Amethyst

 view release on metacpan or  search on metacpan

Amethyst/Brain/Infobot/Module/Zippy.pm  view on Meta::CPAN

Awright, which one of you hid my PENIS ENVY?
BARBARA STANWYCK makes me nervous!!
Barbie says, Take quaaludes in gin and go to a disco right away!
But Ken says, WOO-WOO!!  No credit at "Mr. Liquor"!!
BARRY ... That was the most HEART-WARMING rendition of "I DID IT MY WAY" I've ever heard!!
Being a BALD HERO is almost as FESTIVE as a TATTOOED KNOCKWURST.
BELA LUGOSI is my co-pilot ...
BI-BI-BI-BI-BI-BI-BI-BI-BI-BI-BI-BI-BI-BI-BI-BI-BI-BI-BI-BI-BI-BI-BI-BI- ... bleakness ... desolation ... plastic forks ...
Bo Derek ruined my life!
Boy, am I glad it's only 1971...
Boys, you have ALL been selected to LEAVE th' PLANET in 15 minutes!!
But they went to MARS around 1953!!
But was he mature enough last night at the lesbian masquerade?
Can I have an IMPULSE ITEM instead?
Can you MAIL a BEAN CAKE?
Catsup and Mustard all over the place!  It's the Human Hamburger!
CHUBBY CHECKER just had a CHICKEN SANDWICH in downtown DULUTH!
Civilization is fun!  Anyway, it keeps me busy!!
Clear the laundromat!!  This whirl-o-matic just had a nuclear meltdown!!
Concentrate on th'cute, li'l CARTOON GUYS!  Remember the SERIAL NUMBERS!!  Follow the WHIPPLE AVE. EXIT!!  Have a FREE PEPSI!!  Turn LEFT at th'HOLIDAY INN!!  JOIN the CREDIT WORLD!!  MAKE me an OFFER!!!
CONGRATULATIONS!  Now should I make thinly veiled comments about DIGNITY, self-esteem and finding TRUE FUN in your RIGHT VENTRICLE??

Amethyst/Brain/Infobot/Module/Zippy.pm  view on Meta::CPAN

I like your SNOOPY POSTER!!
-- I love KATRINKA because she drives a PONTIAC.  We're going away now.  I fed the cat.
I love ROCK 'N ROLL!  I memorized the all WORDS to "WIPE-OUT" in 1965!!
I need to discuss BUY-BACK PROVISIONS with at least six studio SLEAZEBALLS!!
I once decorated my apartment entirely in ten foot salad forks!!
I own seven-eighths of all the artists in downtown Burbank!
I put aside my copy of "BOWLING WORLD" and think about GUN CONTROL legislation...
I represent a sardine!!
I request a weekend in Havana with Phil Silvers!
... I see TOILET SEATS ...
I selected E5 ... but I didn't hear "Sam the Sham and the Pharoahs"!
I smell a RANCID CORN DOG!
I smell like a wet reducing clinic on Columbus Day!
I think I am an overnight sensation right now!!
... I think I'd better go back to my DESK and toy with a few common MISAPPREHENSIONS ...
I think I'll KILL myself by leaping out of this 14th STORY WINDOW while reading ERICA JONG'S poetry!!
I think my career is ruined!
I used to be a FUNDAMENTALIST, but then I heard about the HIGH RADIATION LEVELS and bought an ENCYCLOPEDIA!!
... I want a COLOR T.V. and a VIBRATING BED!!!
I want a VEGETARIAN BURRITO to go ... with EXTRA MSG!!
I want a WESSON OIL lease!!

Amethyst/Brain/Infobot/Module/Zippy.pm  view on Meta::CPAN

Oh my GOD -- the SUN just fell into YANKEE STADIUM!!
Oh, I get it!!  "The BEACH goes on", huh, SONNY??
Okay ... I'm going home to write the "I HATE RUBIK's CUBE HANDBOOK FOR DEAD CAT LOVERS" ...
OKAY!!  Turn on the sound ONLY for TRYNEL CARPETING, FULLY-EQUIPPED R.V.'S and FLOATATION SYSTEMS!!
OMNIVERSAL AWARENESS??  Oh, YEH!!  First you need four GALLONS of JELL-O and a BIG WRENCH!! ... I think you drop th'WRENCH in the JELL-O as if it was a FLAVOR, or an INGREDIENT ... ... or ... I ... um ... WHERE'S the WASHING MACHINES?
On SECOND thought, maybe I'll heat up some BAKED BEANS and watch REGIS PHILBIN ...  It's GREAT to be ALIVE!!
On the other hand, life can be an endless parade of TRANSSEXUAL
QUILTING BEES aboard a cruise ship to DISNEYWORLD if only we let it!!
On the road, ZIPPY is a pinhead without a purpose, but never without a POINT.
Once upon a time, four AMPHIBIOUS HOG CALLERS attacked a family of DEFENSELESS, SENSITIVE COIN COLLECTORS and brought DOWN their PROPERTY VALUES!!
Once, there was NO fun ... This was before MENU planning, FASHION statements or NAUTILUS equipment ... Then, in 1985 ... FUN was completely encoded in this tiny MICROCHIP ... It contain 14,768 vaguely amusing SIT-COM pilots!!  We had to wait FOUR BIL...
One FISHWICH coming up!!
ONE LIFE TO LIVE for ALL MY CHILDREN in ANOTHER WORLD all THE DAYS OF OUR LIVES.
ONE: I will donate my entire "BABY HUEY" comic book collection to the downtown PLASMA CENTER ... TWO: I won't START a BAND called "KHADAFY & THE HIT SQUAD" ... THREE: I won't ever TUMBLE DRY my FOX TERRIER again!! 
... or were you driving the PONTIAC that HONKED at me in MIAMI last Tuesday?
Our father who art in heaven ... I sincerely pray that SOMEBODY at this table will PAY for my SHREDDED WHAT and ENGLISH MUFFIN ... and also leave a GENEROUS TIP .... 
over in west Philadelphia a puppy is vomiting ...
OVER the underpass!  UNDER the overpass!  Around the FUTURE and BEYOND REPAIR!!
PARDON me, am I speaking ENGLISH?
Pardon me, but do you know what it means to be TRULY ONE with your BOOTH!
PEGGY FLEMMING is stealing BASKET BALLS to feed the babies in VERMONT.

example.pl  view on Meta::CPAN

		# Object specific variables
		Server		=> 'london.rhizomatic.net',
		Nick		=> 'Amethyst',		# Replace this
		# Channels	=> [ qw(bblug) ],	# Put your channels here
			);

my %infobot = (
		# Amethyst variables
		Name		=> 'infobot',
		# Object specific variables
		# You can put any valid selection of
		# Amethyst::Brain::Infobot::Module names in this list. I have
		# taken some out as my personal preference.
		Modules		=> [ qw(
				Statement
				Google Nslookup
				Karma
				Fortune Excuse Insult
				Zippy Zappa
				Help Time Math
				BabyTime

factpacks/Linux.fact  view on Meta::CPAN

CDJ => <reply> $who, CD player for DJs. URL: http://you.genie.co.uk/fjd/cdj/index.html
cdlabelgen => <reply> $who, Generates frontcards and traycards for CDs. URL: http://www.red-bean.com/~bwf/software/cdlabelgen/
CDlib => <reply> $who, Graphical tool to search for files in your CD-ROMs. URL: http://www.multimania.com/cdlib/
CDM => <reply> $who, Offers copying, mastering and manipulation of CD tracks. URL: http://cdm.squidge.nu
CDPlayer.app => <reply> $who, CD player with CDDB support.. URL: http://www.linuxstart.com/~cassio/omnicd/
zlibc => <reply> $who, Zlibc - transparently access compressed files. URL: http://zlibc.linux.lu/
CDR-Toaster => <reply> $who, Tk frontend for cd-burning. URL: http://www.jump.net/~brooke/cdrtoast/
CDRDAO => <reply> $who, Disk-At-Once Recording of Audio CD-Rs. URL: http://www.ping.de/sites/daneb/cdrdao.html
cdrecord => <reply> $who, Allows the creation of both audio and data CDs. URL: http://www.fokus.gmd.de/research/cc/glone/employees/joerg.schilling/private/cdrecord.html
cdrecord-filters => <reply> $who, A patch for cdrecord to allow it to accept user-created modules.. URL: http://www.multimania.com/pixels/cdrecord-filters.html
cdrom_speed => <reply> $who, Small program to select cdrom drive speed. URL: http://dmpc.dbp.fmph.uniba.sk/~krivanek/cdrom_speed/
cdsetspd => <reply> $who, allows setting the reading speed of Plextor CDROM drives. URL: http://ourworld.compuserve.com/homepages/mjm5
CDXA => <reply> $who, Play Audio from Playstation CDROM XA files. URL: http://solaris1.mysolution.com/~jcatki/cdxa/
Celebrat => <reply> $who, Very simple non-interactive command-line calendar. URL: http://www.nada.kth.se/~d92-jwa/code/
cell.pl => <reply> $who, Cellular One Text Message Email. URL: http://eric.superblock.net/
centerICQ => <reply> $who, a textmode-based ICQ clone for Linux. URL: http://konst.org.ua/software.centericq.html
Cervisia => <reply> $who, KDE CVS frontend. URL: http://pauli.uni-muenster.de/~gehrmab/cervisia/cervisia.html
CFCC Video Algorithm => <reply> $who, Video coding and compression algorithm for low bit rate channels. URL: http://www.linuxtel.com/
ZMailer => <reply> $who, . URL: http://www.zmailer.org/
CfgTie => <reply> $who, Perl modules to access system configuration information. URL: http://www.geocities.com/CapeCanaveral/Lab/1862/script/CfgTie_1.html
cfingerd => <reply> $who, The Configurable Finger Daemon. URL: http://www.infodrom.north.de/cfingerd/

factpacks/Linux.fact  view on Meta::CPAN

ecg2png => <reply> $who, Utility to convert high-res ECGs to Web-friendly PNG format. URL: http://www.cardiothink.com/downloads/ecg2png/
ECLiPt Mirroring Tool => <reply> $who, Full-featured mirroring script. URL: http://eclipt.uni-klu.ac.at/
ECLiPt Roaster => <reply> $who, GTK Interface to MkIsoFs and CDRecord for writing CDs on the fly. URL: http://eclipt.uni-klu.ac.at
ECLiPt Secure Tunnel => <reply> $who, TCP Secure Tunneling System. URL: http://eclipt.uni-klu.ac.at
ECLiPt Virtual Gallery Creator => <reply> $who, Create nice WWW Image Galleries and index pages. URL: http://eclipt.uni-klu.ac.at/projects/evg/
Ecology-HOWTO => <reply> $who, Linux as a mean to protect our environment.. URL: http://www.snafu.de/~wehe/eco_linux.html
eCos => <reply> $who, Real Time Operating System. URL: http://sourceware.cygnus.com/ecos/
Edcom => <reply> $who, An easy to administer, multiuser, story posting system, written in perl5.. URL: http://edseek.com/developers.shtml
Eddie => <reply> $who, Robust, clustering, load balancing, high availability, web server tool.. URL: http://www.eddieware.org/
editek => <reply> $who, Colorizer for /etc/issue, /etc/issue.net and /etc/motd. URL: http://www.xnot.com/editek/
edna => <reply> $who, tiny HTTP server for selecting and streaming MP3 files. URL: 
eEMU => <reply> $who, Enterprise Event Management and Monitoring Utility. URL: http://www.jarrix.com.au/
efingerd => <reply> $who, Another finger daemon for linux. URL: http://melkor.dnp.fmph.uniba.sk/~garabik/efingerd.html
EFMC => <reply> $who, EFMC (Element's Formula Mass Calculator) calculates Formula Mass. URL: http://emu.simplenet.com/misc/efmc-0.1.tar.gz
efs => <reply> $who, Extent File System support (read-only). URL: http://aeschi.ch.eu.org/efs/
Efsane => <reply> $who, Turkish Window Manager for X. URL: http://efsane.sitebest.com/
efsmod => <reply> $who, Read EFS (Silicon Graphic's own Filesystem) Media on a Linux Platform. URL: http://wwwcip.informatik.uni-erlangen.de/user/cnvogelg/proj.html
egcs => <reply> $who, Experimental set of enhancements for the GNU tools. URL: http://www.cygnus.com/egcs/
Egg => <reply> $who, Interpreter for the language in Dijkstra's Discipline of Computer Programming. URL: http://www.andrewcooke.free-online.co.uk/jara/egg/index.html
ZNibbles => <reply> $who, Networked multiplayer nibbles/snake game for X11/Motif. URL: http://www.stud.enst.fr/~vmallet/ZNibbles.html
eggdrop2 => <reply> $who, IRC bot, written in C. URL: http://www.eggdrop.net/

factpacks/Linux.fact  view on Meta::CPAN

Gamora => <reply> $who, Java based server construction, hosting, and adminstration architecture.. URL: http://gamora.org/
gamtv => <reply> $who, A free MPEG player with a nice GTK interface. URL: http://andrej.co.ru/programs/gamtv/
ganesha => <reply> $who, GTK program to locates multiple download sites for ftp.. URL: http://www.frontiernet.net/~pani/downloads.html
GannonChat => <reply> $who, Web-Based Chat using PERL and MySQL. URL: http://chat.nitco.com/
Ganymede => <reply> $who, GPL'ed Network Directory Management System. URL: http://www.arlut.utexas.edu/gash2/
GAP => <reply> $who, A new approach to distributed administration. URL: http://www.gsyc.inf.uc3m.es/~assman/gap/
garbmail => <reply> $who, Delete old messages from mailboxes in /var/spool/mail. URL: ftp://ftp.signum.se/pub/misc/garbmail/garbmail-1.0.tar.gz
Garou Chase => <reply> $who, Game without long lasting interest.. URL: http://rocloiso.planet-d.net/
GASM => <reply> $who, Freeware Assembler. URL: http://gaztek.tpu.org
Gaspell => <reply> $who, A Gnome Frontend to Aspell. URL: http://metalab.unc.edu/kevina/aspell/
gatelogin => <reply> $who, Allows a user to login to a gateway and select a server behind the firewall. URL: http://www.stat.auckland.ac.nz/~blom001/gatelogin/
GATOS => <reply> $who, ATI-TV software for Linux.. URL: http://www.core.binghamton.edu/~insomnia/gatos/
GazOS => <reply> $who, Protected mode OS kernel with source code, all drivers built in.. URL: http://www.gaztek.co.uk/gazos/index.html
gbase => <reply> $who, A GTK program for converting between bases.. URL: http://www.hibernaculum.demon.co.uk/
gbasm => <reply> $who, gameboy assembler. URL: http://emu.simplenet.com/misc/gbasm-0.0.5.tar.gz
gbe => <reply> $who, gbe is a gameboy emulator for X and SVGAlib. URL: http://emu.simplenet.com/gb/gbe/
gbeta => <reply> $who, Advanced OO language. URL: http://www.daimi.au.dk/~eernst/gbeta/
GBlippie => <reply> $who, User interface functionality extension to Gtk/GNOME.. URL: http://GBlippie.mini.dhs.org/
gbox_applet => <reply> $who, mbox watcher. URL: http://www.informatik.uni-bremen.de/~crunchy/linux/gbox_applet.html
GBuffy => <reply> $who, A GTK+ multiple mailbox monitor program. URL: http://www.fiction.net/blong/programs/gbuffy/
gbuild => <reply> $who, build tool to automate cvs update, compilation, and packaging. URL: http://www.cryon.com/gbuild/
GCache => <reply> $who, Generic cache class for Python. URL: ftp://minkirri.apana.org.au/pub/python/GCache-0.1.tar.bz2
gcc => <reply> $who, . URL: http://egcs.cygnus.com/
GCD => <reply> $who, A cd-player with a gtk+ interface. URL: http://www.nostatic.org/grip/
Gcdplay => <reply> $who, GPL'ed CD player with local and server-based cddb support.. URL: http://www.korax.net/~mglisic/gcdplay/index.html
gchbkgrd => <reply> $who, Program to constantly change the desktop's background. URL: http://www.bitdaddy.com/~mono/gchbkgrd/
GChip8 => <reply> $who, An interpreter/emulator for the CHIP8 virtual machine.. URL: http://cerealbox.angel.nu/gchip8.html
GClipper => <reply> $who, A multiple buffer clipboard that automatically fetches new selections.. URL: http://thunderstorms.org/gclipper/gclipper-1.1.tar.gz
GCO => <reply> $who, A database for keeping track of your comic collection.. URL: http://www.daimi.au.dk/~maxx/html/maxximum-linux.html
gcombust => <reply> $who, gtk+ frontend for mkisofs and cdrecord. URL: http://www.iki.fi/jmunsin/gcombust
GCompte => <reply> $who, A program to keep track of your finances. URL: http://www.linux-france.org/prj/gcompte/
GConf => <reply> $who, Configuration storage library, like libproplist or the Windows Registry. URL: ftp://ftp.gnome.org:/pub/GNOME/sources/GConf/GConf-0.1.tar.gz
Gconfig => <reply> $who, A router configuration tool. URL: http://www.employees.org/~stannous/gconfig.html
gd => <reply> $who, A library used to create PNG images. URL: http://www.boutell.com/gd/
GDB => <reply> $who, GDB, The GNU Debugger. URL: http://sourceware.cygnus.com/gdb/
gdbm => <reply> $who, GNU database library for C. URL: http://www.gnu.org/software/gdbm/gdbm.html
gdcd => <reply> $who, GTK CD player with Cover Art Index and CDDB support. URL: http://gdcd.undergrid.net/
Gdchart module => <reply> $who, A perl port of an excellent graphing package.. URL: http://www.aestus.net/gdchart/

factpacks/Linux.fact  view on Meta::CPAN

HTMaiL => <reply> $who, Perl5 mail to HTML utility, for mailing list archives, etc.. URL: http://www.chaotika.net/code/HTMaiL/
HTML PLAIN => <reply> $who, A revolutionary HTML precompiler. URL: http://artho.com/webtools/plain/
HTML Tidy => <reply> $who, Cleans up HTML source and formats it nicely.. URL: http://www.w3.org/People/Raggett/tidy/
HTML-Tree => <reply> $who, Generates HTML Tree Diagram of Web Site HTML Web Pages. URL: http://pagesz.net/~scotty/perlscripts/html-tree-desc.html
html2c => <reply> $who, HTML - CGI-BIN C development tool. URL: http://www.gate.net/~ddata/utilities
Html2PHax => <reply> $who, Webclient to Hylafax for a PHP enabled Apache webserver. URL: http://www.xs4all.be/~mosaic/html2phax/
html2texi => <reply> $who, Converts HTML to texinfo.. URL: http://www.uncg.edu/~wlestes/software/
HTML::DynamicTemplate => <reply> $who, Flexible and dynamic HTML template class. URL: http://perl.m80.org/HTML/HTML-DynamicTemplate-0.94.tar.gz
HTML::Embperl => <reply> $who, Embed Perl into HTML Pages with a lot of features especialy for dynamic webpage. URL: http://perl.apache.org/embperl/
HTML::EP => <reply> $who, PHP-like system based on Perl. URL: ftp://ftp.funet.fi/pub/languages/perl/CPAN/authors/id/JWIED/
HTML::EP::Explorer => <reply> $who, Web interface for selecting and printing files on your web server. URL: ftp://ftp.funet.fi/pub/languages/perl/CPAN/authors/id/JWIED/
HTML::EP::Glimpse => <reply> $who, Simple search engine based on Glimpse. URL: ftp://ftp.funet.fi/pub/languages/perl/CPAN/authors/id/JWIED/
HTML::Mason => <reply> $who, A component-based perl web development environment. URL: http://www.masonhq.com/
HTML::Pager => <reply> $who, Perl module to handle CGI HTML paging of arbitary data. URL: http://www.cpan.org/authors/id/S/SA/SAMTREGAR/
HTML::Template => <reply> $who, A simple and fast HTML Template module for Perl. URL: http://www.cpan.org/authors/id/S/SA/SAMTREGAR/
htmlcrunch => <reply> $who, a simple HTML-compressor. URL: http://mstengel.home.dhs.org/
HTMLDOC => <reply> $who, Converts HTML to indexed HTML, PostScript, and PDF. URL: http://www.easysw.com/htmldoc/
HtmlLayout => <reply> $who, A Java LayoutManager, uses an HTML-like syntax. URL: http://braindamage.org/HtmlLayout/
htmlPARSER => <reply> $who, htmlPARSER is a set of python classes which parse HTML templates. URL: http://heimat.de/mrtopf/htmlparser/
HTMLPerlSETI => <reply> $who, Display SETI@home client statistics in an HTML table.. URL: http://www.mobius-soft.com/htmlperlseti.htm
htmlpp => <reply> $who, Perl-based Preprocessor for HTML documents. URL: http://www.imatix.com/html/htmlpp/index.htm

factpacks/Linux.fact  view on Meta::CPAN

ISCA BBS Client => <reply> $who, Client program for ISCA BBS and DOC-style BBS systems. URL: http://blackout.net/~error/client/
ISDK => <reply> $who, Information System Development Kit. URL: http://www.revai.hu/isdk/
isdn4net => <reply> $who, Scripts for operating and configuring isdn4linux. URL: http://www.terminator.net/isdn4net/
isdnadmin => <reply> $who, Linuxconf module for administration and operation of isdn4linux. URL: http://www.terminator.net/isdnadmin/
ISDNCALL => <reply> $who, Pops up an X message if someone is calling via ISDN. URL: http://www.fuzzys.org/isdncall/
isdnpack => <reply> $who, An ISDN under Linux all-in-one package.. URL: http://server.ownedtech.org/
isdn_scripts => <reply> $who, ISDN configuration tool. URL: http://www.titulaer.de/isdn/
ISE EiffelBench => <reply> $who, Seamless object oriented development environment. URL: http://eiffel.com/
Isearch => <reply> $who, . URL: http://www.etymon.com/Isearch/
isectd => <reply> $who, middleware daemon for client/server, dist. URL: http://home.netcom.com/~tgagne/
iSelect => <reply> $who, Interactive Selection Tool. URL: http://www.engelschall.com/sw/iselect/
Ishmail => <reply> $who, Very powerful GUI e-mail tool. URL: http://ishmail.linuxbox.com
ISIC => <reply> $who, Sends controlled, semi-random packets to test IP Stacks and Firewalls. URL: http://expert.cc.purdue.edu/~frantzen/
IsinGlass => <reply> $who, Firewall setup script designed to protect dial-up users.. URL: http://www.tummy.com/isinglass
isinglass-hzd => <reply> $who, Firewall script designed to protect dial-up users. URL: http://www.hazard.maks.net/~hazard
Islamic Timer => <reply> $who, Calculates Islamic Prayer times, Hijri calender, calender converter. URL: http://www.cob.ohio-state.edu/~wmuhanna/IslamicTimer.html
ISO8211Lib => <reply> $who, ISO/IEC 8211 library. URL: http://gdal.velocet.ca/projects/iso8211/
isp-watcher => <reply> $who, A perl script which monitors lines at an ISP for disconnects.. URL: http://cyberpunks.org/holograph/darkewolf.phtml
ISPd => <reply> $who, Billing/user management software for ISPs. URL: http://ispd.eburg.com
isreal => <reply> $who, Tells if an image is real, computer generated, or not real.. URL: http://www.striker.ottawa.on.ca/~aland/isreal/
ITISSL => <reply> $who, A Java 2 implementation of Sun' SSL Reference API based on SSLeay/OpenSSL. URL: http://www-sp.iti.informatik.tu-darmstadt.de/itissl/

