL)
rfc 1930 => Guidelines for creation, selection, and registration of an Autonomous System (AS). J. Hawkinson, T. Bates. March 1996. (Format: TXT=22073 bytes) (Also BCP0006) (Status: BEST CURRENT PRACTICE)
rfc 1929 => Username/Password Authentication for SOCKS V5. M. Leech. April 1996. (Format: TXT=3568 bytes) (Status: PROPOSED STANDARD)
rfc 1928 => SOCKS Protocol Version 5. M. Leech, M. Ganis, Y. Lee, R. Kuris, D. Koblas & L. Jones. April 1996. (Format: TXT=19741 bytes) (Status: PROPOSED STANDARD)
rfc 1927 => Suggested Additional MIME Types for Associating Documents. C. Rogers. April 1996. (Format: TXT=5254 bytes) (Status: INFORMATIONAL)
rfc 1926 => An Experimental Encapsulation of IP Datagrams on Top of ATM. J. Eriksson. April 1996. (Format: TXT=2969 bytes) (Status: INFORMATIONAL)
rfc 1925 => The Twelve Networking Truths. R. Callon. April 1996. (Format: TXT=4294 bytes) (Status: INFORMATIONAL)
rfc 1924 => A Compact Representation of IPv6 Addresses. R. Elz. April 1996. (Format: TXT=10409 bytes) (Status: INFORMATIONAL)
rfc 1923 => RIPv1 Applicability Statement for Historic Status. J. Halpern & S. Bradner. March 1996. (Format: TXT=5560 bytes) (Status: INFORMATIONAL)
rfc 1922 => Chinese Character Encoding for Internet Messages. HF. Zhu, DY. Hu, ZG. Wang, TC. Kao, WCH. Chang & M. Crispi. March 1996. (Format: TXT=50995 bytes) (Status: INFORMATIONAL)
rfc 1921 => TNVIP Protocol. J. Dujonc. March 1996. (Not online) (Status: INFORMATIONAL)
rfc 1920 => INTERNET OFFICIAL PROTOCOL STANDARDS. J. Postel. March 1996. (Format: TXT=91936 bytes) (Obsoletes RFC1780, RFC1720, RFC1800, RFC1880) (Obsoleted by RFC2109, RFC2000, RFC2200, STD0001) (Also STD0001) (Status: HISTORIC)
factpacks/security.fact view on Meta::CPAN
compromising emanations => Unintentional data-related or intelligence-bearing signals that, if intercepted and analyzed, disclose the information transmission received, handled, or otherwise processed by any information processing equipment. See TEM...
CSTVRP => Computer Security Technical Vulnerability Reporting Program - A program that focuses on technical vulnerabilities in commercially available hardware, firmware and software products acquired by DoD. CSTVRP provides for the reporting, catalo...
abuse => The misuse, alteration, disruption or destruction of data processing resources. The key aspect is that it is intentional and improper.
architecture => The set of layers and protocols (including formats and standards that different hardware/software must comply with to achieve stated objectives) which define a computer system. Computer architecture features can be available to applic...
cryptography => The use of a crypto-algorithm in a computer, microprocessor, or microcomputer to perform encryption or decryption in order to protect information or to authenticate users, sources, or information.
fraud => Computer-related crimes involving deliberate misrepresentation, alteration or disclosure of data in order to obtain something of value (usually for monetary gain). A computer system must have been involved in the perpetration or coverup of ...
security => Synonymous with automated information systems security.
security subsystem => A device designed to provide limited computer security features in a larger system environment.
concealment system => A method of achieving confidentiality in which sensitive information is hidden by embedding it in irrelevant data.
confidentiality => (1) The assurance that information is not disclosed to inappropriate entities or processes. (2) The property that information is not made available or disclosed to unauthorized entities. (3) The prevention of the unauthorized discl...
configuration => the selection of one of the sets of possible combinations of features of a Target of Evaluation.
configuration control => management of changes made to a system's hardware, software, firmware, and documentation throughout the development and operational life of the system.
configuration management => The management of security features and assurances through control of changes made to a system's hardware, software, firmware, documentation, test, test fixtures and test documentation throughout the development and operat...
confinement => The prevention of the leaking of sensitive data from a program.
confinement channel => Synonymous with covert channel.
confinement property => Synonymous with star property (*-property).
connection => a liaison, in the sense of a network interrelationship, between two hosts for a period of time. The liaison is established (by an initiating host) for the purpose of information transfer (with the associated host); the period of time is...
constrained => A qualifier implying: within the TSF Scope of Control
construction => the process of creating a Target of Evaluation.
consumers => Individuals or groups responsible for specifying requirements for IT product security (e.g., policy makers and regulatory officials, system architects, integrators, acquisition managers, product purchasers, and end users.
contamination => The intermixing of data at different sensitivity and need-to-know levels. The lower level data is said to be contaminated by the higher level data; thus, the contaminating (higher level) data may not receive the required level of pr...
factpacks/security.fact view on Meta::CPAN
evaluation assurance requirements => Requirements in a protection profile which address both the type and the rigor of activities that must occur during product evaluation.