factpacks/Linux.fact  view on Meta::CPAN

Kazlib => <reply> $who, Robust ANSI C data structure library.. URL: http://users.footprints.net/~kaz/kazlib.html
KBackup => <reply> $who, . URL: http://www.phy.hw.ac.uk/~karsten/KBackup/
kBag => <reply> $who, Synchronizes your documents between one computer and another.. URL: http://members.tripod.com/Kir_Smirnov/kBag/index.html
kbd => <reply> $who, Keytable files and keyboard utilities. URL: ftp://ftp.win.tue.nl/pub/linux/utils/kbd/
kBeroFTPD => <reply> $who, KDE Front-End for BeroFTPD configuration. URL: ftp://beroftpd.unix.eu.org/pub/BeroFTPD/kBeroFTPD/
KBiff => <reply> $who, New mail notification utility for KDE. URL: http://www.pobox.com/~kurt_granroth/kbiff/index.html
KBind => <reply> $who, KDE front-end to configure the Bind nameserver.. URL: http://asimov.unitec.edu/~cgcorea/kbind.html
KBlade => <reply> $who, KBlade is a frontend to BladeEnc (mp3 encoder) for KDE. URL: http://www.multimania.com/linzeus/kblade/
KBlinsel => <reply> $who, Simple stereogram generator for KDE.. URL: http://www.eisscholle.de/
KBML => <reply> $who, JavaBeans serialization using XML. URL: http://www.inria.fr/koala/kbml/
KBootSelector => <reply> $who, KDE Boot option selector. URL: http://myplace.to.be/Pantoffel/kbootsel/index.html
kbquery => <reply> $who, Command-line search util for the linux knowledge base. URL: http://linuxkb.cheek.com/
KBriefcase => <reply> $who, Briefcase for KDE similar to Windows briefcase.. URL: http://netnow.micron.net/~mrolig/kbriefcase/
KBshare => <reply> $who, Web based knowledge manager. URL: http://www.snipes.org/bspages/projects/
KCdCd => <reply> $who, KDE frontend for the cdcd cd player.. URL: http://ultra7.unl.edu.ar
kcdwrite => <reply> $who, KDE frontend for cd-writing tools. URL: http://harmony.ruhr.de/~core/kcdwrite
kchess => <reply> $who, KDE frontend for chess programs. URL: http://sharmas.dhs.org/~adsharma/projects/kchess.html
Kclock => <reply> $who, . URL: http://www.geocities.com/SiliconValley/Vista/2964/kclock.html
kcmbind => <reply> $who, A KDE front-end to configure bind. URL: http://www.100webstreet.com/kcmbind/
kcmdhcpd => <reply> $who, A configure program for the ISC DHCP-Server for the KDE-project.. URL: http://www.100webstreet.com/kcmbind/dhcp.html
Kcmjoy => <reply> $who, Configure your joystick via kcontrol. URL: http://www.geocities.com/SiliconValley/Vista/2964/applications.html

factpacks/Linux.fact  view on Meta::CPAN

Ptester => <reply> $who, HTTP Benchmarking tool. URL: ftp://ftp.lysator.liu.se/pub/unix/ptester
ptf => <reply> $who, A TCP forwarder written in Python. URL: http://www.tuts.net/~klausman/english/linux.html
ptk-phone => <reply> $who, Phonebook application in Perl/Tk. URL: http://tcfreenet.org/~schewe/ptk-phone/phone.html
ptkfonted => <reply> $who, Perl/Tk BDF Font Editor. URL: http://cantor.res.cmu.edu/gutenberg/
ptkrip => <reply> $who, Perl/Tk frontend to cdparanoia and bladeenc. URL: http://www.red-bean.com/~lefty/ptkrip.html
PTlink ircd => <reply> $who, New featured ircd with a great services integration. URL: http://www.ptlink.net/
PTlink Services => <reply> $who, IRC Registration Services. URL: http://www.ptlink.net/
ptrans => <reply> $who, Convert UTF-8 to plain text. URL: http://www.whizkidtech.net/i18n/
ptris => <reply> $who, Pike GTK Tetris. URL: http://www.pike-community.org/code/show_single.html?id=20
PTSPACE => <reply> $who, Patrol in Space X11 arcade game. URL: http://www.ezmo.com/jason/projects.html
Public Bookmark Generator => <reply> $who, Generate a public bookmark (selected items) out of your bookmarks. URL: http://www.loria.fr/~michel/PBM/
PulseTLM => <reply> $who, A full featured 3D Transmission Line Matrix (TLM) simulator. URL: http://cemtach.org/
pup => <reply> $who, Printer Cartridge Utility. URL: http://pup.hypermart.net/
purl => <reply> $who, A tool to check if web-pages have been modified. URL: http://homer.isoe.ch/~lanzm/purl/
PURP => <reply> $who, An ncurses-based RPM-manager. URL: http://www.lysator.liu.se/purp/
pushsite => <reply> $who, Utility to update remote site. URL: http://www.dyer.demon.co.uk/slug/tipscrip.htm
PVCj => <reply> $who, Client side installation of JARs within Sun's Java Plugin. URL: http://granitepeaks.com/pvcj/
PVFS => <reply> $who, A parallel file system for clusters of PCs. URL: http://www.parl.clemson.edu/pvfs/
PVM => <reply> $who, A portable message-passingprogramming system. URL: http://www.epm.ornl.gov/pvm/
PVM Gmake => <reply> $who, Distributed gmake. URL: http://www.crosswinds.net/~jlabrous/GNU/PVMGmake/
PVM++ => <reply> $who, A C++-Library for PVM. URL: http://goethe.ira.uka.de/~wilhelmi/pvm++/

factpacks/Linux.fact  view on Meta::CPAN

quotatool => <reply> $who, Command line utility for setting Linux filesystem quotas. URL: http://devel.duluoz.net/quotatool/
Quotes => <reply> $who, Financial Quotations and Linux headlines. URL: http://www.iae.nl/users/grimaldo/OpenSoft/quotes.shtml
Quotesaq => <reply> $who, A quote script with a web interface for Eggdrop IRC bots. URL: http://rad.capecod.net/quote/
Qutar => <reply> $who, QT interface for tar. URL: http://home.sol.no/~geirerni/qutar/
QVocab => <reply> $who, A program to learn the vocabulary of a foreign language. URL: http://www.qvocab.seul.org/
Qvwm => <reply> $who, Windows 95 like window manager for the X Window System. URL: http://www.qvwm.org/
QW/Q2 MasterBrowser => <reply> $who, QuakeWorld and Quake2 Master Server. URL: http://www.thegrid.net/smiller/MasterBrowser/Linux/
R => <reply> $who, A language and environment for statistical computing.. URL: http://www.r-project.org
R2D2 => <reply> $who, Tool for developing applications that require run-time symbolic data access.. URL: http://www.zentropix.com/
RabbIT => <reply> $who, Mutating, caching webproxy to speed up surfing over slow links. URL: http://www.nada.kth.se/projects/prup98/web_proxy/
Rabbit Selector => <reply> $who, A happy restaurant selector. URL: http://eclipse.knight-rider.org/rabbit/
Rabid Squirrel Linux => <reply> $who, A Linux distribution for power users and sysadmins. URL: http://www.rabid.de
Raceway => <reply> $who, Embedded interface for ZENamp. URL: http://www.zenamp.net/sections/raceway
Radio Jockey => <reply> $who, Random multi-format player for mp3's, au's, wav's and pictures. URL: http://www.acorn.net/~ajalics/
radio-spase => <reply> $who, SPASE PCRadio V4L device driver. URL: http://www.elis.rug.ac.be/~ronsse/mr/radio-spase.c
RadioActive => <reply> $who, Radio tuner for X11 and Video4Linux. URL: http://cactus.rulez.org/radioactive/
Radius => <reply> $who, Remote Authentication Dial In User Service. URL: http://www.livingston.com/tech/docs/radius/
radiusclient => <reply> $who, framework and library for writing RADIUS clients. URL: http://www.cityline.net/~lf/radius/
radiusContext => <reply> $who, A RADIUS accounting log analysis package. URL: http://www.tummy.com/radiusContext/
radiusd-sql => <reply> $who, RADIUS server modified to store accounting in a MySQL database. URL: http://www.mindrot.org/code/radiusd-sql.php3
radkill => <reply> $who, BASH script for ISP's that wish to guarantee no busy signals. URL: ftp://ftp.nmo.net/pub/radkill/
Rael's Binary Grabber => <reply> $who, Automated tool for downloading binaries from UseNet newsgroups.. URL: http://thelamb.dhs.org/~rael/bgrab/
Rain's PPP scripts => <reply> $who, Scripts to simplify the use and setup of pppd. URL: http://www.bluecherry.net/~rain/rppp-2.9.fix.tar.gz
rainbow => <reply> $who, OpenGL visualization plugin for xmms, based on pulsating rainbows. URL: http://horizon.pair.com/linux/
Ramp Music Player => <reply> $who, A front end to mpg123 with next-generation playlist capabilities. URL: http://www.brilligsys.com/ramp/
Ranalis => <reply> $who, A MOO2-like strategy game. URL: http://antaran.dhs.org/
rand => <reply> $who, random pipe. URL: http://math.smsu.edu/~br0ke/rand.html
Random line selector => <reply> $who, Selects random line from STDIN. URL: http://artho.com/randline.html
Random TagLine => <reply> $who, Pick a random line from a text file and output it to a HTML page. URL: http://kspoon.tsx.org/
Randsig => <reply> $who, Small random signature generator using taglines.. URL: http://www.ctv.es/USERS/sromero/prog/randsig.html
randtype => <reply> $who, Displays text at random intervals.. URL: http://cutlet.linuxbox.com/utilities/
RAPID => <reply> $who, Commodity and stock graphing for technical analysis trading decisions. URL: http://www.daveware.com
RAR For Linux => <reply> $who, A general purpose archiving and compression program. URL: http://www.softwareblast.com/entries/00001673.sml
rarpd => <reply> $who, Portable user-mode RARP daemon. URL: ftp://ftp.dementia.org/pub/net-tools/
Rasca => <reply> $who, Extended MP3 Player.. URL: http://www.penultima.org/~rasca/
Raven SSL Module => <reply> $who, RSA licensed 128-bit strong cryptography SSL module for the Apache web server.. URL: http://www.covalent.net/
raw2s => <reply> $who, This changes a binary file into GNU ASM. URL: http://www.dextrose.com/info/0309raw2s.htm
RawSnif => <reply> $who, Easily configurable Perl based network sniffer written using Net::RawIP modules.. URL: http://www.nfsg.org/downloads/rawsnif.html

factpacks/Linux.fact  view on Meta::CPAN

Secure Remote Password Protocol => <reply> $who, Zero-knowledge password-based authentication and key exchange protocol. URL: http://srp.stanford.edu/srp/
Secure Shell => <reply> $who, Shell script for secure logins using encryption and dual authorization. URL: http://www.leenux.com/scripts/
Secure Sockets Agent Client => <reply> $who, A system for securing the insecure communications between existing applications.. URL: http://www.cyber.ee/ssa/
Secure Sockets Agent Server => <reply> $who, A system for securing the insecure communications between existing applications.. URL: http://www.cyber.ee/ssa/
Secure Syslog => <reply> $who, Cryptographically secure system logging tool for UNIXsystems. URL: http://www.core-sdi.com/english/slogging/ssyslog.html
Secure-Linux Patch => <reply> $who, Linux kernel patch to block most stack overflow exploits. URL: http://www.openwall.com/linux/
sed => <reply> $who, GNU Stream Editor. URL: ftp://ftp.gnu.org/pub/gnu/
SeeR => <reply> $who, C/C++ scripting engine. URL: http://home.elka.pw.edu.pl/~ppodsiad/seer/
segfault.php3 => <reply> $who, segfault.php3 retrieves the latest segfault news for a webpage.. URL: http://swamp.chl.chalmers.se/backends/
Selathco => <reply> $who, LaTeX To HTML Converter. URL: http://dione.zcu.cz/~toman40/selathco/
selectwm => <reply> $who, A window manager selector. URL: http://www.altern.org/ldufresne/selectwm/
Self Serve FAQ => <reply> $who, PHP scripts for Web-based FAQs. URL: http://lcg.org/ssfaq/
semu => <reply> $who, Sega Saturn Emulator. URL: http://emu.simplenet.com/semu/
Send Packet => <reply> $who, Network administration tool. URL: http://redirect.to/mg/
SendDay => <reply> $who, A daemon to email a new URL every day.. URL: http://www3.cybercities.com/s/suneatshours/sendday/
Sendmail => <reply> $who, Powerful and flexible Mail Transport Agent. URL: http://www.sendmail.org/
sendmail-tls => <reply> $who, SSL/TLS Wrapper for sendmail (and other MTAs). URL: http://opensource.3gi.com/sendmail-tls/
SendPage => <reply> $who, Utility for sending alphanumeric pages using the IXO protocol.. URL: http://www.cpoint.net/projects/sendpage/
SENSE => <reply> $who, Distributed Shared Memory system. URL: http://hjem.get2net.dk/dduck/sense.html
Sentinel => <reply> $who, Fast system file scanner. URL: http://zurk.netpedia.net/zfile.html
sersniff => <reply> $who, Program for tunnelling/sniffing for between 2 serial ports.. URL: http://www.earth.li/projectpurple/progs/sersniff.html

factpacks/Linux.fact  view on Meta::CPAN

sherpa => <reply> $who, A system security configuration and maintenance tool. URL: http://www.nbank.net/~rick/sherpa/
Shopping Cart => <reply> $who, A very simple shopping cart solution for PHP and MySQL. URL: http://www.montana.com/ethan/shop.html
shout => <reply> $who, A supplying and a receiving client for the shoutcast streaming mp3 system.. URL: http://sargasso.flum.org/shout/
Shout plugins => <reply> $who, Netscape helper scripts to listen to Shoutcast in mpg123 or x11amp. URL: http://www.negia.net/~timeburn/index.html
ShoutPlug => <reply> $who, SMiaB plug-in for ShoutCast MP3 audio servers. URL: http://www.vaxxine.com/pegasoft/
shout_tools => <reply> $who, CGI suite for icecast/shout song status/requesting. URL: http://www.andrew.cmu.edu/~nstrom/shout_tools/index.html
show-host => <reply> $who, Lets a website always point to a DHCP'd or dialup computer.. URL: http://www.core.binghamton.edu/~burner/show-host/
shredder => <reply> $who, Punishes users who have too many processes running. URL: http://www3.cybercities.com/s/sylex/index.html
shsmod => <reply> $who, enable High Speed mode on some SMC/NS/Winbond Multi-I/O chips Serial. URL: http://www.os.rim.or.jp/~gigo/over115K/index_e.html
shstat => <reply> $who, Designed to give stat() info to shell scripts. URL: http://www.gormand.com.au/tools/shstat/
shThemes => <reply> $who, GTK theme selector. URL: http://home.earthlink.net/~ntnunk/shthemes/
shuffle => <reply> $who, Write lines of concatenated file(s) in random order. URL: http://cscw1.ifs.uni-linz.ac.at/alba/shuffle/
Shutdown Commander => <reply> $who, Curses-based console shutdown utility. URL: http://www.duskglow.com/software.shtml
shViewer => <reply> $who, GTK+/Imlib image viewer. URL: http://home.earthlink.net/~ntnunk/shviewer/
si => <reply> $who, /proc system information viewer. URL: http://si.netpedia.net/
Siag Office => <reply> $who, Free office package for Unix. URL: http://siag.nu/
sickday.pl => <reply> $who, Gives you an occasional day off from work.. URL: http://9mm.com/philez.html
sidentd => <reply> $who, Secure identd written in perl, allows per-user fake replys. URL: http://insecurity.net/
SIDPLAY => <reply> $who, C64 music player and SID sound chip emulator. URL: http://www.geocities.com/SiliconValley/Lakes/5147/
sifi => <reply> $who, Stateful TCP/IP packet filter for Linux.. URL: http://www.ifi.unizh.ch/ikm/SINUS/firewall/
sigd/motdd => <reply> $who, A .signature file generator daemon. URL: http://thunder.temple.edu/~mjasner/sigquote/sigd.html

factpacks/Linux.fact  view on Meta::CPAN

Winux => <reply> $who, Graphical configuration interface for LOADLIN. URL: http://www.linux-france.org/prj/winux/
Wipe => <reply> $who, Secure deletion of files from magnetic media.. URL: http://gsu.linux.org.tr/wipe/
WipeOut => <reply> $who, IDE for C++, Java, Eiffel, and Fortran. URL: http://www.softwarebuero.de/wipeout-eng.html
WiredX => <reply> $who, pure Java X Window System server. URL: http://www.jcraft.com/wiredx/
Wireless Tools/Howto => <reply> $who, Generic tools to setup some Wireless LAN drivers + exhaustive web ressources. URL: http://www.hpl.hp.com/personal/Jean_Tourrilhes/Linux/
Wisio => <reply> $who, An experimental project for a graphical windowing system. URL: http://personal.eunet.fi/pp/wisio/
Wizard => <reply> $who, Component to add a Windows 95-like Wizard to an application.. URL: http://www.bigfoot.com/~teras/wizard/
wm2 => <reply> $who, Minimal, elegant and unusual window manager. URL: http://www.all-day-breakfast.com/wm2/
wmakerconf => <reply> $who, GTK based configuration tool for WindowMaker window manager. URL: http://ulli.linuxbox.com/wmakerconf/
WMAmpMenu => <reply> $who, A simple utility that inserts MP3 playlists in your WM root menu.. URL: http://www.snowman.sgic.fi/ssl/wmampmenu/
wmanager => <reply> $who, X11 window manager selector. URL: http://heuss.techfak.uni-bielefeld.de/www/mtessmer/wmanager/
wmapm => <reply> $who, Small dock-app that shows continually-updated APMstatistics. URL: http://nis-www.lanl.gov/~mgh/WindowMaker/DockApps.shtml
wmappl => <reply> $who, Window Maker Application Launcher. URL: http://www.pobox.com/~charkins/wmappl.html
wmbattery => <reply> $who, APM status dock app. URL: http://kitenet.net/programs/wmbattery/
WMBeats => <reply> $who, InternetTime Clock .. URL: http://shadowmere.student.utwente.nl
wmbiff => <reply> $who, A new mail notifier for WindowMaker.. URL: http://www.elect.ru/wmbiff/
wmbored => <reply> $who, Displays the time between a past date and a future date.. URL: http://www.worldnet.net/~labayle/bored/
wmbp6 => <reply> $who, DockApp monitoring sensors for temperatures and fans speed.. URL: http://goupil.linuxfr.org/downloads/
WmBreakOut => <reply> $who, A breakout clone for the WindowMaker dock. URL: http://vizzini.cs.jhu.edu/~fezzik/wmbreak.html
wmCalClock => <reply> $who, Calendar clock with anti-aliased text. URL: http://nis-www.lanl.gov/~mgh/WindowMaker/DockApps.shtml
wmcdplay => <reply> $who, A CD player designed for WindowMaker.. URL: http://www.geocities.com/SiliconValley/Vista/2471/wmcdplay.htm

factpacks/Linux.fact  view on Meta::CPAN

wmlm78 => <reply> $who, WindowMaker utility to display system monitor information from a lm78 chip. URL: http://users.ox.ac.uk/~kebl0850/wmlm78/
WMLmMon => <reply> $who, Lm78/75 monitor applet for WindowMaker. URL: http://www.ne.jp/asahi/linux/timecop/
wmlmon.app => <reply> $who, A Window Maker dock app displays information gathered by lm7x chips.. URL: http://www.comphardware.com/downloads/
WMM => <reply> $who, A clock and filesystem mounter in a single Window Maker dockapp.. URL: http://www.chez.com/stell/progs/
WMMail => <reply> $who, Xbiff-like mail-checker for WindowMaker. URL: http://earth.gaianet.net/~scorpio/
wmMand => <reply> $who, A mandelbrot set explorer.. URL: http://nis-www.lanl.gov/~mgh/WindowMaker/DockApps.shtml
wmMatrix => <reply> $who, Early beta version of a cpu monitor built around the display from the movie.. URL: http://nis-www.lanl.gov/~mgh/WindowMaker/DockApps.shtml
WMmhcheck => <reply> $who, Window Maker applet to display number of messages in your mailboxes. URL: http://www.flinet.com/~peabrain/wmmhcheck/index.html
WMMixer => <reply> $who, A WindowMaker mixer.. URL: http://www.hta.nl/php/Arnoud.van.Riessen/
wmmixer-alsa => <reply> $who, A hack of wmmixer to make it use ALSA (Advanced Linux Sound Architecture). URL: http://iznogood.bohemians.org/
wmmmnn => <reply> $who, wm-mail-mon-net-netselect combined in one compact app.. URL: http://www.utanet.fi/~sniff/
WMmnt => <reply> $who, a mount.app-like dockapp, that uses LEDs and big icons. URL: http://wmaker.strlen.net/stuff.shtml
WMMon => <reply> $who, . URL: http://windowmaker.mezaway.org/dockapps/wmmon.html
WMMon+SMP => <reply> $who, WMMon modified to work on Dual-Processor systems. URL: http://www.ne.jp/asahi/linux/timecop/
wmMoonClock => <reply> $who, Displays the current phase and ephemeris of the Moon.. URL: http://nis-www.lanl.gov/~mgh/WindowMaker/DockApps.shtml
wmmp3 => <reply> $who, mpg123 front end for Window Maker. URL: http://www.dotfiles.com/software/wmmp3/
WMmpg123 => <reply> $who, Menu generator for WindowMaker and mpg123. URL: http://hub.org/~jeff/
wmMuezzin => <reply> $who, Computes time and direction for a prayer to Mecca. URL: http://www.worldnet.net/~labayle/
wmnet => <reply> $who, Provides network statistics for the Window Maker desktop. URL: http://www.digitalkaos.net/linux/wmnet/
WMNetMon => <reply> $who, A WindowMaker dockable network host monitoring tool using ICMP pings.. URL: http://neubula.utad.pt/~alvieboy/new/wmaker.html
wmphoto => <reply> $who, Put your favorites pictures on your desktop. URL: http://www.dcc.uchile.cl/~amartoq/wmphoto

factpacks/Linux.fact  view on Meta::CPAN

TkHeadlines => <reply> $who, TkHeadlines is a headline viewer for some news and software sites. URL: http://loki.dhs.org/~rick/tkheadlines_0.68.tgz
gnome-8ball => <reply> $who, gnome-8ball is a simple magic 8-ball GNOME-panel application.. URL: http://mocat.qpt.com/gnome-8ball/gnome-8ball-0.1.tar.gz
dhcp-conf => <reply> $who, dhcpd-conf helps with creating and maintaning a DHCPd configuration file for small- to medium- sized LANs. URL: http://members.xoom.com/vschade/dhcp-conf/dhcp-conf.tgz
wwsympa => <reply> $who, WWSympa is a Web interface to the Sympa mailling list manager. URL: http://listes.cru.fr/sympa/distribution/contrib/wwsympa/
JSwat => <reply> $who, JSwat is an extensible, standalone, graphical Java debugger front-end. URL: http://home.earthlink.net/~nfiedler/java/jswat/download.html
LUCI => <reply> $who, LUCI is an Universal Configuration Interface. URL: http://www.multimania.com/zubro/luci/luci-0.1.0.tar.gz
Blade-- => <reply> $who, Blade-- is a C++ wrapper/interface to the BLADE web-based environment. URL: http://www.thestuff.net/bob/file/blade/libblade---0.1.0.tar.gz
gendns => <reply> $who, With a site config file, a domain script, and gendns.pl you can create everything you need to manage lots of domains quickly and easily. URL: http://wildgear.com/gendns/gendns.tar.gz
ANTLR => <reply> $who, ANTLR (ANother Tool for Language Recognition) is a language tool that provides a framework for constructing recognizers, compilers, and translators from grammatical descriptions containing C++ or Java actions. URL: http://www.a...
Apprentice => <reply> $who, Apprentice is an HTTP daemon written in Perl, based on HTML::Mason and libwww-perl.. URL: http://www.halyava.ru/do/Apprentice-0.1.tar.gz
XCounter => <reply> $who, XCounter is a X11-based traffic monitoring program for Linux that displays information about IP traffic on a selected interface. URL: http://www.fortunecity.com/skyscraper/romrow/935/XCounter-1.0.1.tar.gz
ttm => <reply> $who, ttm is a simple but flexible command-line based Perl program for managing lists of tasks. URL: http://www.new.ox.ac.uk/~adam/computing/ttm/ttm
EXG => <reply> $who, EXG is an extension to the eiffel-gtk wrapping library which provides almost complete Gdk wrapping (this was a minus of eiffel-gtk), Imlib wrapping, simple wizard support, trivial turtle graphics, and modal dialogs for file selec...
Craft: The Viscious Vikings => <reply> $who, The Viscious Vikings is a Warcraft-style strategy game with Vikings fighting each other for national survival.. URL: http://borneo.gmd.de/AS/janus/craft/craftcc35.html
ec64 => <reply> $who, ec64 (emulated C64) is an emulator for the Commodore 64 written in x86 assembly.. URL: http://mars.wiwi.uni-halle.de/ec64/download/
nb++ => <reply> $who, nb++ is a nuts-and-bolts C++ toolkit. URL: http://www.sourceforge.net/download.php?fileid=850
Empire Linux => <reply> $who, Empire Linux is a mini-distribution that fits on a floppy. URL: http://home.c2i.net/buddha9/empire/
dash => <reply> $who, dash is a shell to help make the V2 operating system easier to use. URL: http://v2dash.hypermart.net/downloads.html
FoSaT => <reply> $who, Friend of Snails and Turtles (FoSaT, pronounced "faucet") is a method to slowly read text files. URL: http://www.blackant.net/fosat/fosat-current.tar.gz
xfrisk-launcher => <reply> $who, xfrisk-launcher is a launcher for the X11 game XFrisk.. URL: http://www.r56o.f9.co.uk/xfrisk/versions/
loadmon.epplet => <reply> $who, loadmon.epplet is a simple load monitor for Enlightenment.. URL: http://entropy.atlantic.net/epplets/loadmon-0.1.tar.gz
TIP => <reply> $who, TIP (TIP Isn't Pico) is a Pico clone for *NIX. URL: http://faculty.plattsburgh.edu/astyanax/tip/dist/
AutoRelease Library => <reply> $who, The AutoRelease Library is a simple reference counting garbage collector for C++.. URL: http://www.fukt.hk-r.se/~per/autorelease/autorelease-0.5.tar.gz

factpacks/Linux.fact  view on Meta::CPAN

Java Napster => <reply> $who, JNapster is a Java implementation of the Napster client which allows you to download and share MP3s over the Internet. URL: http://www.tux.org/~daneel/content/projects/10.shtml
Site Studio => <reply> $who, Site Studio is an online template-based Web site creation tool. URL: 
RSync Manager => <reply> $who, RSync Manager (RSM) is a set of Python scripts to add and update packages for rsync-based mirror sites, and also create some nice HTML statistics from the logs. URL: http://www.softlab.ece.ntua.gr/~ckotso/RSM/RSM-0.2.0....
lispreader => <reply> $who, lispreader is a small library for reading expressions in Lisp syntax. URL: http://www.complang.tuwien.ac.at/~schani/lispreader/lispreader-0.1.tar.gz
KIrcPoker => <reply> $who, KIrcPoker is a graphical interface client to the on-line poker games that are played on the popular IRC (Internet Relay Chat) server at irc.poker.net.. URL: http://www.geocities.com/~engstad/kircpoker/kircpoker-0.3.tar.gz
Euro Converter => <reply> $who, Euro Converter is a little calculator which automagically converts Euro amounts into other equivalent currency values. URL: http://www.jedi.claranet.fr/euroconvert.tar.gz
PHP File Upload Class => <reply> $who, fileupload.class extends PHP's native support for uploading image and text files through a Web browser. URL: http://dave.imarc.net/downloads/fileupload.tar.gz
ixj => <reply> $who, Device drivers for Quicknet's Internet LineJACK and Internet PhoneJACK telephony/VoIP cards.. URL: http://www.quicknet.net/develop.htm
RDX => <reply> $who, RDX (Reverse Distributed Cron-like System) is a set of clients to connect to a server, and identify themselves via a string, and get a job list with schedules. URL: http://www.nobis.com/~ora/CS.tar.gz
dnscvsutil => <reply> $who, dnscvsutil maintains your DNS zone files under CVS control, and automatically updates reverse zones.. URL: http://hq.yok.utu.fi/download/
Moe Music => <reply> $who, Moe Music is a Web front end to mpg123 that contains a list of songs that can be queued and selected.. URL: http://www.users.bigpond.com/jwrennie/moe_music.0.1.0.tar.gz
RandGen => <reply> $who, RandGen is a small applet that can generate random data in CSV format which can be imported into postgresql or other DBMs.. URL: 
POPNow => <reply> $who, POPNow allows you to provide a Web-based POP3 email front-end to your users with a browser interface in a secure environment.. URL: 
Space Plumber => <reply> $who, Space Plumber is a 3D game, where you must find and activate the water extraction pumps from a maze of corridors before water level increases, swamping everything. URL: http://www.geocities.com/ResearchTriangle/Lab/9961...
E-Wireless => <reply> $who, E-Wireless is an Enlightenment epplet that will monitor the signal quality of an 802.11-compliant wireless networking card. URL: http://www.bitshift.org/E-Wireless.tar.gz
UTIS => <reply> $who, UTIS is a graphical application that helps you find the shortest route between two stations in the Metro of Paris. URL: http://www.jedi.claranet.fr/utis-1.0.tar.gz
Directory Lister => <reply> $who, Directory Lister is a tool which will recurse through subdirectories in order to produce a detailled listing of their contents. URL: http://www.jedi.claranet.fr/dlister-1.0.tar.gz
odbcisql => <reply> $who, Odbcisql is a windowing SQL processor for TCL/Tk, using the Tclodbc extension.. URL: http://www.neosoft.com/tcl/ftparchive/sorted/databases/odbcisql/1.0/
TclTicker => <reply> $who, TCLTicker is a simple stock tickertape, using HTTP requests to fetch quotes. URL: http://www.neosoft.com/tcl/ftparchive/sorted/apps/tclticker/1.1/
YakYak => <reply> $who, YakYak is a preprocessor for the parser generator Bison. URL: http://www.brics.dk/~damgaard/YakYak/download.html
Text::Template => <reply> $who, Text::Template is a module for doing dynamic content generation in Perl. URL: http://www.plover.com/~mjd/perl/Template/Text-Template-1.23.tar.gz

factpacks/Linux.fact  view on Meta::CPAN

cpp1 => <reply> $who, Cpp1 is an experimental chess program written in C++. URL: http://www.keetweej.demon.nl/cpp1.tgz
rdial => <reply> $who, rdial is an extremely simple RPC server for Linux. URL: http://colorfullife.com/~manfreds/rdial/rdial.tar.gz
dclock => <reply> $who, dclock is an X11 desktop clock with a realistic LED-style display of the current time. URL: http://bach.ece.jhu.edu/~tim/programs/archive/dclock.tar.gz
gatO => <reply> $who, gatO is an interface to the UNIX command 'at'.. URL: http://www.arquired.es/users/aldelgado/proy/gato/gato-0.6.2.tgz
g3DSE => <reply> $who, g3DSE is a little tool to set the 3D Stereo Enhancement of your SoundBlaster card (if supported).. URL: http://studwww.rug.ac.be/~fcorneli/g3dse/download/g3dse-0.1.tar.gz
CAFire => <reply> $who, CAFire is a small toy that displays a burning trace after the mouse pointer in X. URL: http://home.zcu.cz/~cimrman3/cafire-latest.tgz
GPPP-Dialer => <reply> $who, GPPP-Dialer runs a connection script and shows the contents of a PPP log, and can run other programs after connecting. URL: http://www.pobox.com/~epg/software/gppp-dialer-0.1.0.tar.gz
Perlmclient => <reply> $who, Perlmclient is a Masqdialler client written in Perl. URL: http://www.vicnet.net.au/~jeremyl/perlmclient/perlmclient-0.2.tar.gz
Address Book => <reply> $who, Address Book is an extremely simple address database with search, edit, insert, drop, etc.. URL: http://ps-ax.com/address/
GTool => <reply> $who, GTool is a program to draw and analyze graphs (as in Graph Theory, not data analysis).. URL: http://erwin.math.lakeheadu.ca/gtool/index.php3?topic=download
gbgrand => <reply> $who, gbgrand is a small shell script that uses a list of directories to select a random background for the GNOME desktop. URL: http://www.chameleon.net/daf/gbgrand.tgz
The Bookexchange => <reply> $who, Bookexchange is a book exchange for the Web, allowing users to search, add, and edit books. URL: http://cs.uiowa.edu/~bdeitte/bookexchange.zip
WMFstatus => <reply> $who, WMFstatus is a general purpose 8x5 LCD screen dockapp for WindowMaker and other managers. URL: http://www.finik.net/files/wmfstatus-0.1.tar.gz
Metapixel => <reply> $who, Metapixel is a program for generating photomosaics. URL: http://www.complang.tuwien.ac.at/~schani/metapixel/metapixel-0.1.tar.gz
oracledump => <reply> $who, oracledump is a command-line tool that dumps Oracle data and table setup information as SQL. URL: http://www.bennyvision.com/~ddkilzer/projects/oracledump/
GNU Standard C++ Library v3 => <reply> $who, The Standard C++ Library v3, or libstc++-2.90.x, is an ongoing project to implement the ISO 14882 Standard C++ library as described in chapters 17 through 27 and annex D, as a drop-in replacement for the c...
GOOPS => <reply> $who, GOOPS is the object-oriented extension to Guile. URL: ftp://ftp.gnu.org/gnu/guile/guile-oops-0.1.6.tar.gz
PHP*Star => <reply> $who, PHP*Star makes CGI mailto forms and creates PHP scripts.. URL: http://www.xtremegroup.com/phpstar.html
Relayer => <reply> $who, Relayer allows for dynamic sendmail relay authentication.. URL: http://ps-ax.com/Relay/
rlwrap => <reply> $who, rlwrap is a readline wrapper, a small utility that uses the GNU readline library to allow the editing of keyboard input for any other command. URL: http://utopia.knoware.nl/~hlub/uck/rlwrap/rlwrap-0.01.tgz
PlottGUI => <reply> $who, PlottGUI is a program to create worksheets with an HP/GL plotter. URL: http://www.fh-wilhelmshaven.de/~akcaagaa/plottgui/files/dynamic-bin.tar.gz

factpacks/MacErrorCodes.fact  view on Meta::CPAN

Mac Error -451 => ( badSectionErr ) Not a valid section type **Edition Manager Errors**
Mac Error -452 => ( notRegisteredSectionErr ) Not registered **Edition Manager Errors**
Mac Error -454 => ( badSubPartErr ) Bad edition container spec or invalid edition container **Edition Manager Errors**
Mac Error -460 => ( multiplePublisherWrn ) Already is a publisher **Edition Manager Errors**
Mac Error -461 => ( containerNotFoundWrn ) Alias was not resolved **Edition Manager Errors**
Mac Error -463 => ( notThePublisherWrn ) Not the publisher **Edition Manager Errors**
Mac Error -470 => ( scsiBadPBErr ) invalid field(s) in the parameter block **SCSI Manager Errors**
Mac Error -471 => ( scsiOverrunErr ) attempted to transfer too many bytes **SCSI Manager Errors**
Mac Error -472 => ( scsiTransferErr ) write flag conflicts with data transfer phase **SCSI Manager Errors**
Mac Error -473 => ( scsiBusTOErr ) bus error during transfer **SCSI Manager Errors**
Mac Error -474 => ( scsiSelectTOErr ) scsiSelTO exceeded (selection failed) **SCSI Manager Errors**
Mac Error -475 => ( scsiTimeOutErr ) scsiReqTO exceeded **SCSI Manager Errors**
Mac Error -476 => ( scsiBusResetErr ) the bus was reset, so your request was aborted **SCSI Manager Errors**
Mac Error -477 => ( scsiBadStatus ) non-zero (not "Good") status returned **SCSI Manager Errors**
Mac Error -478 => ( scsiNoStatusErr ) device did not go through a status phase **SCSI Manager Errors**
Mac Error -479 => ( scsiLinkFailErr ) linked command never executed **SCSI Manager Errors**
Mac Error -489 => ( scsiUnimpVctErr ) unimplemented routine was called **SCSI Manager Errors**
Mac Error -490 => ( userBreak ) user debugger break **SysErrs used instead of inline $A9FF & $ABFF**
Mac Error -491 => ( strUserBreak ) user debugger break - display string on stack **SysErrs used instead of inline $A9FF & $ABFF**
Mac Error -492 => ( exUserBreak ) user debugger break - execute commands on stack **SysErrs used instead of inline $A9FF & $ABFF**
Mac Error -500 => ( rgnTooBigErr ) Bitmap would convert into a region greater than 64 KB **QuickDraw Error**
Mac Error -501 => ( teScrapSizeErr ) scrap item too big for text edit record **Text Edit Error**
Mac Error -502 => ( hwParamrErr ) bad selector for _HWPriv **O/S Error**
Mac Error -600 => ( procNotFound ) No eligible process with specified process serial number **Processes Errors**
Mac Error -601 => ( memFragErr ) Not enough room to launch application with special requirements **Processes Errors**
Mac Error -602 => ( appModeErr ) Memory mode is 32-bit, but application is not 32-bit clean **Processes Errors**
Mac Error -603 => ( protocolErr ) app made module calls in improper order **Processes Errors**
Mac Error -604 => ( hardwareConfigErr ) hardware configuration not correct for call **Processes Errors**
Mac Error -605 => ( appMemFullErr ) Partition size specified in 'SIZE' resource is not big enough for launch **Processes Errors**
Mac Error -606 => ( appIsDaemon ) Application is background-only **Processes Errors**
Mac Error -607 => ( bufferIsSmall ) Buffer is too small **Processes Errors**
Mac Error -608 => ( noOutstandingHLE ) No outstanding high-level event **Processes Errors**
Mac Error -609 => ( connectionInvalid ) Connection is invalid **Processes Errors**

factpacks/dos.fact  view on Meta::CPAN

JOIN => (External) JOIN d: [d:path] JOIN d: [/D] Allows access to the directory structure and files of a drive through a directory on a different drive. 
KEYB => (External) KEYB [xx][,][yyy][,][d:][path]filename [/E][/ID:(number)]  Loads a program that replaces the support program for U. S. keyboards. 
LABEL => (External) LABEL [d:][volume label] Creates or changes or deletes a volume label for a disk. 
LASTDRIVE => (Internal) LASTDRIVE=(drive letter) Used in the CONFIG.SYS file to set the maximum number of drives that can be accessed. 
LOADFIX => (Internal) LOADFIX [d:][path]filename [parameters] Ensures that a program is loaded above the first 64K of conventional memory, and runs the program. 
LOADHIGH => (Internal) LOADHIGH (LH) [d:][path]filename [parameters] Loads memory resident application into reserved area of memory (between 640K-1M).
MEM => (External) MEM [/program|/debug|/classify|/free|/module(name)] [/page] Displays amount of installed and available memory, including extended, expanded, and upper memory.
MEMMAKER => (External) MEMMAKER [/B][/batch][/session][/swap:d] [/T][/undo][/W:size1,size2] Starts the MemMaker program, a program that lets you optimize your computer's memory. 
MENUCOLOR => (Internal) MENUCOLOR=textcolor,[background] Used in the CONFIG.SYS file to set the colors that will be used by DOS to display text on the screen.
MENUDEFAULT => (Internal) MENUDEFAULT=blockname, [timeout] Used in the CONFIG.SYS file to set the startup configuration that will be used by DOS if no key is pressed within the specified timeout period.
MENUITEM => (Internal)MENUITEM=blockname, [menutext] Used in the CONFIG.SYS file to create a start-up menu from which you can select a group of CONFIG.SYS commands to be processed upon reboot.
MIRROR => (External) MIRROR [d:]path [d:] path [...] IRROR [d1:][d2:][...] [/T(drive)(files)] [/partn][/U][/1] Saves disk storage information that can be used to recover accidentally erased files. 
MKDIR => (MD) (Internal) MKDIR (MD) [d:]path Creates a new subdirectory.
MODE => (External) Sets mode of operation for devices or communications.
MORE => (External) MORE < (filename or command) (name)MORE Sends output to console, one screen at a time. 
MOVE => (Internal) MOVE [/Y|/-Y] [d:][path]filename[,[d:][path]filename[...]] destination Moves one or more files to the location you specify. Can also be used to rename directories. 
MSAV => (External) MSAV [d:] [/S|/C][/R][/A][/L][/N][/P][/F][/video][/mouse] SAV /video Scans your computer for known viruses. 
MSBACKUP => External) MSBACKUP [setupfile] [/BW|/LCD|/MDA] Used to backup or restore one or more files from one disk to another. 
MSCDEX => (External) MSCDEX /D:driver [/D:driver2. . .] [/E][/K][/S][/V][/L:letter] [/M:number] Used to gain access to CD-ROM drives (new with DOS Version 6).
MSD => (External) MSD [/B][/I] BSD [/I] [/F[d:][path]filename [/P[d:][path]filename [/S[d:][path]filename Provides detailed technical information about your computer. 
NLSFUNC => (External) NLSFUNC [d:][path]filename Used to load a file with country-specific information.

factpacks/dos.fact  view on Meta::CPAN

RMDIR => (RD) (Internal) RMDIR (RD) [d:]path Removes a subdirectory.
SCANDISK => (External) Starts the Microsoft ScanDisk program which is a disk analysis and repair tool used to check a drive for errors and correct any problems that it finds. 
SELECT => (External) SELECT [d:] [d:][path] [country code][keyboard code] Formats a disk and installs country-specific information and keyboard codes (starting with DOS Version 6, this command is no longer available).
SET => (Internal) SET (string1)=(string2) Inserts strings into the command environment. The set values can be used later by programs.
SETVER => (External) SETVER [d:]:path][filename (number)][/delete][/quiet]  Displays the version table and sets the version of DOS that is reported to programs.
SHARE => (External) SHARE [/F:space] [/L:locks] Installs support for file sharing and file locking.
SHELL => (Internal) SHELL=[d:][path]filename [parameters] Used in the CONFIG.SYS file to specify the command interpreter that DOS should use.
SHIFT => (Internal) SHIFT Increases number of replaceable parameters to more than the standard ten for use in batch files.
SORT => (External) SORT [/R][/+n] < (filename) SORT [/R][/+n] > (filename2) Sorts input and sends it to the screen or to a file.
STACKS => (Internal) STACKS=(number),(size) Used in the CONFIG.SYS file to set the number of stack frames and the size of each stack frame.
SUBMENU => (Internal) SUBMENU=blockname, [menutext] Used in the CONFIG.SYS file to create a multilevel menu from which you can select start-up options.
SUBST => (External) SUBST d: d:path SUBST d: /D Substitutes a virtual drive letter for a path designation.
SWITCHES => (Internal) SWITCHES= [/K][/F][/N][/W] Used in the CONFIG.SYS file to configure DOS in a special way; for example, to tell DOS to emulate different hardware configurations.
SYS => (External) SYS [source] d: Transfers the operating system files to another disk.
TIME => (Internal) TIME hh:mm[:ss][.cc][A|P] Displays current time setting of system clock and provides a way for you to reset the time. 
TREE => (External) TREE [d:][path] [/A][/F] Displays directory paths and (optionally) files in each subdirectory. 
TYPE => (Internal) TYPE [d:][path]filename Displays the contents of a file.
UNDELETE => (External) UNDELETE [d:][path][filename] [/DT|/DS|/DOS] Restores files deleted with the DELETE command.
UNFORMAT => (External) UNFORMAT d: [/J][/L][/test][/partn][/P][/U]  Used to undo the effects of formatting a disk.
VER => (Internal) VER Displays the DOS version number.
VERIFY => (Internal) VERIFY on|off Turns on the verify mode; the program checks all copying operations to assure that files are copied correctly.

factpacks/jargon-split.fact  view on Meta::CPAN

arc wars2 is  and speed while largely   retaining compatibility (it introduced a new compression type that   could be disabled for backward-compatibility).  PKWare settled out   of court to avoid enormous legal costs (both SEA and PKWare are   small ...
arc wars3 is  of PKARC was   changed to PKPAK.  The public backlash against SEA for bringing   suit helped to hasten the demise of ARC as a standard when PKWare   and others introduced new, incompatible archivers with better   compression algorithms....
archive is  n. 1. A collection of several files bundled into one file   by a program such as `ar(1)', `tar(1)', `cpio(1)',   or {arc} for shipment or archiving (sense 2).  See also {tar   and feather}.  2. A collection of files or archives (sense 1) ...
archive2 is  {FTP} or an email server. 
arena is  [UNIX] n. The area of memory attached to a process by   `brk(2)' and `sbrk(2)' and used by `malloc(3)' as   dynamic storage.  So named from a semi-mythical `malloc   corrupt arena' message supposedly emitted when some early versions   becam...
arena2 is  {aliasing   bug}, {memory leak}, {smash the stack}. 
arg is  /arg/ n. Abbreviation for `argument' (to a function),   used so often as to have become a new word (like `piano' from   `pianoforte').  "The sine function takes 1 arg, but the   arc-tangent function can take either 1 or 2 args."  Compare   {p...
armor-plated is  n. Syn. for {bulletproof}.
asbestos is  adj. Used as a modifier to anything intended to protect   one from {flame}s.  Important cases of this include {asbestos   longjohns} and {asbestos cork award}, but it is used more   generally.
asbestos cork award is  n. Once, long ago at MIT, there was a {flamer}   so consistently obnoxious that another hacker designed, had made,   and distributed posters announcing that said flamer had been   nominated for the `asbestos cork award'.  Pers...
asbestos cork award2 is  application of the cork should consult the   etymology under {flame}.  Since then, it is agreed that only a   select few have risen to the heights of bombast required to earn   this dubious dignity --- but there is no agreeme...
asbestos longjohns is  n. Notional garments often donned by {USENET}   posters just before emitting a remark they expect will elicit   {flamage}.  This is the most common of the {asbestos} coinages.   Also `asbestos underwear', `asbestos overcoat', e...
attoparsec is  n. `atto-' is the standard SI prefix for   multiplication by 10^{-18}.  A parsec (parallax-second) is   3.26 light-years; an attoparsec is thus 3.26 * 10^{-18} light   years, or about 3.1 cm (thus, 1 attoparsec/{microfortnight}   equal...
attoparsec2 is  be in use   (though probably not very seriously) among hackers in the U.K.  See   {micro-}. 
autobogotiphobia is  /aw'to-boh-got`*-foh'bee-*/ n. See {bogotify}.
automagically is  /aw-toh-maj'i-klee/ or /aw-toh-maj'i-k*l-ee/ adv.   Automatically, but in a way that, for some reason (typically   because it is too complicated, or too ugly, or perhaps even too   trivial), the speaker doesn't feel like explaining ...
automagically2 is  compiler generates C, then automagically   invokes `cc(1)' to produce an executable." 
avatar is  [CMU, Tektronix] n. Syn. {root}, {superuser}.  There   are quite a few UNIX machines on which the name of the superuser   account is `avatar' rather than `root'.  This quirk was   originated by a CMU hacker who disliked the term `superuser...
avatar2 is  hacker at Tektronix. 
awk is  1. n. [UNIX techspeak] An interpreted language for massaging   text data developed by Alfred Aho, Peter Weinberger, and Brian   Kernighan (the name is from their initials).  It is characterized   by C-like syntax, a declaration-free approach ...
awk2 is  associative arrays, and field-oriented text   processing.  See also {Perl}.  2. n.  Editing term for an   expression awkward to manipulate through normal {regexp}   facilities (for example, one containing a {newline}).  3. vt. To   process d...