evaluation criteria => A set of requirements defining the conditions under which an evaluation is performed. These requirements can also be used in specification and development of systems and products.
evaluator => the independent person or organisation that performs an evaluation.
evaluator actions => a component of the evaluation criteria for a particular phase or aspect of evaluation, identifying what the evaluator must do to check the information supplied by the sponsor of the evaluator, and the additional activities he mus...
evaluators => Individuals or groups responsible for the independent assessment of IT product security (e.g., product evaluators, system security officers, system certifiers, and system accreditors).
executive state => (1) One of several states in which a system may operate and the only one in which certain privileged instructions may be executed. Such instructions cannot be executed when the system is operating in other (for example, user) state...
explain => Give required information and show that it satisfies all relevant requirements.
exploitable channel => Covert channel that is usable or detectable by subjects external to the AIS's trusted computing base and can be used to violate the AIS's technical security policy. (See covert channel.)
external security controls => Measures which include physical, personnel, procedural, and administrative security requirements and a separate certification and accreditation process that govern physical access to an IT product. <br><br>Note: These me...
fail safe => Pertaining to the automatic protection of programs and/or processing systems to maintain safety when a hardware or software failure is detected in a system.
fail soft => Pertaining to the selective termination of affected nonessential processing when a hardware or software failure is detected in a system.
failure access => An unauthorized and usually inadvertent access to data resulting from a hardware or software failure in the system.
failure control => The methodology used to detect and provide fail-safe or fail-soft recovery from hardware and software failures in a system.
family => Grouping of related components that all address the same type of
fault => A condition that causes a device or system component to fail to perform in a required manner.
fetch protection => (1) A system-provided restriction to prevent a program from accessing data in another user's segment of storage. (2) The aggregate of all processes and procedures in a system designed to inhibit unauthorized access, contamination,...
file protection => The aggregate of all processes and procedures in a system designed to inhibit unauthorized access, contamination, or elimination of a file.
file security => The means by which access to computer files is limited to authorized users only.
flaw => An error of commission, omission, or oversight in a system that allows protection mechanisms to be bypassed.
flaw hypothesis methodology => A system analysis and penetration technique where specifications and documentation for the system are analyzed and then flaws in the system are hypothesized. The list of hypothesized flaws is then prioritized on the ba...
formal => Based upon precise and unambiguous syntax and semantics. - Human user - A person who interacts with the TOE.
factpacks/security.fact view on Meta::CPAN
refinements => Requirement in a protection profile taken to a lower level of abstraction than the component on which it is based. Note: The refinement of a component requirement is necessary when multiple environment-specific requirements must be ass...
reliability => The probability of a given system performing its mission adequately for a specified period of time under the expected operating conditions.
requirements => Phase of the Development Process wherein the top level definition of the functionality of the system is produced.
residual risk => The portion of risk that remains after security measures have been applied.
residue => Data left in storage after processing operations are complete, but before degaussing or rewriting has taken place.
resource => anything used or consumed while performing a function. The categories of resources are: time, information, objects (information containers), or processors (the ability to use information). specific examples are: CPU time; terminal connect...
restricted area => Any area to which access is subject to special restrictions or controls for reasons of security or safeguarding of property or material.
risk => The expected loss due to, or impact of, anticipated threats in light of system vulner- abilities and strength or determination of relevant threat agents.
risk analysis => The process of identifying security risks, determining their magnitude, and identifying areas needing safeguards. Risk analysis is a part of risk management. Synonymous with risk assessment.
risk index => The disparity between the minimum clearance or authorization of system users and the maximum sensitivity (e.g., classification and categories) of data processed by a system. See CSC-STD-003-85 and CSC-STD-004-85 for a complete explanat...
risk management => The total process of identifying, controlling, and eliminating or minimizing uncertain events that may affect system resources. It includes risk analysis, cost benefit analysis, selection, implementation and test, security evaluati...
role => A defined set of functionally related operations, and the authorisations necessary to perform those operations, which may be assigned to users.
RSA => A public key algorithm invented by Ronald L. Rivest, Adi Shamir, and Leonard M. Adleman (RSA). RSA can be used to generate digital signatures, encrypt messages, and provide key management for DES (Data Encryption Standard), RC2 (Rivest Cipher ...
safeguards => See security safeguards.
scavenging => Searching through object residue to acquire unauthorized data.
secrecy policy => a security policy to prevent unauthorized users from reading sensitive information. See also Security Policy
secret key => The key that two parties share and keep secret for secret key cryptography. Given secret key algorithms of equal strength, the approximate difficulty of decrypting encrypted messages by brute force search can be measured by the number o...
secure state => A condition in which no subject can access any object in an unauthorized manner.
secure subsystem => A subsystem that contains its own implementation of the reference monitor concept for those resources it controls. However, the secure subsystem must depend on other controls and the base operating system for the control of subje...
Security => The combination of confidentiality, integrity and availability. [ITSEC] Security Audit Trail - Set of records that collectively provide documentary evidence of pro- cessing used to aid in tracing from original transactions forward to rela...
security administrator => A user or user role about which assumptions of correct behaviour need to be made to ensure the continuing correct operation of the TOE.