factpacks/jargon-split.fact  view on Meta::CPAN

backward combatability2 is  making the transition between major   releases.  When the change is so drastic that the old formats are   not retained in the new version, it is said to be `backward   combatable'.  See {flag day}. 
BAD is  /B-A-D/ [IBM acronym, `Broken As Designed'] adj.  Said   of a program that is {bogus} because of bad design and misfeatures   rather than because of bugginess.  See {working as designed}.
Bad Thing is  [from the 1930 Sellar & Yeatman parody `1066 And   All That'] n. Something that can't possibly result in improvement   of the subject.  This term is always capitalized, as in "Replacing   all of the 9600-baud modems with bicycle courier...
Bad Thing2 is  Thing}.  British correspondents confirm   that {Bad Thing} and {Good Thing} (and prob. therefore {Right   Thing} and {Wrong Thing}) come from the book referenced in the   etymology, which discusses rulers who were Good Kings but Bad   ...
Bad Thing3 is  mainstream idiom on the   British side of the pond. 
bag on the side is  n. An extension to an established hack that is   supposed to add some functionality to the original.  Usually   derogatory, implying that the original was being overextended and   should have been thrown away, and the new product ...
bag on the side2 is  phrase, `to hang a bag on the side   [of]'.  "C++?  That's just a bag on the side of C ...." "They   want me to hang a bag on the side of the accounting system." 
bagbiter is  /bag'bit-*r/ n. 1. Something, such as a program or a   computer, that fails to work, or works in a remarkably clumsy   manner.  "This text editor won't let me make a file with a line   longer than 80 characters!  What a bagbiter!"  2. A ...
bagbiter2 is  inadvertently or otherwise, typically by   failing to program the computer properly.  Synonyms {loser},   {cretin}, {chomper}.  3. adj. `bagbiting' Having the   quality of a bagbiter.  "This bagbiting system won't let me   compute the f...
bagbiter3 is  {losing},   {cretinous}, {bletcherous}, `barfucious' (under   {barfulous}) and `chomping' (under {chomp}).  4. `bite   the bag' vi. To fail in some manner.  "The computer keeps crashing   every 5 minutes."  "Yes, the disk controller is ...
bagbiter4 is  of these terms was almost undoubtedly   obscene, possibly referring to the scrotum, but in their current   usage they have become almost completely sanitized.   A program called Lexiphage on the old MIT AI PDP-10 would draw on   a selec...
bagbiter5 is  BAG" in   ornate letters, and then a pair of jaws biting pieces of it off.   This is the first and to date only known example of a program   *intended* to be a bagbiter. 
bamf is  /bamf/ 1. [from old X-Men comics] interj. Notional sound made   by a person or object teleporting in or out of the hearer's   vicinity.  Often used in {virtual reality} (esp. {MUD})   electronic {fora} when a character wishes to make a drama...
bamf2 is  magical transformation, used in virtual   reality {fora} like sense 1.  3. [from `Don Washington's   Survival Guide'] n. Acronym for `Bad-Ass Mother Fucker', used to   refer to one of the handful of nastiest monsters on an LPMUD or   other ...
banana label is  n. The labels often used on the sides of {macrotape}   reels, so called because they are shaped roughly like blunt-ended   bananas.  This term, like macrotapes themselves, is still current   but visibly headed for obsolescence.
banana problem is  n. [from the story of the little girl who said "I   know how to spell `banana', but I don't know when to stop"].  Not   knowing where or when to bring a production to a close (compare   {fencepost error}).  One may say `there is a ...
banana problem2 is  defined or incorrect termination conditions,   or in discussing the evolution of a design that may be succumbing   to featuritis (see also {creeping elegance}, {creeping   featuritis}).  See item 176 under {HAKMEM}, which describe...
banana problem3 is  implementation.bandwidth n. 1. Used by hackers in a generalization of its   technical meaning as the volume of information per unit time that a   computer, person, or transmission medium can handle.  "Those are   amazing graphics,...
banana problem4 is    bandwidth, I guess."  Compare {low-bandwidth}.  2. Attention   span.  3. On {USENET}, a measure of network capacity that is   often wasted by people complaining about how items posted by others   are a waste of bandwidth. 
bang is  1. n. Common spoken name for `!' (ASCII 0100001),   especially when used in pronouncing a {bang path} in spoken   hackish.  In {elder days} this was considered a CMUish usage,   with MIT and Stanford hackers preferring {excl} or {shriek};   ...
bang2 is  it (esp. via the   term {bang path}) and it is now certainly the most common spoken   name for `!'.  Note that it is used exclusively for   non-emphatic written `!'; one would not say "Congratulations   bang" (except possibly for humorous p...
bang3 is  exact characters `foo!' one would speak "Eff oh oh   bang".  See {shriek}, {{ASCII}}.  2. interj. An exclamation   signifying roughly "I have achieved enlightenment!", or "The   dynamite has cleared out my brain!"  Often used to acknowledge...
bang4 is  immediately after one has   been called on it. 
bang on is  vt. To stress-test a piece of hardware or software "I   banged on the new version of the simulator all day yesterday and it   didn't crash once.  I guess it is ready to release."  The term   {pound on} is synonymous.
bang path is  n. An old-style UUCP electronic-mail address specifying   hops to get from some assumed-reachable location to the addressee,   so called because each {hop} is signified by a {bang} sign.   Thus, for example, the path ...!bigsite!foovax!...
bang path2 is  to machine bigsite (presumably   a well-known location accessible to everybody) and from there   through the machine foovax to the account of user me on   barbox.   In the bad old days of not so long ago, before autorouting mailers   b...
bang path3 is  compound bang addresses   using the { } convention (see {glob}) to give paths from   *several* big machines, in the hopes that one's correspondent   might be able to get mail to one of them reliably (example   ...!{seismo, ut-sally, ih...
bang path4 is  10 hops were not uncommon in 1981.  Late-night dial-up   UUCP links would cause week-long transmission times.  Bang paths   were often selected by both transmission time and reliability, as   messages would often get lost.  See {{Inter...
banner is  n. 1. The title page added to printouts by most print   spoolers (see {spool}).  Typically includes user or account ID   information in very large character-graphics capitals.  Also called   a `burst page', because it indicates where to bu...
banner2 is  one user's printout from the next.  2. A   similar printout generated (typically on multiple pages of fan-fold   paper) from user-specified text, e.g., by a program such as UNIX's   `banner({1,6})'.  3. On interactive software, a first sc...
banner3 is  and/or a copyright notice. 
bar is  /bar/ n. 1. The second metasyntactic variable, after {foo}   and before {baz}.  "Suppose we have two functions FOO and BAR.   FOO calls BAR...."  2. Often appended to {foo} to produce   {foobar}.
bare metal is  n. 1. New computer hardware, unadorned with such   snares and delusions as an {operating system}, an {HLL}, or   even assembler.  Commonly used in the phrase `programming on the   bare metal', which refers to the arduous work of {bit b...
bare metal2 is  for a new machine.  Real   bare-metal programming involves things like building boot proms and   BIOS chips, implementing basic monitors used to test device   drivers, and writing the assemblers that will be used to write the   compil...
bare metal3 is  real   development environment.  2. `Programming on the bare metal' is   also used to describe a style of {hand-hacking} that relies on   bit-level peculiarities of a particular hardware design, esp.   tricks for speed and space optim...
bare metal4 is  overlapping instructions (or, as in the famous case described in   appendix A, interleaving of opcodes on a magnetic drum to minimize   fetch delays due to the device's rotational latency).  This sort of   thing has become less common...
bare metal5 is  and machine resources have changed, but is still found in   heavily constrained environments such as industrial embedded systems.   See {real programmer}.   In the world of personal computing, bare metal programming (especially   in s...
bare metal6 is  considered a   {Good Thing}, or at least a necessary thing (because these   machines have often been sufficiently slow and poorly designed   to make it necessary; see {ill-behaved}).  There, the term   usually refers to bypassing the ...

factpacks/jargon-split.fact  view on Meta::CPAN

Berkeley Quality Software is  adj. (often abbreviated `BQS') Term used   in a pejorative sense to refer to software that was apparently   created by rather spaced-out hackers late at night to solve some   unique problem.  It usually has nonexistent, ...
Berkeley Quality Software2 is  been tested on at least two examples,   and core dumps when anyone else attempts to use it.  This term was   frequently applied to early versions of the `dbx(1)' debugger.   See also {Berzerkeley}. 
berklix is  /berk'liks/ n.,adj. [contraction of `Berkeley UNIX'] See   {BSD}.  Not used at Berkeley itself.  May be more common among   {suit}s attempting to sound like cognoscenti than among hackers,   who usually just say `BSD'.
berserking is  vi. A {MUD} term meaning to gain points *only*   by killing other players and mobiles (non-player characters).   Hence, a Berserker-Wizard is a player character that has achieved   enough points to become a wizard, but only by killing ...
berserking2 is  frowned upon because of its   inherently antisocial nature, but some MUDs have a `berserker   mode' in which a player becomes *permanently* berserk, can   never flee from a fight, cannot use magic, gets no score for   treasure, but do...
berserking3 is  wizards can seriously damage your elf!" 
Berzerkeley is  /b*r-zer'klee/ [from `berserk', via the name of a   now-deceased record label] n. Humorous distortion of `Berkeley'   used esp. to refer to the practices or products of the   {BSD} UNIX hackers.  See {software bloat}, {Missed'em-five}...
Berzerkeley2 is  use of this term in reference to the cultural and   political peculiarities of UC Berkeley as a whole has been reported   from as far back as the 1960s. 
beta is  /bay't*/, /be't*/ or (Commonwealth) /bee't*/ n. 1. In   the {Real World}, software often goes through two stages of   testing Alpha (in-house) and Beta (out-house?).  Software is said   to be `in beta'.  2. Anything that is new and experimen...
beta2 is  means that he is still testing   for compatibility and reserving judgment.  3. Beta software is   notoriously buggy, so `in beta' connotes flakiness.   Historical note More formally, to beta-test is to test a   pre-release (potentially unre...
beta3 is  making it available to selected customers and users.  This term   derives from early 1960s terminology for product cycle checkpoints,   first used at IBM but later standard throughout the industry.   `Alpha Test' was the unit, module, or co...
beta4 is  system test.  These themselves came from earlier   A- and B-tests for hardware.  The A-test was a feasibility and   manufacturability evaluation done before any commitment to design   and development.  The B-test was a demonstration that th...
beta5 is  The C-test   (corresponding to today's beta) was the B-test performed on early   samples of the production design. 
BFI is  /B-F-I/ n. See {brute force and ignorance}.  Also   encountered in the variant `BFMI', `brute force and   *massive* ignorance'.
bible is  n. 1. One of a small number of fundamental source books   such as {Knuth} and {K&R}.  2. The most detailed and   authoritative reference for a particular language, operating   system, or other complex software system.
BiCapitalization is  n. The act said to have been performed on   trademarks (such as NeXT, {NeWS}, VisiCalc, FrameMaker,   TK!solver, EasyWriter) that have been raised above the ruck of   common coinage by nonstandard capitalization.  Too many   {mar...
BiCapitalization2 is  really cute, even   the 2,317th time they do it.  Compare {studlycaps}. 
BIFF is  /bif/ [USENET] n. The most famous {pseudo}, and the   prototypical {newbie}.  Articles from BIFF are characterized by   all uppercase letters sprinkled liberally with bangs, typos,   `cute' misspellings (EVRY BUDY LUVS GOOD OLD BIFF CUZ HE"S...
BIFF2 is  IN CAPITULL LETTRS LIKE   THIS!!!), use (and often misuse) of fragments of {talk mode}   abbreviations, a long {sig block} (sometimes even a {doubled   sig}), and unbounded na"ivet'e.  BIFF posts articles using his elder   brother's VIC-20....
BIFF3 is    appear to come from a variety of sites.  However, {BITNET} seems to   be the most frequent origin.  The theory that BIFF is a denizen of   BITNET is supported by BIFF's (unfortunately invalid) electronic   mail address BIFF@BIT.NET. 
biff is  /bif/ vt. To notify someone of incoming mail.  From the   BSD utility `biff(1)', which was in turn named after the   implementor's dog (it barked whenever the mailman came).  No   relation to {BIFF}.

factpacks/jargon-split.fact  view on Meta::CPAN

bit3 is  of belief.  "I have   a bit set that says that you were the last guy to hack on EMACS."   (Meaning "I think you were the last guy to hack on EMACS, and what   I am about to say is predicated on this, so please stop me if this   isn't true.")...
bit4 is  way of indicating that   you intend only a short interruption for a question that can   presumably be answered yes or no.   A bit is said to be `set' if its value is true or 1, and   `reset' or `clear' if its value is false or 0.  One   spea...
bit5 is  or   `invert' a bit is to change it, either from 0 to 1 or from   1 to 0.  See also {flag}, {trit}, {mode bit}. 
bit bang is  n. Transmission of data on a serial line, when   accomplished by rapidly tweaking a single output bit at the   appropriate times.  The technique is a simple   loop with eight OUT and SHIFT instruction pairs for each byte.   Input is more...
bit bang2 is  and output   at the same time) is one way to separate the real hackers from the   {wannabee}s.   Bit bang was used on certain early models of Prime computers,   presumably when UARTs were too expensive, and on archaic Z80 micros   with ...
bit bang3 is  instance of the   {cycle of reincarnation}, this technique is now (1991) coming   back into use on some RISC architectures because it consumes such   an infinitesimal part of the processor that it actually makes sense   not to have a UA...
bit bashing is  n. (alt. `bit diddling' or {bit twiddling}) Term   used to describe any of several kinds of low-level programming   characterized by manipulation of {bit}, {flag}, {nybble},   and other smaller-than-character-sized pieces of data; the...
bit bashing2 is  encryption algorithms, checksum   and error-correcting codes, hash functions, some flavors of   graphics programming (see {bitblt}), and assembler/compiler code   generation.  May connote either tedium or a real technical   challenge...
bit bashing3 is  decoding for   the new tape driver looks pretty solid but the bit-bashing for the   control registers still has bugs."  See also {bit bang},   {mode bit}. 
bit bucket is  n. 1. The universal data sink (originally, the   mythical receptacle used to catch bits when they fall off the end   of a register during a shift instruction).  Discarded, lost, or   destroyed data is said to have `gone to the bit buck...
bit bucket2 is  {/dev/null}.  Sometimes amplified as `the Great   Bit Bucket in the Sky'.  2. The place where all lost mail and news   messages eventually go.  The selection is performed according to   {Finagle's Law}; important mail is much more lik...
bit bucket3 is  mail, which has an almost 100% probability   of getting delivered.  Routing to the bit bucket is automatically   performed by mail-transfer agents, news systems, and the lower   layers of the network.  3. The ideal location for all un...
bit bucket4 is  article to the bit bucket."   Such a request is guaranteed to overflow one's mailbox with flames.   4. Excuse for all mail that has not been sent.  "I mailed you   those figures last week; they must have ended in the bit bucket."   Co...
bit bucket5 is  in jest.  It is based on the fanciful   notion that bits are objects that are not destroyed but only   misplaced.  This appears to have been a mutation of an earlier term   `bit box', about which the same legend was current; old-time ...
bit bucket6 is  told that when the CPU   stored bits into memory it was actually pulling them `out of the   bit box'.  See also {chad box}.   Another variant of this legend has it that, as a consequence of the   `parity preservation law', the number ...
bit bucket7 is  equal the number of 0 bits.  Any imbalance results in   bits filling up the bit bucket.  A qualified computer technician   can empty a full bit bucket as part of scheduled maintenance. 
bit decay is  n. See {bit rot}.  People with a physics background   tend to prefer this one for the analogy with particle decay.  See   also {computron}, {quantum bogodynamics}.
bit rot is  n. Also {bit decay}.  Hypothetical disease the existence   of which has been deduced from the observation that unused programs   or features will often stop working after sufficient time has   passed, even if `nothing has changed'.  The t...
bit rot2 is  were radioactive.  As time passes, the   contents of a file or the code in a program will become   increasingly garbled.   There actually are physical processes that produce such effects   (alpha particles generated by trace radionuclide...
bit rot3 is  change the contents of a computer memory   unpredictably, and various kinds of subtle media failures can   corrupt files in mass storage), but they are quite rare (and   computers are built with error-detecting circuitry to compensate   ...
bit rot4 is  hackers that cosmic   rays are among the causes of such events turns out to be a myth;   see the {cosmic rays} entry for details.   The term {software rot} is almost synonymous.  Software rot is   the effect, bit rot the notional cause. 

factpacks/jargon-split.fact  view on Meta::CPAN

canonical8 is  this term with a playfulness that makes an ironic   contrast with its historical meaning.  A true story One Bob   Sjoberg, new at the MIT AI Lab, expressed some annoyance at the use   of jargon.  Over his loud objections, GLS and RMS m...
canonical9 is  in his presence, and eventually it   began to sink in.  Finally, in one conversation, he used the word   `canonical' in jargon-like fashion without thinking.  Steele   "Aha!  We've finally got you talking jargon too!"  Stallman   "What...
canonical10 is  `canonical' in the   canonical way."   Of course, canonicality depends on context, but it is implicitly   defined as the way *hackers* normally expect things to be.   Thus, a hacker may claim with a straight face that `according to   ...
card is  n. 1. An electronic printed-circuit board (see also {tall   card}, {short card}.  2. obs. Syn. {{punched card}}.
card walloper is  n. An EDP programmer who grinds out batch programs   that do stupid things like print people's paychecks.  Compare   {code grinder}.  See also {{punched card}}, {eighty-column   mind}.
careware is  /keir'weir/ n. {Shareware} for which either the   author suggests that some payment be made to a nominated charity   or a levy directed to charity is included on top of the   distribution charge.  Syn. {charityware}; compare   {cripplewa...
cargo cult programming is  n. A style of (incompetent) programming   dominated by ritual inclusion of code or program structures that   serve no real purpose.  A cargo cult programmer will usually   explain the extra code as a way of working around s...
cargo cult programming2 is  neither the bug nor the reason   the code apparently avoided the bug was ever fully understood   (compare {shotgun debugging}, {voodoo programming}).   The term `cargo cult' is a reference to aboriginal religions that   gr...
cargo cult programming3 is  The practices of   these cults center on building elaborate mockups of airplanes and   military style landing strips in the hope of bringing the return of   the god-like airplanes that brought such marvelous cargo during t...
cargo cult programming4 is  Richard Feynman's   characterization of certain practices as "cargo cult science" in   his book `Surely You're Joking, Mr. Feynman' (W. W. Norton   & Co, New York 1985, ISBN 0-393-01921-7). 
case and paste is  [from `cut and paste'] n. 1. The addition of a new   {feature} to an existing system by selecting the code from an   existing feature and pasting it in with minor changes.  Common in   telephony circles because most operations in a...
case and paste2 is  statements.  Leads to {software bloat}.   In some circles of EMACS users this is called `programming by   Meta-W', because Meta-W is the EMACS command for copying a block of   text to a kill buffer in preparation to pasting it in ...
case and paste3 is  implying that the programmer is acting   mindlessly rather than thinking carefully about what is required to   integrate the code for two similar cases. 
casters-up mode is  [IBM] n. Yet another synonym for `broken' or   `down'.
casting the runes is  n. What a {guru} does when you ask him or her   to run a particular program and type at it because it never works   for anyone else; esp. used when nobody can ever see what the guru   is doing different from what J. Random Luser...
casting the runes2 is  {examining the entrails}; also see   the AI koan about Tom Knight in appendix A. 
cat is  [from `catenate' via {{UNIX}} `cat(1)'] vt.   1. [techspeak] To spew an entire file to the screen or some other   output sink without pause.  2. By extension, to dump large amounts   of data at an unprepared target or with no intention of bro...
cat2 is   Rare outside UNIX sites.  See   also {dd}, {BLT}.   Among UNIX fans, `cat(1)' is considered an excellent example   of user-interface design, because it outputs the file contents   without such verbosity as spacing or headers between the fil...
cat3 is  to consist of lines of text,   but works with any sort of data.   Among UNIX-haters, `cat(1)' is considered the {canonical}   example of *bad* user-interface design.  This because it is more   often used to {blast} a file to standard output ...
cat4 is  `cat' for the former   operation is just as unintuitive as, say, LISP's {cdr}.   Of such oppositions are {holy wars} made.... 
catatonic is  adj. Describes a condition of suspended animation in   which something is so {wedged} or {hung} that it makes no   response.  If you are typing on a terminal and suddenly the   computer doesn't even echo the letters back to the screen a...

factpacks/jargon-split.fact  view on Meta::CPAN

golf-ball printer2 is  font by swapping in a different golf   ball.  This was the technology that enabled APL to use a   non-EBCDIC, non-ASCII, and in fact completely non-standard   character set.  This put it 10 years ahead of its time --- where it ...
golf-ball printer3 is  character displays   gave way to programmable bit-mapped devices with the flexibility to   support other character sets. 
gonk is  /gonk/ vt.,n. 1. To prevaricate or to embellish the truth   beyond any reasonable recognition.  It is alleged that in German   the term is (mythically) `gonken'; in Spanish the verb becomes   `gonkar'.  "You're gonking me.  That story you ju...
gonk2 is  for example, "Du gonkst mir" (You're   pulling my leg).  See also {gonkulator}.  2. [British] To grab some   sleep at an odd time; compare {gronk out}. 
gonkulator is  /gon'kyoo-lay-tr/ [from the old "Hogan's Heroes" TV   series] n. A pretentious piece of equipment that actually serves no   useful purpose.  Usually used to describe one's least favorite   piece of computer hardware.  See {gonk}.
gonzo is  /gon'zoh/ [from Hunter S. Thompson] adj. Overwhelming;   outrageous; over the top; very large, esp. used of collections of   source code, source files, or individual functions.  Has some of the   connotations of {moby} and {hairy}, but with...
Good Thing is  n.,adj. Often capitalized; always pronounced as if   capitalized.  1. Self-evidently wonderful to anyone in a position   to notice "The Trailblazer's 19.2Kbaud PEP mode with on-the-fly   Lempel-Ziv compression is a Good Thing for sites...
Good Thing2 is  possibly have any ill   side-effects and may save considerable grief later "Removing the   self-modifying code from that shared library would be a Good   Thing."  3. When said of software tools or libraries, as in "YACC   is a Good Th...
Good Thing3 is   drastically reduced a programmer's work load.  Oppose {Bad   Thing}. 
gorilla arm is  n. The side-effect that destroyed touch-screens as a   mainstream input technology despite a promising start in the early   1980s.  It seems the designers of all those {spiffy} touch-menu   systems failed to notice that humans aren't ...
gorilla arm2 is  their faces making small motions.  After more than   a very few selections, the arm begins to feel sore, cramped, and   oversized; hence `gorilla arm'.  This is now considered a classic   cautionary tale to human-factors designers; "...
gorilla arm3 is  "How is this going to fly in *real*   use?". 
gorp is  /gorp/ [CMU perhaps from the canonical hiker's food, Good   Old Raisins and Peanuts] Another metasyntactic variable, like   {foo} and {bar}.
GOSMACS is  /goz'maks/ [contraction of `Gosling EMACS'] n. The first   {EMACS}-in-C implementation, predating but now largely eclipsed by   {GNUMACS}.  Originally freeware; a commercial version is now   modestly popular as `UniPress EMACS'.  The auth...
Gosperism is  /gos'p*r-izm/ A hack, invention, or saying by   arch-hacker R. William (Bill) Gosper.  This notion merits its own   term because there are so many of them.  Many of the entries in   {HAKMEM} are Gosperisms; see also {life}.
gotcha is  n. A {misfeature} of a system, especially a programming   language or environment, that tends to breed bugs or mistakes because   it behaves in an unexpected way.  For example, a classic gotcha in {C}   is the fact that `if (a=b) {code;}' ...
gotcha2 is  correct.  It puts the value of `b' into `a'   and then executes `code' if `a' is non-zero.  What the   programmer probably meant was `if (a==b) {code;}',   which executes `code' if `a' and `b' are equal. 
GPL is  /G-P-L/ n. Abbrev. for `General Public License' in   widespread use; see {copyleft}.
GPV is  /G-P-V/ n. Abbrev. for {General Public Virus} in   widespread use.
grault is  /grawlt/ n. Yet another meta-syntactic variable, invented by   Mike Gallaher and propagated by the {GOSMACS} documentation.  See   {corge}.
gray goo is  n. A hypothetical substance composed of {sagan}s of   sub-micron-sized self-replicating robots programmed to make copies   of themselves out of whatever is available.  The image that goes   with the term is one of the entire biosphere of...

factpacks/jargon-split.fact  view on Meta::CPAN

insanely great is  adj. [Mac community, from Steve Jobs; also BSD UNIX   people via Bill Joy] Something so incredibly {elegant} that it is   imaginable only to someone possessing the most puissant of   {hacker}-natures.
INTERCAL is  /in't*r-kal/ [said by the authors to stand for   `Compiler Language With No Pronounceable Acronym'] n. A   computer language designed by Don Woods and James Lyon in 1972.   INTERCAL is purposely different from all other computer   langua...
INTERCAL2 is  written language,   being totally unspeakable.  An excerpt from the INTERCAL Reference   Manual will make the style of the language clear        It is a well-known and oft-demonstrated fact that a person whose        work is incomprehen...
INTERCAL3 is        one were to state that the simplest way to store a value of 65536        in a 32-bit INTERCAL variable is          DO 1 <- #0$#256        any sensible programmer would say that that was absurd.  Since this        is indeed the sim...
INTERCAL4 is  look        foolish in front of his boss, who would of course have happened to        turn up, as bosses are wont to do.  The effect would be no less        devastating for the programmer having been correct.   INTERCAL has many other p...
INTERCAL5 is  more unspeakable.  The Woods-Lyons implementation was actually used   by many (well, at least several) people at Princeton.  The language   has been recently reimplemented as C-INTERCAL and is consequently   enjoying an unprecedented le...
INTERCAL6 is  alt.lang.intercal newsgroup devoted to the study and ...   appreciation of the language on USENET. 
interesting is  adj. In hacker parlance, this word has strong   connotations of `annoying', or `difficult', or both.  Hackers   relish a challenge, and enjoy wringing all the irony possible out   of the ancient Chinese curse "May you live in interest...
Internet address is  n. 1. [techspeak] An absolute network address of   the form foo@bar.baz, where foo is a user name, bar is a   {sitename}, and baz is a `domain' name, possibly including   periods itself.  Contrast with {bang path}; see also {netw...
Internet address2 is  Internet machines and most UUCP   sites can now resolve these addresses, thanks to a large amount of   behind-the-scenes magic and PD software written since 1980 or so.   See also {bang path}, {domainist}.  2. More loosely, any ...
Internet address3 is  this includes {bang   path} addresses and some internal corporate and government   networks.   Reading Internet addresses is something of an art.  Here are the   four most important top-level functional Internet domains followed...
Internet address4 is  com          commercial organizations     edu          educational institutions     gov          U.S. government civilian sites     mil          U.S. military sites   Note that most of the sites in the com and edu domains are in...
Internet address5 is  the U.S. outside the functional domains     su          sites in the Soviet Union (see {kremvax}).     uk          sites in the United Kingdom   Within the us domain, there are subdomains for the fifty   states, each generally w...
Internet address6 is  abbreviation.  Within the uk domain, there is an ac subdomain for   academic sites and a co domain for commercial ones.  Other   top-level domains may be divided up in similar ways. 
interrupt is  1. [techspeak] n. On a computer, an event that   interrupts normal processing and temporarily diverts   flow-of-control through an "interrupt handler" routine.  See also   {trap}.  2. interj. A request for attention from a hacker.   Oft...
interrupt2 is  seen Joe   recently?"  See {priority interrupt}.  3. Under MS-DOS, the   term `interrupt' is nearly synonymous with `system call', because   the OS and BIOS routines are both called using the INT instruction   (see {{interrupt list, th...
interrupt3 is  bypass the OS (going directly to a BIOS interrupt) to get   reasonable performance. 
interrupt list, the is  [MS-DOS] n. The list of all known software   interrupt calls (both documented and undocumented) for IBM PCs and   compatibles, maintained and made available for free redistribution   by Ralf Brown (ralf@cs.cmu.edu).  As of ear...
interrupts locked out is  When someone is ignoring you.  In a   restaurant, after several fruitless attempts to get the waitress's   attention, a hacker might well observe "She must have interrupts   locked out".  The synonym `interrupts disabled' is...
interrupts locked out2 is  have one's interrupt mask bit set"   or "interrupts masked out" is also heard.  See also {spl}. 
iron is  n. Hardware, especially older and larger hardware of   {mainframe} class with big metal cabinets housing relatively   low-density electronics (but the term is also used of modern   supercomputers).  Often in the phrase {big iron}.  Oppose   ...

factpacks/jargon-split.fact  view on Meta::CPAN

meeces is  /mees'*z/ [TMRC] n. Occasional furry visitors who are not   {urchin}s.  [That is, mice. This may no longer be in live use; it   clearly derives from the refrain of the early-1960s cartoon character   Mr. Jinx: "I hate meeces to *pieces*!" ...
meg is  /meg/ n. See {{quantifiers}}.
mega- is  /me'g*/ [SI] pref. See {{quantifiers}}.
megapenny is  /meg'*-pen`ee/ n. $10,000 (1 cent * 10^6).   Used semi-humorously as a unit in comparing computer cost and   performance figures.
MEGO is  /me'goh/ or /mee'goh/ [`My Eyes Glaze Over', often `Mine Eyes   Glazeth (sic) Over', attributed to the futurologist Herman Kahn]   Also `MEGO factor'.  1. n. A {handwave} intended to confuse the   listener and hopefully induce agreement beca...
MEGO2 is  not understanding what is going on.  MEGO is   usually directed at senior management by engineers and contains a   high proportion of {TLA}s.  2. excl. An appropriate response to   MEGO tactics.  3. Among non-hackers this term often refers ...
MEGO3 is  glaze, but to the eye-glazing   reaction itself, which may be triggered by the mere threat of   technical detail as effectively as by an actual excess of it. 
meltdown, network is  n.  See {network meltdown}.
meme is  /meem/ [coined on analogy with `gene' by Richard   Dawkins] n. An idea considered as a {replicator}, esp. with   the connotation that memes parasitize people into propagating them   much as viruses do.  Used esp. in the phrase `meme complex'...
meme2 is  memes that form an   organized belief system, such as a religion.  This lexicon is an   (epidemiological) vector of the `hacker subculture' meme complex;   each entry might be considered a meme.  However, `meme' is often   misused to mean `...
meme3 is  acceptance of the idea that in humans (and presumably other tool-   and language-using sophonts) cultural evolution by selection of   adaptive ideas has superseded biological evolution by selection of   hereditary traits.  Hackers find this...
meme plague is  n. The spread of a successful but pernicious {meme},   esp. one that parasitizes the victims into giving their all to   propagate it.  Astrology, BASIC, and the other guy's religion are   often considered to be examples.  This usage i...
meme plague2 is  `joiner' ideologies like Naziism or various   forms of millennarian Christianity have exhibited plague-like cycles   of exponential growth followed by collapses to small reservoir   populations. 
memetics is  /me-met'iks/ [from {meme}] The study of memes.  As of   mid-1991, this is still an extremely informal and speculative   endeavor, though the first steps towards at least statistical rigor   have been made by H. Keith Henson and others.  ...
memetics2 is  among hackers, who like to see   themselves as the architects of the new information ecologies in   which memes live and replicate. 
memory leak is  n. An error in a program's dynamic-store allocation   logic that causes it to fail to reclaim discarded memory, leading   to eventual collapse due to memory exhaustion.  Also (esp. at   CMU) called {core leak}.  See {aliasing bug}, {f...
memory leak2 is  {precedence lossage}, {overrun   screw}, {leaky heap}, {leak}. 
menuitis is  /men`yoo-i:'tis/ n. Notional disease suffered by software   with an obsessively simple-minded menu interface and no escape.   Hackers find this intensely irritating and much prefer the   flexibility of command-line or language-style inte...
menuitis2 is  macros or a special-purpose   language in which one can encode useful hacks.  See   {user-obsequious}, {drool-proof paper}, {WIMP environment},   {for the rest of us}. 
mess-dos is  /mes-dos/ n. Derisory term for MS-DOS.  Often followed   by the ritual banishing "Just say No!"  See {{MS-DOS}}.  Most   hackers (even many MS-DOS hackers) loathe MS-DOS for its   single-tasking nature, its limits on application size, it...
mess-dos2 is  IBMness (see {fear and   loathing}).  Also `mess-loss', `messy-dos', `mess-dog',   `mess-dross', `mush-dos', and various combinations thereof.  In   Ireland and the U.K. it is even sometimes called `Domestos' after a   brand of toilet c...

factpacks/jargon-split.fact  view on Meta::CPAN

misfeature4 is  parameters   subsequently changed (possibly only in the judgment of the   implementors).  "Well, yeah, it is kind of a misfeature that file   names are limited to 6 characters, but the original implementors   wanted to save directory ...
Missed'em-five is  n. Pejorative hackerism for AT&T System V UNIX,   generally used by {BSD} partisans in a bigoted mood.  (The   synonym `SysVile' is also encountered.)  See {software bloat},   {Berzerkeley}.
miswart is  /mis-wort/ [from {wart} by analogy with {misbug}] n.   A {feature} that superficially appears to be a {wart} but has been   determined to be the {Right Thing}.  For example, in some versions   of the {EMACS} text editor, the `transpose ch...
miswart2 is  characters on either side of the cursor on the   screen, *except* when the cursor is at the end of a line, in   which case the two characters before the cursor are exchanged.   While this behavior is perhaps surprising, and certainly   i...
miswart3 is  extensive experimentation   to be what most users want.  This feature is a miswart. 
mod is  vt.,n. 1. Short for `modify' or `modification'.  Very   commonly used --- in fact the full terms are considered markers   that one is being formal.  The plural `mods' is used esp. with   reference to bug fixes or minor design changes in hardw...
mod2 is  {patch} sets or a {diff}.   2. Short for {modulo} but used *only* for its techspeak sense. 
mode is  n. A general state, usually used with an adjective   describing the state.  Use of the word `mode' rather than   `state' implies that the state is extended over time, and   probably also that some activity characteristic of that state is   b...
mode2 is  thesis mode."  In its   jargon sense, `mode' is most often attributed to people, though it is   sometimes applied to programs and inanimate objects. In particular,   see {hack mode}, {day mode}, {night mode}, {demo mode},   {fireworks mode}...
mode3 is  also often hears the verbs `enable' and `disable' used in   connection with jargon modes.  Thus, for example, a sillier way of   saying "I'm going to crash" is "I'm going to enable crash mode   now".  One might also hear a request to "disab...
mode bit is  n. A {flag}, usually in hardware, that selects between   two (usually quite different) modes of operation.  The connotations   are different from {flag} bit in that mode bits are mainly   written during a boot or set-up phase, are seldom...
mode bit2 is  lifetime of an ordinary program.  The   classic example was the EBCDIC-vs.-ASCII bit (#12) of the Program   Status Word of the IBM 360.  Another was the bit on a PDP-12 that   controlled whether it ran the PDP-8 or the LINC instruction ...
modulo is  /mo'dyu-loh/ prep. Except for.  From mathematical   terminology; one can consider saying that 4 = 22 except for   the 9s (4 = 22 mod 9).  "Well, LISP seems to work okay now,   modulo that {GC} bug."  "I feel fine today modulo a slight   he...
molly-guard is  /mol'ee-gard/ [University of Illinois] n. A shield   to prevent tripping of some {Big Red Switch} by clumsy or   ignorant hands.  Originally used of some plexiglass covers   improvised for the BRS on an IBM 4341 after a programmer's t...
molly-guard2 is  twice in one day.  Later   generalized to covers over stop/reset switches on disk drives and   networking equipment. 
Mongolian Hordes technique is  n. Development by {gang bang}   (poss. from the Sixties counterculture expression `Mongolian   clusterfuck' for a public orgy).  Implies that large numbers of   inexperienced programmers are being put on a job better pe...
Mongolian Hordes technique2 is  `Chinese Army technique';   see also {Brooks's Law}. 
monkey up is  vt. To hack together hardware for a particular task,   especially a one-shot job.  Connotes an extremely {crufty} and   consciously temporary solution.  Compare {hack up}, {kluge up},   {cruft together}, {cruft together}.
monkey, scratch is  n.  See {scratch monkey}.
monstrosity is  1. n. A ridiculously {elephantine} program or system,   esp. one that is buggy or only marginally functional.  2. The   quality of being monstrous (see `Overgeneralization' in the discussion   of jargonification).  See also {baroque}.
Moof is  /moof/ [MAC users] n. The Moof or `dogcow' is a   semi-legendary creature that lurks in the depths of the Macintosh   Technical Notes Hypercard stack V3.1; specifically, the full story   of the dogcow is told in technical note #31 (the parti...
Moof2 is  `Clarus').  Option-shift-click will   cause it to emit a characteristic `Moof!' or `!fooM' sound.   *Getting* to tech note 31 is the hard part; to discover how   to do that, one must needs examine the stack script with a hackerly   eye.  Cl...
Moof3 is  if you   choose `Page Setup...' with a LaserWriter selected and click on   the `Options' button. 
Moore's Law is  /morz law/ prov. The observation that the logic   density of silicon integrated circuits has closely followed the   curve (bits per square inch)  = 2^{(n - 1962)}; that is, the   amount of information storable in one square inch of si...
Moore's Law2 is  since the technology was   invented.  See also {Parkinson's Law of Data}. 
moria is  /mor'ee-*/ n. Like {nethack} and {rogue}, one of the   large PD Dungeons-and-Dragons-like simulation games, available for   a wide range of machines and operating systems.  Extremely   addictive and a major consumer of time better used for ...
MOTAS is  /moh-toz/ [USENET: Member Of The Appropriate Sex, after   {MOTOS} and {MOTSS}] n. A potential or (less often) actual sex   partner.  See also {SO}.
MOTOS is  /moh-tohs/ [acronym from the 1970 U.S. census forms via   USENET: Member Of The Opposite Sex] n. A potential or (less often)   actual sex partner.  See {MOTAS}, {MOTSS}, {SO}.  Less   common than MOTSS or {MOTAS}, which have largely displac...
MOTSS is  /mots/ or /M-O-T-S-S/ [from the 1970 U.S. census forms   via USENET, Member Of The Same Sex] n. Esp. one considered as a   possible sexual partner.  The gay-issues newsgroup on USENET is   called soc.motss.  See {MOTOS} and {MOTAS}, which d...
mouse ahead is  vi. Point-and-click analog of `type ahead'.  To   manipulate a computer's pointing device (almost always a mouse in   this usage, but not necessarily) and its selection or command   buttons before a computer program is ready to accept...
mouse ahead2 is  accepting the input.  Handling this   properly is rare, but it can help make a {WIMP environment} much   more usable, assuming the users are familiar with the behavior of the   user interface. 
mouse around is  vi. To explore public portions of a large system, esp.   a network such as Internet via {FTP} or {TELNET}, looking for   interesting stuff to {snarf}.
mouse belt is  n. See {rat belt}.
mouse droppings is  [MS-DOS] n. Pixels (usually single) that are not   properly restored when the mouse pointer moves away from a   particular location on the screen, producing the appearance that   the mouse pointer has left droppings behind.  The m...
mouse droppings2 is  that write to the screen memory   corresponding to the mouse pointer's current location without   hiding the mouse pointer first, and mouse drivers that do not quite   support the graphics mode in use. 
mouse elbow is  n. A tennis-elbow-like fatigue syndrome resulting from   excessive use of a {WIMP environment}.  Similarly, `mouse   shoulder'; GLS reports that he used to get this a lot before he   taught himself to be ambimoustrous.
mouso is  /mow'soh/ n. [by analogy with `typo'] An error in mouse usage   resulting in an inappropriate selection or graphic garbage on the   screen.  Compare {thinko}, {braino}.
MS-DOS is  /M-S-dos/ [MicroSoft Disk Operating System] n. A   {clone} of {{CP/M}} for the 8088 crufted together in 6 weeks by   hacker Tim Paterson, who is said to have regretted it ever since.   Numerous features, including vaguely UNIX-like but rat...
MS-DOS2 is  redirection, and pipelines, were   hacked into 2.0 and subsequent versions; as a result, there are two   or more incompatible versions of many system calls, and MS-DOS   programmers can never agree on basic things like what character to  ...
MS-DOS3 is  case-sensitive.  The   resulting mess is now the highest-unit-volume OS in history.  Often   known simply as DOS, which annoys people familiar with other   similarly abbreviated operating systems (the name goes back to the   mid-1960s, wh...
MS-DOS4 is  operating   system for the 360).  Some people like to pronounce DOS like   "dose", as in "I don't work on dose, man!", or to compare it   to a dose of brain-damaging drugs (a slogan button in wide   circulation among hackers exhorts: "MS-...
mu is  /moo/ The correct answer to the classic trick question   "Have you stopped beating your wife yet?".  Assuming that you   have no wife or you have never beaten your wife, the answer "yes"   is wrong because it implies that you used to beat your...
mu2 is  because it suggests that you   have one and are still beating her.  According to various   Discordians and Douglas Hofstadter (see the Bibliography), the   correct answer is usually "mu", a Japanese word alleged to mean   "Your question canno...
mu3 is  assumptions".  Hackers tend to be sensitive to logical   inadequacies in language, and many have adopted this suggestion   with enthusiasm.  The word `mu' is actually from Chinese, meaning   `nothing'; it is used in mainstream Japanese in tha...
mu4 is  the Discordian question-denying   use.  It almost certainly derives from overgeneralization of the   answer in the following well-known Rinzei Zen teaching riddle:     A monk asked Joshu, "Does a dog have the Buddha nature?"     Joshu retorte...
mu5 is  Koans}, and Douglas   Hofstadter's `G"odel, Escher, Bach' (pointer in the   Bibliography). 
mudhead is  n. Commonly used to refer to a {MUD} player who   sleeps, breathes, and eats MUD.  Mudheads have been known to fail   their degrees, drop out, etc., with the consolation, however, that   they made wizard level.  When encountered in person...

factpacks/jargon-split.fact  view on Meta::CPAN

rusty iron is  n. Syn. {tired iron}.  It has been claimed that this   is the inevitable fate of {water MIPS}.
rusty memory is  n. Mass-storage that uses iron-oxide-based magnetic   media (esp. tape and the pre-Winchester removable disk packs used   in {washing machine}s).  Compare {donuts}.*S/N ratio // n. (also `s/n ratio', `sn ratio').  Syn.   {signal-to-n...
sacred is  adj. Reserved for the exclusive use of something (an   extension of the standard meaning).  Often means that anyone may   look at the sacred object, but clobbering it will screw whatever it   is sacred to.  The comment "Register 7 is sacre...
sacred2 is  program would be interpreted by a hacker   to mean that if any *other* part of the program changes the   contents of register 7, dire consequences are likely to ensue. 
saga is  [WPI] n. A cuspy but bogus raving story about N random   broken people.
sagan is  /say'gn/ [from Carl Sagan's TV series "Cosmos"; think   "billions and billions"] n. A large quantity of anything.   "There's a sagan different ways to tweak EMACS."  "The   U.S. Government spends sagans on bombs and welfare --- hard to say ...
SAIL is  /sayl/, not /S-A-I-L/ n. 1. Stanford Artificial   Intelligence Lab.  An important site in the early development of   LISP; with the MIT AI Lab, BBN, CMU, and the UNIX community, one of   the major wellsprings of technical innovation and hack...
SAIL2 is  entry for details).  The SAIL   machines were officially shut down in late May 1990, scant weeks   after the MIT AI Lab's ITS cluster was officially decommissioned.   2. The Stanford Artificial Intelligence Language used at SAIL   (sense 1)...
SAIL3 is  coroutining   facility and some new data types intended for building search trees   and association lists. 
salescritter is  /sayls'kri`tr/ n. Pejorative hackerism for a computer   salesperson.  Hackers tell the following joke     Q. What's the difference between a used-car dealer and a        computer salesman?     A. The used-car dealer knows he's lying....
salescritter2 is  that salescritters are   self-selected for stupidity (after all, if they had brains and the   inclination to use them, they'd be in programming).  The terms   `salesthing' and `salesdroid' are also common.  Compare   {marketroid}, {...
salsman is  /salz'm*n/ v. To flood a mailing list or newsgroup with   huge amounts of useless, trivial or redundant information.  From   the name of a hacker who has frequently done this on some widely   distributed mailing lists.
salt mines is  n. Dense quarters housing large numbers of programmers   working long hours on grungy projects, with some hope of seeing the   end of the tunnel in N years.  Noted for their absence of sunshine.   Compare {playpen}, {sandbox}.
salt substrate is  [MIT] n. Collective noun used to refer to potato   chips, pretzels, saltines, or any other form of snack food   designed primarily as a carrier for sodium chloride.  From the   technical term `chip substrate', used to refer to the ...
salt substrate2 is  of integrated circuits are deposited. 
same-day service is  n. Ironic term used to describe long response   time, particularly with respect to {{MS-DOS}} system calls (which   ought to require only a tiny fraction of a second to execute).   Such response time is a major incentive for prog...
same-day service2 is  {well-behaved}.  See also {PC-ism}. 
sandbender is  [IBM] n. A person involved with silicon lithography and   the physical design of chips.  Compare {ironmonger}, {polygon   pusher}.
sandbox is  n. (or `sandbox, the') Common term for the   R&D department at many software and computer companies (where hackers   in commercial environments are likely to be found).  Half-derisive,   but reflects the truth that research is a form of c...
sanity check is  n. 1. The act of checking a piece of code (or   anything else, e.g., a USENET posting) for completely stupid mistakes.   Implies that the check is to make sure the author was sane when it   was written; e.g., if a piece of scientific...
sanity check2 is  was giving unexpected results, one might   first look at the nesting of parentheses or the coding of the   formula, as a {sanity check}, before looking at the more complex   I/O or data structure manipulation routines, much less the...

factpacks/jargon-split.fact  view on Meta::CPAN

toy problem is  [AI] n. A deliberately oversimplified case of a   challenging problem used to investigate, prototype, or test   algorithms for a real problem.  Sometimes used pejoratively.  See   also {gedanken}, {toy program}.
toy program is  n. 1. One that can be readily comprehended; hence, a   trivial program (compare {noddy}).  2. One for which the effort   of initial coding dominates the costs through its life cycle.   See also {noddy}.
trampoline is  n. An incredibly {hairy} technique, found in some   {HLL} and program-overlay implementations (e.g., on the   Macintosh), that involves on-the-fly generation of small executable   (and, likely as not, self-modifying) code objects to do...
trampoline2 is  pieces of {live data} are called   `trampolines.  Trampolines are notoriously difficult to understand   in action; in fact, it is said by those who use this term that the   trampoline that doesnt bend your brain is not the true   tram...
trap is  1. n. A program interrupt, usually an interrupt caused by   some exceptional situation in the user program.  In most cases, the   OS performs some action, then returns control to the program.   2. vi. To cause a trap.  "These instructions tr...
trap2 is  to indicate the cause of the   trap.  "The monitor traps all input/output instructions."   This term is associated with assembler programming (`interrupt   or `exception is more common among {HLL} programmers) and   appears to be fading int...
trap3 is  assembler continues to shrink.  However, it is still important to   computer architects and systems hackers (see {system},   sense 1), who use it to distinguish deterministically repeatable   exceptions from timing-dependent ones (such as I...
trap door is  alt. `trapdoor n. 1. Syn. {back door}.   2. [techspeak] A `trap-door function is one which is easy to   compute but very difficult to compute the inverse of.  Such   functions have important applications in cryptography, specifically   ...
trash is  vt. To destroy the contents of (said of a data structure).   The most common of the family of near-synonyms including {mung},   {mangle}, and {scribble}.
tree-killer is  [Sun] n. 1. A printer.  2. A person who wastes paper.   This should be interpreted in a broad sense; `wasting paper   includes the production of {spiffy} but {content-free} documents.   Thus, most {suit}s are tree-killers.
trit is  /trit/ [by analogy with `bit] n. One base-3 digit; the   amount of information conveyed by a selection among one of three   equally likely outcomes (see also {bit}).  These arise, for   example, in the context of a {flag} that should actuall...
trit2 is  as yes, no, or unknown.  Trits are   sometimes jokingly called `3-state bits.  A trit may be   semi-seriously referred to as `a bit and a half, although it is   linearly equivalent to 1.5849625 bits (that is,   log2(3)   bits). 
trivial is  adj. 1. Too simple to bother detailing.  2. Not worth the   speakers time.  3. Complex, but solvable by methods so well known   that anyone not utterly {cretinous} would have thought of them   already.  4. Any problem one has already solv...
trivial2 is  evaluates to `Ive seen it before).   Hackers notions of triviality may be quite at variance with those   of non-hackers.  See {nontrivial}, {uninteresting}. 
troglodyte is  [Commodore] n. 1. A hacker who never leaves his   cubicle.  The term `Gnoll (from Dungeons & Dragons) is also   reported.  2. A curmudgeon attached to an obsolescent computing   environment.  The combination `ITS troglodyte was flung a...
troglodyte2 is  wringle-wrangle attending the   2.x.x revision of the Jargon File; at least one of the people it   was intended to describe adopted it with pride. 
troglodyte mode is  [Rice University] n. Programming with the lights   turned off, sunglasses on, and the terminal inverted (black on   white) because youve been up for so many days straight that your   eyes hurt (see {raster burn}).  Loud music blar...
troglodyte mode2 is  optional but recommended.  See {larval   stage}, {hack mode}. 
Trojan horse is  [coined by MIT-hacker-turned-NSA-spook Dan Edwards]   n. A program designed to break security or damage a system that is   disguised as something else benign, such as a directory lister,   archiver, a game, or (in one notorious 1990 ...
Trojan horse2 is  destroy viruses!  See {back door}, {virus},   {worm}. 
true-hacker is  [analogy with `trufan from SF fandom] n. One who   exemplifies the primary values of hacker culture, esp. competence   and helpfulness to other hackers.  A high compliment.  "He spent   6 hours helping me bring up UUCP and netnews on ...

factpacks/jargon.fact  view on Meta::CPAN

arc => [primarily MSDOS] vt. To create a compressed archive from a group of files using SEA ARC, PKWare PKARC, or a compatible program. Rapidly becoming obsolete as the ARC compression method is falling into disuse, having been replaced by newer comp...
arc wars => [primarily MSDOS] n. {holy wars} over which archiving program one should use. The first arc war was sparked when System Enhancement Associates (SEA) sued PKWare for copyright and trademark infringement on its ARC program. PKWare's PKARC o...
arc wars2 => and speed while largely retaining compatibility (it introduced a new compression type that could be disabled for backward-compatibility). PKWare settled out of court to avoid enormous legal costs (both SEA and PKWare are small companies)...
arc wars3 => of PKARC was changed to PKPAK. The public backlash against SEA for bringing suit helped to hasten the demise of ARC as a standard when PKWare and others introduced new, incompatible archivers with better compression algorithms. 
archive => n. 1. A collection of several files bundled into one file by a program such as `ar(1)', `tar(1)', `cpio(1)', or arc for shipment or archiving (sense 2). See also {tar and feather}. 2. A collection of files or archives (sense 1) made availa...
arena => [UNIX] n. The area of memory attached to a process by `brk(2)' and `sbrk(2)' and used by `malloc(3)' as dynamic storage. So named from a semi-mythical `malloc corrupt arena' message supposedly emitted when some early versions became terminal...
arg => /arg/ n. Abbreviation for `argument' (to a function), used so often as to have become a new word (like `piano' from `pianoforte'). "The sine function takes 1 arg, but the arc-tangent function can take either 1 or 2 args." Compare param, parm, ...
armor-plated => n. Syn. for bulletproof.
asbestos => adj. Used as a modifier to anything intended to protect one from flames. Important cases of this include {asbestos longjohns} and {asbestos cork award}, but it is used more generally.
asbestos cork award => n. Once, long ago at MIT, there was a flamer so consistently obnoxious that another hacker designed, had made, and distributed posters announcing that said flamer had been nominated for the `asbestos cork award'. Persons in any...
asbestos cork award2 => application of the cork should consult the etymology under flame. Since then, it is agreed that only a select few have risen to the heights of bombast required to earn this dubious dignity --- but there is no agreement on *whi...
asbestos longjohns => n. Notional garments often donned by USENET posters just before emitting a remark they expect will elicit flamage. This is the most common of the asbestos coinages. Also `asbestos underwear', `asbestos overcoat', etc.
attoparsec => n. `atto-' is the standard SI prefix for multiplication by 10^-18. A parsec (parallax-second) is 3.26 light-years; an attoparsec is thus 3.26 * 10^-18 light years, or about 3.1 cm (thus, 1 attoparsec/microfortnight equals about 1 inch/s...
autobogotiphobia => /aw'to-boh-got`*-foh'bee-*/ n. See bogotify.
automagically => /aw-toh-maj'i-klee/ or /aw-toh-maj'i-k*l-ee/ adv. Automatically, but in a way that, for some reason (typically because it is too complicated, or too ugly, or perhaps even too trivial), the speaker doesn't feel like explaining to you....
avatar => [CMU, Tektronix] n. Syn. root, superuser. There are quite a few UNIX machines on which the name of the superuser account is `avatar' rather than `root'. This quirk was originated by a CMU hacker who disliked the term `superuser', and was pr...
awk => 1. n. [UNIX techspeak] An interpreted language for massaging text data developed by Alfred Aho, Peter Weinberger, and Brian Kernighan (the name is from their initials). It is characterized by C-like syntax, a declaration-free approach to varia...
backbone cabal => n. A group of large-site administrators who pushed through the {Great Renaming} and reined in the chaos of USENET during most of the 1980s. The cabal {mailing list} disbanded in late 1988 after a bitter internal catfight, but the ne...
backbone site => n. A key USENET and email site; one that processes a large amount of third-party traffic, especially if it is the home site of any of the regional coordinators for the USENET maps. Notable backbone sites as of early 1991 include uune...
backbone site2 => University, UC Berkeley, DEC's Western Research Laboratories, Ohio State University, and the University of Texas. Compare {rib site}, {leaf site}. 
backgammon => See bignum, moby, and pseudoprime.
background => n.,adj.,vt. To do a task `in background' is to do it whenever foreground matters are not claiming your undivided attention, and `to background' something means to relegate it to a lower priority. "For now, we'll just print a list of nod...
backspace and overstrike => interj. Whoa! Back up. Used to suggest that someone just said or did something wrong. Common among APL programmers.
backward combatability => /bak'w*rd k*m-bat'*-bil'*-tee/ [from `backward compatibility'] n. A property of hardware or software revisions in which previous protocols, formats, and layouts are discarded in favor of `new and improved' protocols, formats...
backward combatability2 => making the transition between major releases. When the change is so drastic that the old formats are not retained in the new version, it is said to be `backward combatable'. See {flag day}. 
BAD => /B-A-D/ [IBM acronym, `Broken As Designed'] adj. Said of a program that is bogus because of bad design and misfeatures rather than because of bugginess. See {working as designed}.
Bad Thing => [from the 1930 Sellar & Yeatman parody `1066 And All That'] n. Something that can't possibly result in improvement of the subject. This term is always capitalized, as in "Replacing all of the 9600-baud modems with bicycle couriers would ...
Bad Thing2 => Thing}. British correspondents confirm that {Bad Thing} and {Good Thing} (and prob. therefore {Right Thing} and {Wrong Thing}) come from the book referenced in the etymology, which discusses rulers who were Good Kings but Bad Things. Th...
Bad Thing3 => mainstream idiom on the British side of the pond. 
bag on the side => n. An extension to an established hack that is supposed to add some functionality to the original. Usually derogatory, implying that the original was being overextended and should have been thrown away, and the new product is ugly,...
bag on the side2 => phrase, `to hang a bag on the side [of]'. "C++? That's just a bag on the side of C ...." "They want me to hang a bag on the side of the accounting system." 
bagbiter => /bag'bit-*r/ n. 1. Something, such as a program or a computer, that fails to work, or works in a remarkably clumsy manner. "This text editor won't let me make a file with a line longer than 80 characters! What a bagbiter!" 2. A person who...
bamf => /bamf/ 1. [from old X-Men comics] interj. Notional sound made by a person or object teleporting in or out of the hearer's vicinity. Often used in {virtual reality} (esp. MUD) electronic fora when a character wishes to make a dramatic entrance...
banana label => n. The labels often used on the sides of macrotape reels, so called because they are shaped roughly like blunt-ended bananas. This term, like macrotapes themselves, is still current but visibly headed for obsolescence.
banana problem => n. [from the story of the little girl who said "I know how to spell `banana', but I don't know when to stop"]. Not knowing where or when to bring a production to a close (compare {fencepost error}). One may say `there is a banana pr...
banana problem2 => defined or incorrect termination conditions, or in discussing the evolution of a design that may be succumbing to featuritis (see also {creeping elegance}, {creeping featuritis}). See item 176 under HAKMEM, which describes a banana...
banana problem3 => implementation.bandwidth n. 1. Used by hackers in a generalization of its technical meaning as the volume of information per unit time that a computer, person, or transmission medium can handle. "Those are amazing graphics, but I m...
banana problem4 => bandwidth, I guess." Compare low-bandwidth. 2. Attention span. 3. On USENET, a measure of network capacity that is often wasted by people complaining about how items posted by others are a waste of bandwidth. 
bang => 1. n. Common spoken name for `!' (ASCII 0100001), especially when used in pronouncing a {bang path} in spoken hackish. In {elder days} this was considered a CMUish usage, with MIT and Stanford hackers preferring excl or shriek; but the spread...
bang on => vt. To stress-test a piece of hardware or software "I banged on the new version of the simulator all day yesterday and it didn't crash once. I guess it is ready to release." The term {pound on} is synonymous.
bang path => n. An old-style UUCP electronic-mail address specifying hops to get from some assumed-reachable location to the addressee, so called because each hop is signified by a bang sign. Thus, for example, the path ...!bigsite!foovax!barbox!me d...
bang path2 => to machine bigsite (presumably a well-known location accessible to everybody) and from there through the machine foovax to the account of user me on barbox. In the bad old days of not so long ago, before autorouting mailers became commo...
bang path3 => compound bang addresses using the { } convention (see glob) to give paths from *several* big machines, in the hopes that one's correspondent might be able to get mail to one of them reliably (example ...!{seismo, ut-sally, ihnp4}!rice!b...
bang path4 => 10 hops were not uncommon in 1981. Late-night dial-up UUCP links would cause week-long transmission times. Bang paths were often selected by both transmission time and reliability, as messages would often get lost. See {{Internet addres...
banner => n. 1. The title page added to printouts by most print spoolers (see spool). Typically includes user or account ID information in very large character-graphics capitals. Also called a `burst page', because it indicates where to burst (tear a...
bar => /bar/ n. 1. The second metasyntactic variable, after foo and before baz. "Suppose we have two functions FOO and BAR. FOO calls BAR...." 2. Often appended to foo to produce foobar.
bare metal => n. 1. New computer hardware, unadorned with such snares and delusions as an {operating system}, an HLL, or even assembler. Commonly used in the phrase `programming on the bare metal', which refers to the arduous work of {bit bashing} ne...
bare metal2 => for a new machine. Real bare-metal programming involves things like building boot proms and BIOS chips, implementing basic monitors used to test device drivers, and writing the assemblers that will be used to write the compiler back en...
bare metal3 => real development environment. 2. `Programming on the bare metal' is also used to describe a style of hand-hacking that relies on bit-level peculiarities of a particular hardware design, esp. tricks for speed and space optimization that...
bare metal4 => overlapping instructions (or, as in the famous case described in appendix A, interleaving of opcodes on a magnetic drum to minimize fetch delays due to the device's rotational latency). This sort of thing has become less common as the ...
bare metal5 => and machine resources have changed, but is still found in heavily constrained environments such as industrial embedded systems. See {real programmer}. In the world of personal computing, bare metal programming (especially in sense 1 bu...
bare metal6 => considered a {Good Thing}, or at least a necessary thing (because these machines have often been sufficiently slow and poorly designed to make it necessary; see ill-behaved). There, the term usually refers to bypassing the BIOS or OS i...
bare metal7 => application to directly access device registers and machine addresses. "To get 19.2 kilobaud on the serial port, you need to get down to the bare metal." People who can do this sort of thing are held in high regard. 
barf => /barf/ [from mainstream slang meaning `vomit'] 1. interj. Term of disgust. This is the closest hackish equivalent of the Val\-speak "gag me with a spoon". (Like, euwww!) See bletch. 2. vi. To say "Barf!" or emit some similar expression of dis...

factpacks/jargon.fact  view on Meta::CPAN

beige toaster => n. A Macintosh. See toaster; compare Macintrash, maggotbox.
bells and whistles => [by analogy with the toyboxes on theater organs] n. Features added to a program or system to make it more flavorful from a hacker's point of view, without necessarily adding to its utility for its primary function. Distinguished...
bells and whistles2 => to attract users. "Now that we've got the basic program working, let's go back and add some bells and whistles." No one seems to know what distinguishes a bell from a whistle. 
bells, whistles, and gongs => n. A standard elaborated form of {bells and whistles}; typically said with a pronounced and ironic accent on the `gongs'.
benchmark => [techspeak] n. An inaccurate measure of computer performance. "In the computer industry, there are three kinds of lies lies, damn lies, and benchmarks." Well-known ones include Whetstone, Dhrystone, Rhealstone (see h), the Gabriel LISP b...
Berkeley Quality Software => adj. (often abbreviated `BQS') Term used in a pejorative sense to refer to software that was apparently created by rather spaced-out hackers late at night to solve some unique problem. It usually has nonexistent, incomple...
Berkeley Quality Software2 => been tested on at least two examples, and core dumps when anyone else attempts to use it. This term was frequently applied to early versions of the `dbx(1)' debugger. See also Berzerkeley. 
berklix => /berk'liks/ n.,adj. [contraction of `Berkeley UNIX'] See BSD. Not used at Berkeley itself. May be more common among suits attempting to sound like cognoscenti than among hackers, who usually just say `BSD'.
berserking => vi. A MUD term meaning to gain points *only* by killing other players and mobiles (non-player characters). Hence, a Berserker-Wizard is a player character that has achieved enough points to become a wizard, but only by killing other cha...
Berzerkeley => /b*r-zer'klee/ [from `berserk', via the name of a now-deceased record label] n. Humorous distortion of `Berkeley' used esp. to refer to the practices or products of the BSD UNIX hackers. See {software bloat}, Missed'em-five, {Berkeley ...
beta => /bay't*/, /be't*/ or (Commonwealth) /bee't*/ n. 1. In the {Real World}, software often goes through two stages of testing Alpha (in-house) and Beta (out-house?). Software is said to be `in beta'. 2. Anything that is new and experimental is in...
BFI => /B-F-I/ n. See {brute force and ignorance}. Also encountered in the variant `BFMI', `brute force and *massive* ignorance'.
bible => n. 1. One of a small number of fundamental source books such as Knuth and K&R. 2. The most detailed and authoritative reference for a particular language, operating system, or other complex software system.
BiCapitalization => n. The act said to have been performed on trademarks (such as NeXT, NeWS, VisiCalc, FrameMaker, TK!solver, EasyWriter) that have been raised above the ruck of common coinage by nonstandard capitalization. Too many marketroid types...
BIFF => /bif/ [USENET] n. The most famous pseudo, and the prototypical newbie. Articles from BIFF are characterized by all uppercase letters sprinkled liberally with bangs, typos, `cute' misspellings (EVRY BUDY LUVS GOOD OLD BIFF CUZ HE"S A K00L DOOD...
biff => /bif/ vt. To notify someone of incoming mail. From the BSD utility `biff(1)', which was in turn named after the implementor's dog (it barked whenever the mailman came). No relation to BIFF.
Big Gray Wall => n. What faces a VMS user searching for documentation. A full VMS kit comes on a pallet, the documentation taking up around 15 feet of shelf space before the addition of layered products such as compilers, databases, multivendor netwo...
Big Gray Wall2 => Recent (since VMS version 5) DEC documentation comes with gray binders; under VMS version 4 the binders were orange (`big orange wall'), and under version 3 they were blue. See VMS. 
big iron => n. Large, expensive, ultra-fast computers. Used generally of number-crunching supercomputers such as Crays, but can include more conventional big commercial IBMish mainframes. Term of approval; compare {heavy metal}, oppose dinosaur.
Big Red Switch => [IBM] n. The power switch on a computer, esp. the `Emergency Pull' switch on an IBM mainframe or the power switch on an IBM PC where it really is large and red. "This !@%$% {bitty box} is hung again; time to hit the Big Red Switch."...
Big Red Switch2 => tune with the company's passion for TLAs, this is often acronymized as `BRS' (this has also become established on FidoNet and in the PC clone world). It is alleged that the emergency pull switch on an IBM 360/91 actually fired a no...

factpacks/jargon.fact  view on Meta::CPAN

bignum => /big'nuhm/ [orig. from MIT MacLISP] n. 1. [techspeak] A multiple-precision computer representation for very large integers. More generally, any very large number. "Have you ever looked at the United States Budget? There's bignums for you!" ...
bigot => n. A person who is religiously attached to a particular computer, language, operating system, editor, or other tool (see {religious issues}). Usually found with a specifier; thus, `cray bigot', {ITS bigot}, `APL bigot', `VMS bigot', {Berkele...
bit => [from the mainstream meaning and `Binary digIT'] n. 1. [techspeak] The unit of information; the amount of information obtained by asking a yes-or-no question for which the two outcomes are equally probable. 2. [techspeak] A computational quant...
bit bang => n. Transmission of data on a serial line, when accomplished by rapidly tweaking a single output bit at the appropriate times. The technique is a simple loop with eight OUT and SHIFT instruction pairs for each byte. Input is more interesti...
bit bang2 => and output at the same time) is one way to separate the real hackers from the wannabees. Bit bang was used on certain early models of Prime computers, presumably when UARTs were too expensive, and on archaic Z80 micros with a Zilog PIO b...
bit bang3 => instance of the {cycle of reincarnation}, this technique is now (1991) coming back into use on some RISC architectures because it consumes such an infinitesimal part of the processor that it actually makes sense not to have a UART. 
bit bashing => n. (alt. `bit diddling' or {bit twiddling}) Term used to describe any of several kinds of low-level programming characterized by manipulation of bit, flag, nybble, and other smaller-than-character-sized pieces of data; these include lo...
bit bashing2 => encryption algorithms, checksum and error-correcting codes, hash functions, some flavors of graphics programming (see bitblt), and assembler/compiler code generation. May connote either tedium or a real technical challenge (more usual...
bit bashing3 => decoding for the new tape driver looks pretty solid but the bit-bashing for the control registers still has bugs." See also {bit bang}, {mode bit}. 
bit bucket => n. 1. The universal data sink (originally, the mythical receptacle used to catch bits when they fall off the end of a register during a shift instruction). Discarded, lost, or destroyed data is said to have `gone to the bit bucket'. On ...
bit bucket2 => /dev/null. Sometimes amplified as `the Great Bit Bucket in the Sky'. 2. The place where all lost mail and news messages eventually go. The selection is performed according to {Finagle's Law}; important mail is much more likely to end u...
bit bucket3 => mail, which has an almost 100% probability of getting delivered. Routing to the bit bucket is automatically performed by mail-transfer agents, news systems, and the lower layers of the network. 3. The ideal location for all unwanted ma...
bit bucket4 => article to the bit bucket." Such a request is guaranteed to overflow one's mailbox with flames. 4. Excuse for all mail that has not been sent. "I mailed you those figures last week; they must have ended in the bit bucket." Compare {bla...
bit bucket5 => in jest. It is based on the fanciful notion that bits are objects that are not destroyed but only misplaced. This appears to have been a mutation of an earlier term `bit box', about which the same legend was current; old-time hackers a...
bit bucket6 => told that when the CPU stored bits into memory it was actually pulling them `out of the bit box'. See also {chad box}. Another variant of this legend has it that, as a consequence of the `parity preservation law', the number of 1 bits ...
bit bucket7 => equal the number of 0 bits. Any imbalance results in bits filling up the bit bucket. A qualified computer technician can empty a full bit bucket as part of scheduled maintenance. 
bit decay => n. See {bit rot}. People with a physics background tend to prefer this one for the analogy with particle decay. See also computron, {quantum bogodynamics}.
bit rot => n. Also {bit decay}. Hypothetical disease the existence of which has been deduced from the observation that unused programs or features will often stop working after sufficient time has passed, even if `nothing has changed'. The theory exp...
bit rot2 => were radioactive. As time passes, the contents of a file or the code in a program will become increasingly garbled. There actually are physical processes that produce such effects (alpha particles generated by trace radionuclides in ceram...
bit rot3 => change the contents of a computer memory unpredictably, and various kinds of subtle media failures can corrupt files in mass storage), but they are quite rare (and computers are built with error-detecting circuitry to compensate for them)...
bit rot4 => hackers that cosmic rays are among the causes of such events turns out to be a myth; see the {cosmic rays} entry for details. The term {software rot} is almost synonymous. Software rot is the effect, bit rot the notional cause. 

factpacks/jargon.fact  view on Meta::CPAN

calculator => [Cambridge] n. Syn. for {bitty box}.
can => vt. To abort a job on a time-sharing system. Used esp. when the person doing the deed is an operator, as in "canned from the {console}". Frequently used in an imperative sense, as in "Can that print job, the LPT just popped a sprocket!" Synony...
canonical => [historically, `according to religious law'] adj. The usual or standard state or manner of something. This word has a somewhat more technical meaning in mathematics. Two formulas such as 9 + x and x + 9 are said to be equivalent because ...
card => n. 1. An electronic printed-circuit board (see also {tall card}, {short card}. 2. obs. Syn. {{punched card}}.
card walloper => n. An EDP programmer who grinds out batch programs that do stupid things like print people's paychecks. Compare {code grinder}. See also {{punched card}}, {eighty-column mind}.
careware => /keir'weir/ n. Shareware for which either the author suggests that some payment be made to a nominated charity or a levy directed to charity is included on top of the distribution charge. Syn. charityware; compare crippleware, sense 2.
cargo cult programming => n. A style of (incompetent) programming dominated by ritual inclusion of code or program structures that serve no real purpose. A cargo cult programmer will usually explain the extra code as a way of working around some bug ...
cargo cult programming2 => neither the bug nor the reason the code apparently avoided the bug was ever fully understood (compare {shotgun debugging}, {voodoo programming}). The term `cargo cult' is a reference to aboriginal religions that grew up in ...
cargo cult programming3 => The practices of these cults center on building elaborate mockups of airplanes and military style landing strips in the hope of bringing the return of the god-like airplanes that brought such marvelous cargo during the war....
cargo cult programming4 => Richard Feynman's characterization of certain practices as "cargo cult science" in his book `Surely You're Joking, Mr. Feynman' (W. W. Norton & Co, New York 1985, ISBN 0-393-01921-7). 
case and paste => [from `cut and paste'] n. 1. The addition of a new feature to an existing system by selecting the code from an existing feature and pasting it in with minor changes. Common in telephony circles because most operations in a telephone...
case and paste2 => statements. Leads to {software bloat}. In some circles of EMACS users this is called `programming by Meta-W', because Meta-W is the EMACS command for copying a block of text to a kill buffer in preparation to pasting it in elsewher...
case and paste3 => implying that the programmer is acting mindlessly rather than thinking carefully about what is required to integrate the code for two similar cases. 
casters-up mode => [IBM] n. Yet another synonym for `broken' or `down'.
casting the runes => n. What a guru does when you ask him or her to run a particular program and type at it because it never works for anyone else; esp. used when nobody can ever see what the guru is doing different from what J. Random Luser does. Co...
casting the runes2 => {examining the entrails}; also see the AI koan about Tom Knight in appendix A. 
cat => [from `catenate' via {UNIX} `cat(1)'] vt. 1. [techspeak] To spew an entire file to the screen or some other output sink without pause. 2. By extension, to dump large amounts of data at an unprepared target or with no intention of browsing it c...
catatonic => adj. Describes a condition of suspended animation in which something is so wedged or hung that it makes no response. If you are typing on a terminal and suddenly the computer doesn't even echo the letters back to the screen as you type, ...
cdr => /ku'dr/ or /kuh'dr/ [from LISP] vt. To skip past the first item from a list of things (generalized from the LISP operation on binary tree structures, which returns a list consisting of all but the first element of its argument). In the form `c...
chad => /chad/ n. 1. The perforated edge strips on printer paper, after they have been separated from the printed portion. Also called selvage and perf. 2. obs. The confetti-like paper bits punched out of cards or paper tape; this was also called `ch...
chad box => n. {Iron Age} card punches contained boxes inside them, about the size of a lunchbox (or in some models a large wastebasket), that held the chad (sense 2). You had to open the covers of the card punch periodically and empty the chad box. ...

factpacks/jargon.fact  view on Meta::CPAN

golf-ball printer => n. The IBM 2741, a slow but letter-quality printing device and terminal based on the IBM Selectric typewriter. The `golf ball' was a round object bearing reversed embossed images of 88 different characters arranged on four meridi...
golf-ball printer2 => font by swapping in a different golf ball. This was the technology that enabled APL to use a non-EBCDIC, non-ASCII, and in fact completely non-standard character set. This put it 10 years ahead of its time --- where it stayed, f...
golf-ball printer3 => character displays gave way to programmable bit-mapped devices with the flexibility to support other character sets. 
gonk => /gonk/ vt.,n. 1. To prevaricate or to embellish the truth beyond any reasonable recognition. It is alleged that in German the term is (mythically) `gonken'; in Spanish the verb becomes `gonkar'. "You're gonking me. That story you just told me...
gonkulator => /gon'kyoo-lay-tr/ [from the old "Hogan's Heroes" TV series] n. A pretentious piece of equipment that actually serves no useful purpose. Usually used to describe one's least favorite piece of computer hardware. See gonk.
gonzo => /gon'zoh/ [from Hunter S. Thompson] adj. Overwhelming; outrageous; over the top; very large, esp. used of collections of source code, source files, or individual functions. Has some of the connotations of moby and hairy, but without the impl...
Good Thing => n.,adj. Often capitalized; always pronounced as if capitalized. 1. Self-evidently wonderful to anyone in a position to notice "The Trailblazer's 19.2Kbaud PEP mode with on-the-fly Lempel-Ziv compression is a Good Thing for sites relayin...
Good Thing2 => possibly have any ill side-effects and may save considerable grief later "Removing the self-modifying code from that shared library would be a Good Thing." 3. When said of software tools or libraries, as in "YACC is a Good Thing", spec...
Good Thing3 => drastically reduced a programmer's work load. Oppose {Bad Thing}. 
gorilla arm => n. The side-effect that destroyed touch-screens as a mainstream input technology despite a promising start in the early 1980s. It seems the designers of all those spiffy touch-menu systems failed to notice that humans aren't designed t...
gorilla arm2 => their faces making small motions. After more than a very few selections, the arm begins to feel sore, cramped, and oversized; hence `gorilla arm'. This is now considered a classic cautionary tale to human-factors designers; "Remember ...
gorilla arm3 => "How is this going to fly in *real* use?". 
gorp => /gorp/ [CMU perhaps from the canonical hiker's food, Good Old Raisins and Peanuts] Another metasyntactic variable, like foo and bar.
GOSMACS => /goz'maks/ [contraction of `Gosling EMACS'] n. The first EMACS-in-C implementation, predating but now largely eclipsed by GNUMACS. Originally freeware; a commercial version is now modestly popular as `UniPress EMACS'. The author (James Gos...
Gosperism => /gos'p*r-izm/ A hack, invention, or saying by arch-hacker R. William (Bill) Gosper. This notion merits its own term because there are so many of them. Many of the entries in HAKMEM are Gosperisms; see also life.
gotcha => n. A misfeature of a system, especially a programming language or environment, that tends to breed bugs or mistakes because it behaves in an unexpected way. For example, a classic gotcha in C is the fact that `if (a=b) code;' is syntactical...
GPL => /G-P-L/ n. Abbrev. for `General Public License' in widespread use; see copyleft.
GPV => /G-P-V/ n. Abbrev. for {General Public Virus} in widespread use.
grault => /grawlt/ n. Yet another meta-syntactic variable, invented by Mike Gallaher and propagated by the GOSMACS documentation. See corge.
gray goo => n. A hypothetical substance composed of sagans of sub-micron-sized self-replicating robots programmed to make copies of themselves out of whatever is available. The image that goes with the term is one of the entire biosphere of Earth bei...
gray goo2 => goo. This is the simplest of the {nanotechnology} disaster scenarios, easily refuted by arguments from energy requirements and elemental abundances. Compare {blue goo}. 

factpacks/jargon.fact  view on Meta::CPAN

infant mortality3 => syndrome'). See {bathtub curve}, {burn-in period}. 
infinite => adj. Consisting of a large number of objects; extreme. Used very loosely as in "This program produces infinite garbage." "He is an infinite loser." The word most likely to follow `infinite', though, is hair (it has been pointed out that f...
infinite loop => n. One that never terminates (that is, the machine spins or buzzes forever; the usual symptom is catatonia). There is a standard joke that has been made about each generation's exemplar of the ultra-fast machine "The Cray-3 is so fas...
infinite loop2 => loop in under 2 seconds!" 
infinity => n. 1. The largest value that can be represented in a particular type of variable (register, memory location, data type, whatever). 2. `minus infinity' The smallest such value, not necessarily or even usually the simple negation of plus in...
insanely great => adj. [Mac community, from Steve Jobs; also BSD UNIX people via Bill Joy] Something so incredibly elegant that it is imaginable only to someone possessing the most puissant of hacker-natures.
INTERCAL => /in't*r-kal/ [said by the authors to stand for `Compiler Language With No Pronounceable Acronym'] n. A computer language designed by Don Woods and James Lyon in 1972. INTERCAL is purposely different from all other computer languages in al...
interesting => adj. In hacker parlance, this word has strong connotations of `annoying', or `difficult', or both. Hackers relish a challenge, and enjoy wringing all the irony possible out of the ancient Chinese curse "May you live in interesting time...
Internet address => n. 1. [techspeak] An absolute network address of the form foo@bar.baz, where foo is a user name, bar is a sitename, and baz is a `domain' name, possibly including periods itself. Contrast with {bang path}; see also {network, the} ...
Internet address2 => Internet machines and most UUCP sites can now resolve these addresses, thanks to a large amount of behind-the-scenes magic and PD software written since 1980 or so. See also {bang path}, domainist. 2. More loosely, any network ad...
Internet address3 => this includes {bang path} addresses and some internal corporate and government networks. Reading Internet addresses is something of an art. Here are the four most important top-level functional Internet domains followed by a sele...
Internet address4 => com commercial organizations edu educational institutions gov U.S. government civilian sites mil U.S. military sites Note that most of the sites in the com and edu domains are in the U.S. or Canada. us sites in See: Internet addr...
Internet address5 => the U.S. outside the functional domains su sites in the Soviet Union (see kremvax). uk sites in the United Kingdom Within the us domain, there are subdomains for the fifty states, each generally with a name identical to the state...
Internet address6 => abbreviation. Within the uk domain, there is an ac subdomain for academic sites and a co domain for commercial ones. Other top-level domains may be divided up in similar ways. 
interrupt => 1. [techspeak] n. On a computer, an event that interrupts normal processing and temporarily diverts flow-of-control through an "interrupt handler" routine. See also trap. 2. interj. A request for attention from a hacker. Often explicitly...
interrupt list, the => [MS-DOS] n. The list of all known software interrupt calls (both documented and undocumented) for IBM PCs and compatibles, maintained and made available for free redistribution by Ralf Brown (ralf@cs.cmu.edu). As of early 1991,...
interrupts locked out => When someone is ignoring you. In a restaurant, after several fruitless attempts to get the waitress's attention, a hacker might well observe "She must have interrupts locked out". The synonym `interrupts disabled' is also com...
interrupts locked out2 => have one's interrupt mask bit set" or "interrupts masked out" is also heard. See also spl. 
iron => n. Hardware, especially older and larger hardware of mainframe class with big metal cabinets housing relatively low-density electronics (but the term is also used of modern supercomputers). Often in the phrase {big iron}. Oppose silicon. See ...
Iron Age => n. In the history of computing, 1961--1971 --- the formative era of commercial mainframe technology, when {big iron} dinosaurs ruled the earth. These began with the delivery of the first PDP-1, coincided with the dominance of ferrite core...
Iron Age2 => introduction of the first commercial microprocessor (the Intel 4004) in 1971. See also {Stone Age}; compare {elder days}. 

factpacks/jargon.fact  view on Meta::CPAN

Matrix: [FidoNet] n. 1. What the Opus BBS software and sysops call => FidoNet. 2. Fanciful term for a cyberspace expected to emerge from current networking experiments (see {network, the}). Some people refer to the totality of present networks this w...
Mbogo, Dr. Fred: /*m-boh'goh, dok'tr fred/ [Stanford] n. The => archetypal man you don't want to see about a problem, esp. an incompetent professional; a shyster. "Do you know a good eye doctor?" "Sure, try Mbogo Eye Care and Professional Dry Cleanin...
Mbogo, Dr. Fred: /*m-boh'goh, dok'tr fred/ [Stanford] n. The2 => between bogus and the original Dr. Mbogo, a witch doctor who was Gomez Addams' physician on the old "Addams Family" TV show. See also fred. 
meatware => n. Synonym for wetware. Less common.
meeces => /mees'*z/ [TMRC] n. Occasional furry visitors who are not urchins. [That is, mice. This may no longer be in live use; it clearly derives from the refrain of the early-1960s cartoon character Mr. Jinx: "I hate meeces to *pieces*!" --- ESR]
meg => /meg/ n. See {quantifiers}.
mega- => /me'g*/ [SI] pref. See {quantifiers}.
megapenny => /meg'*-pen`ee/ n. $10,000 (1 cent * 10^6). Used semi-humorously as a unit in comparing computer cost and performance figures.
MEGO => /me'goh/ or /mee'goh/ [`My Eyes Glaze Over', often `Mine Eyes Glazeth (sic) Over', attributed to the futurologist Herman Kahn] Also `MEGO factor'. 1. n. A handwave intended to confuse the listener and hopefully induce agreement because the li...
meltdown, network => n. See {network meltdown}.
meme => /meem/ [coined on analogy with `gene' by Richard Dawkins] n. An idea considered as a replicator, esp. with the connotation that memes parasitize people into propagating them much as viruses do. Used esp. in the phrase `meme complex' denoting ...
meme plague => n. The spread of a successful but pernicious meme, esp. one that parasitizes the victims into giving their all to propagate it. Astrology, BASIC, and the other guy's religion are often considered to be examples. This usage is given poi...
meme plague2 => `joiner' ideologies like Naziism or various forms of millennarian Christianity have exhibited plague-like cycles of exponential growth followed by collapses to small reservoir populations. 
memetics => /me-met'iks/ [from meme] The study of memes. As of mid-1991, this is still an extremely informal and speculative endeavor, though the first steps towards at least statistical rigor have been made by H. Keith Henson and others. Memetics is...
memory leak => n. An error in a program's dynamic-store allocation logic that causes it to fail to reclaim discarded memory, leading to eventual collapse due to memory exhaustion. Also (esp. at CMU) called {core leak}. See {aliasing bug}, {fandango o...
memory leak2 => {precedence lossage}, {overrun screw}, {leaky heap}, leak. 
menuitis => /men`yoo-i:'tis/ n. Notional disease suffered by software with an obsessively simple-minded menu interface and no escape. Hackers find this intensely irritating and much prefer the flexibility of command-line or language-style interfaces,...
mess-dos => /mes-dos/ n. Derisory term for MS-DOS. Often followed by the ritual banishing "Just say No!" See {MS-DOS}. Most hackers (even many MS-DOS hackers) loathe MS-DOS for its single-tasking nature, its limits on application size, its nasty prim...
meta => /me't*/ or /may't*/ or (Commonwealth) /mee't*/ [from analytic philosophy] adj.,pref. One level of description up. A meta-syntactic variable is a variable in notation used to describe syntax, and meta-language is language used to describe lang...
meta bit => n. The top bit of an 8-bit character, which is on in character values 128--255. Also called {high bit}, {alt bit}, or hobbit. Some terminals and consoles (see {space-cadet keyboard}) have a META shift key. Others (including, *mirabile dic...
meta bit2 => machines) have an ALT key. See also {bucky bits}. 

factpacks/jargon.fact  view on Meta::CPAN

middle-endian => adj. Not big-endian or little-endian. Used of perverse byte orders such as 3-4-1-2 or 2-1-4-3, occasionally found in the packed-decimal formats of minicomputer manufacturers who shall remain nameless. See {NUXI problem}.
milliLampson => /mil'*-lamp`sn/ n. A unit of talking speed, abbreviated mL. Most people run about 200 milliLampsons. Butler Lampson (a CS theorist and systems implementor highly regarded among hackers) goes at 1000. A few people speak faster. This un...
minifloppies => n. 5.25-inch vanilla floppy disks, as opposed to 3.5-inch or microfloppies and the now-obsolescent 8-inch variety. At one time, this term was a trademark of Shugart Associates for their SA-400 minifloppy drive. Nobody paid any attenti...
MIPS => /mips/ [acronym] n. 1. A measure of computing speed; formally, `Million Instructions Per Second' (that's 10^6 per second, not 2^20!); often rendered by hackers as `Meaningless Indication of Processor Speed' or in other unflattering ways. This...
misbug => /mis-buhg/ [MIT] n. An unintended property of a program that turns out to be useful; something that should have been a bug but turns out to be a feature. Usage: rare. Compare {green lightning}. See miswart.
misfeature => /mis-fee'chr/ or /mis'fee`chr/ n. A feature that eventually causes lossage, possibly because it is not adequate for a new situation which has evolved. It is not the same as a bug, because fixing it involves a substantial philosophical c...
Missed'em-five => n. Pejorative hackerism for AT&T System V UNIX, generally used by BSD partisans in a bigoted mood. (The synonym `SysVile' is also encountered.) See {software bloat}, Berzerkeley.
miswart => /mis-wort/ [from wart by analogy with misbug] n. A feature that superficially appears to be a wart but has been determined to be the {Right Thing}. For example, in some versions of the EMACS text editor, the `transpose characters' command ...
mod => vt.,n. 1. Short for `modify' or `modification'. Very commonly used --- in fact the full terms are considered markers that one is being formal. The plural `mods' is used esp. with reference to bug fixes or minor design changes in hardware or so...
mode => n. A general state, usually used with an adjective describing the state. Use of the word `mode' rather than `state' implies that the state is extended over time, and probably also that some activity characteristic of that state is being carri...
mode bit => n. A flag, usually in hardware, that selects between two (usually quite different) modes of operation. The connotations are different from flag bit in that mode bits are mainly written during a boot or set-up phase, are seldom explicitly ...
mode bit2 => lifetime of an ordinary program. The classic example was the EBCDIC-vs.-ASCII bit (#12) of the Program Status Word of the IBM 360. Another was the bit on a PDP-12 that controlled whether it ran the PDP-8 or the LINC instruction set. 
modulo => /mo'dyu-loh/ prep. Except for. From mathematical terminology; one can consider saying that 4 = 22 except for the 9s (4 = 22 mod 9). "Well, LISP seems to work okay now, modulo that GC bug." "I feel fine today modulo a slight headache."
molly-guard => /mol'ee-gard/ [University of Illinois] n. A shield to prevent tripping of some {Big Red Switch} by clumsy or ignorant hands. Originally used of some plexiglass covers improvised for the BRS on an IBM 4341 after a programmer's toddler d...
Mongolian Hordes technique => n. Development by {gang bang} (poss. from the Sixties counterculture expression `Mongolian clusterfuck' for a public orgy). Implies that large numbers of inexperienced programmers are being put on a job better performed ...
Mongolian Hordes technique2 => `Chinese Army technique'; see also {Brooks's Law}. 
monkey up => vt. To hack together hardware for a particular task, especially a one-shot job. Connotes an extremely crufty and consciously temporary solution. Compare {hack up}, {kluge up}, {cruft together}, {cruft together}.
monkey, scratch => n. See {scratch monkey}.
monstrosity => 1. n. A ridiculously elephantine program or system, esp. one that is buggy or only marginally functional. 2. The quality of being monstrous (see `Overgeneralization' in the discussion of jargonification). See also baroque.
Moof => /moof/ [MAC users] n. The Moof or `dogcow' is a semi-legendary creature that lurks in the depths of the Macintosh Technical Notes Hypercard stack V3.1; specifically, the full story of the dogcow is told in technical note #31 (the particular M...
Moore's Law => /morz law/ prov. The observation that the logic density of silicon integrated circuits has closely followed the curve (bits per square inch) = 2^{(n - 1962)}; that is, the amount of information storable in one square inch of silicon ha...
Moore's Law2 => since the technology was invented. See also {Parkinson's Law of Data}. 
moria => /mor'ee-*/ n. Like nethack and rogue, one of the large PD Dungeons-and-Dragons-like simulation games, available for a wide range of machines and operating systems. Extremely addictive and a major consumer of time better used for hacking.
MOTAS => /moh-toz/ [USENET: Member Of The Appropriate Sex, after MOTOS and MOTSS] n. A potential or (less often) actual sex partner. See also SO.
MOTOS => /moh-tohs/ [acronym from the 1970 U.S. census forms via USENET: Member Of The Opposite Sex] n. A potential or (less often) actual sex partner. See MOTAS, MOTSS, SO. Less common than MOTSS or MOTAS, which have largely displaced it.
MOTSS => /mots/ or /M-O-T-S-S/ [from the 1970 U.S. census forms via USENET, Member Of The Same Sex] n. Esp. one considered as a possible sexual partner. The gay-issues newsgroup on USENET is called soc.motss. See MOTOS and MOTAS, which derive from it...
mouse ahead => vi. Point-and-click analog of `type ahead'. To manipulate a computer's pointing device (almost always a mouse in this usage, but not necessarily) and its selection or command buttons before a computer program is ready to accept such in...
mouse ahead2 => accepting the input. Handling this properly is rare, but it can help make a {WIMP environment} much more usable, assuming the users are familiar with the behavior of the user interface. 
mouse around => vi. To explore public portions of a large system, esp. a network such as Internet via FTP or TELNET, looking for interesting stuff to snarf.
mouse belt => n. See {rat belt}.
mouse droppings => [MS-DOS] n. Pixels (usually single) that are not properly restored when the mouse pointer moves away from a particular location on the screen, producing the appearance that the mouse pointer has left droppings behind. The major cau...
mouse droppings2 => that write to the screen memory corresponding to the mouse pointer's current location without hiding the mouse pointer first, and mouse drivers that do not quite support the graphics mode in use. 
mouse elbow => n. A tennis-elbow-like fatigue syndrome resulting from excessive use of a {WIMP environment}. Similarly, `mouse shoulder'; GLS reports that he used to get this a lot before he taught himself to be ambimoustrous.
mouso => /mow'soh/ n. [by analogy with `typo'] An error in mouse usage resulting in an inappropriate selection or graphic garbage on the screen. Compare thinko, braino.
MS-DOS => /M-S-dos/ [MicroSoft Disk Operating System] n. A clone of {CP/M} for the 8088 crufted together in 6 weeks by hacker Tim Paterson, who is said to have regretted it ever since. Numerous features, including vaguely UNIX-like but rather broken ...
mu => /moo/ The correct answer to the classic trick question "Have you stopped beating your wife yet?". Assuming that you have no wife or you have never beaten your wife, the answer "yes" is wrong because it implies that you used to beat your wife an...
mudhead => n. Commonly used to refer to a MUD player who sleeps, breathes, and eats MUD. Mudheads have been known to fail their degrees, drop out, etc., with the consolation, however, that they made wizard level. When encountered in person, all a mud...
multician => /muhl-ti'shn/ [coined at Honeywell, ca. 1970] n. Competent user of {Multics}. Perhaps oddly, no one has ever promoted the analogous `Unician'.
Multics => /muhl'tiks/ n. [from "MULTiplexed Information and Computing Service"] An early (late 1960s) timesharing operating system co-designed by a consortium including MIT, GE, and Bell Laboratories. Very innovative for its time --- among other thi...
multitask => n. Often used of humans in the same meaning it has for computers, to describe a person doing several things at once (but see thrash). The term `multiplex', from communications technology (meaning to handle more than one channel at the sa...
mumblage => /muhm'bl*j/ n. The topic of one's mumbling (see mumble). "All that mumblage" is used like "all that stuff" when it is not quite clear how the subject of discussion works, or like "all that crap" when `mumble' is being used as an implicit ...
mumble => interj. 1. Said when the correct response is too complicated to enunciate, or the speaker has not thought it out. Often prefaces a longer answer, or indicates a general reluctance to get into a long discussion. "Don't you think that we coul...
munch => [often confused with mung, q.v.] vt. To transform information in a serial fashion, often requiring large amounts of computation. To trace down a data structure. Related to crunch and nearly synonymous with grovel, but connotes less pain.
munching => n. Exploration of security holes of someone else's computer for thrills, notoriety, or to annoy the system manager. Compare cracker. See also {hacked off}.

factpacks/jargon.fact  view on Meta::CPAN

RTM => /R-T-M/ [USENET acronym for `Read The Manual'] 1. Politer variant of RTFM. 2. Robert T. Morris, perpetrator of the great Internet worm of 1988; villain to many, na"ive hacker gone wrong to a few. Morris claimed that the worm that brought the I...
rude => [WPI] adj. 1. (of a program) Badly written. 2. Functionally poor, e.g., a program that is very difficult to use because of gratuitously poor (random?) design decisions. See cuspy.
runes => pl.n. 1. Anything that requires {heavy wizardry} or {black art} to parse core dumps, JCL commands, APL, or code in a language you haven't a clue how to read. Compare {casting the runes}, {Great Runes}. 2. Special display characters (for exam...
runic => adj. Syn. obscure. VMS fans sometimes refer to UNIX as `Runix'; UNIX fans return the compliment by expanding VMS to `Very Messy Syntax' or `Vachement Mauvais Syst`eme' (French; lit. "Cowlike Bad System", idiomatically "Bitchy Bad System").
rusty iron => n. Syn. {tired iron}. It has been claimed that this is the inevitable fate of {water MIPS}.
rusty memory => n. Mass-storage that uses iron-oxide-based magnetic media (esp. tape and the pre-Winchester removable disk packs used in {washing machine}s). Compare donuts.*S/N ratio // n. (also `s/n ratio', `sn ratio'). Syn. {signal-to-noise ratio}...
sacred => adj. Reserved for the exclusive use of something (an extension of the standard meaning). Often means that anyone may look at the sacred object, but clobbering it will screw whatever it is sacred to. The comment "Register 7 is sacred to the ...
saga => [WPI] n. A cuspy but bogus raving story about N random broken people.
sagan => /say'gn/ [from Carl Sagan's TV series "Cosmos"; think "billions and billions"] n. A large quantity of anything. "There's a sagan different ways to tweak EMACS." "The U.S. Government spends sagans on bombs and welfare --- hard to say which is...
SAIL => /sayl/, not /S-A-I-L/ n. 1. Stanford Artificial Intelligence Lab. An important site in the early development of LISP; with the MIT AI Lab, BBN, CMU, and the UNIX community, one of the major wellsprings of technical innovation and hacker-cultu...
salescritter => /sayls'kri`tr/ n. Pejorative hackerism for a computer salesperson. Hackers tell the following joke Q. What's the difference between a used-car dealer and a computer salesman? A. The used-car dealer knows he's lying. This reflects the ...
salsman => /salz'm*n/ v. To flood a mailing list or newsgroup with huge amounts of useless, trivial or redundant information. From the name of a hacker who has frequently done this on some widely distributed mailing lists.
salt mines => n. Dense quarters housing large numbers of programmers working long hours on grungy projects, with some hope of seeing the end of the tunnel in N years. Noted for their absence of sunshine. Compare playpen, sandbox.
salt substrate => [MIT] n. Collective noun used to refer to potato chips, pretzels, saltines, or any other form of snack food designed primarily as a carrier for sodium chloride. From the technical term `chip substrate', used to refer to the silicon ...
salt substrate2 => of integrated circuits are deposited. 
same-day service => n. Ironic term used to describe long response time, particularly with respect to {MS-DOS} system calls (which ought to require only a tiny fraction of a second to execute). Such response time is a major incentive for programmers t...
same-day service2 => well-behaved. See also PC-ism. 
sandbender => [IBM] n. A person involved with silicon lithography and the physical design of chips. Compare ironmonger, {polygon pusher}.
sandbox => n. (or `sandbox, the') Common term for the R&D department at many software and computer companies (where hackers in commercial environments are likely to be found). Half-derisive, but reflects the truth that research is a form of creative ...
sanity check => n. 1. The act of checking a piece of code (or anything else, e.g., a USENET posting) for completely stupid mistakes. Implies that the check is to make sure the author was sane when it was written; e.g., if a piece of scientific softwa...
sanity check2 => was giving unexpected results, one might first look at the nesting of parentheses or the coding of the formula, as a {sanity check}, before looking at the more complex I/O or data structure manipulation routines, much less the algori...

factpacks/jargon.fact  view on Meta::CPAN

toy => n. A computer system; always used with qualifiers. 1. `nice toy One that supports the speakers hacking style adequately. 2. `just a toy A machine that yields insufficient computrons for the speakers preferred uses. This is not condemnatory, as...
toy language => n. A language useful for instructional purposes or as a proof-of-concept for some aspect of computer-science theory, but inadequate for general-purpose programming. {Bad Thing}s can result when a toy language is promoted as a general ...
toy language2 => (see {bondage-and-discipline language}); the classic example is {Pascal}. Several moderately well-known formalisms for conceptual tasks such as programming Turing machines also qualify as toy languages in a less negative sense. See a...
toy problem => [AI] n. A deliberately oversimplified case of a challenging problem used to investigate, prototype, or test algorithms for a real problem. Sometimes used pejoratively. See also gedanken, {toy program}.
toy program => n. 1. One that can be readily comprehended; hence, a trivial program (compare noddy). 2. One for which the effort of initial coding dominates the costs through its life cycle. See also noddy.
trampoline => n. An incredibly hairy technique, found in some HLL and program-overlay implementations (e.g., on the Macintosh), that involves on-the-fly generation of small executable (and, likely as not, self-modifying) code objects to do indirectio...
trap => 1. n. A program interrupt, usually an interrupt caused by some exceptional situation in the user program. In most cases, the OS performs some action, then returns control to the program. 2. vi. To cause a trap. "These instructions trap to the...
trap door => alt. `trapdoor n. 1. Syn. {back door}. 2. [techspeak] A `trap-door function is one which is easy to compute but very difficult to compute the inverse of. Such functions have important applications in cryptography, specifically in the con...
trash => vt. To destroy the contents of (said of a data structure). The most common of the family of near-synonyms including mung, mangle, and scribble.
tree-killer => [Sun] n. 1. A printer. 2. A person who wastes paper. This should be interpreted in a broad sense; `wasting paper includes the production of spiffy but content-free documents. Thus, most suits are tree-killers.
trit => /trit/ [by analogy with `bit] n. One base-3 digit; the amount of information conveyed by a selection among one of three equally likely outcomes (see also bit). These arise, for example, in the context of a flag that should actually be able to...
trivial => adj. 1. Too simple to bother detailing. 2. Not worth the speakers time. 3. Complex, but solvable by methods so well known that anyone not utterly cretinous would have thought of them already. 4. Any problem one has already solved (some cla...
troglodyte => [Commodore] n. 1. A hacker who never leaves his cubicle. The term `Gnoll (from Dungeons & Dragons) is also reported. 2. A curmudgeon attached to an obsolescent computing environment. The combination `ITS troglodyte was flung around some...
troglodyte mode => [Rice University] n. Programming with the lights turned off, sunglasses on, and the terminal inverted (black on white) because youve been up for so many days straight that your eyes hurt (see {raster burn}). Loud music blaring from...
troglodyte mode2 => optional but recommended. See {larval stage}, {hack mode}. 
Trojan horse => [coined by MIT-hacker-turned-NSA-spook Dan Edwards] n. A program designed to break security or damage a system that is disguised as something else benign, such as a directory lister, archiver, a game, or (in one notorious 1990 case on...
Trojan horse2 => destroy viruses! See {back door}, virus, worm. 
true-hacker => [analogy with `trufan from SF fandom] n. One who exemplifies the primary values of hacker culture, esp. competence and helpfulness to other hackers. A high compliment. "He spent 6 hours helping me bring up UUCP and netnews on my FOOBAR...
tty => /T-T-Y/ [UNIX], /titee/ [ITS, but some UNIX people say it this way as well; this pronunciation is not considered to have sexual undertones] n. 1. A terminal of the teletype variety, characterized by a noisy mechanical printer, a very limited c...
tube => 1. n. A CRT terminal. Never used in the mainstream sense of TV; real hackers dont watch TV, except for Loony Toons, Rocky & Bullwinkle, Trek Classic, the Simpsons, and the occasional cheesy old swashbuckler movie (see appendix B). 2. [IBM] To...
tube time => n. Time spent at a terminal or console. More inclusive than hacking time; commonly used in discussions of what parts of ones environment one uses most heavily. "I find Im spending too much of my tube time reading mail since I started thi...

factpacks/pTkfunc.fact  view on Meta::CPAN

pack => Geometry manager that packs around edges of cavity - TkGeometry Management
place => Geometry manager for fixed or rubber-sheet placement - TkGeometry Management
raise => Change a window's position in the stacking order - TkGeometry Management
bitmap => Images that display two colors - TkImage Classes
image => Create and manipulate images - TkImage Classes
photo => Full-color images - TkImage Classes
Tk_BackgroundError => report Tcl error that occurred in background processing - TkLibrary Procedures
Tk_CanvasPsY => utility procedures for generating Postscript for canvases - TkLibrary Procedures
Tk_CanvasTextInfo => additional information for managing text items in canvases - TkLibrary Procedures
Tk_CanvasTkwin => utility procedures for canvas type managers - TkLibrary Procedures
Tk_ClearSelection => Deselect a selection - TkLibrary Procedures
Tk_ClipboardClear => Manage the clipboard - TkLibrary Procedures
Tk_ConfigureWidget => process configuration options for widgets - TkLibrary Procedures
Tk_ConfigureWindow => change window configuration or attributes - TkLibrary Procedures
Tk_CoordsToWindow => Find window containing a point - TkLibrary Procedures
Tk_CreateBindingTable => invoke scripts in response to X events - TkLibrary Procedures
Tk_CreateErrorHandler => handle X protocol errors - TkLibrary Procedures
Tk_CreateEventHandler => associate procedure callback with an X event - TkLibrary Procedures
Tk_CreateFileHandler => associate procedure callbacks with files or devices - TkLibrary Procedures
Tk_CreateGenericHandler => associate procedure callback with all X events - TkLibrary Procedures
Tk_CreateImageType => define new kind of image - TkLibrary Procedures
Tk_CreateItemType => define new kind of canvas item - TkLibrary Procedures
Tk_CreateMainWindow => create or delete window - TkLibrary Procedures
Tk_CreatePhotoImageFormat => define new file format for photo images - TkLibrary Procedures
Tk_CreateSelHandler => arrange to handle requests for a selection - TkLibrary Procedures
Tk_CreateTimerHandler => call a procedure at a - TkLibrary Procedures
Tk_DeleteImage => Destroy an image. - TkLibrary Procedures
Tk_DoOneEvent => wait for events and - TkLibrary Procedures
Tk_DoWhenIdle => invoke a procedure when there are no pending events - TkLibrary Procedures
Tk_DrawFocusHighlight => draw the traversal highlight ring for a widget - TkLibrary Procedures
Tk_EventInit => Use the Tk event loop without the rest of Tk - TkLibrary Procedures
Tk_FindPhoto => manipulate the image data stored in a photo image. - TkLibrary Procedures
Tk_FreeXId => make X resource identifier available for reuse - TkLibrary Procedures
Tk_GeometryRequest => specify desired geometry or internal border for a window - TkLibrary Procedures
Tk_Get3DBorder => draw borders with three-dimensional appearance - TkLibrary Procedures

factpacks/pTkfunc.fact  view on Meta::CPAN

Tk_GetGC => maintain database of read-only graphics contexts - TkLibrary Procedures
Tk_GetImage => use an image in a widget - TkLibrary Procedures
Tk_GetJoinStyle => translate between strings and join styles - TkLibrary Procedures
Tk_GetJustify => translate between strings and justification styles - TkLibrary Procedures
Tk_GetOption => retrieve an option from the option database - TkLibrary Procedures
Tk_GetPixels => translate between strings and screen units - TkLibrary Procedures
Tk_GetPixmap => allocate and free pixmaps - TkLibrary Procedures
Tk_GetRelief => translate between strings and relief values - TkLibrary Procedures
Tk_GetRootCoords => Compute root-window coordinates of window - TkLibrary Procedures
Tk_GetScrollInfo => parse arguments for scrolling commands - TkLibrary Procedures
Tk_GetSelection => retrieve the contents of a selection - TkLibrary Procedures
Tk_GetUid => convert from string to unique identifier - TkLibrary Procedures
Tk_GetVRootGeometry => Get location and size of virtual root for window - TkLibrary Procedures
Tk_GetVisual => translate from string to visual - TkLibrary Procedures
Tk_IdToWindow => Find Tk's window information for an X window - TkLibrary Procedures
Tk_ImageChanged => notify widgets that image needs to be redrawn - TkLibrary Procedures
Tk_InternAtom => manage cache of X atoms - TkLibrary Procedures
Tk_Main => main program for Tk-based applications - TkLibrary Procedures
Tk_MainWindow => find the main window for an application - TkLibrary Procedures
Tk_MaintainGeometry => maintain geometry of one window relative to another - TkLibrary Procedures
Tk_ManageGeometry => arrange to handle geometry requests for a window - TkLibrary Procedures
Tk_MapWindow => map or unmap a window - TkLibrary Procedures
Tk_MoveToplevelWindow => Adjust the position of a top-level window - TkLibrary Procedures
Tk_Name => convert between names and window tokens - TkLibrary Procedures
Tk_NameOfImage => Return name of image. - TkLibrary Procedures
Tk_OwnSelection => make a window the owner of the primary selection - TkLibrary Procedures
Tk_ParseArgv => process command-line options - TkLibrary Procedures
Tk_Preserve => avoid freeing storage while it's being used - TkLibrary Procedures
Tk_RestackWindow => Change a window's position in the stacking order - TkLibrary Procedures
Tk_RestrictEvents => filter and selectively delay X events - TkLibrary Procedures
Tk_SetAppName => Set the name of an application for ``send'' commands - TkLibrary Procedures
Tk_SetClass => set or retrieve a window's class - TkLibrary Procedures
Tk_SetGrid => control the grid for interactive resizing - TkLibrary Procedures
Tk_SetWindowVisual => change visual characteristics of window - TkLibrary Procedures
Tk_Sleep => delay execution for a given number of milliseconds - TkLibrary Procedures
Tk_StrictMotif => Return value of tk_strictMotif variable - TkLibrary Procedures
Tk_WindowId => retrieve information from Tk's local data structure - TkLibrary Procedures
clipboard => Manipulate Tk clipboard - TkSelection Handling
selection => Manipulate the X selection - TkSelection Handling
bell => Ring a display's bell - TkUser Interaction
focus => Manage the input focus - TkUser Interaction
focusNext => Utility methods for managing the input focus. - TkUser Interaction
grab => Confine pointer and keyboard events to a window sub-tree - TkUser Interaction
tkwait => Wait for variable to change or window to be destroyed - TkUser Interaction
AXIS => Canvas with Axes - perl/TkDocumentation
BLIB => Use MakeMaker's uninstalled version of a package - perl/TkDocumentation
DIAL => an alternative to the scale widget - perl/TkDocumentation
DRAGDROP/COMMON => private class used by Drag&amp;Drop - perl/TkDocumentation
DRAGDROP/SUNCONST => Constants for Sun's Drag&amp;Drop protocol  - perl/TkDocumentation

factpacks/rfc_index.fact  view on Meta::CPAN

rfc 1940 => Source Demand Routing: Packet Format and Forwarding Specification (Version 1). D. Estrin, T. Li, Y. Rekhter, K. Varadhan, D. Zappala. May 1996. (Format: TXT=60858 bytes) (Status: INFORMATIONAL)
rfc 1939 => Post Office Protocol - Version 3. J. Myers & M. Rose. May 1996. (Format: TXT=47018 bytes) (Obsoletes RFC1725) (Updated by RFC1957) (Also STD0053) (Status: STANDARD)
rfc 1938 => A One-Time Password System. N. Haller & C. Metz. May 1996. (Format: TXT=44844 bytes) (Obsoleted by RFC2289) (Status: PROPOSED STANDARD)
rfc 1937 => "Local/Remote" Forwarding Decision in Switched Data Link Subnetworks. Y. Rekhter & D. Kandlur. May 1996. (Format: TXT=18302 bytes) (Status: INFORMATIONAL)
rfc 1936 => Implementing the Internet Checksum in Hardware. J. Touch & B. Parham. April 1996. (Format: TXT=36618 bytes) (Status: INFORMATIONAL)
rfc 1935 => What is the Internet, Anyway?. J. Quarterman & S. Carl-Mitchell. April 1996. (Format: TXT=30369 bytes) (Status: INFORMATIONAL)
rfc 1934 => Ascend's Multilink Protocol Plus (MP+). K. Smith. April 1996. (Format: TXT=87072 bytes) (Status: INFORMATIONAL)
rfc 1933 => Transition Mechanisms for IPv6 Hosts and Routers. R. Gilligan & E. Nordmark. April 1996. (Format: TXT=47005 bytes) (Status: PROPOSED STANDARD)
rfc 1932 => IP over ATM: A Framework Document. R. Cole, D. Shur, & C. Villamizar. April 1996. (Format: TXT=68031 bytes) (Status: INFORMATIONAL)
rfc 1931 => Dynamic RARP Extensions for Automatic Network Address Acquisition. D. Brownell. April 1996. (Format: TXT=27544 bytes) (Status: INFORMATIONAL)
rfc 1930 => Guidelines for creation, selection, and registration of an Autonomous System (AS). J. Hawkinson, T. Bates. March 1996. (Format: TXT=22073 bytes) (Also BCP0006) (Status: BEST CURRENT PRACTICE)
rfc 1929 => Username/Password Authentication for SOCKS V5. M. Leech. April 1996. (Format: TXT=3568 bytes) (Status: PROPOSED STANDARD)
rfc 1928 => SOCKS Protocol Version 5. M. Leech, M. Ganis, Y. Lee, R. Kuris, D. Koblas & L. Jones. April 1996. (Format: TXT=19741 bytes) (Status: PROPOSED STANDARD)
rfc 1927 => Suggested Additional MIME Types for Associating Documents. C. Rogers. April 1996. (Format: TXT=5254 bytes) (Status: INFORMATIONAL)
rfc 1926 => An Experimental Encapsulation of IP Datagrams on Top of ATM. J. Eriksson. April 1996. (Format: TXT=2969 bytes) (Status: INFORMATIONAL)
rfc 1925 => The Twelve Networking Truths. R. Callon. April 1996. (Format: TXT=4294 bytes) (Status: INFORMATIONAL)
rfc 1924 => A Compact Representation of IPv6 Addresses. R. Elz. April 1996. (Format: TXT=10409 bytes) (Status: INFORMATIONAL)
rfc 1923 => RIPv1 Applicability Statement for Historic Status. J. Halpern & S. Bradner. March 1996. (Format: TXT=5560 bytes) (Status: INFORMATIONAL)
rfc 1922 => Chinese Character Encoding for Internet Messages. HF. Zhu, DY. Hu, ZG. Wang, TC. Kao, WCH. Chang & M. Crispi. March 1996. (Format: TXT=50995 bytes) (Status: INFORMATIONAL)
rfc 1921 => TNVIP Protocol. J. Dujonc. March 1996. (Not online) (Status: INFORMATIONAL)
rfc 1920 => INTERNET OFFICIAL PROTOCOL STANDARDS. J. Postel. March 1996. (Format: TXT=91936 bytes) (Obsoletes RFC1780, RFC1720, RFC1800, RFC1880) (Obsoleted by RFC2109, RFC2000, RFC2200, STD0001) (Also STD0001) (Status: HISTORIC)

factpacks/security.fact  view on Meta::CPAN

compromising emanations => Unintentional data-related or intelligence-bearing signals that, if intercepted and analyzed, disclose the information transmission received, handled, or otherwise processed by any information processing equipment.  See TEM...
CSTVRP => Computer Security Technical Vulnerability Reporting Program - A program that focuses on technical vulnerabilities in commercially available hardware, firmware and software products acquired by DoD.  CSTVRP provides for the reporting, catalo...
abuse => The misuse, alteration, disruption or destruction of data processing resources.  The key aspect is that it is intentional and improper.
architecture => The set of layers and protocols (including formats and standards that different hardware/software must comply with to achieve stated objectives) which define a computer system. Computer architecture features can be available to applic...
cryptography => The use of a crypto-algorithm in a computer, microprocessor, or microcomputer to perform encryption or decryption in order to protect information or to authenticate users, sources, or information.
fraud => Computer-related crimes involving deliberate misrepresentation, alteration or disclosure of data in order to obtain something of value (usually for monetary gain).  A computer system must have been involved in the perpetration or coverup of ...
security => Synonymous with automated information systems security.
security subsystem => A device designed to provide limited computer security features in a larger system environment.
concealment system => A method of achieving confidentiality in which sensitive information is hidden by embedding it in irrelevant data.
confidentiality => (1) The assurance that information is not disclosed to inappropriate entities or processes. (2) The property that information is not made available or disclosed to unauthorized entities. (3) The prevention of the unauthorized discl...
configuration => the selection of one of the sets of possible combinations of features of a Target of Evaluation.
configuration control => management of changes made to a system's hardware, software, firmware, and documentation throughout the development and operational life of the system.
configuration management => The management of security features and assurances through control of changes made to a system's hardware, software, firmware, documentation, test, test fixtures and test documentation throughout the development and operat...
confinement => The prevention of the leaking of sensitive data from a program.
confinement channel => Synonymous with covert channel.
confinement property => Synonymous with star property (*-property).
connection => a liaison, in the sense of a network interrelationship, between two hosts for a period of time. The liaison is established (by an initiating host) for the purpose of information transfer (with the associated host); the period of time is...
constrained => A qualifier implying: within the TSF Scope of Control
construction => the process of creating a Target of Evaluation.
consumers => Individuals or groups responsible for specifying requirements for IT product security (e.g., policy makers and regulatory officials, system architects, integrators, acquisition managers, product purchasers, and end users.
contamination => The intermixing of data at different sensitivity and need-to-know levels.  The lower level data is said to be contaminated by the higher level data; thus, the contaminating (higher level) data may not receive the required level of pr...

factpacks/security.fact  view on Meta::CPAN

evaluation assurance requirements => Requirements in a protection profile which address both the type and the rigor of activities that must occur during product evaluation.
evaluation criteria => A set of requirements defining the conditions under which an evaluation is performed. These requirements can also be used in specification and development of systems and products.
evaluator => the independent person or organisation that performs an evaluation.
evaluator actions => a component of the evaluation criteria for a particular phase or aspect of evaluation, identifying what the evaluator must do to check the information supplied by the sponsor of the evaluator, and the additional activities he mus...
evaluators => Individuals or groups responsible for the independent assessment of IT product security (e.g., product evaluators, system security officers, system certifiers, and system accreditors).
executive state => (1) One of several states in which a system may operate and the only one in which certain privileged instructions may be executed. Such instructions cannot be executed when the system is operating in other (for example, user) state...
explain => Give required information and show that it satisfies all relevant requirements.
exploitable channel => Covert channel that is usable or detectable by subjects external to the AIS's trusted computing base and can be used to violate the AIS's technical security policy. (See covert channel.)
external security controls => Measures which include physical, personnel, procedural, and administrative security requirements and a separate certification and accreditation process that govern physical access to an IT product. <br><br>Note: These me...
fail safe => Pertaining to the automatic protection of programs and/or processing systems to maintain safety when a hardware or software failure is detected in a system.
fail soft => Pertaining to the selective termination of affected nonessential processing when a hardware or software failure is detected in a system.
failure access => An unauthorized and usually inadvertent access to data resulting from a hardware or software failure in the system.
failure control => The methodology used to detect and provide fail-safe or fail-soft recovery from hardware and software failures in a system.
family => Grouping of related components that all address the same type of
fault => A condition that causes a device or system component to fail to perform in a required manner.
fetch protection => (1) A system-provided restriction to prevent a program from accessing data in another user's segment of storage. (2) The aggregate of all processes and procedures in a system designed to inhibit unauthorized access, contamination,...
file protection => The aggregate of all processes and procedures in a system designed to inhibit unauthorized access, contamination, or elimination of a file.
file security => The means by which access to computer files is limited to authorized users only.
flaw => An error of commission, omission, or oversight in a system that allows protection mechanisms to be bypassed.
flaw hypothesis methodology => A system analysis and penetration technique where specifications and documentation for the system are analyzed and then flaws in the system are hypothesized.  The list of hypothesized flaws is then prioritized on the ba...
formal => Based upon precise and unambiguous syntax and semantics. -  Human user - A person who interacts with the TOE.

factpacks/security.fact  view on Meta::CPAN

refinements => Requirement in a protection profile taken to a lower level of abstraction than the component on which it is based. Note: The refinement of a component requirement is necessary when multiple environment-specific requirements must be ass...
reliability => The probability of a given system performing its mission adequately for a specified period of time under the expected operating conditions.
requirements => Phase of the Development Process wherein the top level definition of the functionality of the system is produced.
residual risk => The portion of risk that remains after security measures have been applied.
residue => Data left in storage after processing operations are complete, but before degaussing or rewriting has taken place.
resource => anything used or consumed while performing a function. The categories of resources are: time, information, objects (information containers), or processors (the ability to use information). specific examples are: CPU time; terminal connect...
restricted area => Any area to which access is subject to special restrictions or controls for reasons of security or safeguarding of property or material.
risk => The expected loss due to, or impact of, anticipated threats in light of system vulner- abilities and strength or determination of relevant threat agents.
risk analysis => The process of identifying security risks, determining their magnitude, and identifying areas needing safeguards.  Risk analysis is a part of risk management.  Synonymous with risk assessment.
risk index => The disparity between the minimum clearance or authorization of system users and the maximum sensitivity (e.g., classification and categories) of data processed by a system.  See CSC-STD-003-85 and CSC-STD-004-85 for a complete explanat...
risk management => The total process of identifying, controlling, and eliminating or minimizing uncertain events that may affect system resources. It includes risk analysis, cost benefit analysis, selection, implementation and test, security evaluati...
role => A defined set of functionally related operations, and the authorisations necessary to perform those operations, which may be assigned to users.
RSA => A public key algorithm invented by Ronald L. Rivest, Adi Shamir, and Leonard M. Adleman (RSA). RSA can be used to generate digital signatures, encrypt messages, and provide key management for DES (Data Encryption Standard), RC2 (Rivest Cipher ...
safeguards => See security safeguards.
scavenging => Searching through object residue to acquire unauthorized data.
secrecy policy => a security policy to prevent unauthorized users from reading sensitive information. See also Security Policy
secret key => The key that two parties share and keep secret for secret key cryptography. Given secret key algorithms of equal strength, the approximate difficulty of decrypting encrypted messages by brute force search can be measured by the number o...
secure state => A condition in which no subject can access any object in an unauthorized manner.
secure subsystem => A subsystem that contains its own implementation of the reference monitor concept for those resources it controls.  However, the secure subsystem must depend on other controls and the base operating system for the control of subje...
Security => The combination of confidentiality, integrity and availability. [ITSEC] Security Audit Trail - Set of records that collectively provide documentary evidence of pro- cessing used to aid in tracing from original transactions forward to rela...
security administrator => A user or user role about which assumptions of correct behaviour need to be made to ensure the continuing correct operation of the TOE.



( run in 1.540 second using v1.01-cache-2.11-cpan-49f99fa48dc )